Science.gov

Sample records for agreement protocol based

  1. Comments on an ID-Based Authenticated Group Key Agreement Protocol with Withstanding Insider Attacks

    NASA Astrophysics Data System (ADS)

    Wu, Tsu-Yang; Tseng, Yuh-Min

    In PKC 2004, Choi et al. proposed an ID-based authenticated group key agreement (AGKA) protocol using bilinear pairings. Unfortunately, their protocol suffered from an impersonation attack and an insider colluding attack. In 2008, Choi et al. presented an improvement to resist insider attacks. In their modified protocol, they used an ID-based signature scheme on transcripts for binding them in a session to prevent replay of transcripts. In particular, they smartly used the batch verification technique to reduce the computational cost. In this paper, we first show that Choi et al.'s modified AGKA protocol still suffers from an insider colluding attack. Then, we prove that the batch verification of the adopted ID-based signature scheme in their modified protocol suffers from a forgery attack.

  2. An Enhanced Biometric Based Authentication with Key-Agreement Protocol for Multi-Server Architecture Based on Elliptic Curve Cryptography

    PubMed Central

    Reddy, Alavalapati Goutham; Das, Ashok Kumar; Odelu, Vanga; Yoo, Kee-Young

    2016-01-01

    Biometric based authentication protocols for multi-server architectures have gained momentum in recent times due to advancements in wireless technologies and associated constraints. Lu et al. recently proposed a robust biometric based authentication with key agreement protocol for a multi-server environment using smart cards. They claimed that their protocol is efficient and resistant to prominent security attacks. The careful investigation of this paper proves that Lu et al.’s protocol does not provide user anonymity, perfect forward secrecy and is susceptible to server and user impersonation attacks, man-in-middle attacks and clock synchronization problems. In addition, this paper proposes an enhanced biometric based authentication with key-agreement protocol for multi-server architecture based on elliptic curve cryptography using smartcards. We proved that the proposed protocol achieves mutual authentication using Burrows-Abadi-Needham (BAN) logic. The formal security of the proposed protocol is verified using the AVISPA (Automated Validation of Internet Security Protocols and Applications) tool to show that our protocol can withstand active and passive attacks. The formal and informal security analyses and performance analysis demonstrates that the proposed protocol is robust and efficient compared to Lu et al.’s protocol and existing similar protocols. PMID:27163786

  3. An Enhanced Biometric Based Authentication with Key-Agreement Protocol for Multi-Server Architecture Based on Elliptic Curve Cryptography.

    PubMed

    Reddy, Alavalapati Goutham; Das, Ashok Kumar; Odelu, Vanga; Yoo, Kee-Young

    2016-01-01

    Biometric based authentication protocols for multi-server architectures have gained momentum in recent times due to advancements in wireless technologies and associated constraints. Lu et al. recently proposed a robust biometric based authentication with key agreement protocol for a multi-server environment using smart cards. They claimed that their protocol is efficient and resistant to prominent security attacks. The careful investigation of this paper proves that Lu et al.'s protocol does not provide user anonymity, perfect forward secrecy and is susceptible to server and user impersonation attacks, man-in-middle attacks and clock synchronization problems. In addition, this paper proposes an enhanced biometric based authentication with key-agreement protocol for multi-server architecture based on elliptic curve cryptography using smartcards. We proved that the proposed protocol achieves mutual authentication using Burrows-Abadi-Needham (BAN) logic. The formal security of the proposed protocol is verified using the AVISPA (Automated Validation of Internet Security Protocols and Applications) tool to show that our protocol can withstand active and passive attacks. The formal and informal security analyses and performance analysis demonstrates that the proposed protocol is robust and efficient compared to Lu et al.'s protocol and existing similar protocols.

  4. An Enhanced Biometric Based Authentication with Key-Agreement Protocol for Multi-Server Architecture Based on Elliptic Curve Cryptography.

    PubMed

    Reddy, Alavalapati Goutham; Das, Ashok Kumar; Odelu, Vanga; Yoo, Kee-Young

    2016-01-01

    Biometric based authentication protocols for multi-server architectures have gained momentum in recent times due to advancements in wireless technologies and associated constraints. Lu et al. recently proposed a robust biometric based authentication with key agreement protocol for a multi-server environment using smart cards. They claimed that their protocol is efficient and resistant to prominent security attacks. The careful investigation of this paper proves that Lu et al.'s protocol does not provide user anonymity, perfect forward secrecy and is susceptible to server and user impersonation attacks, man-in-middle attacks and clock synchronization problems. In addition, this paper proposes an enhanced biometric based authentication with key-agreement protocol for multi-server architecture based on elliptic curve cryptography using smartcards. We proved that the proposed protocol achieves mutual authentication using Burrows-Abadi-Needham (BAN) logic. The formal security of the proposed protocol is verified using the AVISPA (Automated Validation of Internet Security Protocols and Applications) tool to show that our protocol can withstand active and passive attacks. The formal and informal security analyses and performance analysis demonstrates that the proposed protocol is robust and efficient compared to Lu et al.'s protocol and existing similar protocols. PMID:27163786

  5. A Low Cost Key Agreement Protocol Based on Binary Tree for EPCglobal Class 1 Generation 2 RFID Protocol

    NASA Astrophysics Data System (ADS)

    Jeng, Albert; Chang, Li-Chung; Chen, Sheng-Hui

    There are many protocols proposed for protecting Radio Frequency Identification (RFID) system privacy and security. A number of these protocols are designed for protecting long-term security of RFID system using symmetric key or public key cryptosystem. Others are designed for protecting user anonymity and privacy. In practice, the use of RFID technology often has a short lifespan, such as commodity check out, supply chain management and so on. Furthermore, we know that designing a long-term security architecture to protect the security and privacy of RFID tags information requires a thorough consideration from many different aspects. However, any security enhancement on RFID technology will jack up its cost which may be detrimental to its widespread deployment. Due to the severe constraints of RFID tag resources (e. g., power source, computing power, communication bandwidth) and open air communication nature of RFID usage, it is a great challenge to secure a typical RFID system. For example, computational heavy public key and symmetric key cryptography algorithms (e. g., RSA and AES) may not be suitable or over-killed to protect RFID security or privacy. These factors motivate us to research an efficient and cost effective solution for RFID security and privacy protection. In this paper, we propose a new effective generic binary tree based key agreement protocol (called BKAP) and its variations, and show how it can be applied to secure the low cost and resource constraint RFID system. This BKAP is not a general purpose key agreement protocol rather it is a special purpose protocol to protect privacy, un-traceability and anonymity in a single RFID closed system domain.

  6. An Improved RSA Based User Authentication and Session Key Agreement Protocol Usable in TMIS.

    PubMed

    Amin, Ruhul; Biswas, G P

    2015-08-01

    Recently, Giri et al.'s proposed a RSA cryptosystem based remote user authentication scheme for telecare medical information system and claimed that the protocol is secure against all the relevant security attacks. However, we have scrutinized the Giri et al.'s protocol and pointed out that the protocol is not secure against off-line password guessing attack, privileged insider attack and also suffers from anonymity problem. Moreover, the extension of password guessing attack leads to more security weaknesses. Therefore, this protocol needs improvement in terms of security before implementing in real-life application. To fix the mentioned security pitfalls, this paper proposes an improved scheme over Giri et al.'s scheme, which preserves user anonymity property. We have then simulated the proposed protocol using widely-accepted AVISPA tool which ensures that the protocol is SAFE under OFMC and CL-AtSe models, that means the same protocol is secure against active and passive attacks including replay and man-in-the-middle attacks. The informal cryptanalysis has been also presented, which confirmed that the proposed protocol provides well security protection on the relevant security attacks. The performance analysis section compares the proposed protocol with other existing protocols in terms of security and it has been observed that the protocol provides more security and achieves additional functionalities such as user anonymity and session key verification.

  7. An Improved RSA Based User Authentication and Session Key Agreement Protocol Usable in TMIS.

    PubMed

    Amin, Ruhul; Biswas, G P

    2015-08-01

    Recently, Giri et al.'s proposed a RSA cryptosystem based remote user authentication scheme for telecare medical information system and claimed that the protocol is secure against all the relevant security attacks. However, we have scrutinized the Giri et al.'s protocol and pointed out that the protocol is not secure against off-line password guessing attack, privileged insider attack and also suffers from anonymity problem. Moreover, the extension of password guessing attack leads to more security weaknesses. Therefore, this protocol needs improvement in terms of security before implementing in real-life application. To fix the mentioned security pitfalls, this paper proposes an improved scheme over Giri et al.'s scheme, which preserves user anonymity property. We have then simulated the proposed protocol using widely-accepted AVISPA tool which ensures that the protocol is SAFE under OFMC and CL-AtSe models, that means the same protocol is secure against active and passive attacks including replay and man-in-the-middle attacks. The informal cryptanalysis has been also presented, which confirmed that the proposed protocol provides well security protection on the relevant security attacks. The performance analysis section compares the proposed protocol with other existing protocols in terms of security and it has been observed that the protocol provides more security and achieves additional functionalities such as user anonymity and session key verification. PMID:26123833

  8. A Biometric Authenticated Key Agreement Protocol for Secure Token

    NASA Astrophysics Data System (ADS)

    Yoon, Eun-Jun; Yoo, Kee-Young

    This letter proposes a robust biometric authenticated key agreement (BAKA) protocol for a secure token to provide strong security and minimize the computation cost of each participant. Compared with other related protocols, the proposed BAKA protocol not only is secure against well-known cryptographical attacks but also provides various functionality and performance requirements.

  9. Judges' Agreement and Disagreement Patterns When Encoding Verbal Protocols.

    ERIC Educational Resources Information Center

    Schael, Jocelyne; Dionne, Jean-Paul

    The basis of agreement or disagreement among judges/evaluators when applying a coding scheme to concurrent verbal protocols was studied. The sample included 20 university graduates, from varied backgrounds; 10 subjects had and 10 subjects did not have experience in protocol analysis. The total sample was divided into four balanced groups according…

  10. Improvement on "Quantum Key Agreement Protocol with Maximally Entangled States"

    NASA Astrophysics Data System (ADS)

    Chong, Song-Kong; Tsai, Chia-Wei; Hwang, Tzonelih

    2011-06-01

    Recently, Hsueh and Chen [in Proceedings of the 14th Information Security Conference, National Taiwan University of Science and Technology, Taipei, pp. 236-242, 2004] proposed a quantum key agreement (QKA) protocol with maximally entangled states. Their protocol allows two users to negotiate a secret key in such a way that no one can predetermine the shared key alone. This study points out two security flaws in their protocol: (1) a legitimate but malicious user can fully control the shared key alone; (2) an eavesdropper can obtain the shared key without being detected. A possible solution is presented to avoid these attacks and also Tsai et al.'s CNOT attack [in Proceedings of the 20th Cryptology and Information Security Conference, National Chiao Tung University, Hsinchu, pp. 210-213, 2010] on Hsueh and Chen protocol to obtain the shared key without being detected.

  11. Agreements between Industry and Academia on Publication Rights: A Retrospective Study of Protocols and Publications of Randomized Clinical Trials

    PubMed Central

    Kasenda, Benjamin; von Elm, Erik; You, John J.; Tomonaga, Yuki; Saccilotto, Ramon; Amstutz, Alain; Bengough, Theresa; Meerpohl, Joerg J.; Stegert, Mihaela; Olu, Kelechi K.; Tikkinen, Kari A. O.; Neumann, Ignacio; Carrasco-Labra, Alonso; Faulhaber, Markus; Mulla, Sohail M.; Mertz, Dominik; Akl, Elie A.; Bassler, Dirk; Busse, Jason W.; Nordmann, Alain; Gloy, Viktoria; Ebrahim, Shanil; Schandelmaier, Stefan; Sun, Xin; Vandvik, Per O.; Johnston, Bradley C.; Walter, Martin A.; Burnand, Bernard; Hemkens, Lars G.; Bucher, Heiner C.; Guyatt, Gordon H.; Briel, Matthias

    2016-01-01

    Background Little is known about publication agreements between industry and academic investigators in trial protocols and the consistency of these agreements with corresponding statements in publications. We aimed to investigate (i) the existence and types of publication agreements in trial protocols, (ii) the completeness and consistency of the reporting of these agreements in subsequent publications, and (iii) the frequency of co-authorship by industry employees. Methods and Findings We used a retrospective cohort of randomized clinical trials (RCTs) based on archived protocols approved by six research ethics committees between 13 January 2000 and 25 November 2003. Only RCTs with industry involvement were eligible. We investigated the documentation of publication agreements in RCT protocols and statements in corresponding journal publications. Of 647 eligible RCT protocols, 456 (70.5%) mentioned an agreement regarding publication of results. Of these 456, 393 (86.2%) documented an industry partner’s right to disapprove or at least review proposed manuscripts; 39 (8.6%) agreements were without constraints of publication. The remaining 24 (5.3%) protocols referred to separate agreement documents not accessible to us. Of those 432 protocols with an accessible publication agreement, 268 (62.0%) trials were published. Most agreements documented in the protocol were not reported in the subsequent publication (197/268 [73.5%]). Of 71 agreements reported in publications, 52 (73.2%) were concordant with those documented in the protocol. In 14 of 37 (37.8%) publications in which statements suggested unrestricted publication rights, at least one co-author was an industry employee. In 25 protocol-publication pairs, author statements in publications suggested no constraints, but 18 corresponding protocols documented restricting agreements. Conclusions Publication agreements constraining academic authors’ independence are common. Journal articles seldom report on

  12. Two-party quantum key agreement protocol with four-particle entangled states

    NASA Astrophysics Data System (ADS)

    He, Yefeng; Ma, Wenping

    2016-09-01

    Based on four-particle entangled states and the delayed measurement technique, a two-party quantum key agreement protocol is proposed in this paper. In the protocol, two participants can deduce the measurement results of each other’s initial quantum states in terms of the measurement correlation property of four-particle entangled states. According to the corresponding initial quantum states deduced by themselves, two parties can extract the secret keys of each other by using the publicly announced value or by performing the delayed measurement, respectively. This guarantees the fair establishment of a shared key. Since each particle in quantum channel is transmitted only once, the protocol is congenitally free from the Trojan horse attacks. The security analysis shows that the protocol not only can resist against both participant and outsider attacks but also has no information leakage problem. Moreover, it has high qubit efficiency.

  13. A non-interactive and efficient key agreement protocol for ASNs

    NASA Astrophysics Data System (ADS)

    Yang, Deming; Mu, Dejun; Xu, Zhong

    2007-11-01

    Ad hoc space networks (ASNs) are implemented using flexible, distributed architecture consisting of constellations of dynamically deployed space, airborne and mobile platforms. The nodes within ASNs operate both as communication end-points as well as routers, enabling multi-hop wireless communication and dynamic network topology. Secure and efficient key agreement scheme is the crucial mechanism to construct secure ASNs. Previous ID-based cryptosystem is not feasible in ASNs because of the interaction process in key agreement. A novel non-interactive and efficient ID-based two-party key agreement protocol is proposed for ASNs. Based on the security analysis of IDNIKS proposed by Tso et al., the feasibility of adopting non-interactive key agreement for multi-party in ASNs is analyzed and a conclusion is given.

  14. Cryptanalysis and improvement of authentication and key agreement protocols for telecare medicine information systems.

    PubMed

    Islam, S K Hafizul; Khan, Muhammad Khurram

    2014-10-01

    Recently, many authentication protocols have been presented using smartcard for the telecare medicine information system (TMIS). In 2014, Xu et al. put forward a two-factor mutual authentication with key agreement protocol using elliptic curve cryptography (ECC). However, the authors have proved that the protocol is not appropriate for practical use as it has many problems (1) it fails to achieve strong authentication in login and authentication phases; (2) it fails to update the password correctly in the password change phase; (3) it fails to provide the revocation of lost/stolen smartcard; and (4) it fails to protect the strong replay attack. We then devised an anonymous and provably secure two-factor authentication protocol based on ECC. Our protocol is analyzed with the random oracle model and demonstrated to be formally secured against the hardness assumption of computational Diffie-Hellman problem. The performance evaluation demonstrated that our protocol outperforms from the perspective of security, functionality and computation costs over other existing designs. PMID:25190590

  15. An improved authenticated key agreement protocol for telecare medicine information system.

    PubMed

    Liu, Wenhao; Xie, Qi; Wang, Shengbao; Hu, Bin

    2016-01-01

    In telecare medicine information systems (TMIS), identity authentication of patients plays an important role and has been widely studied in the research field. Generally, it is realized by an authenticated key agreement protocol, and many such protocols were proposed in the literature. Recently, Zhang et al. pointed out that Islam et al.'s protocol suffers from the following security weaknesses: (1) Any legal but malicious patient can reveal other user's identity; (2) An attacker can launch off-line password guessing attack and the impersonation attack if the patient's identity is compromised. Zhang et al. also proposed an improved authenticated key agreement scheme with privacy protection for TMIS. However, in this paper, we point out that Zhang et al.'s scheme cannot resist off-line password guessing attack, and it fails to provide the revocation of lost/stolen smartcard. In order to overcome these weaknesses, we propose an improved protocol, the security and authentication of which can be proven using applied pi calculus based formal verification tool ProVerif.

  16. An improved authenticated key agreement protocol for telecare medicine information system.

    PubMed

    Liu, Wenhao; Xie, Qi; Wang, Shengbao; Hu, Bin

    2016-01-01

    In telecare medicine information systems (TMIS), identity authentication of patients plays an important role and has been widely studied in the research field. Generally, it is realized by an authenticated key agreement protocol, and many such protocols were proposed in the literature. Recently, Zhang et al. pointed out that Islam et al.'s protocol suffers from the following security weaknesses: (1) Any legal but malicious patient can reveal other user's identity; (2) An attacker can launch off-line password guessing attack and the impersonation attack if the patient's identity is compromised. Zhang et al. also proposed an improved authenticated key agreement scheme with privacy protection for TMIS. However, in this paper, we point out that Zhang et al.'s scheme cannot resist off-line password guessing attack, and it fails to provide the revocation of lost/stolen smartcard. In order to overcome these weaknesses, we propose an improved protocol, the security and authentication of which can be proven using applied pi calculus based formal verification tool ProVerif. PMID:27218005

  17. Experimental Demonstration of a Quantum Protocol for Byzantine Agreement and Liar Detection

    NASA Astrophysics Data System (ADS)

    Gaertner, Sascha; Bourennane, Mohamed; Kurtsiefer, Christian; Cabello, Adán; Weinfurter, Harald

    2008-02-01

    We introduce a new quantum protocol for solving detectable Byzantine agreement (also called detectable broadcast) between three parties, and also for solving the detectable liar detection problem. The protocol is suggested by the properties of a four-qubit entangled state, and the classical part of the protocol is simpler than that of previous proposals. In addition, we present an experimental implementation of the protocol using four-photon entanglement.

  18. Experimental demonstration of a quantum protocol for byzantine agreement and liar detection.

    PubMed

    Gaertner, Sascha; Bourennane, Mohamed; Kurtsiefer, Christian; Cabello, Adán; Weinfurter, Harald

    2008-02-22

    We introduce a new quantum protocol for solving detectable Byzantine agreement (also called detectable broadcast) between three parties, and also for solving the detectable liar detection problem. The protocol is suggested by the properties of a four-qubit entangled state, and the classical part of the protocol is simpler than that of previous proposals. In addition, we present an experimental implementation of the protocol using four-photon entanglement.

  19. Freshness-preserving non-interactive hierarchical key agreement protocol over WHMS.

    PubMed

    Kim, Hyunsung

    2014-12-10

    The digitization of patient health information (PHI) for wireless health monitoring systems (WHMSs) has brought many benefits and challenges for both patients and physicians. However, security, privacy and robustness have remained important challenges for WHMSs. Since the patient's PHI is sensitive and the communication channel, i.e., the Internet, is insecure, it is important to protect them against unauthorized entities, i.e., attackers. Otherwise, failure to do so will not only lead to the compromise of a patient's privacy, but will also put his/her life at risk. This paper proposes a freshness-preserving non-interactive hierarchical key agreement protocol (FNKAP) for WHMSs. The FNKAP is based on the concept of the non-interactive identity-based key agreement for communication efficiency. It achieves patient anonymity between a patient and physician, session key secrecy and resistance against various security attacks, especially including replay attacks.

  20. Freshness-preserving non-interactive hierarchical key agreement protocol over WHMS.

    PubMed

    Kim, Hyunsung

    2014-01-01

    The digitization of patient health information (PHI) for wireless health monitoring systems (WHMSs) has brought many benefits and challenges for both patients and physicians. However, security, privacy and robustness have remained important challenges for WHMSs. Since the patient's PHI is sensitive and the communication channel, i.e., the Internet, is insecure, it is important to protect them against unauthorized entities, i.e., attackers. Otherwise, failure to do so will not only lead to the compromise of a patient's privacy, but will also put his/her life at risk. This paper proposes a freshness-preserving non-interactive hierarchical key agreement protocol (FNKAP) for WHMSs. The FNKAP is based on the concept of the non-interactive identity-based key agreement for communication efficiency. It achieves patient anonymity between a patient and physician, session key secrecy and resistance against various security attacks, especially including replay attacks. PMID:25513824

  1. Freshness-Preserving Non-Interactive Hierarchical Key Agreement Protocol over WHMS

    PubMed Central

    Kim, Hyunsung

    2014-01-01

    The digitization of patient health information (PHI) for wireless health monitoring systems (WHMSs) has brought many benefits and challenges for both patients and physicians. However, security, privacy and robustness have remained important challenges for WHMSs. Since the patient's PHI is sensitive and the communication channel, i.e., the Internet, is insecure, it is important to protect them against unauthorized entities, i.e., attackers. Otherwise, failure to do so will not only lead to the compromise of a patient's privacy, but will also put his/her life at risk. This paper proposes a freshness-preserving non-interactive hierarchical key agreement protocol (FNKAP) for WHMSs. The FNKAP is based on the concept of the non-interactive identity-based key agreement for communication efficiency. It achieves patient anonymity between a patient and physician, session key secrecy and resistance against various security attacks, especially including replay attacks. PMID:25513824

  2. Collusive attacks to "circle-type" multi-party quantum key agreement protocols

    NASA Astrophysics Data System (ADS)

    Liu, Bin; Xiao, Di; Jia, Heng-Yue; Liu, Run-Zong

    2016-05-01

    We find that existing multi-party quantum key agreement (MQKA) protocols designed for fairness of the key are, in fact, unfair. Our analysis shows that these protocols are sensitive to collusive attacks; that is, dishonest participants can collaborate in predetermining the key without being detected. In fact, the transmission structures of the quantum particles in those unfair MQKA protocols, three of which have already been analyzed, have much in common. We call these unfair MQKA protocols circle-type MQKA protocols. Likewise, the transmission structures of the quantum particles in MQKA protocols that can resist collusive attacks are also similar. We call such protocols complete-graph-type MQKA protocols. A MQKA protocol also exists that can resist the above attacks but is still not fair, and we call it the tree-type MQKA protocol. We first point out a common, easily missed loophole that severely compromises the fairness of present circle-type MQKA protocols. Then we show that two dishonest participants at special positions can totally predetermine the key generated by circle-type MQKA protocols. We anticipate that our observations will contribute to secure and fair MQKA protocols, especially circle-type protocols.

  3. Chaotic maps-based password-authenticated key agreement using smart cards

    NASA Astrophysics Data System (ADS)

    Guo, Cheng; Chang, Chin-Chen

    2013-06-01

    Password-based authenticated key agreement using smart cards has been widely and intensively researched. Inspired by the semi-group property of Chebyshev maps and key agreement protocols based on chaotic maps, we proposed a novel chaotic maps-based password-authenticated key agreement protocol with smart cards. In our protocol, we avoid modular exponential computing or scalar multiplication on elliptic curve used in traditional authenticated key agreement protocols using smart cards. Our analysis shows that our protocol has comprehensive characteristics and can withstand attacks, including the insider attack, replay attack, and others, satisfying essential security requirements. Performance analysis shows that our protocol can refrain from consuming modular exponential computing and scalar multiplication on an elliptic curve. The computational cost of our protocol compared with related protocols is acceptable.

  4. A Secure Three-Factor User Authentication and Key Agreement Protocol for TMIS With User Anonymity.

    PubMed

    Amin, Ruhul; Biswas, G P

    2015-08-01

    Telecare medical information system (TMIS) makes an efficient and convenient connection between patient(s)/user(s) and doctor(s) over the insecure internet. Therefore, data security, privacy and user authentication are enormously important for accessing important medical data over insecure communication. Recently, many user authentication protocols for TMIS have been proposed in the literature and it has been observed that most of the protocols cannot achieve complete security requirements. In this paper, we have scrutinized two (Mishra et al., Xu et al.) remote user authentication protocols using smart card and explained that both the protocols are suffering against several security weaknesses. We have then presented three-factor user authentication and key agreement protocol usable for TMIS, which fix the security pitfalls of the above mentioned schemes. The informal cryptanalysis makes certain that the proposed protocol provides well security protection on the relevant security attacks. Furthermore, the simulator AVISPA tool confirms that the protocol is secure against active and passive attacks including replay and man-in-the-middle attacks. The security functionalities and performance comparison analysis confirm that our protocol not only provide strong protection on security attacks, but it also achieves better complexities along with efficient login and password change phase as well as session key verification property.

  5. A Secure Three-Factor User Authentication and Key Agreement Protocol for TMIS With User Anonymity.

    PubMed

    Amin, Ruhul; Biswas, G P

    2015-08-01

    Telecare medical information system (TMIS) makes an efficient and convenient connection between patient(s)/user(s) and doctor(s) over the insecure internet. Therefore, data security, privacy and user authentication are enormously important for accessing important medical data over insecure communication. Recently, many user authentication protocols for TMIS have been proposed in the literature and it has been observed that most of the protocols cannot achieve complete security requirements. In this paper, we have scrutinized two (Mishra et al., Xu et al.) remote user authentication protocols using smart card and explained that both the protocols are suffering against several security weaknesses. We have then presented three-factor user authentication and key agreement protocol usable for TMIS, which fix the security pitfalls of the above mentioned schemes. The informal cryptanalysis makes certain that the proposed protocol provides well security protection on the relevant security attacks. Furthermore, the simulator AVISPA tool confirms that the protocol is secure against active and passive attacks including replay and man-in-the-middle attacks. The security functionalities and performance comparison analysis confirm that our protocol not only provide strong protection on security attacks, but it also achieves better complexities along with efficient login and password change phase as well as session key verification property. PMID:26112322

  6. Assessment of Assistance in Smoking Cessation Therapy by Pharmacies in Collaboration with Medical Institutions- Implementation of a Collaborative Drug Therapy Management Protocol Based on a Written Agreement between Physicians and Pharmacists.

    PubMed

    Watanabe, Fumiyuki; Shinohara, Kuniko; Dobashi, Akira; Amagai, Kenji; Hara, Kazuo; Kurata, Kaori; Iizima, Hideo; Shimakawa, Kiyoshi; Shimada, Masahiko; Abe, Sakurako; Takei, Keiji; Kamei, Miwako

    2016-01-01

    This study built a protocol for drug therapy management (hereinafter "the protocol") that would enable continuous support from the decision making of smoking cessation therapy to the completion of therapy through the collaboration of physicians and community pharmacists, after which we evaluated whether the use of this protocol would be helpful to smoking cessation therapy. This study utilized the "On the Promotion of Team-Based Medical Care", a Notification by the Health Policy Bureau as one of the resources for judgment, and referred to collaborative drug therapy management (CDTM) in the United States. After the implementation of this protocol, the success rate of smoking cessation at the participating medical institutions rose to approximately 70%, approximately 28-point improvement compared to the rate before the implementation. In addition to the benefits of the standard smoking cessation program, this result may have been affected by the intervention of pharmacists, who assisted in continuing cessation by advising to reduce drug dosage as necessary approximately one week after the smoking cessation, when side effects and the urge to smoke tend to occur. Additionally, the awareness survey for the intervention group revealed that all respondents, including patients who failed to quit smoking, answered that they were satisfied to the question on general satisfaction. The question about the reason for successful cessation revealed that the support by pharmacists was as important as, or more important than, that by physicians and nurses. This infers that the pharmacists' active engagement in drug therapy for individual patients was favorably acknowledged.

  7. Assessment of Assistance in Smoking Cessation Therapy by Pharmacies in Collaboration with Medical Institutions- Implementation of a Collaborative Drug Therapy Management Protocol Based on a Written Agreement between Physicians and Pharmacists.

    PubMed

    Watanabe, Fumiyuki; Shinohara, Kuniko; Dobashi, Akira; Amagai, Kenji; Hara, Kazuo; Kurata, Kaori; Iizima, Hideo; Shimakawa, Kiyoshi; Shimada, Masahiko; Abe, Sakurako; Takei, Keiji; Kamei, Miwako

    2016-01-01

    This study built a protocol for drug therapy management (hereinafter "the protocol") that would enable continuous support from the decision making of smoking cessation therapy to the completion of therapy through the collaboration of physicians and community pharmacists, after which we evaluated whether the use of this protocol would be helpful to smoking cessation therapy. This study utilized the "On the Promotion of Team-Based Medical Care", a Notification by the Health Policy Bureau as one of the resources for judgment, and referred to collaborative drug therapy management (CDTM) in the United States. After the implementation of this protocol, the success rate of smoking cessation at the participating medical institutions rose to approximately 70%, approximately 28-point improvement compared to the rate before the implementation. In addition to the benefits of the standard smoking cessation program, this result may have been affected by the intervention of pharmacists, who assisted in continuing cessation by advising to reduce drug dosage as necessary approximately one week after the smoking cessation, when side effects and the urge to smoke tend to occur. Additionally, the awareness survey for the intervention group revealed that all respondents, including patients who failed to quit smoking, answered that they were satisfied to the question on general satisfaction. The question about the reason for successful cessation revealed that the support by pharmacists was as important as, or more important than, that by physicians and nurses. This infers that the pharmacists' active engagement in drug therapy for individual patients was favorably acknowledged. PMID:27592827

  8. A Wiki Based CT Protocol Management System.

    PubMed

    Szczykutowicz, Timothy P; Rubert, Nicholas; Belden, Daryn; Ciano, Amanda; Duplissis, Andrew; Hermanns, Ashley; Monette, Stephen; Saldivar, Elliott Janssen

    2015-01-01

    At the University of Wisconsin Madison Department of Radiology, CT protocol management requires maintenance of thousands of parameters for each scanner. Managing CT protocols is further complicated by the unique configurability of each scanner. Due to recent Joint Commission requirements, now all CT protocol changes must be documented and reviewed by a site's CT protocol optimization team. The difficulty of managing the CT protocols was not in assembling the protocols, but in managing and implementing changes. This is why a wiki based solution for protocol management was implemented. A wiki inherently keeps track of all changes, logging who made the changes and when, allowing for editing and viewing permissions to be controlled, as well as allowing protocol changes to be instantly relayed to all scanner locations.

  9. Electronic Voting Protocol Using Identity-Based Cryptography

    PubMed Central

    Gallegos-Garcia, Gina; Tapia-Recillas, Horacio

    2015-01-01

    Electronic voting protocols proposed to date meet their properties based on Public Key Cryptography (PKC), which offers high flexibility through key agreement protocols and authentication mechanisms. However, when PKC is used, it is necessary to implement Certification Authority (CA) to provide certificates which bind public keys to entities and enable verification of such public key bindings. Consequently, the components of the protocol increase notably. An alternative is to use Identity-Based Encryption (IBE). With this kind of cryptography, it is possible to have all the benefits offered by PKC, without neither the need of certificates nor all the core components of a Public Key Infrastructure (PKI). Considering the aforementioned, in this paper we propose an electronic voting protocol, which meets the privacy and robustness properties by using bilinear maps. PMID:26090515

  10. Electronic Voting Protocol Using Identity-Based Cryptography.

    PubMed

    Gallegos-Garcia, Gina; Tapia-Recillas, Horacio

    2015-01-01

    Electronic voting protocols proposed to date meet their properties based on Public Key Cryptography (PKC), which offers high flexibility through key agreement protocols and authentication mechanisms. However, when PKC is used, it is necessary to implement Certification Authority (CA) to provide certificates which bind public keys to entities and enable verification of such public key bindings. Consequently, the components of the protocol increase notably. An alternative is to use Identity-Based Encryption (IBE). With this kind of cryptography, it is possible to have all the benefits offered by PKC, without neither the need of certificates nor all the core components of a Public Key Infrastructure (PKI). Considering the aforementioned, in this paper we propose an electronic voting protocol, which meets the privacy and robustness properties by using bilinear maps.

  11. Electronic Voting Protocol Using Identity-Based Cryptography.

    PubMed

    Gallegos-Garcia, Gina; Tapia-Recillas, Horacio

    2015-01-01

    Electronic voting protocols proposed to date meet their properties based on Public Key Cryptography (PKC), which offers high flexibility through key agreement protocols and authentication mechanisms. However, when PKC is used, it is necessary to implement Certification Authority (CA) to provide certificates which bind public keys to entities and enable verification of such public key bindings. Consequently, the components of the protocol increase notably. An alternative is to use Identity-Based Encryption (IBE). With this kind of cryptography, it is possible to have all the benefits offered by PKC, without neither the need of certificates nor all the core components of a Public Key Infrastructure (PKI). Considering the aforementioned, in this paper we propose an electronic voting protocol, which meets the privacy and robustness properties by using bilinear maps. PMID:26090515

  12. Identity-based authenticated key exchange protocols from the Tate pairing

    NASA Astrophysics Data System (ADS)

    Shen, Jun; Jin, Hong; Yang, Zhiyong; Cui, Xiang

    2011-12-01

    Key agreement protocols are designed to establish a session keys between two or multiple entities oven an insecure network and the session key is used to assure confidentiality thought encryption. With the advantages of identity-based (ID-based) cryptography, there have been many ID-based key agreement protocols proposed. However, most of them are based on Weil pairing, which is more cost of computation compared with Tate paring. In this paper, we propose a newly ID-based key agreement protocol from the Tate pairing. Compared with previous protocols, the new protocol minimizes the cost of computation with no extra message exchange time. In addition, the proposed protocol provides known key security, no key control, no key-compromise impersonation and perfect forward secrecy.

  13. Analysis of agreement between cardiac risk stratification protocols applied to participants of a center for cardiac rehabilitation

    PubMed Central

    Santos, Ana A. S.; Silva, Anne K. F.; Vanderlei, Franciele M.; Christofaro, Diego G. D.; Gonçalves, Aline F. L.; Vanderlei, Luiz C. M.

    2016-01-01

    ABSTRACT Background Cardiac risk stratification is related to the risk of the occurrence of events induced by exercise. Despite the existence of several protocols to calculate risk stratification, studies indicating that there is similarity between these protocols are still unknown. Objective To evaluate the agreement between the existing protocols on cardiac risk rating in cardiac patients. Method The records of 50 patients from a cardiac rehabilitation program were analyzed, from which the following information was extracted: age, sex, weight, height, clinical diagnosis, medical history, risk factors, associated diseases, and the results from the most recent laboratory and complementary tests performed. This information was used for risk stratification of the patients in the protocols of the American College of Sports Medicine, the Brazilian Society of Cardiology, the American Heart Association, the protocol designed by Frederic J. Pashkow, the American Association of Cardiovascular and Pulmonary Rehabilitation, the Société Française de Cardiologie, and the Sociedad Española de Cardiología. Descriptive statistics were used to characterize the sample and the analysis of agreement between the protocols was calculated using the Kappa coefficient. Differences were considered with a significance level of 5%. Results Of the 21 analyses of agreement, 12 were considered significant between the protocols used for risk classification, with nine classified as moderate and three as low. No agreements were classified as excellent. Different proportions were observed in each risk category, with significant differences between the protocols for all risk categories. Conclusion The agreements between the protocols were considered low and moderate and the risk proportions differed between protocols. PMID:27556385

  14. A novel user authentication and key agreement protocol for accessing multi-medical server usable in TMIS.

    PubMed

    Amin, Ruhul; Biswas, G P

    2015-03-01

    Telecare Medical Information System (TMIS) makes an efficient and convenient connection between patient(s)/user(s) at home and doctor(s) at a clinical center. To ensure secure connection between the two entities (patient(s)/user(s), doctor(s)), user authentication is enormously important for the medical server. In this regard, many authentication protocols have been proposed in the literature only for accessing single medical server. In order to fix the drawbacks of the single medical server, we have primarily developed a novel architecture for accessing several medical services of the multi-medical server, where a user can directly communicate with the doctor of the medical server securely. Thereafter, we have developed a smart card based user authentication and key agreement security protocol usable for TMIS system using cryptographic one-way hash function. We have analyzed the security of our proposed authentication scheme through both formal and informal security analysis. Furthermore, we have simulated the proposed scheme for the formal security verification using the widely-accepted AVISPA (Automated Validation of Internet Security Protocols and Applications) tool and showed that the scheme is secure against the replay and man-in-the-middle attacks. The informal security analysis is also presented which confirms that the protocol has well security protection on the relevant security attacks. The security and performance comparison analysis confirm that the proposed protocol not only provides security protection on the above mentioned attacks, but it also achieves better complexities along with efficient login and password change phase. PMID:25681100

  15. Quantum key distribution protocol using random bases

    NASA Astrophysics Data System (ADS)

    Meslouhi, A.; Amellal, H.; Hassouni, Y.; El Baz, M.; El Allati, A.

    2016-04-01

    In order to enhance the quantum key distribution (QKD) security, a new protocol, “QKDPRB” based on random bases is proposed. It consists of using standard encoding bases moving circularly with a variable rotational angle α which depends on angular velocity ω(t); thus, the traditional bases turn into relative ones. To prove the security and the efficiency of the protocol, we present a universal demonstration which proves a high level security of the proposed protocol, even in the presence of the intercept and resend attack. Finally, the QKDPRB may improve the security of QKD.

  16. A comparative study of protocols for secure quantum communication under noisy environment: single-qubit-based protocols versus entangled-state-based protocols

    NASA Astrophysics Data System (ADS)

    Sharma, Vishal; Thapliyal, Kishore; Pathak, Anirban; Banerjee, Subhashish

    2016-07-01

    The effect of noise on various protocols of secure quantum communication has been studied. Specifically, we have investigated the effect of amplitude damping, phase damping, squeezed generalized amplitude damping, Pauli type as well as various collective noise models on the protocols of quantum key distribution, quantum key agreement, quantum secure direct quantum communication and quantum dialogue. From each type of protocol of secure quantum communication, we have chosen two protocols for our comparative study: one based on single-qubit states and the other one on entangled states. The comparative study reported here has revealed that single-qubit-based schemes are generally found to perform better in the presence of amplitude damping, phase damping, squeezed generalized amplitude damping noises, while entanglement-based protocols turn out to be preferable in the presence of collective noises. It is also observed that the effect of noise depends upon the number of rounds of quantum communication involved in a scheme of quantum communication. Further, it is observed that squeezing, a completely quantum mechanical resource present in the squeezed generalized amplitude channel, can be used in a beneficial way as it may yield higher fidelity compared to the corresponding zero squeezing case.

  17. Towards Dynamic Service Level Agreement Negotiation:An Approach Based on WS-Agreement

    NASA Astrophysics Data System (ADS)

    Pichot, Antoine; Wäldrich, Oliver; Ziegler, Wolfgang; Wieder, Philipp

    In Grid, e-Science and e-Business environments, Service Level Agreements are often used to establish frameworks for the delivery of services between service providers and the organisations hosting the researchers. While this high level SLAs define the overall quality of the services, it is desirable for the end-user to have dedicated service quality also for individual services like the orchestration of resources necessary for composed services. Grid level scheduling services typically are responsible for the orchestration and co-ordination of resources in the Grid. Co-allocation e.g. requires the Grid level scheduler to co-ordinate resource management systems located in different domains. As the site autonomy has to be respected negotiation is the only way to achieve the intended co-ordination. SLAs emerged as a new way to negotiate and manage usage of resources in the Grid and are already adopted by a number of management systems. Therefore, it is natural to look for ways to adopt SLAs for Grid level scheduling. In order to do this, efficient and flexible protocols are needed, which support dynamic negotiation and creation of SLAs. In this paper we propose and discuss extensions to the WS-Agreement protocol addressing these issues.

  18. Two-party quantum key agreement based on four-particle GHZ states

    NASA Astrophysics Data System (ADS)

    He, Ye-Feng; Ma, Wen-Ping

    2016-04-01

    Based on four-particle GHZ states, the double CNOT operation and the delayed measurement technique, a two-party quantum key agreement (QKA) protocols is proposed. The double CNOT operation makes each four-particle GHZ state collapse into two independent quantum states without any entanglement. Furthermore, one party can directly know the two quantum states and the other party can be aware of the two quantum states by using the corresponding measurement. According to the initial states of the two quantum states, two parties can extract the secret keys of each other by using the publicly announced value or by performing the delayed measurement, respectively. Then the protocol achieves the fair establishment of a shared key. The security analysis shows that the new protocol can resist against participant attacks, the Trojan horse attacks and other outsider attacks. Furthermore, the new protocol also has no information leakage problem and has high qubit efficiency.

  19. Improved chaotic maps-based password-authenticated key agreement using smart cards

    NASA Astrophysics Data System (ADS)

    Lin, Han-Yu

    2015-02-01

    Elaborating on the security of password-based authenticated key agreement, in this paper, the author cryptanalyzes a chaotic maps-based password-authenticated key agreement proposed by Guo and Chang recently. Specifically, their protocol could not achieve strong user anonymity due to a fixed parameter and a malicious adversary is able to derive the shared session key by manipulating the property of Chebyshev chaotic maps. Additionally, the author also presents an improved scheme to eliminate the above weaknesses and still maintain the efficiency.

  20. A Model Based Security Testing Method for Protocol Implementation

    PubMed Central

    Fu, Yu Long; Xin, Xiao Long

    2014-01-01

    The security of protocol implementation is important and hard to be verified. Since the penetration testing is usually based on the experience of the security tester and the specific protocol specifications, a formal and automatic verification method is always required. In this paper, we propose an extended model of IOLTS to describe the legal roles and intruders of security protocol implementations, and then combine them together to generate the suitable test cases to verify the security of protocol implementation. PMID:25105163

  1. Agreement in cardiovascular risk rating based on anthropometric parameters

    PubMed Central

    Dantas, Endilly Maria da Silva; Pinto, Cristiane Jordânia; Freitas, Rodrigo Pegado de Abreu; de Medeiros, Anna Cecília Queiroz

    2015-01-01

    Objective To investigate the agreement in evaluation of risk of developing cardiovascular diseases based on anthropometric parameters in young adults. Methods The study included 406 students, measuring weight, height, and waist and neck circumferences. Waist-to-height ratio and the conicity index. The kappa coefficient was used to assess agreement in risk classification for cardiovascular diseases. The positive and negative specific agreement values were calculated as well. The Pearson chi-square (χ2) test was used to assess associations between categorical variables (p<0.05). Results The majority of the parameters assessed (44%) showed slight (k=0.21 to 0.40) and/or poor agreement (k<0.20), with low values of negative specific agreement. The best agreement was observed between waist circumference and waist-to-height ratio both for the general population (k=0.88) and between sexes (k=0.93 to 0.86). There was a significant association (p<0.001) between the risk of cardiovascular diseases and females when using waist circumference and conicity index, and with males when using neck circumference. This resulted in a wide variation in the prevalence of cardiovascular disease risk (5.5%-36.5%), depending on the parameter and the sex that was assessed. Conclusion The results indicate variability in agreement in assessing risk for cardiovascular diseases, based on anthropometric parameters, and which also seems to be influenced by sex. Further studies in the Brazilian population are required to better understand this issue. PMID:26466060

  2. SPP: A data base processor data communications protocol

    NASA Technical Reports Server (NTRS)

    Fishwick, P. A.

    1983-01-01

    The design and implementation of a data communications protocol for the Intel Data Base Processor (DBP) is defined. The protocol is termed SPP (Service Port Protocol) since it enables data transfer between the host computer and the DBP service port. The protocol implementation is extensible in that it is explicitly layered and the protocol functionality is hierarchically organized. Extensive trace and performance capabilities have been supplied with the protocol software to permit optional efficient monitoring of the data transfer between the host and the Intel data base processor. Machine independence was considered to be an important attribute during the design and implementation of SPP. The protocol source is fully commented and is included in Appendix A of this report.

  3. Biometrics based authentication scheme for session initiation protocol.

    PubMed

    Xie, Qi; Tang, Zhixiong

    2016-01-01

    Many two-factor challenge-response based session initiation protocol (SIP) has been proposed, but most of them are vulnerable to smart card stolen attacks and password guessing attacks. In this paper, we propose a novel three-factor SIP authentication scheme using biometrics, password and smart card, and utilize the pi calculus-based formal verification tool ProVerif to prove that the proposed protocol achieves security and authentication. Furthermore, our protocol is highly efficient when compared to other related protocols.

  4. A Flexible CSMA based MAC Protocol for Software Defined Radios

    NASA Astrophysics Data System (ADS)

    Puschmann, André; Kalil, Mohamed A.; Mitschele-Thiel, Andreas

    2012-09-01

    In this article, we propose a flexible CSMA based MAC protocol which facilitates research and experimentation using software define radios. The modular architecture allows to employ the protocol on platforms with heterogeneous hardware capabilities and provides the freedom to exchange or adapt the spectrum sensing mechanism without modifying the MAC protocol internals. We discuss the architecture of the protocol and provide structural details of its main components. Furthermore, we present throughput measurements that have been obtained on an example system using host-based spectrum sensing.

  5. Biometrics based authentication scheme for session initiation protocol.

    PubMed

    Xie, Qi; Tang, Zhixiong

    2016-01-01

    Many two-factor challenge-response based session initiation protocol (SIP) has been proposed, but most of them are vulnerable to smart card stolen attacks and password guessing attacks. In this paper, we propose a novel three-factor SIP authentication scheme using biometrics, password and smart card, and utilize the pi calculus-based formal verification tool ProVerif to prove that the proposed protocol achieves security and authentication. Furthermore, our protocol is highly efficient when compared to other related protocols. PMID:27462493

  6. Simple group password-based authenticated key agreements for the integrated EPR information system.

    PubMed

    Lee, Tian-Fu; Chang, I-Pin; Wang, Ching-Cheng

    2013-04-01

    The security and privacy are important issues for electronic patient records (EPRs). The goal of EPRs is sharing the patients' medical histories such as the diagnosis records, reports and diagnosis image files among hospitals by the Internet. So the security issue for the integrated EPR information system is essential. That is, to ensure the information during transmission through by the Internet is secure and private. The group password-based authenticated key agreement (GPAKE) allows a group of users like doctors, nurses and patients to establish a common session key by using password authentication. Then the group of users can securely communicate by using this session key. Many approaches about GAPKE employ the public key infrastructure (PKI) in order to have higher security. However, it not only increases users' overheads and requires keeping an extra equipment for storing long-term secret keys, but also requires maintaining the public key system. This investigation presents a simple group password-based authenticated key agreement (SGPAKE) protocol for the integrated EPR information system. The proposed SGPAKE protocol does not require using the server or users' public keys. Each user only remembers his weak password shared with a trusted server, and then can obtain a common session key. Then all users can securely communicate by using this session key. The proposed SGPAKE protocol not only provides users with convince, but also has higher security.

  7. Simple group password-based authenticated key agreements for the integrated EPR information system.

    PubMed

    Lee, Tian-Fu; Chang, I-Pin; Wang, Ching-Cheng

    2013-04-01

    The security and privacy are important issues for electronic patient records (EPRs). The goal of EPRs is sharing the patients' medical histories such as the diagnosis records, reports and diagnosis image files among hospitals by the Internet. So the security issue for the integrated EPR information system is essential. That is, to ensure the information during transmission through by the Internet is secure and private. The group password-based authenticated key agreement (GPAKE) allows a group of users like doctors, nurses and patients to establish a common session key by using password authentication. Then the group of users can securely communicate by using this session key. Many approaches about GAPKE employ the public key infrastructure (PKI) in order to have higher security. However, it not only increases users' overheads and requires keeping an extra equipment for storing long-term secret keys, but also requires maintaining the public key system. This investigation presents a simple group password-based authenticated key agreement (SGPAKE) protocol for the integrated EPR information system. The proposed SGPAKE protocol does not require using the server or users' public keys. Each user only remembers his weak password shared with a trusted server, and then can obtain a common session key. Then all users can securely communicate by using this session key. The proposed SGPAKE protocol not only provides users with convince, but also has higher security. PMID:23328913

  8. A Weak Value Based QKD Protocol Robust Against Detector Attacks

    NASA Astrophysics Data System (ADS)

    Troupe, James

    2015-03-01

    We propose a variation of the BB84 quantum key distribution protocol that utilizes the properties of weak values to insure the validity of the quantum bit error rate estimates used to detect an eavesdropper. The protocol is shown theoretically to be secure against recently demonstrated attacks utilizing detector blinding and control and should also be robust against all detector based hacking. Importantly, the new protocol promises to achieve this additional security without negatively impacting the secure key generation rate as compared to that originally promised by the standard BB84 scheme. Implementation of the weak measurements needed by the protocol should be very feasible using standard quantum optical techniques.

  9. Experimental eavesdropping attack against Ekert's protocol based on Wigner's inequality

    SciTech Connect

    Bovino, F. A.; Colla, A. M.; Castagnoli, G.; Castelletto, S.; Degiovanni, I. P.; Rastello, M. L.

    2003-09-01

    We experimentally implemented an eavesdropping attack against the Ekert protocol for quantum key distribution based on the Wigner inequality. We demonstrate a serious lack of security of this protocol when the eavesdropper gains total control of the source. In addition we tested a modified Wigner inequality which should guarantee a secure quantum key distribution.

  10. Packet-Based Protocol Efficiency for Aeronautical and Satellite Communications

    NASA Technical Reports Server (NTRS)

    Carek, David A.

    2005-01-01

    This paper examines the relation between bit error ratios and the effective link efficiency when transporting data with a packet-based protocol. Relations are developed to quantify the impact of a protocol s packet size and header size relative to the bit error ratio of the underlying link. These relations are examined in the context of radio transmissions that exhibit variable error conditions, such as those used in satellite, aeronautical, and other wireless networks. A comparison of two packet sizing methodologies is presented. From these relations, the true ability of a link to deliver user data, or information, is determined. Relations are developed to calculate the optimal protocol packet size forgiven link error characteristics. These relations could be useful in future research for developing an adaptive protocol layer. They can also be used for sizing protocols in the design of static links, where bit error ratios have small variability.

  11. A Quantum Watermarking Protocol Based on Bell Dual Basis

    NASA Astrophysics Data System (ADS)

    Mo, Jia; Ma, Zhaofeng; Yang, Yixian; Niu, Xinxin

    2013-11-01

    This paper presents a Bell-dual-basis-based quantum watermarking protocol composed of three major algorithms: watermark embedding and extracting and the intercepting test. The first two are completed by using the entanglement swapping property of Bell dual basis and the test is accomplished through IBF protocol to guarantee its bottom security. The watermarking protocol is mainly designed for the protection of digital copyright in the existence of classical information. This design finds that the quality of digital contents is not damaged with its zero-watermark attributes when embedding watermarks.

  12. An XML-based protocol for distributed event services

    SciTech Connect

    Gunter, Dan K.; Smith, Warren; Quesnel, Darcy

    2001-06-25

    A recent trend in distributed computing is the construction of high-performance distributed systems called computational grids. One difficulty we have encountered is that there is no standard format for the representation of performance information and no standard protocol for transmitting this information. This limits the types of performance analysis that can be undertaken in complex distributed systems. To address this problem, we present an XML-based protocol for transmitting performance events in distributed systems and evaluate the performance of this protocol.

  13. An XML-Based Protocol for Distributed Event Services

    NASA Technical Reports Server (NTRS)

    Smith, Warren; Gunter, Dan; Quesnel, Darcy; Biegel, Bryan (Technical Monitor)

    2001-01-01

    A recent trend in distributed computing is the construction of high-performance distributed systems called computational grids. One difficulty we have encountered is that there is no standard format for the representation of performance information and no standard protocol for transmitting this information. This limits the types of performance analysis that can be undertaken in complex distributed systems. To address this problem, we present an XML-based protocol for transmitting performance events in distributed systems and evaluate the performance of this protocol.

  14. A Voting Protocol Based on the Controlled Quantum Operation Teleportation

    NASA Astrophysics Data System (ADS)

    Tian, Juan-Hong; Zhang, Jian-Zhong; Li, Yan-Ping

    2016-05-01

    Based on the controlled quantum operation teleportation, a secure voting protocol is proposed in this paper. Genuine four-qubit entangled state functions as the quantum channel. The eligible voter's quantum operation which represents his vote information can be transmitted to the tallyman Bob with the help of the scrutineer Charlie. Voter's quantum identity authentication provides the anonymity of voters'ID, which is ensured by a zero-knowledge proof of the notary organization CA. Charlie's supervision in the whole voting process can make the protocol satisfy verifiability and non-reusability so as to avoid Bob's dishonest behaviour. The security analysis shows that the voting protocol satisfies unforgeability, and has great advantages over some relevant researches. Additionally, the quantum operation can be transmitted successfully with the probability 1, which can make the protocol reliable and practical.

  15. Study on Cloud Security Based on Trust Spanning Tree Protocol

    NASA Astrophysics Data System (ADS)

    Lai, Yingxu; Liu, Zenghui; Pan, Qiuyue; Liu, Jing

    2015-09-01

    Attacks executed on Spanning Tree Protocol (STP) expose the weakness of link layer protocols and put the higher layers in jeopardy. Although the problems have been studied for many years and various solutions have been proposed, many security issues remain. To enhance the security and credibility of layer-2 network, we propose a trust-based spanning tree protocol aiming at achieving a higher credibility of LAN switch with a simple and lightweight authentication mechanism. If correctly implemented in each trusted switch, the authentication of trust-based STP can guarantee the credibility of topology information that is announced to other switch in the LAN. To verify the enforcement of the trusted protocol, we present a new trust evaluation method of the STP using a specification-based state model. We implement a prototype of trust-based STP to investigate its practicality. Experiment shows that the trusted protocol can achieve security goals and effectively avoid STP attacks with a lower computation overhead and good convergence performance.

  16. A Signcryption based Light Weight Key Exchange Protocol

    NASA Astrophysics Data System (ADS)

    Feng, Yong; Wei, Qian; Zhang, Xing

    Traditional cryptography based authenticated Diffie-Hellman key exchange protocols expose the problems of efficiency and privacy since signature-then-encryption is heavy to wireless communication special for flexible dynamic deployment, i.e., wireless mesh networks, wireless sensor networks, mobile ad hoc networks, etc., in computational cost and communicational overhead and traditional digital signature allows anyone to verify its validity using the corresponding public key. In this paper, we propose a signcryption based light weight key exchange protocol named SLWKE which can provide resistance to traditional attacks, i.e., eavesdropping, deducing, replaying, interleaving, forging and repudiating, and unknown key-share attack and save computational cost by three modular calculations, i.e., one modular inversion, one modular addition and one modular multiplicative, included in a signature s and communicational overhead by secure length of IqI in comparison to signcryption based direct key exchange using a time-stamp protocol termed Dkeuts.

  17. Development and validation of rapid magnetic particle based extraction protocols

    PubMed Central

    2014-01-01

    Background In order to control and eradicate transboundary animal diseases, early diagnosis and reaction is essential for the implementation of control activities. Thus, mobile diagnostic units which allow analytical testing close to the site of occurrence could provide valuable support for centralized laboratories. Consequently, the availability of diagnostic tests using mobile amplification and detection technologies has been increasing over the past years. However, methods enabling rapid and simple nucleic acid extraction also under resource-limited settings are still scarce. Methods In the present study rapid extraction protocols based on magnetic particle technology have been developed. For this purpose, the two open extraction platforms KingFisher™ Duo (Thermo Fisher Scientific) and BioSprint® 15 (Qiagen) as well as the fully automated EZ1® advanced XL instrument (Qiagen) were used. All protocols were validated in comparison to standard manual extraction using blood and serum samples from animals infected with Schmallenberg virus or bovine viral diarrhea virus. Results All newly developed protocols allowed a complete extraction within 30 minutes of time. The fully automated EZ1-extraction yielded the highest reproducibility, whereas slightly higher intra- and inter-assay variations were observed using the open platforms. Compared to the manual procedure, the analytical sensitivity of all the rapid protocols was 1 log10 step reduced for extraction from blood samples. For sera a reduced dynamic range could only be observed using the maximally shortened BioSprint 15 protocol. Validation using clinical samples showed an excellent concordance of all the rapid extraction protocols to the standard manual extraction procedure, independent of sample materials and target viruses. Conclusions The results of this study show that the speed-optimized novel extraction protocols allow rapid and simple nucleic acid extractions for a variety of target viruses without

  18. An Enhanced Security Protocol for VANET-Based Entertainment Services

    NASA Astrophysics Data System (ADS)

    Kim, Jung-Yoon; Choi, Hyoung-Kee

    Multimedia transactions between vehicles are expected to become a promising application in VANETs but security is a fundamental issue that must be resolved before such transactions can become practical and trusted. Existing certificate-based digital signature schemes are ineffective for ensuring the security of multimedia transactions in VANETs. This ineffectiveness exists because there is no guarantee that (1) vehicles can download the latest certificate revocation lists or that (2) vehicles can complete a multimedia transaction before leaving their communication range. These two problems result, respectively, from a lack of infrastructure and from the inconsistent connectivity inherent in VANETs. In this paper, we propose a digital signature approach that combines a certificateless signature scheme and short-lived public keys to alleviate these problems. We then propose a security protocol that uses the proposed signature approach for multimedia transactions between vehicles. The proposed protocol enables vehicles to trade in multimedia resources without an online trust authority. We provide an analytical approach to optimizing the security of the proposed protocol. The security and performance of our protocol are evaluated via simulation and theoretical analysis. Based on these evaluations, we contend that the proposed protocol is practical for multimedia transactions in VANETs in terms of security and performance.

  19. An XML-Based Protocol for Distributed Event Services

    NASA Technical Reports Server (NTRS)

    Smith, Warren; Gunter, Dan; Quesnel, Darcy; Biegel, Bryan (Technical Monitor)

    2001-01-01

    This viewgraph presentation provides information on the application of an XML (extensible mark-up language)-based protocol to the developing field of distributed processing by way of a computational grid which resembles an electric power grid. XML tags would be used to transmit events between the participants of a transaction, namely, the consumer and the producer of the grid scheme.

  20. The Verification-based Analysis of Reliable Multicast Protocol

    NASA Technical Reports Server (NTRS)

    Wu, Yunqing

    1996-01-01

    Reliable Multicast Protocol (RMP) is a communication protocol that provides an atomic, totally ordered, reliable multicast service on top of unreliable IP Multicasting. In this paper, we develop formal models for R.W using existing automatic verification systems, and perform verification-based analysis on the formal RMP specifications. We also use the formal models of RW specifications to generate a test suite for conformance testing of the RMP implementation. Throughout the process of RMP development, we follow an iterative, interactive approach that emphasizes concurrent and parallel progress between the implementation and verification processes. Through this approach, we incorporate formal techniques into our development process, promote a common understanding for the protocol, increase the reliability of our software, and maintain high fidelity between the specifications of RMP and its implementation.

  1. Protocols for Image Processing based Underwater Inspection of Infrastructure Elements

    NASA Astrophysics Data System (ADS)

    O'Byrne, Michael; Ghosh, Bidisha; Schoefs, Franck; Pakrashi, Vikram

    2015-07-01

    Image processing can be an important tool for inspecting underwater infrastructure elements like bridge piers and pile wharves. Underwater inspection often relies on visual descriptions of divers who are not necessarily trained in specifics of structural degradation and the information may often be vague, prone to error or open to significant variation of interpretation. Underwater vehicles, on the other hand can be quite expensive to deal with for such inspections. Additionally, there is now significant encouragement globally towards the deployment of more offshore renewable wind turbines and wave devices and the requirement for underwater inspection can be expected to increase significantly in the coming years. While the merit of image processing based assessment of the condition of underwater structures is understood to a certain degree, there is no existing protocol on such image based methods. This paper discusses and describes an image processing protocol for underwater inspection of structures. A stereo imaging image processing method is considered in this regard and protocols are suggested for image storage, imaging, diving, and inspection. A combined underwater imaging protocol is finally presented which can be used for a variety of situations within a range of image scenes and environmental conditions affecting the imaging conditions. An example of detecting marine growth is presented of a structure in Cork Harbour, Ireland.

  2. Proposed Requirements-driven User-scenario Development Protocol for the Belmont Forum E-Infrastructure and Data Management Cooperative Research Agreement

    NASA Astrophysics Data System (ADS)

    Wee, B.; Car, N.; Percivall, G.; Allen, D.; Fitch, P. G.; Baumann, P.; Waldmann, H. C.

    2014-12-01

    The Belmont Forum E-Infrastructure and Data Management Cooperative Research Agreement (CRA) is designed to foster a global community to collaborate on e-infrastructure challenges. One of the deliverables is an implementation plan to address global data infrastructure interoperability challenges and align existing domestic and international capabilities. Work package three (WP3) of the CRA focuses on the harmonization of global data infrastructure for sharing environmental data. One of the subtasks under WP3 is the development of user scenarios that guide the development of applicable deliverables. This paper describes the proposed protocol for user scenario development. It enables the solicitation of user scenarios from a broad constituency, and exposes the mechanisms by which those solicitations are evaluated against requirements that map to the Belmont Challenge. The underlying principle of traceability forms the basis for a structured, requirements-driven approach resulting in work products amenable to trade-off analyses and objective prioritization. The protocol adopts the ISO Reference Model for Open Distributed Processing (RM-ODP) as a top level framework. User scenarios are developed within RM-ODP's "Enterprise Viewpoint". To harmonize with existing frameworks, the protocol utilizes the conceptual constructs of "scenarios", "use cases", "use case categories", and use case templates as adopted by recent GEOSS Architecture Implementation Project (AIP) deliverables and CSIRO's eReefs project. These constructs are encapsulated under the larger construct of "user scenarios". Once user scenarios are ranked by goodness-of-fit to the Belmont Challenge, secondary scoring metrics may be generated, like goodness-of-fit to FutureEarth science themes. The protocol also facilitates an assessment of the ease of implementing given user scenario using existing GEOSS AIP deliverables. In summary, the protocol results in a traceability graph that can be extended to coordinate

  3. A Network Coding Based Routing Protocol for Underwater Sensor Networks

    PubMed Central

    Wu, Huayang; Chen, Min; Guan, Xin

    2012-01-01

    Due to the particularities of the underwater environment, some negative factors will seriously interfere with data transmission rates, reliability of data communication, communication range, and network throughput and energy consumption of underwater sensor networks (UWSNs). Thus, full consideration of node energy savings, while maintaining a quick, correct and effective data transmission, extending the network life cycle are essential when routing protocols for underwater sensor networks are studied. In this paper, we have proposed a novel routing algorithm for UWSNs. To increase energy consumption efficiency and extend network lifetime, we propose a time-slot based routing algorithm (TSR).We designed a probability balanced mechanism and applied it to TSR. The theory of network coding is introduced to TSBR to meet the requirement of further reducing node energy consumption and extending network lifetime. Hence, time-slot based balanced network coding (TSBNC) comes into being. We evaluated the proposed time-slot based balancing routing algorithm and compared it with other classical underwater routing protocols. The simulation results show that the proposed protocol can reduce the probability of node conflicts, shorten the process of routing construction, balance energy consumption of each node and effectively prolong the network lifetime. PMID:22666045

  4. Transputer-based architecture for ATM LAN protocol testing

    NASA Astrophysics Data System (ADS)

    Di Concetto, M.; Crocetti, P.; Marino, G.; Merli, E.; Pavesi, M.; Zizza, F.

    1993-10-01

    Local Area Networks (LANs) have completed two generations of development (Ethernet and Token Ring the first, and FDDI and DQDB the second); the large volumes of traffic involved in the emerging multimedia applications, however, lead towards a third generation of LANs. This generation must provide real-time capabilities needed by new services and solve the problems of interworking with ATM-based B-ISDN. Moreover the possibility to vary the subscribed bandwidth with the B-ISDN will be given to the LAN interfaces. This paper focuses on an architecture for protocol testing of a Dynamic Bandwidth Allocation Protocol inserted in a LAN environment based on ATM technology. In fact, the technology of the third LAN generation will be the Asynchronous Transfer Mode solving every interface problem with the public B-ISDN. A testing and debugging environment which checks the implementation of the Dynamic Bandwidth Allocation Protocol at the interface host/LAN- ATM is discussed. The main concepts of the overall system architecture are analyzed, evidencing both software and hardware issues.

  5. Streetlight Control System Based on Wireless Communication over DALI Protocol

    PubMed Central

    Bellido-Outeiriño, Francisco José; Quiles-Latorre, Francisco Javier; Moreno-Moreno, Carlos Diego; Flores-Arias, José María; Moreno-García, Isabel; Ortiz-López, Manuel

    2016-01-01

    Public lighting represents a large part of the energy consumption of towns and cities. Efficient management of public lighting can entail significant energy savings. This work presents a smart system for managing public lighting networks based on wireless communication and the DALI protocol. Wireless communication entails significant economic savings, as there is no need to install new wiring and visual impacts and damage to the facades of historical buildings in city centers are avoided. The DALI protocol uses bidirectional communication with the ballast, which allows its status to be controlled and monitored at all times. The novelty of this work is that it tackles all aspects related to the management of public lighting: a standard protocol, DALI, was selected to control the ballast, a wireless node based on the IEEE 802.15.4 standard with a DALI interface was designed, a network layer that considers the topology of the lighting network has been developed, and lastly, some user-friendly applications for the control and maintenance of the system by the technical crews of the different towns and cities have been developed. PMID:27128923

  6. Streetlight Control System Based on Wireless Communication over DALI Protocol.

    PubMed

    Bellido-Outeiriño, Francisco José; Quiles-Latorre, Francisco Javier; Moreno-Moreno, Carlos Diego; Flores-Arias, José María; Moreno-García, Isabel; Ortiz-López, Manuel

    2016-01-01

    Public lighting represents a large part of the energy consumption of towns and cities. Efficient management of public lighting can entail significant energy savings. This work presents a smart system for managing public lighting networks based on wireless communication and the DALI protocol. Wireless communication entails significant economic savings, as there is no need to install new wiring and visual impacts and damage to the facades of historical buildings in city centers are avoided. The DALI protocol uses bidirectional communication with the ballast, which allows its status to be controlled and monitored at all times. The novelty of this work is that it tackles all aspects related to the management of public lighting: a standard protocol, DALI, was selected to control the ballast, a wireless node based on the IEEE 802.15.4 standard with a DALI interface was designed, a network layer that considers the topology of the lighting network has been developed, and lastly, some user-friendly applications for the control and maintenance of the system by the technical crews of the different towns and cities have been developed. PMID:27128923

  7. ASCOM based research on the universal control protocol of telescope

    NASA Astrophysics Data System (ADS)

    Wu, Peng; Luo, Chuanxin

    2014-08-01

    Remote control for the telescope can greatly reduce personnel requirements for observation and improve the quality of observation. It is important for astronomical observations. ASCOM provide a driver-client layer to separate astronomy device-specifics from the application software that uses those devices in the same time make sure that the drivers are usable from all programming languages. By building the server, client and drivers based on the ASCOM standard protocol to remote control the telescope. The software use Microsoft COM component programming model. Its API consists of a set of standard properties and methods , as defined in the relevant ASCOM interface specification and permit compatibility with all Windows languages. Applications control the operation of the equipment via ASCOM to invoke device driver. Using ASCOM common protocols will greatly improve the scalability and compatibility of system.

  8. An Identity Based Key Exchange Protocol in Cloud Computing

    NASA Astrophysics Data System (ADS)

    Molli, Venkateswara Rao; Tiwary, Omkar Nath

    2012-10-01

    Workflow systems often use delegation to enhance the flexibility of authorization; delegation transfers privileges among users across different administrative domains and facilitates information sharing. We present an independently verifiable delegation mechanism, where a delegation credential can be verified without the participation of domain administrators. This protocol, called role-based cascaded delegation (RBCD), supports simple and efficient cross-domain delegation of authority. RBCD enables a role member to create delegations based on the dynamic needs of collaboration; in the meantime, a delegation chain canbe verified by anyone without the participation of role administrators. We also propose the Measurable Risk Adaptive decentralized Role-based Delegation framework to address this problem. Describe an efficient realization of RBCD by using aggregate signatures, where the authentication information for an arbitrarily long role-based delegation chain is captured by one short signature of constant size. RBCD enables a role member to create delegations based on the need of collaboration; in the meantime anyone can verify a delegation chain without the participation of role administrators. The protocol is general and can be realized by any signature scheme. We have described a specific realization with a hierarchical certificate-based encryption scheme that gives delegation compact credentials.

  9. A knowledge-based care protocol system for ICU.

    PubMed

    Lau, F; Vincent, D D

    1995-01-01

    There is a growing interest in using care maps in ICU. So far, the emphasis has been on developing the critical path, problem/outcome, and variance reporting for specific diagnoses. This paper presents a conceptual knowledge-based care protocol system design for the ICU. It is based on the manual care map currently in use for managing myocardial infarction in the ICU of the Sturgeon General Hospital in Alberta. The proposed design uses expert rules, object schemas, case-based reasoning, and quantitative models as sources of its knowledge. Also being developed is a decision model with explicit linkages for outcome-process-measure from the care map. The resulting system is intended as a bedside charting and decision-support tool for caregivers. Proposed usage includes charting by acknowledgment, generation of alerts, and critiques on variances/events recorded, recommendations for planned interventions, and comparison with historical cases. Currently, a prototype is being developed on a PC-based network with Visual Basic, Level-Expert Object, and xBase. A clinical trial is also planned to evaluate whether this knowledge-based care protocol can reduce the length of stay of patients with myocardial infarction in the ICU. PMID:8591604

  10. A novel wavelength availability advertisement based ASON routing protocol implementation

    NASA Astrophysics Data System (ADS)

    Li, Jian; Liu, Juan; Zhang, Jie; Gu, Wanyi

    2005-11-01

    A novel wavelength availability advertisement based ASON routing protocol implementation is proposed in this paper which is derived from Open Shortest Path First protocol (OSPF) version 2. It can be applied to ASON network with a single control domain and can be easily extended to support routing in the multi-domain scenarios. Two new types of link state advertisement (LSA) are suggested for disseminating wavelength availability and network topology information. The OSPF mechanisms are inherited to ensure that the routing messages are delivered more reliably and converged more quickly while with fewer overheads. The topology auto discovery is realized through LSA flooding interacting with auto neighbor discovery using Link Management Protocol. The new LSA formats are given and how the link state database (LSD) is comprised is described. The new data structures proposed include topology resource list, adjacency list and route table. Then we analyze the differences of ASON in link state exchange, routing information flooding procedure, flushing procedure and new resources participating, i.e. new links or nodes join in an existing ASON. The link or node failure and recovery effect and how to deal with them are settled as well. In order to adopt different Routing and Wavelength Assignment (RWA) algorithms, a standard and efficient interface is designed. After extensive simulation we give the numerical analysis and come to the following conclusions: wavelength availability information flooding Convergence Time is about 30 milliseconds and it is not affected by RWA algorithms and the call traffic load; routing Protocol Average Overhead rises linearly with the increase of traffic load; Average Connection Setup Time decreases with the increase of traffic load because of the decrease of Average Routing Distance of the successfully lightpaths; Wavelength availability advertisement can greatly promote the blocking performance of ASON in relatively low traffic load; ASON

  11. A Secure Cluster-Based Multipath Routing Protocol for WMSNs

    PubMed Central

    Almalkawi, Islam T.; Zapata, Manel Guerrero; Al-Karaki, Jamal N.

    2011-01-01

    The new characteristics of Wireless Multimedia Sensor Network (WMSN) and its design issues brought by handling different traffic classes of multimedia content (video streams, audio, and still images) as well as scalar data over the network, make the proposed routing protocols for typical WSNs not directly applicable for WMSNs. Handling real-time multimedia data requires both energy efficiency and QoS assurance in order to ensure efficient utility of different capabilities of sensor resources and correct delivery of collected information. In this paper, we propose a Secure Cluster-based Multipath Routing protocol for WMSNs, SCMR, to satisfy the requirements of delivering different data types and support high data rate multimedia traffic. SCMR exploits the hierarchical structure of powerful cluster heads and the optimized multiple paths to support timeliness and reliable high data rate multimedia communication with minimum energy dissipation. Also, we present a light-weight distributed security mechanism of key management in order to secure the communication between sensor nodes and protect the network against different types of attacks. Performance evaluation from simulation results demonstrates a significant performance improvement comparing with existing protocols (which do not even provide any kind of security feature) in terms of average end-to-end delay, network throughput, packet delivery ratio, and energy consumption. PMID:22163854

  12. Mask-based interactive watermarking protocol for video

    NASA Astrophysics Data System (ADS)

    Emmanuel, Sabu; Kankanhalli, Mohan S.

    2001-11-01

    Digital video broadcasting is increasingly being adopted all over the world. The video broadcasters would require that the viewable contents of the pay channels be protected from unauthorized copying and distribution by subscribers, which is copyright protection. The subscribers would require that they be not wrongfully implicated by the broadcasters and thus ensure customer's rights protection. In this paper we present an integrated solution to address the copyright protection and customers rights protection for a video broadcasting environment. The copyright protection is addressed using a mask based watermarking technique and customer's rights protection is obtained through the use of an interactive watermarking protocol.

  13. Two RFID standard-based security protocols for healthcare environments.

    PubMed

    Picazo-Sanchez, Pablo; Bagheri, Nasour; Peris-Lopez, Pedro; Tapiador, Juan E

    2013-10-01

    Radio Frequency Identification (RFID) systems are widely used in access control, transportation, real-time inventory and asset management, automated payment systems, etc. Nevertheless, the use of this technology is almost unexplored in healthcare environments, where potential applications include patient monitoring, asset traceability and drug administration systems, to mention just a few. RFID technology can offer more intelligent systems and applications, but privacy and security issues have to be addressed before its adoption. This is even more dramatical in healthcare applications where very sensitive information is at stake and patient safety is paramount. In Wu et al. (J. Med. Syst. 37:19, 43) recently proposed a new RFID authentication protocol for healthcare environments. In this paper we show that this protocol puts location privacy of tag holders at risk, which is a matter of gravest concern and ruins the security of this proposal. To facilitate the implementation of secure RFID-based solutions in the medical sector, we suggest two new applications (authentication and secure messaging) and propose solutions that, in contrast to previous proposals in this field, are fully based on ISO Standards and NIST Security Recommendations.

  14. Evidence-based guidelines: Improving AGREEment on consistence evaluation

    PubMed Central

    Vincenzi, Bruno; Napolitano, Andrea; Santini, Daniele; Maiello, Evaristo; Torri, Valter; Tonini, Giuseppe

    2012-01-01

    Modern clinical practice relies on evidence-based medicine (EBM) and evidence-based guidelines (EBGs). The critical evaluation of EBGs value is therefore an essential step to further improve clinical practice. In our opinion, correlating levels of evidence and grades of recommendation can be an easy tool to quickly display internal consistence of EBGs. PMID:26909252

  15. Standards-Based Wireless Sensor Networking Protocols for Spaceflight Applications

    NASA Technical Reports Server (NTRS)

    Wagner, Raymond S.

    2010-01-01

    Wireless sensor networks (WSNs) have the capacity to revolutionize data gathering in both spaceflight and terrestrial applications. WSNs provide a huge advantage over traditional, wired instrumentation since they do not require wiring trunks to connect sensors to a central hub. This allows for easy sensor installation in hard to reach locations, easy expansion of the number of sensors or sensing modalities, and reduction in both system cost and weight. While this technology offers unprecedented flexibility and adaptability, implementing it in practice is not without its difficulties. Recent advances in standards-based WSN protocols for industrial control applications have come a long way to solving many of the challenges facing practical WSN deployments. In this paper, we will overview two of the more promising candidates - WirelessHART from the HART Communication Foundation and ISA100.11a from the International Society of Automation - and present the architecture for a new standards-based sensor node for networking and applications research.

  16. REVIEW OF THE NEGOTIATION OF THE MODEL PROTOCOL ADDITIONAL TO THE AGREEMENT(S) BETWEEN STATE(S) AND THE INTERNATIONAL ATOMIC ENERGY AGENCY FOR THE APPLICATION OF SAFEGUARDS, INFCIRC/540 (Corrected) VOLUME II/III IAEA COMMITTEE 24, Major Issues Underlying the Model Additional Protocol (1996-1997).

    SciTech Connect

    Rosenthal, M.D.; Saum-Manning, L.; Houck, F.

    2010-01-01

    Volume I of this Review traces the origins of the Model Additional Protocol. It covers the period from 1991, when events in Iraq triggered an intensive review of the safeguards system, until 1996, when the IAEA Board of Governors established Committee 24 to negotiate a new protocol to safeguards agreement. The period from 1991-1996 set the stage for this negotiation and shaped its outcome in important ways. During this 5-year period, many proposals for strengthening safeguards were suggested and reviewed. Some proposals were dropped, for example, the suggestion by the IAEA Secretariat to verify certain imports, and others were refined. A rough consensus was established about the directions in which the international community wanted to go, and this was reflected in the draft of an additional protocol that was submitted to the IAEA Board of Governors on May 6, 1996 in document GOV/2863, Strengthening the Effectiveness and Improving the Efficiency of the Safeguards System - Proposals For Implementation Under Complementary Legal Authority, A Report by the Director General. This document ended with a recommendation that, 'the Board, through an appropriate mechanism, finalize the required legal instrument taking as a basis the draft protocol proposed by the Secretariat and the explanation of the measures contained in this document.'

  17. Fluoroquinolone-based protocols for eradication of Helicobacter pylori

    PubMed Central

    Rispo, Antonio; Capone, Pietro; Castiglione, Fabiana; Pasquale, Luigi; Rea, Matilde; Caporaso, Nicola

    2014-01-01

    Helicobacter pylori (H. pylori) is a widespread pathogen infecting about 40% of people living in urban areas and over 90% of people living in the developing regions of the world. H. pylori is well-documented as the main factor in the pathogenesis of peptic ulcer disease, chronic gastritis, and gastric malignancies such as cancer and mucosa-associated lymphoid tissue-lymphoma; hence, its eradication is strongly recommended. The Maastricht IV consensus, which focused on the management of H. pylori infection, set important new strategies in terms of treatment approaches, particularly with regards to first- and second-line treatment protocols and led to improved knowledge and understanding of H. pylori resistance to antibiotics. In recent years, various fluoroquinolone-based protocols, mainly including levofloxacin, have been proposed and effectively tested at all therapeutic lines for H. pylori eradication. The aim of the present paper is to review the scientific literature focused on the use of fluoroquinolones in eradicating H. pylori. PMID:25083067

  18. Enhancing data exploitation through DTN-based data transmission protocols

    NASA Astrophysics Data System (ADS)

    Daglis, Ioannis A.; Tsaoussidis, Vassilis; Rontogiannis, Athanasios; Balasis, Georgios; Keramitsoglou, Iphigenia; Paronis, Dimitrios; Sykioti, Olga; Tsinganos, Antonios

    2014-05-01

    Data distribution and data access are major issues in space sciences and geosciences as they strongly influence the degree of data exploitation. Processing and analysis of large volumes of Earth observation and space/planetary data face two major impediments: limited access capabilities due to narrow connectivity windows between spacecraft and ground receiving stations and lack of sufficient communication and dissemination mechanisms between space data receiving centres and the end-user community. Real-time data assimilation that would be critical in a number of forecasting capabilities is particularly affected by such limitations. The FP7-Space project "Space-Data Routers" (SDR) has the aim of allowing space agencies, academic institutes and research centres to disseminate/share space data generated by single or multiple missions, in an efficient, secure and automated manner. The approach of SDR relies on space internetworking - and in particular on Delay-Tolerant Networking (DTN), which marks the new era in space communications, unifies space and earth communication infrastructures and delivers a set of tools and protocols for space-data exploitation. The project includes the definition of limitations imposed by typical space mission scenarios in which the National Observatory of Athens is currently involved, including space and planetary exploration, as well as satellite-supported geoscience applications. In this paper, we present the mission scenarios, the SDR-application and the evaluation of the associated impact from the space-data router enhancements. The work leading to this paper has received funding from the European Union's Seventh Framework Programme (FP7-SPACE-2010-1) under grant agreement no. 263330 for the SDR (Space-Data Routers for Exploiting Space Data) collaborative research project. This paper reflects only the authors' views and the Union is not liable for any use that may be made of the information contained therein.

  19. VANET Clustering Based Routing Protocol Suitable for Deserts

    PubMed Central

    Mohammed Nasr, Mohammed Mohsen; Abdelgader, Abdeldime Mohamed Salih; Wang, Zhi-Gong; Shen, Lian-Feng

    2016-01-01

    In recent years, there has emerged applications of vehicular ad hoc networks (VANETs) towards security, safety, rescue, exploration, military and communication redundancy systems in non-populated areas, besides its ordinary use in urban environments as an essential part of intelligent transportation systems (ITS). This paper proposes a novel algorithm for the process of organizing a cluster structure and cluster head election (CHE) suitable for VANETs. Moreover, it presents a robust clustering-based routing protocol, which is appropriate for deserts and can achieve high communication efficiency, ensuring reliable information delivery and optimal exploitation of the equipment on each vehicle. A comprehensive simulation is conducted to evaluate the performance of the proposed CHE and routing algorithms. PMID:27058539

  20. VANET Clustering Based Routing Protocol Suitable for Deserts.

    PubMed

    Nasr, Mohammed Mohsen Mohammed; Abdelgader, Abdeldime Mohamed Salih; Wang, Zhi-Gong; Shen, Lian-Feng

    2016-01-01

    In recent years, there has emerged applications of vehicular ad hoc networks (VANETs) towards security, safety, rescue, exploration, military and communication redundancy systems in non-populated areas, besides its ordinary use in urban environments as an essential part of intelligent transportation systems (ITS). This paper proposes a novel algorithm for the process of organizing a cluster structure and cluster head election (CHE) suitable for VANETs. Moreover, it presents a robust clustering-based routing protocol, which is appropriate for deserts and can achieve high communication efficiency, ensuring reliable information delivery and optimal exploitation of the equipment on each vehicle. A comprehensive simulation is conducted to evaluate the performance of the proposed CHE and routing algorithms. PMID:27058539

  1. VANET Clustering Based Routing Protocol Suitable for Deserts.

    PubMed

    Nasr, Mohammed Mohsen Mohammed; Abdelgader, Abdeldime Mohamed Salih; Wang, Zhi-Gong; Shen, Lian-Feng

    2016-04-06

    In recent years, there has emerged applications of vehicular ad hoc networks (VANETs) towards security, safety, rescue, exploration, military and communication redundancy systems in non-populated areas, besides its ordinary use in urban environments as an essential part of intelligent transportation systems (ITS). This paper proposes a novel algorithm for the process of organizing a cluster structure and cluster head election (CHE) suitable for VANETs. Moreover, it presents a robust clustering-based routing protocol, which is appropriate for deserts and can achieve high communication efficiency, ensuring reliable information delivery and optimal exploitation of the equipment on each vehicle. A comprehensive simulation is conducted to evaluate the performance of the proposed CHE and routing algorithms.

  2. A Public-Key Based Authentication and Key Establishment Protocol Coupled with a Client Puzzle.

    ERIC Educational Resources Information Center

    Lee, M. C.; Fung, Chun-Kan

    2003-01-01

    Discusses network denial-of-service attacks which have become a security threat to the Internet community and suggests the need for reliable authentication protocols in client-server applications. Presents a public-key based authentication and key establishment protocol coupled with a client puzzle protocol and validates it through formal logic…

  3. Management of the infertile couple: an evidence-based protocol

    PubMed Central

    2010-01-01

    Background Infertility is defined as inability of a couple to conceive naturally after one year of regular unprotected sexual intercourse. It remains a major clinical and social problem, affecting perhaps one couple in six. Evaluation usually starts after 12 months; however it may be indicated earlier. The most common causes of infertility are: male factor such as sperm abnormalities, female factor such as ovulation dysfunction and tubal pathology, combined male and female factors and unexplained infertility. Objectives The aim of this study is to provide the healthcare professionals an evidence-based management protocol for infertile couples away from medical information overload. Methods A comprehensive review where the literature was searched for "Management of infertility and/or infertile couples" at library website of University of Bristol (MetaLib) by using a cross-search of different medical databases besides the relevant printed medical journals and periodicals. Guidelines and recommendations were retrieved from the best evidence reviews such as that from the American College of Obstetricians and Gynaecologists (ACOG), American Society for Reproductive Medicine (ASRM), Canadian Fertility and Andrology Society (CFAS), and Royal College of Obstetricians and Gynaecologists (RCOG). Results A simple guide for the clinicians to manage the infertile couples. Conclusions The study deploys a new strategy to translate the research findings and evidence-base recommendations into a simplified focused guide to be applied on routine daily practice. It is an approach to disseminate the recommended medical care for infertile couple to the practicing clinicians. PMID:20205744

  4. Precision Time Protocol-Based Trilateration for Planetary Navigation

    NASA Technical Reports Server (NTRS)

    Murdock, Ron

    2015-01-01

    Progeny Systems Corporation has developed a high-fidelity, field-scalable, non-Global Positioning System (GPS) navigation system that offers precision localization over communications channels. The system is bidirectional, providing position information to both base and mobile units. It is the first-ever wireless use of the Institute of Electrical and Electronics Engineers (IEEE) Precision Time Protocol (PTP) in a bidirectional trilateration navigation system. The innovation provides a precise and reliable navigation capability to support traverse-path planning systems and other mapping applications, and it establishes a core infrastructure for long-term lunar and planetary occupation. Mature technologies are integrated to provide navigation capability and to support data and voice communications on the same network. On Earth, the innovation is particularly well suited for use in unmanned aerial vehicles (UAVs), as it offers a non-GPS precision navigation and location service for use in GPS-denied environments. Its bidirectional capability provides real-time location data to the UAV operator and to the UAV. This approach optimizes assisted GPS techniques and can be used to determine the presence of GPS degradation, spoofing, or jamming.

  5. Quantum Private Comparison Protocol Based on Cluster States

    NASA Astrophysics Data System (ADS)

    Sun, Zhiwei; Long, Dongyang

    2013-01-01

    We present a quantum private comparison (QPC) protocol, enabling two players to compare the equality of their information without revealing any information about their respective private inputs, in which the four-particle cluster states as the information carriers are used. The presented protocol can ensure correctness, privacy, and fairness with the assistance of a semi-trusted third party (TP). Meanwhile, the participants including the TP are just required having the ability to perform single-particle measurements, which make the presented protocol more feasible in technique. Furthermore, the photon transmission is a one-way distribution; the Trojan horse attacks can be automatically avoided. The security of this protocol is also analyzed.

  6. Internet-Protocol-Based Satellite Bus Architecture Designed

    NASA Technical Reports Server (NTRS)

    Slywczak, Richard A.

    2004-01-01

    NASA is designing future complex satellite missions ranging from single satellites and constellations to space networks and sensor webs. These missions require more interoperability, autonomy, and coordination than previous missions; in addition, a desire exists to have scientists retrieve data directly from the satellite rather than a central distribution source. To meet these goals, NASA has been studying the possibility of extending the Transmission Control Protocol/Internet Protocol (TCP/IP) suite for spacebased applications.

  7. Coexistence of WiFi and WiMAX systems based on PS-request protocols.

    PubMed

    Kim, Jongwoo; Park, Suwon; Rhee, Seung Hyong; Choi, Yong-Hoon; Chung, Young-uk; Hwang, Ho Young

    2011-01-01

    We introduce both the coexistence zone within the WiMAX frame structure and a PS-Request protocol for the coexistence of WiFi and WiMAX systems sharing a frequency band. Because we know that the PS-Request protocol has drawbacks, we propose a revised PS-Request protocol to improve the performance. Two PS-Request protocols are based on the time division operation (TDO) of WiFi system and WiMAX system to avoid the mutual interference, and use the vestigial power management (PwrMgt) bit within the Frame Control field of the frames transmitted by a WiFi AP. The performance of the revised PS-Request protocol is evaluated by computer simulation, and compared to those of the cases without a coexistence protocol and to the original PS-Request protocol. PMID:22163721

  8. Coexistence of WiFi and WiMAX systems based on PS-request protocols.

    PubMed

    Kim, Jongwoo; Park, Suwon; Rhee, Seung Hyong; Choi, Yong-Hoon; Chung, Young-uk; Hwang, Ho Young

    2011-01-01

    We introduce both the coexistence zone within the WiMAX frame structure and a PS-Request protocol for the coexistence of WiFi and WiMAX systems sharing a frequency band. Because we know that the PS-Request protocol has drawbacks, we propose a revised PS-Request protocol to improve the performance. Two PS-Request protocols are based on the time division operation (TDO) of WiFi system and WiMAX system to avoid the mutual interference, and use the vestigial power management (PwrMgt) bit within the Frame Control field of the frames transmitted by a WiFi AP. The performance of the revised PS-Request protocol is evaluated by computer simulation, and compared to those of the cases without a coexistence protocol and to the original PS-Request protocol.

  9. A standard protocol for describing individual-based and agent-based models

    USGS Publications Warehouse

    Grimm, Volker; Berger, Uta; Bastiansen, Finn; Eliassen, Sigrunn; Ginot, Vincent; Giske, Jarl; Goss-Custard, John; Grand, Tamara; Heinz, Simone K.; Huse, Geir; Huth, Andreas; Jepsen, Jane U.; Jorgensen, Christian; Mooij, Wolf M.; Muller, Birgit; Pe'er, Guy; Piou, Cyril; Railsback, Steven F.; Robbins, Andrew M.; Robbins, Martha M.; Rossmanith, Eva; Ruger, Nadja; Strand, Espen; Souissi, Sami; Stillman, Richard A.; Vabo, Rune; Visser, Ute; DeAngelis, Donald L.

    2006-01-01

    Simulation models that describe autonomous individual organisms (individual based models, IBM) or agents (agent-based models, ABM) have become a widely used tool, not only in ecology, but also in many other disciplines dealing with complex systems made up of autonomous entities. However, there is no standard protocol for describing such simulation models, which can make them difficult to understand and to duplicate. This paper presents a proposed standard protocol, ODD, for describing IBMs and ABMs, developed and tested by 28 modellers who cover a wide range of fields within ecology. This protocol consists of three blocks (Overview, Design concepts, and Details), which are subdivided into seven elements: Purpose, State variables and scales, Process overview and scheduling, Design concepts, Initialization, Input, and Submodels. We explain which aspects of a model should be described in each element, and we present an example to illustrate the protocol in use. In addition, 19 examples are available in an Online Appendix. We consider ODD as a first step for establishing a more detailed common format of the description of IBMs and ABMs. Once initiated, the protocol will hopefully evolve as it becomes used by a sufficiently large proportion of modellers.

  10. Efficient biometric authenticated key agreements based on extended chaotic maps for telecare medicine information systems.

    PubMed

    Lou, Der-Chyuan; Lee, Tian-Fu; Lin, Tsung-Hung

    2015-05-01

    Authenticated key agreements for telecare medicine information systems provide patients, doctors, nurses and health visitors with accessing medical information systems and getting remote services efficiently and conveniently through an open network. In order to have higher security, many authenticated key agreement schemes appended biometric keys to realize identification except for using passwords and smartcards. Due to too many transmissions and computational costs, these authenticated key agreement schemes are inefficient in communication and computation. This investigation develops two secure and efficient authenticated key agreement schemes for telecare medicine information systems by using biometric key and extended chaotic maps. One scheme is synchronization-based, while the other nonce-based. Compared to related approaches, the proposed schemes not only retain the same security properties with previous schemes, but also provide users with privacy protection and have fewer transmissions and lower computational cost.

  11. Development of Research-Based Protocol Aligned to Predict High Levels of Teaching Quality

    ERIC Educational Resources Information Center

    Schumacher, Gary; Grigsby, Bettye; Vesey, Winona

    2011-01-01

    This study proposes a research-based teacher selection protocol. The protocol is intended to offer school district hiring authorities a tool to identify teacher candidates with the behaviors expected to predict effective teaching. It is hypothesized that a particular series of research-based interview questions focusing on teaching behaviors in…

  12. The Impact of Acceptance-Based Versus Avoidance-Based Protocols on Discomfort

    ERIC Educational Resources Information Center

    Luciano, Carmen; Molina, Francisco; Gutierrez-Martinez, Olga; Barnes-Holmes, Dermot; Valdivia-Salas, Sonsoles; Cabello, Francisco; Barnes-Holmes, Yvonne; Rodriguez-Valverde, Miguel; Wilson, Kelly G.

    2010-01-01

    This study aimed to isolate the conditions under which aversive stimulation is experienced as more or less discomforting/unpleasant. Discomfort was induced by playing loud noises through headphones while participants performed computer tasks. We employed 4 main conditions. Condition 1: the acceptance-based protocol (ACT), intended to integrate…

  13. Improving the reliability of diagnostic tests in population-based agreement studies

    PubMed Central

    Nelson, Kerrie P.; Edwards, Don

    2016-01-01

    Many large-scale studies have recently been carried out to assess the reliability of diagnostic procedures, such as mammography for the detection of breast cancer. The large numbers of raters and subjects involved raise new challenges in how to measure agreement in these types of studies. An important motivator of these studies is the identification of factors that contribute to the often wide discrepancies observed between raters’ classifications, such as a rater’s experience, in order to improve the reliability of the diagnostic process of interest. Incorporating covariate information into the agreement model is a key component in addressing these questions. Few agreement models are currently available that jointly model larger numbers of raters and subjects and incorporate covariate information. In this paper, we extend a recently developed population-based model and measure of agreement for binary ratings to incorporate covariate information using the class of generalized linear mixed models with a probit link function. Important information on factors related to the subjects and raters can be included as fixed and/or random effects in the model. We demonstrate how agreement can be assessed between subgroups of the raters and/or subjects, for example, comparing agreement between experienced and less experienced raters. Simulation studies are carried out to test the performance of the proposed models and measures of agreement. Application to a large-scale breast cancer study is presented. PMID:20128018

  14. Cryptanalysis of an inter-bank E-payment protocol based on quantum proxy blind signature

    NASA Astrophysics Data System (ADS)

    Cai, Xiao-Qiu; Wei, Chun-Yan

    2013-04-01

    We analyze the security of an inter-bank E-payment protocol based on quantum proxy blind signature, and find that there is a security leak in the quantum channels of this protocol, which gives a chance for an outside opponent to launch a special denial-of-service attack. Furthermore, we show that the dishonest merchant can succeed to change the purchase information of the customer in this protocol.

  15. Comment on "Device-independent entanglement-based Bennett 1992 protocol"

    NASA Astrophysics Data System (ADS)

    Tan, Yong-gang; Cai, Qing-yu

    2016-06-01

    Recently, Lucamarini et al. proposed the device-independent entanglement-based Bennett 1992 protocol [Phys. Rev. A 86, 032325 (2012), 10.1103/PhysRevA.86.032325]. By exploiting the results in device-independent quantum key distribution with the Clauser-Horne-Shimony-Holt inequality, they claimed the security of their protocol. We will show, however, the way of encoding and the process for the latent eavesdropper to obtain the illegal information are different in these two protocols. Thus the security of their protocol cannot rely on Bell's theorem only.

  16. An arbitrated quantum signature protocol based on the chained CNOT operations encryption

    NASA Astrophysics Data System (ADS)

    Li, Feng-Guang; Shi, Jian-Hong

    2015-06-01

    At present, the encryption scheme used by most arbitrated quantum signature (AQS) protocols is quantum one-time pad (QOTP) which encrypts data qubit by qubit. Though QOTP can achieve high security for data encryption, it is not suitable for AQS. There are many attacks on AQS using QOTP. In this paper, we propose an AQS protocol based on another encryption scheme called the chained CNOT operations, which encrypts quantum message ensemble. Our protocol preserves all merits in the similar AQS schemes and has better security. Security analysis shows that our protocol cannot be forged and disavowed under the existing attacks.

  17. Interactive identification protocol based on a quantum public-key cryptosystem

    NASA Astrophysics Data System (ADS)

    Wu, Chenmiao; Yang, Li

    2014-11-01

    We propose two interactive identification protocols based on a general construction of quantum public-key cryptosystem. Basic protocol contains set-up phase and authentication phase. Participants do operation with quantum computing of Boolean function in two-round transmission of authentication phase. Basic one only ensures completeness and soundness, but leaks information about private-key. We modify basic protocol with random string and random Boolean permutation. After modification, both transmitted states in two-round transmission can be proved to be ultimate mixed states. No participant or attacker will get useful information about private-key by measuring such states. Modified protocol achieves property of zero-knowledge.

  18. Taking the Politics Out of Satellite and Space-Based Communications Protocols

    NASA Technical Reports Server (NTRS)

    Ivancic, William D.

    2006-01-01

    After many years of studies, experimentation, and deployment, large amounts of misinformation and misconceptions remain regarding applicability of various communications protocols for use in satellite and space-based networks. This paper attempts to remove much of the politics, misconceptions, and misinformation that have plagued spacebased communications protocol development and deployment. This paper provides a common vocabulary for communications; a general discussion of the requirements for various communication environments; an evaluation of tradeoffs between circuit and packet-switching technologies, and the pros and cons of various link, network, transport, application, and security protocols. Included is the applicability of protocol enhancing proxies to NASA, Department of Defense (DOD), and commercial space communication systems.

  19. Two new Controlled not Gate Based Quantum Secret Sharing Protocols without Entanglement Attenuation

    NASA Astrophysics Data System (ADS)

    Zhu, Zhen-Chao; Hu, Ai-Qun; Fu, An-Min

    2016-05-01

    In this paper, we propose two new controlled not gate based quantum secret sharing protocols. In these two protocols, each photon only travels once, which guarantees the agents located in long distance can be able to derive the dealer's secret without suffering entanglement attenuation problem. The protocols are secure against trojan horse attack, intercept-resend attack, entangle-measure attack and entanglement-swapping attack. The theoretical efficiency for qubits of these two protocols can approach 100 %, except those used for eavesdropping checking, all entangled states can be used for final secret sharing.

  20. Authenticated algorithms for Byzantine agreement

    SciTech Connect

    Dolev, D.; Strong, H.R.

    1983-11-01

    Reaching agreement in a distributed system in the presence of fault processors is a central issue for reliable computer systems. Using an authentication protocol, one can limit the undetected behavior of faulty processors to a simple failure to relay messages to all intended targets. In this paper the authors show that, in spite of such an ability to limit faulty behavior, and no matter what message types or protocols are allowed, reaching (Byzantine) agreement requires at least t+1 phases or rounds of information exchange, where t is an upper bound on the number of faulty processors. They present algorithms for reaching agreement based on authentication that require a total number of messages sent by correctly operating processors that is polynomial in both t and the number of processors, n. The best algorithm uses only t+1 phases and o(nt) messages. 9 references.

  1. Communication protocol in chassis detecting wireless transmission system based on WiFi

    Technology Transfer Automated Retrieval System (TEKTRAN)

    In chassis detecting wireless transmission system, the wireless network communication protocol plays a key role in the information exchange and synchronization between the host and chassis PDA. This paper presents a wireless network transmission protocol based on TCP/IP which makes the rules of info...

  2. A Provably Secure Revocable ID-Based Authenticated Group Key Exchange Protocol with Identifying Malicious Participants

    PubMed Central

    Tsai, Tung-Tso

    2014-01-01

    The existence of malicious participants is a major threat for authenticated group key exchange (AGKE) protocols. Typically, there are two detecting ways (passive and active) to resist malicious participants in AGKE protocols. In 2012, the revocable identity- (ID-) based public key system (R-IDPKS) was proposed to solve the revocation problem in the ID-based public key system (IDPKS). Afterwards, based on the R-IDPKS, Wu et al. proposed a revocable ID-based AGKE (RID-AGKE) protocol, which adopted a passive detecting way to resist malicious participants. However, it needs three rounds and cannot identify malicious participants. In this paper, we fuse a noninteractive confirmed computation technique to propose the first two-round RID-AGKE protocol with identifying malicious participants, which is an active detecting way. We demonstrate that our protocol is a provably secure AGKE protocol with forward secrecy and can identify malicious participants. When compared with the recently proposed ID/RID-AGKE protocols, our protocol possesses better performance and more robust security properties. PMID:24991641

  3. A network identity authentication protocol of bank account system based on fingerprint identification and mixed encryption

    NASA Astrophysics Data System (ADS)

    Zhu, Lijuan; Liu, Jingao

    2013-07-01

    This paper describes a network identity authentication protocol of bank account system based on fingerprint identification and mixed encryption. This protocol can provide every bank user a safe and effective way to manage his own bank account, and also can effectively prevent the hacker attacks and bank clerk crime, so that it is absolute to guarantee the legitimate rights and interests of bank users.

  4. Meta-Transport Library, A protocol base class library. Release 1.1

    SciTech Connect

    Strayer, T.

    1994-05-10

    This User`s Guide describes the installation and use of the Meta- Transport Library protocol base classes. This software package includes the full source code for the implementation, as well as man pages and appropriate documents. The fully built MTL is a C++ library file that is linked into derived protocol code.

  5. Security enhanced EMV-based mobile payment protocol.

    PubMed

    Yang, Ming-Hour

    2014-01-01

    Near field communication has enabled customers to put their credit cards into a smartphone and use the phone for credit card transaction. But EMV contactless payment allows unauthorized readers to access credit cards. Besides, in offline transaction, a merchant's reader cannot verify whether a card has been revoked. Therefore, we propose an EMV-compatible payment protocol to mitigate the transaction risk. And our modifications to the EMV standard are transparent to merchants and users. We also encrypt the communications between a card and a reader to prevent eavesdropping on sensitive data. The protocol is able to resist impersonation attacks and to avoid the security threats in EMV. In offline transactions, our scheme requires a user to apply for a temporary offline certificate in advance. With the certificate, banks no longer need to lower customer's credits for risk control, and users can have online-equivalent credits in offline transactions.

  6. Security Enhanced EMV-Based Mobile Payment Protocol

    PubMed Central

    2014-01-01

    Near field communication has enabled customers to put their credit cards into a smartphone and use the phone for credit card transaction. But EMV contactless payment allows unauthorized readers to access credit cards. Besides, in offline transaction, a merchant's reader cannot verify whether a card has been revoked. Therefore, we propose an EMV-compatible payment protocol to mitigate the transaction risk. And our modifications to the EMV standard are transparent to merchants and users. We also encrypt the communications between a card and a reader to prevent eavesdropping on sensitive data. The protocol is able to resist impersonation attacks and to avoid the security threats in EMV. In offline transactions, our scheme requires a user to apply for a temporary offline certificate in advance. With the certificate, banks no longer need to lower customer's credits for risk control, and users can have online-equivalent credits in offline transactions. PMID:25302334

  7. 42 CFR 137.120 - May a Self-Governance Tribe's funding agreement provide for a stable base budget?

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... 42 Public Health 1 2014-10-01 2014-10-01 false May a Self-Governance Tribe's funding agreement... SELF-GOVERNANCE Funding Stable Base Budget § 137.120 May a Self-Governance Tribe's funding agreement provide for a stable base budget? Yes, at the option of a Self-Governance Tribe, a funding agreement...

  8. 42 CFR 137.120 - May a Self-Governance Tribe's funding agreement provide for a stable base budget?

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 42 Public Health 1 2010-10-01 2010-10-01 false May a Self-Governance Tribe's funding agreement... SELF-GOVERNANCE Funding Stable Base Budget § 137.120 May a Self-Governance Tribe's funding agreement provide for a stable base budget? Yes, at the option of a Self-Governance Tribe, a funding agreement...

  9. 42 CFR 137.120 - May a Self-Governance Tribe's funding agreement provide for a stable base budget?

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... 42 Public Health 1 2012-10-01 2012-10-01 false May a Self-Governance Tribe's funding agreement... SELF-GOVERNANCE Funding Stable Base Budget § 137.120 May a Self-Governance Tribe's funding agreement provide for a stable base budget? Yes, at the option of a Self-Governance Tribe, a funding agreement...

  10. 42 CFR 137.120 - May a Self-Governance Tribe's funding agreement provide for a stable base budget?

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 42 Public Health 1 2011-10-01 2011-10-01 false May a Self-Governance Tribe's funding agreement... SELF-GOVERNANCE Funding Stable Base Budget § 137.120 May a Self-Governance Tribe's funding agreement provide for a stable base budget? Yes, at the option of a Self-Governance Tribe, a funding agreement...

  11. 42 CFR 137.120 - May a Self-Governance Tribe's funding agreement provide for a stable base budget?

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... 42 Public Health 1 2013-10-01 2013-10-01 false May a Self-Governance Tribe's funding agreement... SELF-GOVERNANCE Funding Stable Base Budget § 137.120 May a Self-Governance Tribe's funding agreement provide for a stable base budget? Yes, at the option of a Self-Governance Tribe, a funding agreement...

  12. Quantum private comparison protocol based on entanglement swapping of d-level Bell states

    NASA Astrophysics Data System (ADS)

    Guo, Fen Zhuo; Gao, Fei; Qin, Su Juan; Zhang, Jie; Wen, Qiao Yan

    2013-08-01

    In this paper, we propose a quantum private comparison protocol based on entanglement swapping, where two distrustful parties can compare the values of their secrets with the help of a semi-trusted third party. The protocol can determine not only whether two secrets are equal, but also the size relationship between them. The two parties can deduce the comparison result based on the keys shared between them and the announcement of the third party. Others including the third party will learn nothing about the values of the secrets, as well as the comparison result. The security of our protocol is analyzed. Furthermore, all the particles can be reused in the same protocol model theoretically. So our protocol is efficient and feasible to expand in network service, which in turn gives a solution to the left problem in Lin et al. (Quantum Inf Process, doi: 10.1007/s11128-012-0395-6, 2012).

  13. A two-hop based adaptive routing protocol for real-time wireless sensor networks.

    PubMed

    Rachamalla, Sandhya; Kancherla, Anitha Sheela

    2016-01-01

    One of the most important and challenging issues in wireless sensor networks (WSNs) is to optimally manage the limited energy of nodes without degrading the routing efficiency. In this paper, we propose an energy-efficient adaptive routing mechanism for WSNs, which saves energy of nodes by removing the much delayed packets without degrading the real-time performance of the used routing protocol. It uses the adaptive transmission power algorithm which is based on the attenuation of the wireless link to improve the energy efficiency. The proposed routing mechanism can be associated with any geographic routing protocol and its performance is evaluated by integrating with the well known two-hop based real-time routing protocol, PATH and the resulting protocol is energy-efficient adaptive routing protocol (EE-ARP). The EE-ARP performs well in terms of energy consumption, deadline miss ratio, packet drop and end-to-end delay. PMID:27478727

  14. 13 CFR 108.507 - Violations based on false filings and nonperformance of agreements with SBA.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 13 Business Credit and Assistance 1 2010-01-01 2010-01-01 false Violations based on false filings and nonperformance of agreements with SBA. 108.507 Section 108.507 Business Credit and Assistance SMALL BUSINESS ADMINISTRATION NEW MARKETS VENTURE CAPITAL (âNMVCâ) PROGRAM Managing the Operations of...

  15. 13 CFR 108.507 - Violations based on false filings and nonperformance of agreements with SBA.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 13 Business Credit and Assistance 1 2012-01-01 2012-01-01 false Violations based on false filings and nonperformance of agreements with SBA. 108.507 Section 108.507 Business Credit and Assistance SMALL BUSINESS ADMINISTRATION NEW MARKETS VENTURE CAPITAL (âNMVCâ) PROGRAM Managing the Operations of...

  16. 13 CFR 107.507 - Violations based on false filings and nonperformance of agreements with SBA.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 13 Business Credit and Assistance 1 2010-01-01 2010-01-01 false Violations based on false filings and nonperformance of agreements with SBA. 107.507 Section 107.507 Business Credit and Assistance SMALL BUSINESS ADMINISTRATION SMALL BUSINESS INVESTMENT COMPANIES Managing the Operations of a...

  17. 13 CFR 107.507 - Violations based on false filings and nonperformance of agreements with SBA.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 13 Business Credit and Assistance 1 2013-01-01 2013-01-01 false Violations based on false filings and nonperformance of agreements with SBA. 107.507 Section 107.507 Business Credit and Assistance SMALL BUSINESS ADMINISTRATION SMALL BUSINESS INVESTMENT COMPANIES Managing the Operations of a...

  18. 13 CFR 107.507 - Violations based on false filings and nonperformance of agreements with SBA.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 13 Business Credit and Assistance 1 2012-01-01 2012-01-01 false Violations based on false filings and nonperformance of agreements with SBA. 107.507 Section 107.507 Business Credit and Assistance SMALL BUSINESS ADMINISTRATION SMALL BUSINESS INVESTMENT COMPANIES Managing the Operations of a...

  19. 13 CFR 108.507 - Violations based on false filings and nonperformance of agreements with SBA.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 13 Business Credit and Assistance 1 2013-01-01 2013-01-01 false Violations based on false filings and nonperformance of agreements with SBA. 108.507 Section 108.507 Business Credit and Assistance SMALL BUSINESS ADMINISTRATION NEW MARKETS VENTURE CAPITAL (âNMVCâ) PROGRAM Managing the Operations of...

  20. 13 CFR 107.507 - Violations based on false filings and nonperformance of agreements with SBA.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 13 Business Credit and Assistance 1 2014-01-01 2014-01-01 false Violations based on false filings and nonperformance of agreements with SBA. 107.507 Section 107.507 Business Credit and Assistance SMALL BUSINESS ADMINISTRATION SMALL BUSINESS INVESTMENT COMPANIES Managing the Operations of a...

  1. 48 CFR 22.1012-2 - Wage determinations based on collective bargaining agreements.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... ACQUISITIONS Service Contract Act of 1965, as Amended 22.1012-2 Wage determinations based on collective... before commencement of the work shall be effective for purposes of the successor contract under section 4... contracting officer shall incorporate the collective bargaining agreement itself in a solicitation or...

  2. A multihop key agreement scheme for wireless ad hoc networks based on channel characteristics.

    PubMed

    Hao, Zhuo; Zhong, Sheng; Yu, Nenghai

    2013-01-01

    A number of key agreement schemes based on wireless channel characteristics have been proposed recently. However, previous key agreement schemes require that two nodes which need to agree on a key are within the communication range of each other. Hence, they are not suitable for multihop wireless networks, in which nodes do not always have direct connections with each other. In this paper, we first propose a basic multihop key agreement scheme for wireless ad hoc networks. The proposed basic scheme is resistant to external eavesdroppers. Nevertheless, this basic scheme is not secure when there exist internal eavesdroppers or Man-in-the-Middle (MITM) adversaries. In order to cope with these adversaries, we propose an improved multihop key agreement scheme. We show that the improved scheme is secure against internal eavesdroppers and MITM adversaries in a single path. Both performance analysis and simulation results demonstrate that the improved scheme is efficient. Consequently, the improved key agreement scheme is suitable for multihop wireless ad hoc networks. PMID:23766725

  3. A Multihop Key Agreement Scheme for Wireless Ad Hoc Networks Based on Channel Characteristics

    PubMed Central

    Yu, Nenghai

    2013-01-01

    A number of key agreement schemes based on wireless channel characteristics have been proposed recently. However, previous key agreement schemes require that two nodes which need to agree on a key are within the communication range of each other. Hence, they are not suitable for multihop wireless networks, in which nodes do not always have direct connections with each other. In this paper, we first propose a basic multihop key agreement scheme for wireless ad hoc networks. The proposed basic scheme is resistant to external eavesdroppers. Nevertheless, this basic scheme is not secure when there exist internal eavesdroppers or Man-in-the-Middle (MITM) adversaries. In order to cope with these adversaries, we propose an improved multihop key agreement scheme. We show that the improved scheme is secure against internal eavesdroppers and MITM adversaries in a single path. Both performance analysis and simulation results demonstrate that the improved scheme is efficient. Consequently, the improved key agreement scheme is suitable for multihop wireless ad hoc networks. PMID:23766725

  4. A multihop key agreement scheme for wireless ad hoc networks based on channel characteristics.

    PubMed

    Hao, Zhuo; Zhong, Sheng; Yu, Nenghai

    2013-01-01

    A number of key agreement schemes based on wireless channel characteristics have been proposed recently. However, previous key agreement schemes require that two nodes which need to agree on a key are within the communication range of each other. Hence, they are not suitable for multihop wireless networks, in which nodes do not always have direct connections with each other. In this paper, we first propose a basic multihop key agreement scheme for wireless ad hoc networks. The proposed basic scheme is resistant to external eavesdroppers. Nevertheless, this basic scheme is not secure when there exist internal eavesdroppers or Man-in-the-Middle (MITM) adversaries. In order to cope with these adversaries, we propose an improved multihop key agreement scheme. We show that the improved scheme is secure against internal eavesdroppers and MITM adversaries in a single path. Both performance analysis and simulation results demonstrate that the improved scheme is efficient. Consequently, the improved key agreement scheme is suitable for multihop wireless ad hoc networks.

  5. A survey on the taxonomy of cluster-based routing protocols for homogeneous wireless sensor networks.

    PubMed

    Naeimi, Soroush; Ghafghazi, Hamidreza; Chow, Chee-Onn; Ishii, Hiroshi

    2012-01-01

    The past few years have witnessed increased interest among researchers in cluster-based protocols for homogeneous networks because of their better scalability and higher energy efficiency than other routing protocols. Given the limited capabilities of sensor nodes in terms of energy resources, processing and communication range, the cluster-based protocols should be compatible with these constraints in either the setup state or steady data transmission state. With focus on these constraints, we classify routing protocols according to their objectives and methods towards addressing the shortcomings of clustering process on each stage of cluster head selection, cluster formation, data aggregation and data communication. We summarize the techniques and methods used in these categories, while the weakness and strength of each protocol is pointed out in details. Furthermore, taxonomy of the protocols in each phase is given to provide a deeper understanding of current clustering approaches. Ultimately based on the existing research, a summary of the issues and solutions of the attributes and characteristics of clustering approaches and some open research areas in cluster-based routing protocols that can be further pursued are provided. PMID:22969350

  6. A Survey on the Taxonomy of Cluster-Based Routing Protocols for Homogeneous Wireless Sensor Networks

    PubMed Central

    Naeimi, Soroush; Ghafghazi, Hamidreza; Chow, Chee-Onn; Ishii, Hiroshi

    2012-01-01

    The past few years have witnessed increased interest among researchers in cluster-based protocols for homogeneous networks because of their better scalability and higher energy efficiency than other routing protocols. Given the limited capabilities of sensor nodes in terms of energy resources, processing and communication range, the cluster-based protocols should be compatible with these constraints in either the setup state or steady data transmission state. With focus on these constraints, we classify routing protocols according to their objectives and methods towards addressing the shortcomings of clustering process on each stage of cluster head selection, cluster formation, data aggregation and data communication. We summarize the techniques and methods used in these categories, while the weakness and strength of each protocol is pointed out in details. Furthermore, taxonomy of the protocols in each phase is given to provide a deeper understanding of current clustering approaches. Ultimately based on the existing research, a summary of the issues and solutions of the attributes and characteristics of clustering approaches and some open research areas in cluster-based routing protocols that can be further pursued are provided. PMID:22969350

  7. MAC protocol for an ATM-based SuperPON

    NASA Astrophysics Data System (ADS)

    Angelopoulos, John D.; Koulouris, John; Fragoulopoulos, Stratos K.

    1996-11-01

    Developments in optical amplifiers and the tendency towards fewer and larger switching stages made feasible and desirable the concept of SuperPONs with a range of 100km. Up to 15000 residential customers can share the SuperPON on a TDMA basis lowering the cost of access to B-ISDN services. Tree PONs require a MAC protocol to arbitrate the access to upstream slots among the competing customer ATM cells in a dynamic and efficient way. The protocol presented in this work combines different access mechanisms according to service quality requirements. All bursty traffic is manipulated transparently using a reservation approach with closed loop control so as to handle the unpredictability of arrivals. In contrast, voice, N-ISDN and other delay sensitive services are provided with unsolicited access permits. In addition, composite cells offered quasi- synchronous permits are used to support STM legacy traffic without echo-cancellers. So, ABR traffic which is delay tolerant and more cost sensitive, can and should be concentrated with full exploitation of multiplexing gain prospects. The permit distribution algorithm focuses on cell spacing, control of CDV, almost jitter free access for synchronous traffic and efficiency for ABR traffic.

  8. A hash based mutual RFID tag authentication protocol in telecare medicine information system.

    PubMed

    Srivastava, Keerti; Awasthi, Amit K; Kaul, Sonam D; Mittal, R C

    2015-01-01

    Radio Frequency Identification (RFID) is a technology which has multidimensional applications to reduce the complexity of today life. Everywhere, like access control, transportation, real-time inventory, asset management and automated payment systems etc., RFID has its enormous use. Recently, this technology is opening its wings in healthcare environments, where potential applications include patient monitoring, object traceability and drug administration systems etc. In this paper, we propose a secure RFID-based protocol for the medical sector. This protocol is based on hash operation with synchronized secret. The protocol is safe against active and passive attacks such as forgery, traceability, replay and de-synchronization attack. PMID:25491577

  9. A hash based mutual RFID tag authentication protocol in telecare medicine information system.

    PubMed

    Srivastava, Keerti; Awasthi, Amit K; Kaul, Sonam D; Mittal, R C

    2015-01-01

    Radio Frequency Identification (RFID) is a technology which has multidimensional applications to reduce the complexity of today life. Everywhere, like access control, transportation, real-time inventory, asset management and automated payment systems etc., RFID has its enormous use. Recently, this technology is opening its wings in healthcare environments, where potential applications include patient monitoring, object traceability and drug administration systems etc. In this paper, we propose a secure RFID-based protocol for the medical sector. This protocol is based on hash operation with synchronized secret. The protocol is safe against active and passive attacks such as forgery, traceability, replay and de-synchronization attack.

  10. Protocol Support for a New Satellite-Based Airspace Communication Network

    NASA Technical Reports Server (NTRS)

    Shang, Yadong; Hadjitheodosiou, Michael; Baras, John

    2004-01-01

    We recommend suitable transport protocols for an aeronautical network supporting Internet and data services via satellite. We study the characteristics of an aeronautical satellite hybrid network and focus on the problems that cause dramatically degraded performance of the Transport Protocol. We discuss various extensions to standard TCP that alleviate some of these performance problems. Through simulation, we identify those TCP implementations that can be expected to perform well. Based on the observation that it is difficult for an end-to-end solution to solve these problems effectively, we propose a new TCP-splitting protocol, termed Aeronautical Transport Control Protocol (AeroTCP). The main idea of this protocol is to use a fixed window for flow control and one duplicated acknowledgement (ACK) for fast recovery. Our simulation results show that AeroTCP can maintain higher utilization for the satellite link than end-to-end TCP, especially in high BER environment.

  11. Distance-Based and Low Energy Adaptive Clustering Protocol for Wireless Sensor Networks

    PubMed Central

    Gani, Abdullah; Anisi, Mohammad Hossein; Ab Hamid, Siti Hafizah; Akhunzada, Adnan; Khan, Muhammad Khurram

    2016-01-01

    A wireless sensor network (WSN) comprises small sensor nodes with limited energy capabilities. The power constraints of WSNs necessitate efficient energy utilization to extend the overall network lifetime of these networks. We propose a distance-based and low-energy adaptive clustering (DISCPLN) protocol to streamline the green issue of efficient energy utilization in WSNs. We also enhance our proposed protocol into the multi-hop-DISCPLN protocol to increase the lifetime of the network in terms of high throughput with minimum delay time and packet loss. We also propose the mobile-DISCPLN protocol to maintain the stability of the network. The modelling and comparison of these protocols with their corresponding benchmarks exhibit promising results. PMID:27658194

  12. Agreement among Health Care Professionals in Diagnosing Case Vignette-Based Surgical Site Infections

    PubMed Central

    Lepelletier, Didier; Ravaud, Philippe; Baron, Gabriel; Lucet, Jean-Christophe

    2012-01-01

    Objective To assess agreement in diagnosing surgical site infection (SSI) among healthcare professionals involved in SSI surveillance. Methods Case-vignette study done in 2009 in 140 healthcare professionals from seven specialties (20 in each specialty, Anesthesiologists, Surgeons, Public health specialists, Infection control physicians, Infection control nurses, Infectious diseases specialists, Microbiologists) in 29 University and 36 non-University hospitals in France. We developed 40 case-vignettes based on cardiac and gastrointestinal surgery patients with suspected SSI. Each participant scored six randomly assigned case-vignettes before and after reading the SSI definition on an online secure relational database. The intraclass correlation coefficient (ICC) was used to assess agreement regarding SSI diagnosis on a seven-point Likert scale and the kappa coefficient to assess agreement for superficial or deep SSI on a three-point scale. Results Based on a consensus, SSI was present in 21 of 40 vignettes (52.5%). Intraspecialty agreement for SSI diagnosis ranged across specialties from 0.15 (95% confidence interval, 0.00–0.59) (anesthesiologists and infection control nurses) to 0.73 (0.32–0.90) (infectious diseases specialists). Reading the SSI definition improved agreement in the specialties with poor initial agreement. Intraspecialty agreement for superficial or deep SSI ranged from 0.10 (−0.19–0.38) to 0.54 (0.25–0.83) (surgeons) and increased after reading the SSI definition only among the infection control nurses from 0.10 (−0.19–0.38) to 0.41 (−0.09–0.72). Interspecialty agreement for SSI diagnosis was 0.36 (0.22–0.54) and increased to 0.47 (0.31–0.64) after reading the SSI definition. Conclusion Among healthcare professionals evaluating case-vignettes for possible surgical site infection, there was large disagreement in diagnosis that varied both between and within specialties. PMID:22529980

  13. A Neural Networks-Based Hybrid Routing Protocol for Wireless Mesh Networks

    PubMed Central

    Kojić, Nenad; Reljin, Irini; Reljin, Branimir

    2012-01-01

    The networking infrastructure of wireless mesh networks (WMNs) is decentralized and relatively simple, but they can display reliable functioning performance while having good redundancy. WMNs provide Internet access for fixed and mobile wireless devices. Both in urban and rural areas they provide users with high-bandwidth networks over a specific coverage area. The main problems affecting these networks are changes in network topology and link quality. In order to provide regular functioning, the routing protocol has the main influence in WMN implementations. In this paper we suggest a new routing protocol for WMN, based on good results of a proactive and reactive routing protocol, and for that reason it can be classified as a hybrid routing protocol. The proposed solution should avoid flooding and creating the new routing metric. We suggest the use of artificial logic—i.e., neural networks (NNs). This protocol is based on mobile agent technologies controlled by a Hopfield neural network. In addition to this, our new routing metric is based on multicriteria optimization in order to minimize delay and blocking probability (rejected packets or their retransmission). The routing protocol observes real network parameters and real network environments. As a result of artificial logic intelligence, the proposed routing protocol should maximize usage of network resources and optimize network performance. PMID:22969360

  14. A neural networks-based hybrid routing protocol for wireless mesh networks.

    PubMed

    Kojić, Nenad; Reljin, Irini; Reljin, Branimir

    2012-01-01

    The networking infrastructure of wireless mesh networks (WMNs) is decentralized and relatively simple, but they can display reliable functioning performance while having good redundancy. WMNs provide Internet access for fixed and mobile wireless devices. Both in urban and rural areas they provide users with high-bandwidth networks over a specific coverage area. The main problems affecting these networks are changes in network topology and link quality. In order to provide regular functioning, the routing protocol has the main influence in WMN implementations. In this paper we suggest a new routing protocol for WMN, based on good results of a proactive and reactive routing protocol, and for that reason it can be classified as a hybrid routing protocol. The proposed solution should avoid flooding and creating the new routing metric. We suggest the use of artificial logic-i.e., neural networks (NNs). This protocol is based on mobile agent technologies controlled by a Hopfield neural network. In addition to this, our new routing metric is based on multicriteria optimization in order to minimize delay and blocking probability (rejected packets or their retransmission). The routing protocol observes real network parameters and real network environments. As a result of artificial logic intelligence, the proposed routing protocol should maximize usage of network resources and optimize network performance. PMID:22969360

  15. Agreement on the Level Selection in Laminoplasty among Experienced Surgeons: A Survey-Based Study

    PubMed Central

    Cho, Jae Hwan; Suk, Kyung-Soo; Park, Jong-Beom; Ha, Jung-Ki; Hwang, Chang Ju; Lee, Choon Sung

    2016-01-01

    Study Design Survey based study. Purpose To assess the degree of agreement in level selection of laminoplasty (LP) for the selected cervical myeloradiculopathy cases between experienced spine surgeons. Overview of Literature Although, cervical LP is a widely used surgical technique for multi-level spinal cord compression, until now there is no consensus about how many segments or which segments should be opened to achieve a satisfactory decompression. Methods Thorough clinical and radiographic data (plain X-ray, computed tomography, and magnetic resonance imaging) of 30 patients who had cervical myelopathy were prepared. The data were provided to three independent spine surgeons with over 10 years experience in operation of their own practices. They were questioned about the most preferable surgical method and suitable decompression levels. The second survey was carried out after 6 months with the same cases. If the level difference between respondents was a half level or below, agreement was considered acceptable. The intraobserver and interobserver agreements in level selection were assessed by kappa statistics. Results Three respondents selected LP as an option for 6, 8, and 22 cases in the first survey and 10, 21, and 24 cases in the second survey. The reasons for selection of LP were levels of ossification of the posterior longitudinal ligament (p=0.004), segmental kyphotic deformity (p=0.036) and mean compression score (p=0.041). Intraobserver agreement showed variable results. Interobserver agreement was poor to fair by perfect matching (kappa=0.111–0.304) and fair to moderate by acceptable matching (kappa=0.308–0.625). Conclusions The degree of agreement for level selection of LP was not high even though experienced surgeons would choose the opening segments on the basis of same criteria. These results suggest that more specific guidelines in determination of levels for LP should be required to decrease unnecessary wide decompression according to

  16. Cryptanalysis of Two MD5-Based Authentication Protocols: APOP and NMAC

    NASA Astrophysics Data System (ADS)

    Wang, Lei; Ohta, Kazuo; Sasaki, Yu; Sakiyama, Kazuo; Kunihiro, Noboru

    Many hash-based authentication protocols have been proposed, and proven secure assuming that underlying hash functions are secure. On the other hand, if a hash function compromises, the security of authentication protocols based on this hash function becomes unclear. Therefore, it is significantly important to verify the security of hash-based protocols when a hash function is broken. In this paper, we will re-evaluate the security of two MD5-based authentication protocols based on a fact that MD5 cannot satisfy a required fundamental property named collision resistance. The target protocols are APOP (Authenticated Post Office Protocol) and NMAC (Nested Message Authentication Code), since they or their variants are widely used in real world. For security evaluation of APOP, we will propose a modified password recovery attack procedure, which is twice as fast as previous attacks. Moreover, our attack is more realistic, as the probability of being detected is lower than that of previous attacks. For security evaluation of MD5-based NMAC, we will propose a new key-recovery attack procedure, which has a complexity lower than that of previous attack. The complexity of our attack is 276, while that of previous attack is 2100.**Moreover, our attack has another interesting point. NMAC has two keys: the inner key and the outer key. Our attack can recover the outer key partially without the knowledge of the inner key.

  17. Enhancing user privacy in SARG04-based private database query protocols

    NASA Astrophysics Data System (ADS)

    Yu, Fang; Qiu, Daowen; Situ, Haozhen; Wang, Xiaoming; Long, Shun

    2015-11-01

    The well-known SARG04 protocol can be used in a private query application to generate an oblivious key. By usage of the key, the user can retrieve one out of N items from a database without revealing which one he/she is interested in. However, the existing SARG04-based private query protocols are vulnerable to the attacks of faked data from the database since in its canonical form, the SARG04 protocol lacks means for one party to defend attacks from the other. While such attacks can cause significant loss of user privacy, a variant of the SARG04 protocol is proposed in this paper with new mechanisms designed to help the user protect its privacy in private query applications. In the protocol, it is the user who starts the session with the database, trying to learn from it bits of a raw key in an oblivious way. An honesty test is used to detect a cheating database who had transmitted faked data. The whole private query protocol has O( N) communication complexity for conveying at least N encrypted items. Compared with the existing SARG04-based protocols, it is efficient in communication for per-bit learning.

  18. Efficient Three-Party Quantum Dialogue Protocol Based on the Continuous Variable GHZ States

    NASA Astrophysics Data System (ADS)

    Yu, Zhen-Bo; Gong, Li-Hua; Zhu, Qi-Biao; Cheng, Shan; Zhou, Nan-Run

    2016-07-01

    Based on the continuous variable GHZ entangled states, an efficient three-party quantum dialogue protocol is devised, where each legitimate communication party could simultaneously deduce the secret information of the other two parties with perfect efficiency. The security is guaranteed by the correlation of the continuous variable GHZ entangled states and the randomly selected decoy states. Furthermore, the three-party quantum dialogue protocol is directly generalized to an N-party quantum dialogue protocol by using the n-tuple continuous variable GHZ entangled states.

  19. A Scenario-Based Protocol Checker for Public-Key Authentication Scheme

    NASA Astrophysics Data System (ADS)

    Saito, Takamichi

    Security protocol provides communication security for the internet. One of the important features of it is authentication with key exchange. Its correctness is a requirement of the whole of the communication security. In this paper, we introduce three attack models realized as their attack scenarios, and provide an authentication-protocol checker for applying three attack-scenarios based on the models. We also utilize it to check two popular security protocols: Secure SHell (SSH) and Secure Socket Layer/Transport Layer Security (SSL/TLS).

  20. A Multiparty Controlled Bidirectional Quantum Secure Direct Communication and Authentication Protocol Based on EPR Pairs

    NASA Astrophysics Data System (ADS)

    Chang, Yan; Zhang, Shi-Bin; Yan, Li-Li; Sheng, Zhi-Wei

    2013-06-01

    A multiparty controlled bidirectional quantum secure direct communication and authentication protocol is proposed based on EPR pair and entanglement swapping. The legitimate identities of communicating parties are encoded to Bell states which act as a detection sequence. Secret messages are transmitted by using the classical XOR operation, which serves as a one-time-pad. No photon with secret information transmits in the quantum channel. Compared with the protocols proposed by Wang et al. [Acta Phys. Sin. 56 (2007) 673; Opt. Commun. 266 (2006) 732], the protocol in this study implements bidirectional communication and authentication, which defends most attacks including the ‘man-in-the-middle’ attack efficiently.

  1. Teachers' and Parents' Rating of Children's Social Skills: A Closer Look at Cross-Informant Agreements through an Item Analysis Protocol.

    ERIC Educational Resources Information Center

    Ruffalo, Stacey L.; Elliott, Stephen N.

    1997-01-01

    Describes assessment of children's social behavior using Social Skills Rating System (SSRS) and an item analysis protocol (IAP). Examines relationships among mother and father pairs, teacher SSRS ratings, and descriptions of kindergarten through 4th-grade students. Finds mothers' and fathers' SSRS frequency and importance ratings for their…

  2. Observer Agreement for Timed-Event Sequential Data: A Comparison of Time-Based and Event-Based Algorithms

    PubMed Central

    Bakeman, Roger; Quera, Vicenç; Gnisci, Augusto

    2009-01-01

    Observer agreement is often regarded as the sine qua non of observational research. Cohen’s kappa is a widely-used index and is appropriate when discrete entities, such as a turn-of-talk or a demarcated time-interval, are presented to pairs of observers to code. Kappa-like statistics and agreement matrixes are also used for the timed-event sequential data produced when observers first segment and then code events detected in the stream of behavior, noting onset and offset times. Such kappas are of two kinds, time-based and event-based. Available for download is a computer program (OASTES, Observer Agreement for Simulated Timed Event Sequences) that simulates the coding of observers of a stated accuracy, and then computes agreement statistics for two time-based kappas (with and without tolerance) and three event-based kappas (one implemented in The Observer, one in INTERACT, and one in GSEQ). Based on simulation results presented here, and due to the somewhat different information provide by each, reporting of both a time-based and an event-based kappa is recommended. PMID:19182133

  3. Intelligent QoS routing algorithm based on improved AODV protocol for Ad Hoc networks

    NASA Astrophysics Data System (ADS)

    Huibin, Liu; Jun, Zhang

    2016-04-01

    Mobile Ad Hoc Networks were playing an increasingly important part in disaster reliefs, military battlefields and scientific explorations. However, networks routing difficulties are more and more outstanding due to inherent structures. This paper proposed an improved cuckoo searching-based Ad hoc On-Demand Distance Vector Routing protocol (CSAODV). It elaborately designs the calculation methods of optimal routing algorithm used by protocol and transmission mechanism of communication-package. In calculation of optimal routing algorithm by CS Algorithm, by increasing QoS constraint, the found optimal routing algorithm can conform to the requirements of specified bandwidth and time delay, and a certain balance can be obtained among computation spending, bandwidth and time delay. Take advantage of NS2 simulation software to take performance test on protocol in three circumstances and validate the feasibility and validity of CSAODV protocol. In results, CSAODV routing protocol is more adapt to the change of network topological structure than AODV protocol, which improves package delivery fraction of protocol effectively, reduce the transmission time delay of network, reduce the extra burden to network brought by controlling information, and improve the routing efficiency of network.

  4. An Anonymous User Authentication and Key Agreement Scheme Based on a Symmetric Cryptosystem in Wireless Sensor Networks.

    PubMed

    Jung, Jaewook; Kim, Jiye; Choi, Younsung; Won, Dongho

    2016-01-01

    In wireless sensor networks (WSNs), a registered user can login to the network and use a user authentication protocol to access data collected from the sensor nodes. Since WSNs are typically deployed in unattended environments and sensor nodes have limited resources, many researchers have made considerable efforts to design a secure and efficient user authentication process. Recently, Chen et al. proposed a secure user authentication scheme using symmetric key techniques for WSNs. They claim that their scheme assures high efficiency and security against different types of attacks. After careful analysis, however, we find that Chen et al.'s scheme is still vulnerable to smart card loss attack and is susceptible to denial of service attack, since it is invalid for verification to simply compare an entered ID and a stored ID in smart card. In addition, we also observe that their scheme cannot preserve user anonymity. Furthermore, their scheme cannot quickly detect an incorrect password during login phase, and this flaw wastes both communication and computational overheads. In this paper, we describe how these attacks work, and propose an enhanced anonymous user authentication and key agreement scheme based on a symmetric cryptosystem in WSNs to address all of the aforementioned vulnerabilities in Chen et al.'s scheme. Our analysis shows that the proposed scheme improves the level of security, and is also more efficient relative to other related schemes. PMID:27537890

  5. An Anonymous User Authentication and Key Agreement Scheme Based on a Symmetric Cryptosystem in Wireless Sensor Networks.

    PubMed

    Jung, Jaewook; Kim, Jiye; Choi, Younsung; Won, Dongho

    2016-08-16

    In wireless sensor networks (WSNs), a registered user can login to the network and use a user authentication protocol to access data collected from the sensor nodes. Since WSNs are typically deployed in unattended environments and sensor nodes have limited resources, many researchers have made considerable efforts to design a secure and efficient user authentication process. Recently, Chen et al. proposed a secure user authentication scheme using symmetric key techniques for WSNs. They claim that their scheme assures high efficiency and security against different types of attacks. After careful analysis, however, we find that Chen et al.'s scheme is still vulnerable to smart card loss attack and is susceptible to denial of service attack, since it is invalid for verification to simply compare an entered ID and a stored ID in smart card. In addition, we also observe that their scheme cannot preserve user anonymity. Furthermore, their scheme cannot quickly detect an incorrect password during login phase, and this flaw wastes both communication and computational overheads. In this paper, we describe how these attacks work, and propose an enhanced anonymous user authentication and key agreement scheme based on a symmetric cryptosystem in WSNs to address all of the aforementioned vulnerabilities in Chen et al.'s scheme. Our analysis shows that the proposed scheme improves the level of security, and is also more efficient relative to other related schemes.

  6. An Anonymous User Authentication and Key Agreement Scheme Based on a Symmetric Cryptosystem in Wireless Sensor Networks

    PubMed Central

    Jung, Jaewook; Kim, Jiye; Choi, Younsung; Won, Dongho

    2016-01-01

    In wireless sensor networks (WSNs), a registered user can login to the network and use a user authentication protocol to access data collected from the sensor nodes. Since WSNs are typically deployed in unattended environments and sensor nodes have limited resources, many researchers have made considerable efforts to design a secure and efficient user authentication process. Recently, Chen et al. proposed a secure user authentication scheme using symmetric key techniques for WSNs. They claim that their scheme assures high efficiency and security against different types of attacks. After careful analysis, however, we find that Chen et al.’s scheme is still vulnerable to smart card loss attack and is susceptible to denial of service attack, since it is invalid for verification to simply compare an entered ID and a stored ID in smart card. In addition, we also observe that their scheme cannot preserve user anonymity. Furthermore, their scheme cannot quickly detect an incorrect password during login phase, and this flaw wastes both communication and computational overheads. In this paper, we describe how these attacks work, and propose an enhanced anonymous user authentication and key agreement scheme based on a symmetric cryptosystem in WSNs to address all of the aforementioned vulnerabilities in Chen et al.’s scheme. Our analysis shows that the proposed scheme improves the level of security, and is also more efficient relative to other related schemes. PMID:27537890

  7. A Field-Based Testing Protocol for Assessing Gross Motor Skills in Preschool Children: The CHAMPS Motor Skills Protocol (CMSP)

    PubMed Central

    Williams, Harriet G.; Pfeiffer, Karin A.; Dowda, Marsha; Jeter, Chevy; Jones, Shaverra; Pate, Russell R.

    2010-01-01

    The purpose of the study was to develop a valid and reliable tool for use in assessing motor skills in preschool children in field based settings. The development of the CHAMPS (Children’s Activity and Movement in Preschool Study) Motor Skills Protocol (CMSP) included evidence of its reliability and validity for use in field-based environments as part of large epidemiological studies. Following pilot work, 297 children (3-5 years old) from 22 preschools were tested using the final version of the CMSP and the TGMD-2. Reliability of the CMSP and interobserver reliability were determined using intraclass correlation procedures (ICC; ANOVA). Concurrent validity was assessed using Pearson correlation coefficients to compare the CMSP to the original Test of Gross Motor Development (2nd Edition) (TGMD-2). Results indicated that test reliability, interobserver reliability and validity coefficients were all high, generally above R/r = 0.90. Significant age differences were found. Outcomes indicate that the CMSP is an appropriate tool for assessing motor development of 3-, 4-, and 5-year-old children in field-based settings that are consistent with large-scale trials. PMID:21532999

  8. A broadcast-based key agreement scheme using set reconciliation for wireless body area networks.

    PubMed

    Ali, Aftab; Khan, Farrukh Aslam

    2014-05-01

    Information and communication technologies have thrived over the last few years. Healthcare systems have also benefited from this progression. A wireless body area network (WBAN) consists of small, low-power sensors used to monitor human physiological values remotely, which enables physicians to remotely monitor the health of patients. Communication security in WBANs is essential because it involves human physiological data. Key agreement and authentication are the primary issues in the security of WBANs. To agree upon a common key, the nodes exchange information with each other using wireless communication. This information exchange process must be secure enough or the information exchange should be minimized to a certain level so that if information leak occurs, it does not affect the overall system. Most of the existing solutions for this problem exchange too much information for the sake of key agreement; getting this information is sufficient for an attacker to reproduce the key. Set reconciliation is a technique used to reconcile two similar sets held by two different hosts with minimal communication complexity. This paper presents a broadcast-based key agreement scheme using set reconciliation for secure communication in WBANs. The proposed scheme allows the neighboring nodes to agree upon a common key with the personal server (PS), generated from the electrocardiogram (EKG) feature set of the host body. Minimal information is exchanged in a broadcast manner, and even if every node is missing a different subset, by reconciling these feature sets, the whole network will still agree upon a single common key. Because of the limited information exchange, if an attacker gets the information in any way, he/she will not be able to reproduce the key. The proposed scheme mitigates replay, selective forwarding, and denial of service attacks using a challenge-response authentication mechanism. The simulation results show that the proposed scheme has a great deal of

  9. Vehicle Density Based Forwarding Protocol for Safety Message Broadcast in VANET

    PubMed Central

    Huang, Jiawei; Wang, Jianxin

    2014-01-01

    In vehicular ad hoc networks (VANETs), the medium access control (MAC) protocol is of great importance to provide time-critical safety applications. Contemporary multihop broadcast protocols in VANETs usually choose the farthest node in broadcast range as the forwarder to reduce the number of forwarding hops. However, in this paper, we demonstrate that the farthest forwarder may experience large contention delay in case of high vehicle density. We propose an IEEE 802.11-based multihop broadcast protocol VDF to address the issue of emergency message dissemination. To achieve the tradeoff between contention delay and forwarding hops, VDF adaptably chooses the forwarder according to the vehicle density. Simulation results show that, due to its ability to decrease the transmission collisions, the proposed protocol can provide significantly lower broadcast delay. PMID:25121125

  10. A decentralized fuzzy C-means-based energy-efficient routing protocol for wireless sensor networks.

    PubMed

    Alia, Osama Moh'd

    2014-01-01

    Energy conservation in wireless sensor networks (WSNs) is a vital consideration when designing wireless networking protocols. In this paper, we propose a Decentralized Fuzzy Clustering Protocol, named DCFP, which minimizes total network energy dissipation to promote maximum network lifetime. The process of constructing the infrastructure for a given WSN is performed only once at the beginning of the protocol at a base station, which remains unchanged throughout the network's lifetime. In this initial construction step, a fuzzy C-means algorithm is adopted to allocate sensor nodes into their most appropriate clusters. Subsequently, the protocol runs its rounds where each round is divided into a CH-Election phase and a Data Transmission phase. In the CH-Election phase, the election of new cluster heads is done locally in each cluster where a new multicriteria objective function is proposed to enhance the quality of elected cluster heads. In the Data Transmission phase, the sensing and data transmission from each sensor node to their respective cluster head is performed and cluster heads in turn aggregate and send the sensed data to the base station. Simulation results demonstrate that the proposed protocol improves network lifetime, data delivery, and energy consumption compared to other well-known energy-efficient protocols. PMID:25162060

  11. Multi-Component Protein - Protein Docking Based Protocol with External Scoring for Modeling Dimers of G Protein-Coupled Receptors.

    PubMed

    Kaczor, Agnieszka A; Guixà-González, Ramon; Carrió, Pau; Poso, Antti; Dove, Stefan; Pastor, Manuel; Selent, Jana

    2015-04-01

    In order to apply structure-based drug design techniques to GPCR complexes, it is essential to model their 3D structure. For this purpose, a multi-component protocol was derived based on protein-protein docking which generates populations of dimers compatible with membrane integration, considering all reasonable interfaces. At the next stage, we applied a scoring procedure based on up to eleven different parameters including shape or electrostatics complementarity. Two methods of consensus scoring were performed: (i) average scores of 100 best scored dimers with respect to each interface, and (ii) frequencies of interfaces among 100 best scored dimers. In general, our multi-component protocol gives correct indications for dimer interfaces that have been observed in X-ray crystal structures of GPCR dimers (opsin dimer, chemokine CXCR4 and CCR5 dimers, κ opioid receptor dimer, β1 adrenergic receptor dimer and smoothened receptor dimer) but also suggests alternative dimerization interfaces. Interestingly, at times these alternative interfaces are scored higher than the experimentally observed ones suggesting them to be also relevant in the life cycle of studied GPCR dimers. Further results indicate that GPCR dimer and higher-order oligomer formation may involve transmembrane helices (TMs) TM1-TM2-TM7, TM3-TM4-TM5 or TM4-TM5-TM6 but not TM1-TM2-TM3 or TM2-TM3-TM4 which is in general agreement with available experimental and computational data.

  12. Motor-based intervention protocols in treatment of childhood apraxia of speech (CAS)

    PubMed Central

    Maas, Edwin; Gildersleeve-Neumann, Christina; Jakielski, Kathy J.; Stoeckel, Ruth

    2014-01-01

    This paper reviews current trends in treatment for childhood apraxia of speech (CAS), with a particular emphasis on motor-based intervention protocols. The paper first briefly discusses how CAS fits into the typology of speech sound disorders, followed by a discussion of the potential relevance of principles derived from the motor learning literature for CAS treatment. Next, different motor-based treatment protocols are reviewed, along with their evidence base. The paper concludes with a summary and discussion of future research needs. PMID:25313348

  13. Robust ECC-based authenticated key agreement scheme with privacy protection for Telecare medicine information systems.

    PubMed

    Zhang, Liping; Zhu, Shaohui

    2015-05-01

    To protect the transmission of the sensitive medical data, a secure and efficient authenticated key agreement scheme should be deployed when the healthcare delivery session is established via Telecare Medicine Information Systems (TMIS) over the unsecure public network. Recently, Islam and Khan proposed an authenticated key agreement scheme using elliptic curve cryptography for TMIS. They claimed that their proposed scheme is provably secure against various attacks in random oracle model and enjoys some good properties such as user anonymity. In this paper, however, we point out that any legal but malicious patient can reveal other user's identity. Consequently, their scheme suffers from server spoofing attack and off-line password guessing attack. Moreover, if the malicious patient performs the same time of the registration as other users, she can further launch the impersonation attack, man-in-the-middle attack, modification attack, replay attack, and strong replay attack successfully. To eliminate these weaknesses, we propose an improved ECC-based authenticated key agreement scheme. Security analysis demonstrates that the proposed scheme can resist various attacks and enables the patient to enjoy the remote healthcare services with privacy protection. Through the performance evaluation, we show that the proposed scheme achieves a desired balance between security and performance in comparisons with other related schemes. PMID:25732081

  14. Highly Scalable, UDP-Based Network Transport Protocols for Lambda Grids and 10 GE Routed Networks

    SciTech Connect

    PI: Robert Grossman Co-PI: Stephen Eick

    2009-08-04

    Summary of Report In work prior to this grant, NCDM developed a high performance data transport protocol called SABUL. During this grant, we refined SABUL’s functionality, and then extended both the capabilities and functionality and incorporated them into a new protocol called UDP-based Data transport Protocol, or UDT. We also began preliminary work on Composable UDT, a version of UDT that allows the user to choose among different congestion control algorithms and implement the algorithm of his choice at the time he compiles the code. Specifically, we: · Investigated the theoretical foundations of protocols similar to SABUL and UDT. · Performed design and development work of UDT, a protocol that uses UDP in both the data and control channels. · Began design and development work of Composable UDT, a protocol that supports the use of different congestion control algorithms by simply including the appropriate library when compiling the code. · Performed experimental studies using UDT and Composable UDT using real world applications such as the Sloan Digital Sky Survey (SDSS) astronomical data sets. · Released several versions of UDT and Composable, the most recent being v3.1.

  15. Engineering Analysis Using a Web-based Protocol

    NASA Technical Reports Server (NTRS)

    Schoeffler, James D.; Claus, Russell W.

    2002-01-01

    This paper reviews the development of a web-based framework for engineering analysis. A one-dimensional, high-speed analysis code called LAPIN was used in this study, but the approach can be generalized to any engineering analysis tool. The web-based framework enables users to store, retrieve, and execute an engineering analysis from a standard web-browser. We review the encapsulation of the engineering data into the eXtensible Markup Language (XML) and various design considerations in the storage and retrieval of application data.

  16. A School-Based Suicide Risk Assessment Protocol

    ERIC Educational Resources Information Center

    Boccio, Dana E.

    2015-01-01

    Suicide remains the third leading cause of death among young people in the United States. Considering that youth who contemplate suicide generally exhibit warning signs before engaging in lethal self-harm, school-based mental health professionals can play a vital role in identifying students who are at risk for suicidal behavior. Nevertheless, the…

  17. Writer-Based Prose, Creativity Research, and Protocol Analysis.

    ERIC Educational Resources Information Center

    Collier, Richard M.

    An experiment was conducted to test the hypothesis that recent theories connecting creative problem solving with cerebral specialization might explain why some writers compose much more effectively than others. Specifically, the experiment was designed to find ways composition teachers can help students to transform writer-based prose into…

  18. Magnetic-Particle-Sensing Based Diagnostic Protocols and Applications

    PubMed Central

    Takamura, Tsukasa; Ko, Pil Ju; Sharma, Jaiyam; Yukino, Ryoji; Ishizawa, Shunji; Sandhu, Adarsh

    2015-01-01

    Magnetic particle-labeled biomaterial detection has attracted much attention in recent years for a number of reasons; easy manipulation by external magnetic fields, easy functionalization of the surface, and large surface-to-volume ratio, to name but a few. In this review, we report on our recent investigations into the detection of nano-sized magnetic particles. First, the detection by Hall magnetic sensor with lock-in amplifier and alternative magnetic field is summarized. Then, our approach to detect sub-200 nm diameter target magnetic particles via relatively large micoro-sized “columnar particles” by optical microscopy is described. Subsequently, we summarize magnetic particle detection based on optical techniques; one method is based on the scattering of the magnetically-assembled nano-sized magnetic bead chain in rotating magnetic fields and the other one is based on the reflection of magnetic target particles and porous silicon. Finally, we report recent works with reference to more familiar industrial products (such as smartphone-based medical diagnosis systems and magnetic removal of unspecific-binded nano-sized particles, or “magnetic washing”). PMID:26053747

  19. School-Based Methylphenidate Placebo Protocols: Methodological and Practical Issues.

    ERIC Educational Resources Information Center

    Hyman, Irwin A.; Wojtowicz, Alexandra; Lee, Kee Duk; Haffner, Mary Elizabeth; Fiorello, Catherine A.; And Others

    1998-01-01

    Focuses on methodological issues involved in choosing instruments to monitor behavior, once a comprehensive evaluation has suggested trials on Ritalin. Case examples illustrate problems of teacher compliance in filling out measures, supplying adequate placebos, and obtaining physical cooperation. Emerging school-based methodologies are discussed…

  20. Management of Energy Consumption on Cluster Based Routing Protocol for MANET

    NASA Astrophysics Data System (ADS)

    Hosseini-Seno, Seyed-Amin; Wan, Tat-Chee; Budiarto, Rahmat; Yamada, Masashi

    The usage of light-weight mobile devices is increasing rapidly, leading to demand for more telecommunication services. Consequently, mobile ad hoc networks and their applications have become feasible with the proliferation of light-weight mobile devices. Many protocols have been developed to handle service discovery and routing in ad hoc networks. However, the majority of them did not consider one critical aspect of this type of network, which is the limited of available energy in each node. Cluster Based Routing Protocol (CBRP) is a robust/scalable routing protocol for Mobile Ad hoc Networks (MANETs) and superior to existing protocols such as Ad hoc On-demand Distance Vector (AODV) in terms of throughput and overhead. Therefore, based on this strength, methods to increase the efficiency of energy usage are incorporated into CBRP in this work. In order to increase the stability (in term of life-time) of the network and to decrease the energy consumption of inter-cluster gateway nodes, an Enhanced Gateway Cluster Based Routing Protocol (EGCBRP) is proposed. Three methods have been introduced by EGCBRP as enhancements to the CBRP: improving the election of cluster Heads (CHs) in CBRP which is based on the maximum available energy level, implementing load balancing for inter-cluster traffic using multiple gateways, and implementing sleep state for gateway nodes to further save the energy. Furthermore, we propose an Energy Efficient Cluster Based Routing Protocol (EECBRP) which extends the EGCBRP sleep state concept into all idle member nodes, excluding the active nodes in all clusters. The experiment results show that the EGCBRP decreases the overall energy consumption of the gateway nodes up to 10% and the EECBRP reduces the energy consumption of the member nodes up to 60%, both of which in turn contribute to stabilizing the network.

  1. Insecurity of position-based quantum-cryptography protocols against entanglement attacks

    SciTech Connect

    Lau, Hoi-Kwan; Lo, Hoi-Kwong

    2011-01-15

    Recently, position-based quantum cryptography has been claimed to be unconditionally secure. On the contrary, here we show that the existing proposals for position-based quantum cryptography are, in fact, insecure if entanglement is shared among two adversaries. Specifically, we demonstrate how the adversaries can incorporate ideas of quantum teleportation and quantum secret sharing to compromise the security with certainty. The common flaw to all current protocols is that the Pauli operators always map a codeword to a codeword (up to an irrelevant overall phase). We propose a modified scheme lacking this property in which the same cheating strategy used to undermine the previous protocols can succeed with a rate of at most 85%. We prove the modified protocol is secure when the shared quantum resource between the adversaries is a two- or three-level system.

  2. Insecurity of position-based quantum-cryptography protocols against entanglement attacks

    NASA Astrophysics Data System (ADS)

    Lau, Hoi-Kwan; Lo, Hoi-Kwong

    2011-01-01

    Recently, position-based quantum cryptography has been claimed to be unconditionally secure. On the contrary, here we show that the existing proposals for position-based quantum cryptography are, in fact, insecure if entanglement is shared among two adversaries. Specifically, we demonstrate how the adversaries can incorporate ideas of quantum teleportation and quantum secret sharing to compromise the security with certainty. The common flaw to all current protocols is that the Pauli operators always map a codeword to a codeword (up to an irrelevant overall phase). We propose a modified scheme lacking this property in which the same cheating strategy used to undermine the previous protocols can succeed with a rate of at most 85%. We prove the modified protocol is secure when the shared quantum resource between the adversaries is a two- or three-level system.

  3. Fully Integrated Passive UHF RFID Tag for Hash-Based Mutual Authentication Protocol.

    PubMed

    Mikami, Shugo; Watanabe, Dai; Li, Yang; Sakiyama, Kazuo

    2015-01-01

    Passive radio-frequency identification (RFID) tag has been used in many applications. While the RFID market is expected to grow, concerns about security and privacy of the RFID tag should be overcome for the future use. To overcome these issues, privacy-preserving authentication protocols based on cryptographic algorithms have been designed. However, to the best of our knowledge, evaluation of the whole tag, which includes an antenna, an analog front end, and a digital processing block, that runs authentication protocols has not been studied. In this paper, we present an implementation and evaluation of a fully integrated passive UHF RFID tag that runs a privacy-preserving mutual authentication protocol based on a hash function. We design a single chip including the analog front end and the digital processing block. We select a lightweight hash function supporting 80-bit security strength and a standard hash function supporting 128-bit security strength. We show that when the lightweight hash function is used, the tag completes the protocol with a reader-tag distance of 10 cm. Similarly, when the standard hash function is used, the tag completes the protocol with the distance of 8.5 cm. We discuss the impact of the peak power consumption of the tag on the distance of the tag due to the hash function. PMID:26491714

  4. An adaptive OFDMA-based MAC protocol for underwater acoustic wireless sensor networks.

    PubMed

    Khalil, Issa M; Gadallah, Yasser; Hayajneh, Mohammad; Khreishah, Abdallah

    2012-01-01

    Underwater acoustic wireless sensor networks (UAWSNs) have many applications across various civilian and military domains. However, they suffer from the limited available bandwidth of acoustic signals and harsh underwater conditions. In this work, we present an Orthogonal Frequency Division Multiple Access (OFDMA)-based Media Access Control (MAC) protocol that is configurable to suit the operating requirements of the underwater sensor network. The protocol has three modes of operation, namely random, equal opportunity and energy-conscious modes of operation. Our MAC design approach exploits the multi-path characteristics of a fading acoustic channel to convert it into parallel independent acoustic sub-channels that undergo flat fading. Communication between node pairs within the network is done using subsets of these sub-channels, depending on the configurations of the active mode of operation. Thus, the available limited bandwidth gets fully utilized while completely avoiding interference. We derive the mathematical model for optimal power loading and subcarrier selection, which is used as basis for all modes of operation of the protocol. We also conduct many simulation experiments to evaluate and compare our protocol with other Code Division Multiple Access (CDMA)-based MAC protocols.

  5. An Adaptive OFDMA-Based MAC Protocol for Underwater Acoustic Wireless Sensor Networks

    PubMed Central

    Khalil, Issa M.; Gadallah, Yasser; Hayajneh, Mohammad; Khreishah, Abdallah

    2012-01-01

    Underwater acoustic wireless sensor networks (UAWSNs) have many applications across various civilian and military domains. However, they suffer from the limited available bandwidth of acoustic signals and harsh underwater conditions. In this work, we present an Orthogonal Frequency Division Multiple Access (OFDMA)-based Media Access Control (MAC) protocol that is configurable to suit the operating requirements of the underwater sensor network. The protocol has three modes of operation, namely random, equal opportunity and energy-conscious modes of operation. Our MAC design approach exploits the multi-path characteristics of a fading acoustic channel to convert it into parallel independent acoustic sub-channels that undergo flat fading. Communication between node pairs within the network is done using subsets of these sub-channels, depending on the configurations of the active mode of operation. Thus, the available limited bandwidth gets fully utilized while completely avoiding interference. We derive the mathematical model for optimal power loading and subcarrier selection, which is used as basis for all modes of operation of the protocol. We also conduct many simulation experiments to evaluate and compare our protocol with other Code Division Multiple Access (CDMA)-based MAC protocols. PMID:23012517

  6. Fully Integrated Passive UHF RFID Tag for Hash-Based Mutual Authentication Protocol.

    PubMed

    Mikami, Shugo; Watanabe, Dai; Li, Yang; Sakiyama, Kazuo

    2015-01-01

    Passive radio-frequency identification (RFID) tag has been used in many applications. While the RFID market is expected to grow, concerns about security and privacy of the RFID tag should be overcome for the future use. To overcome these issues, privacy-preserving authentication protocols based on cryptographic algorithms have been designed. However, to the best of our knowledge, evaluation of the whole tag, which includes an antenna, an analog front end, and a digital processing block, that runs authentication protocols has not been studied. In this paper, we present an implementation and evaluation of a fully integrated passive UHF RFID tag that runs a privacy-preserving mutual authentication protocol based on a hash function. We design a single chip including the analog front end and the digital processing block. We select a lightweight hash function supporting 80-bit security strength and a standard hash function supporting 128-bit security strength. We show that when the lightweight hash function is used, the tag completes the protocol with a reader-tag distance of 10 cm. Similarly, when the standard hash function is used, the tag completes the protocol with the distance of 8.5 cm. We discuss the impact of the peak power consumption of the tag on the distance of the tag due to the hash function.

  7. Cryptanalysis and Improvement of a Biometric-Based Multi-Server Authentication and Key Agreement Scheme

    PubMed Central

    Wang, Chengqi; Zhang, Xiao; Zheng, Zhiming

    2016-01-01

    With the security requirements of networks, biometrics authenticated schemes which are applied in the multi-server environment come to be more crucial and widely deployed. In this paper, we propose a novel biometric-based multi-server authentication and key agreement scheme which is based on the cryptanalysis of Mishra et al.’s scheme. The informal and formal security analysis of our scheme are given, which demonstrate that our scheme satisfies the desirable security requirements. The presented scheme provides a variety of significant functionalities, in which some features are not considered in the most of existing authentication schemes, such as, user revocation or re-registration and biometric information protection. Compared with several related schemes, our scheme has more secure properties and lower computation cost. It is obviously more appropriate for practical applications in the remote distributed networks. PMID:26866606

  8. Cryptanalysis and Improvement of a Biometric-Based Multi-Server Authentication and Key Agreement Scheme.

    PubMed

    Wang, Chengqi; Zhang, Xiao; Zheng, Zhiming

    2016-01-01

    With the security requirements of networks, biometrics authenticated schemes which are applied in the multi-server environment come to be more crucial and widely deployed. In this paper, we propose a novel biometric-based multi-server authentication and key agreement scheme which is based on the cryptanalysis of Mishra et al.'s scheme. The informal and formal security analysis of our scheme are given, which demonstrate that our scheme satisfies the desirable security requirements. The presented scheme provides a variety of significant functionalities, in which some features are not considered in the most of existing authentication schemes, such as, user revocation or re-registration and biometric information protection. Compared with several related schemes, our scheme has more secure properties and lower computation cost. It is obviously more appropriate for practical applications in the remote distributed networks.

  9. A secure smart-card based authentication and key agreement scheme for telecare medicine information systems.

    PubMed

    Lee, Tian-Fu; Liu, Chuan-Ming

    2013-06-01

    A smart-card based authentication scheme for telecare medicine information systems enables patients, doctors, nurses, health visitors and the medicine information systems to establish a secure communication platform through public networks. Zhu recently presented an improved authentication scheme in order to solve the weakness of the authentication scheme of Wei et al., where the off-line password guessing attacks cannot be resisted. This investigation indicates that the improved scheme of Zhu has some faults such that the authentication scheme cannot execute correctly and is vulnerable to the attack of parallel sessions. Additionally, an enhanced authentication scheme based on the scheme of Zhu is proposed. The enhanced scheme not only avoids the weakness in the original scheme, but also provides users' anonymity and authenticated key agreements for secure data communications.

  10. Cryptanalysis and Improvement of a Biometric-Based Multi-Server Authentication and Key Agreement Scheme.

    PubMed

    Wang, Chengqi; Zhang, Xiao; Zheng, Zhiming

    2016-01-01

    With the security requirements of networks, biometrics authenticated schemes which are applied in the multi-server environment come to be more crucial and widely deployed. In this paper, we propose a novel biometric-based multi-server authentication and key agreement scheme which is based on the cryptanalysis of Mishra et al.'s scheme. The informal and formal security analysis of our scheme are given, which demonstrate that our scheme satisfies the desirable security requirements. The presented scheme provides a variety of significant functionalities, in which some features are not considered in the most of existing authentication schemes, such as, user revocation or re-registration and biometric information protection. Compared with several related schemes, our scheme has more secure properties and lower computation cost. It is obviously more appropriate for practical applications in the remote distributed networks. PMID:26866606

  11. A secure smart-card based authentication and key agreement scheme for telecare medicine information systems.

    PubMed

    Lee, Tian-Fu; Liu, Chuan-Ming

    2013-06-01

    A smart-card based authentication scheme for telecare medicine information systems enables patients, doctors, nurses, health visitors and the medicine information systems to establish a secure communication platform through public networks. Zhu recently presented an improved authentication scheme in order to solve the weakness of the authentication scheme of Wei et al., where the off-line password guessing attacks cannot be resisted. This investigation indicates that the improved scheme of Zhu has some faults such that the authentication scheme cannot execute correctly and is vulnerable to the attack of parallel sessions. Additionally, an enhanced authentication scheme based on the scheme of Zhu is proposed. The enhanced scheme not only avoids the weakness in the original scheme, but also provides users' anonymity and authenticated key agreements for secure data communications. PMID:23494392

  12. 78 FR 43926 - Solicitation for a Cooperative Agreement-Evidence-Based Decision Making in State and Local...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-07-22

    ... Agreement. SUMMARY: The National Institute of Corrections (NIC) is soliciting proposals from organizations... August 15, 2013. Work under this cooperative agreement will be an extension of the NIC's Evidence-Based... planning for EBDM implementation. This project will be a collaborative venture with the NIC...

  13. A Field-Based Testing Protocol for Assessing Gross Motor Skills in Preschool Children: The Children's Activity and Movement in Preschool Study Motor Skills Protocol

    ERIC Educational Resources Information Center

    Williams, Harriet G.; Pfeiffer, Karin A.; Dowda, Marsha; Jeter, Chevy; Jones, Shaverra; Pate, Russell R.

    2009-01-01

    The purpose of this study was to develop a valid and reliable tool for use in assessing motor skills in preschool children in field-based settings. The development of the Children's Activity and Movement in Preschool Study Motor Skills Protocol included evidence of its reliability and validity for use in field-based environments as part of large…

  14. An Efficient Byzantine Fault Tolerant Agreement

    NASA Astrophysics Data System (ADS)

    Saini, Poonam; Singh, Awadhesh Kumar

    2010-11-01

    Most of the distributed transaction protocols rely on atomic commitment. Dealing with arbitrary failures effectively is a major operational challenge to be faced with. In the contemporary literature, protocols such as BFTDC [3] and PBFT [5] run an effective agreement protocol. The drawback with these protocols is that they incur increased message overhead as well as latency into the protocol execution. The paper presents an efficient byzantine fault tolerant distributed commit protocol. The proposed agreement protocol helps in achieving faster execution results using an effective view change mechanism. The protocol is computationally more efficient. It has lower message complexity and reduces the time overhead incurred in transaction processing.

  15. Towards an Improved LAI Collection Protocol via Simulated and Field-Based PAR Sensing

    PubMed Central

    Yao, Wei; Kelbe, David; van Leeuwen, Martin; Romanczyk, Paul; van Aardt, Jan

    2016-01-01

    In support of NASA’s next-generation spectrometer—the Hyperspectral Infrared Imager (HyspIRI)—we are working towards assessing sub-pixel vegetation structure from imaging spectroscopy data. Of particular interest is Leaf Area Index (LAI), which is an informative, yet notoriously challenging parameter to efficiently measure in situ. While photosynthetically-active radiation (PAR) sensors have been validated for measuring crop LAI, there is limited literature on the efficacy of PAR-based LAI measurement in the forest environment. This study (i) validates PAR-based LAI measurement in forest environments, and (ii) proposes a suitable collection protocol, which balances efficiency with measurement variation, e.g., due to sun flecks and various-sized canopy gaps. A synthetic PAR sensor model was developed in the Digital Imaging and Remote Sensing Image Generation (DIRSIG) model and used to validate LAI measurement based on first-principles and explicitly-known leaf geometry. Simulated collection parameters were adjusted to empirically identify optimal collection protocols. These collection protocols were then validated in the field by correlating PAR-based LAI measurement to the normalized difference vegetation index (NDVI) extracted from the “classic” Airborne Visible Infrared Imaging Spectrometer (AVIRIS-C) data (R2 was 0.61). The results indicate that our proposed collecting protocol is suitable for measuring the LAI of sparse forest (LAI < 3–5 (m2/m2)). PMID:27428969

  16. Improving International-Level Chess Players' Performance with an Acceptance-Based Protocol: Preliminary Findings

    ERIC Educational Resources Information Center

    Ruiz, Francisco J.; Luciano, Carmen

    2012-01-01

    This study compared an individual, 4-hr intervention based on acceptance and commitment therapy (ACT) versus a no-contact control condition in improving the performance of international-level chess players. Five participants received the brief ACT protocol, with each matched to another chess player with similar characteristics in the control…

  17. Cheating and Anti-Cheating in Gossip-Based Protocol: An Experimental Investigation

    NASA Astrophysics Data System (ADS)

    Xiao, Xin; Shi, Yuanchun; Tang, Yun; Zhang, Nan

    During recent years, there has been a rapid growth in deployment of gossip-based protocol in many multicast applications. In a typical gossip-based protocol, each node acts as dual roles of receiver and sender, independently exchanging data with its neighbors to facilitate scalability and resilience. However, most of previous work in this literature seldom considered cheating issue of end users, which is also very important in face of the fact that the mutual cooperation inherently determines overall system performance. In this paper, we investigate the dishonest behaviors in decentralized gossip-based protocol through extensive experimental study. Our original contributions come in two-fold: In the first part of cheating study, we analytically discuss two typical cheating strategies, that is, intentionally increasing subscription requests and untruthfully calculating forwarding probability, and further evaluate their negative impacts. The results indicate that more attention should be paid to defending cheating behaviors in gossip-based protocol. In the second part of anti-cheating study, we propose a receiver-driven measurement mechanism, which evaluates individual forwarding traffic from the perspective of receivers and thus identifies cheating nodes with high incoming/outgoing ratio. Furthermore, we extend our mechanism by introducing reliable factor to further improve its accuracy. The experiments under various conditions show that it performs quite well in case of serious cheating and achieves considerable performance in other cases.

  18. Towards an improved LAI collection protocol via simulated field-based PAR sensing

    DOE PAGES

    Yao, Wei; Van Leeuwen, Martin; Romanczyk, Paul; van Aardt, Jan; Kelbe, David

    2016-07-14

    In support of NASA’s next-generation spectrometer—the Hyperspectral Infrared Imager (HyspIRI)—we are working towards assessing sub-pixel vegetation structure from imaging spectroscopy data. Of particular interest is Leaf Area Index (LAI), which is an informative, yet notoriously challenging parameter to efficiently measure in situ. While photosynthetically-active radiation (PAR) sensors have been validated for measuring crop LAI, there is limited literature on the efficacy of PAR-based LAI measurement in the forest environment. This study (i) validates PAR-based LAI measurement in forest environments, and (ii) proposes a suitable collection protocol, which balances efficiency with measurement variation, e.g., due to sun flecks and various-sized canopymore » gaps. A synthetic PAR sensor model was developed in the Digital Imaging and Remote Sensing Image Generation (DIRSIG) model and used to validate LAI measurement based on first-principles and explicitly-known leaf geometry. Simulated collection parameters were adjusted to empirically identify optimal collection protocols. Furthermore, these collection protocols were then validated in the field by correlating PAR-based LAI measurement to the normalized difference vegetation index (NDVI) extracted from the “classic” Airborne Visible Infrared Imaging Spectrometer (AVIRIS-C) data (R2 was 0.61). The results indicate that our proposed collecting protocol is suitable for measuring the LAI of sparse forest (LAI < 3–5 ( m2/m2)).« less

  19. Towards an Improved LAI Collection Protocol via Simulated and Field-Based PAR Sensing.

    PubMed

    Yao, Wei; Kelbe, David; Leeuwen, Martin van; Romanczyk, Paul; Aardt, Jan van

    2016-01-01

    In support of NASA's next-generation spectrometer-the Hyperspectral Infrared Imager (HyspIRI)-we are working towards assessing sub-pixel vegetation structure from imaging spectroscopy data. Of particular interest is Leaf Area Index (LAI), which is an informative, yet notoriously challenging parameter to efficiently measure in situ. While photosynthetically-active radiation (PAR) sensors have been validated for measuring crop LAI, there is limited literature on the efficacy of PAR-based LAI measurement in the forest environment. This study (i) validates PAR-based LAI measurement in forest environments, and (ii) proposes a suitable collection protocol, which balances efficiency with measurement variation, e.g., due to sun flecks and various-sized canopy gaps. A synthetic PAR sensor model was developed in the Digital Imaging and Remote Sensing Image Generation (DIRSIG) model and used to validate LAI measurement based on first-principles and explicitly-known leaf geometry. Simulated collection parameters were adjusted to empirically identify optimal collection protocols. These collection protocols were then validated in the field by correlating PAR-based LAI measurement to the normalized difference vegetation index (NDVI) extracted from the "classic" Airborne Visible Infrared Imaging Spectrometer (AVIRIS-C) data ( R 2 was 0.61). The results indicate that our proposed collecting protocol is suitable for measuring the LAI of sparse forest (LAI < 3-5 ( m 2 / m 2 )). PMID:27428969

  20. Multi-Party Quantum Private Comparison Protocol Based on Entanglement Swapping of Bell Entangled States

    NASA Astrophysics Data System (ADS)

    Ye, Tian-Yu

    2016-09-01

    Recently, Liu et al. proposed a two-party quantum private comparison (QPC) protocol using entanglement swapping of Bell entangled state (Commun. Theor. Phys. 57 (2012) 583). Subsequently Liu et al. pointed out that in Liu et al.'s protocol, the TP can extract the two users' secret inputs without being detected by launching the Bell-basis measurement attack, and suggested the corresponding improvement to mend this loophole (Commun. Theor. Phys. 62 (2014) 210). In this paper, we first point out the information leakage problem toward TP existing in both of the above two protocols, and then suggest the corresponding improvement by using the one-way hash function to encrypt the two users' secret inputs. We further put forward the three-party QPC protocol also based on entanglement swapping of Bell entangled state, and then validate its output correctness and its security in detail. Finally, we generalize the three-party QPC protocol into the multi-party case, which can accomplish arbitrary pair's comparison of equality among K users within one execution. Supported by the National Natural Science Foundation of China under Grant No. 61402407

  1. Region-Based Collision Avoidance Beaconless Geographic Routing Protocol in Wireless Sensor Networks

    PubMed Central

    Lee, JeongCheol; Park, HoSung; Kang, SeokYoon; Kim, Ki-Il

    2015-01-01

    Due to the lack of dependency on beacon messages for location exchange, the beaconless geographic routing protocol has attracted considerable attention from the research community. However, existing beaconless geographic routing protocols are likely to generate duplicated data packets when multiple winners in the greedy area are selected. Furthermore, these protocols are designed for a uniform sensor field, so they cannot be directly applied to practical irregular sensor fields with partial voids. To prevent the failure of finding a forwarding node and to remove unnecessary duplication, in this paper, we propose a region-based collision avoidance beaconless geographic routing protocol to increase forwarding opportunities for randomly-deployed sensor networks. By employing different contention priorities into the mutually-communicable nodes and the rest of the nodes in the greedy area, every neighbor node in the greedy area can be used for data forwarding without any packet duplication. Moreover, simulation results are given to demonstrate the increased packet delivery ratio and shorten end-to-end delay, rather than well-referred comparative protocols. PMID:26057037

  2. Three-Party Quantum Network Communication Protocols Based on Quantum Teleportation

    NASA Astrophysics Data System (ADS)

    Zhou, Nan-Run; Cheng, Hu-Lai; Gong, Li-Hua; Li, Chi-Sheng

    2014-04-01

    By utilizing the delocalized correlation of entangled states in quantum information theory, a novel method on acknowledgments of quantum information among three-party is presented, and then two three-party quantum network communication protocols based on quantum teleportation are presented, namely, three-party stop-wait quantum communication protocol and three-party selective automatic repeat quantum communication protocol. In the two proposed protocols, the data frames composed of qubits are teleported via three-party quantum teleportation, the two receivers simultaneously receive quantum frames from the sender, and then return quantum acknowledgment frames or quantum negative acknowledgment frames via quantum entanglement channels. The sender simultaneously receives and deals with quantum acknowledgment frames and quantum negative acknowledgment frames from the two receivers, thus the processing delay on returning quantum frames is reduced. And due to the transience of transferring quantum information, the returning of quantum acknowledgment frames and quantum negative acknowledgment frames are completed instantaneously, the proposed protocols reduce the transmission delay and improve the communication efficiency. During the whole course of communications, the classical channels are only used to transmit the measurement message, so the burdens of classical channels are reduced.

  3. Region-Based Collision Avoidance Beaconless Geographic Routing Protocol in Wireless Sensor Networks.

    PubMed

    Lee, JeongCheol; Park, HoSung; Kang, SeokYoon; Kim, Ki-Il

    2015-01-01

    Due to the lack of dependency on beacon messages for location exchange, the beaconless geographic routing protocol has attracted considerable attention from the research community. However, existing beaconless geographic routing protocols are likely to generate duplicated data packets when multiple winners in the greedy area are selected. Furthermore, these protocols are designed for a uniform sensor field, so they cannot be directly applied to practical irregular sensor fields with partial voids. To prevent the failure of finding a forwarding node and to remove unnecessary duplication, in this paper, we propose a region-based collision avoidance beaconless geographic routing protocol to increase forwarding opportunities for randomly-deployed sensor networks. By employing different contention priorities into the mutually-communicable nodes and the rest of the nodes in the greedy area, every neighbor node in the greedy area can be used for data forwarding without any packet duplication. Moreover, simulation results are given to demonstrate the increased packet delivery ratio and shorten end-to-end delay, rather than well-referred comparative protocols.

  4. Relay-based routing protocol for space networks with predictable mobility

    NASA Astrophysics Data System (ADS)

    Zhang, Zhi; Dai, Guanzhong; Li, Lixin; Zhao, Yuting

    2005-11-01

    Future space scientific missions are envisioned to incorporate a large number of satellites and spacecrafts deployed in different orbits to network together into Space Networks. These networks have some unique characteristics such as limited resource of nodes, large latency and intermittent connectivity, which pose challenges to routing. In this paper, we propose a Relay-based Routing Protocol for Space Networks (RRPSN), which exploits the predictability of nodes motion to help deliver packets. Nodes use the link state and trajectory information received from other nodes to construct the routing tables where the next hop node is selected from the current as well as the future neighbors. Three key components of the protocol, including dissemination link information, modified Dijkstra's algorithm and packet processing are described in this paper. The computation complexity and overhead of the protocol is analyzed.

  5. A hop count based heuristic routing protocol for mobile delay tolerant networks.

    PubMed

    You, Lei; Li, Jianbo; Wei, Changjiang; Dai, Chenqu; Xu, Jixing; Hu, Lejuan

    2014-01-01

    Routing in delay tolerant networks (DTNs) is a challenge since it must handle network partitioning, long delays, and dynamic topology. Meanwhile, routing protocols of the traditional mobile ad hoc networks (MANETs) cannot work well due to the failure of its assumption that most network connections are available. In this paper, we propose a hop count based heuristic routing protocol by utilizing the information carried by the peripatetic packets in the network. A heuristic function is defined to help in making the routing decision. We formally define a custom operation for square matrices so as to transform the heuristic value calculation into matrix manipulation. Finally, the performance of our proposed algorithm is evaluated by the simulation results, which show the advantage of such self-adaptive routing protocol in the diverse circumstance of DTNs.

  6. A unified protocol for the transdiagnostic psychodynamic treatment of anxiety disorders: an evidence-based approach.

    PubMed

    Leichsenring, Falk; Salzer, Simone

    2014-06-01

    Although there is evidence for the efficacy of psychodynamic therapy (PDT) in anxiety disorders, results are not yet satisfactory, for example, if rates of remission and response are considered. To address this problem, a unified psychodynamic protocol for anxiety disorders (UPP-ANXIETY) is proposed that integrates the treatment principles of those methods of PDT that have proven to be efficacious in anxiety disorders. In addition, this protocol is transdiagnostic, implying that it is applicable to various forms of anxiety disorders and related disorders (generalized anxiety disorder, social phobia, panic disorders, avoidant personality disorder). Based on supportive-expressive therapy, the UPP-ANXIETY represents an integrated form of psychodynamic therapy that allows for a flexible use of empirically supported treatment principles. UPP-ANXIETY encompasses the following 9 treatment principles (modules): (1) socializing the patient for psychotherapy, (2) motivating and setting treatment goals, (3) establishing a secure helping alliance, (4) identifying the core conflict underlying anxiety, (5) focusing on the warded-off wish/affect, (6) modifying underlying internalized object relations, (7) changing underlying defenses and avoidance, (8) modifying underlying response of self, and (9) termination and relapse prevention. Some principles are regarded as core components to be used in every treatment (principles 3-8). A unified protocol for the psychodynamic treatment of anxiety disorders has several advantages, that is (1) integrating the most effective treatment principles of empirically supported psychodynamic treatments for anxiety disorders can be expected to further improve the efficacy of PDT; (2) using a unified protocol in efficacy studies has the potential to enhance the evidence-based status of PDT by aggregating the evidence; (3) a unified protocol will facilitate both training in PDT and transfer of research to clinical practice; and (4) thus, a unified

  7. A Priority-Based Adaptive MAC Protocol for Wireless Body Area Networks.

    PubMed

    Bhandari, Sabin; Moh, Sangman

    2016-01-01

    In wireless body area networks (WBANs), various sensors and actuators are placed on/inside the human body and connected wirelessly. WBANs have specific requirements for healthcare and medical applications, hence, standard protocols like the IEEE 802.15.4 cannot fulfill all the requirements. Consequently, many medium access control (MAC) protocols, mostly derived from the IEEE 802.15.4 superframe structure, have been studied. Nevertheless, they do not support a differentiated quality of service (QoS) for the various forms of traffic coexisting in a WBAN. In particular, a QoS-aware MAC protocol is essential for WBANs operating in the unlicensed Industrial, Scientific, and Medical (ISM) bands, because different wireless services like Bluetooth, WiFi, and Zigbee may coexist there and cause severe interference. In this paper, we propose a priority-based adaptive MAC (PA-MAC) protocol for WBANs in unlicensed bands, which allocates time slots dynamically, based on the traffic priority. Further, multiple channels are effectively utilized to reduce access delays in a WBAN, in the presence of coexisting systems. Our performance evaluation results show that the proposed PA-MAC outperforms the IEEE 802.15.4 MAC and the conventional priority-based MAC in terms of the average transmission time, throughput, energy consumption, and data collision ratio. PMID:26999162

  8. An Enhanced Reservation-Based MAC Protocol for IEEE 802.15.4 Networks

    PubMed Central

    Afonso, José A.; Silva, Helder D.; Macedo, Pedro; Rocha, Luis A.

    2011-01-01

    The IEEE 802.15.4 Medium Access Control (MAC) protocol is an enabling standard for wireless sensor networks. In order to support applications requiring dedicated bandwidth or bounded delay, it provides a reservation-based scheme named Guaranteed Time Slot (GTS). However, the GTS scheme presents some drawbacks, such as inefficient bandwidth utilization and support to a maximum of only seven devices. This paper presents eLPRT (enhanced Low Power Real Time), a new reservation-based MAC protocol that introduces several performance enhancing features in comparison to the GTS scheme. This MAC protocol builds on top of LPRT (Low Power Real Time) and includes various mechanisms designed to increase data transmission reliability against channel errors, improve bandwidth utilization and increase the number of supported devices. A motion capture system based on inertial and magnetic sensors has been used to validate the protocol. The effectiveness of the performance enhancements introduced by each of the new features is demonstrated through the provision of both simulation and experimental results. PMID:22163826

  9. A Priority-Based Adaptive MAC Protocol for Wireless Body Area Networks.

    PubMed

    Bhandari, Sabin; Moh, Sangman

    2016-03-18

    In wireless body area networks (WBANs), various sensors and actuators are placed on/inside the human body and connected wirelessly. WBANs have specific requirements for healthcare and medical applications, hence, standard protocols like the IEEE 802.15.4 cannot fulfill all the requirements. Consequently, many medium access control (MAC) protocols, mostly derived from the IEEE 802.15.4 superframe structure, have been studied. Nevertheless, they do not support a differentiated quality of service (QoS) for the various forms of traffic coexisting in a WBAN. In particular, a QoS-aware MAC protocol is essential for WBANs operating in the unlicensed Industrial, Scientific, and Medical (ISM) bands, because different wireless services like Bluetooth, WiFi, and Zigbee may coexist there and cause severe interference. In this paper, we propose a priority-based adaptive MAC (PA-MAC) protocol for WBANs in unlicensed bands, which allocates time slots dynamically, based on the traffic priority. Further, multiple channels are effectively utilized to reduce access delays in a WBAN, in the presence of coexisting systems. Our performance evaluation results show that the proposed PA-MAC outperforms the IEEE 802.15.4 MAC and the conventional priority-based MAC in terms of the average transmission time, throughput, energy consumption, and data collision ratio.

  10. Intervention mapping protocol for developing a theory-based diabetes self-management education program.

    PubMed

    Song, Misoon; Choi, Suyoung; Kim, Se-An; Seo, Kyoungsan; Lee, Soo Jin

    2015-01-01

    Development of behavior theory-based health promotion programs is encouraged with the paradigm shift from contents to behavior outcomes. This article describes the development process of the diabetes self-management program for older Koreans (DSME-OK) using intervention mapping (IM) protocol. The IM protocol includes needs assessment, defining goals and objectives, identifying theory and determinants, developing a matrix to form change objectives, selecting strategies and methods, structuring the program, and planning for evaluation and pilot testing. The DSME-OK adopted seven behavior objectives developed by the American Association of Diabetes Educators as behavioral outcomes. The program applied an information-motivation-behavioral skills model, and interventions were targeted to 3 determinants to change health behaviors. Specific methods were selected to achieve each objective guided by IM protocol. As the final step, program evaluation was planned including a pilot test. The DSME-OK was structured as the 3 determinants of the IMB model were intervened to achieve behavior objectives in each session. The program has 12 weekly 90-min sessions tailored for older adults. Using the IM protocol in developing a theory-based self-management program was beneficial in terms of providing a systematic guide to developing theory-based and behavior outcome-focused health education programs.

  11. A Priority-Based Adaptive MAC Protocol for Wireless Body Area Networks

    PubMed Central

    Bhandari, Sabin; Moh, Sangman

    2016-01-01

    In wireless body area networks (WBANs), various sensors and actuators are placed on/inside the human body and connected wirelessly. WBANs have specific requirements for healthcare and medical applications, hence, standard protocols like the IEEE 802.15.4 cannot fulfill all the requirements. Consequently, many medium access control (MAC) protocols, mostly derived from the IEEE 802.15.4 superframe structure, have been studied. Nevertheless, they do not support a differentiated quality of service (QoS) for the various forms of traffic coexisting in a WBAN. In particular, a QoS-aware MAC protocol is essential for WBANs operating in the unlicensed Industrial, Scientific, and Medical (ISM) bands, because different wireless services like Bluetooth, WiFi, and Zigbee may coexist there and cause severe interference. In this paper, we propose a priority-based adaptive MAC (PA-MAC) protocol for WBANs in unlicensed bands, which allocates time slots dynamically, based on the traffic priority. Further, multiple channels are effectively utilized to reduce access delays in a WBAN, in the presence of coexisting systems. Our performance evaluation results show that the proposed PA-MAC outperforms the IEEE 802.15.4 MAC and the conventional priority-based MAC in terms of the average transmission time, throughput, energy consumption, and data collision ratio. PMID:26999162

  12. Intervention mapping protocol for developing a theory-based diabetes self-management education program.

    PubMed

    Song, Misoon; Choi, Suyoung; Kim, Se-An; Seo, Kyoungsan; Lee, Soo Jin

    2015-01-01

    Development of behavior theory-based health promotion programs is encouraged with the paradigm shift from contents to behavior outcomes. This article describes the development process of the diabetes self-management program for older Koreans (DSME-OK) using intervention mapping (IM) protocol. The IM protocol includes needs assessment, defining goals and objectives, identifying theory and determinants, developing a matrix to form change objectives, selecting strategies and methods, structuring the program, and planning for evaluation and pilot testing. The DSME-OK adopted seven behavior objectives developed by the American Association of Diabetes Educators as behavioral outcomes. The program applied an information-motivation-behavioral skills model, and interventions were targeted to 3 determinants to change health behaviors. Specific methods were selected to achieve each objective guided by IM protocol. As the final step, program evaluation was planned including a pilot test. The DSME-OK was structured as the 3 determinants of the IMB model were intervened to achieve behavior objectives in each session. The program has 12 weekly 90-min sessions tailored for older adults. Using the IM protocol in developing a theory-based self-management program was beneficial in terms of providing a systematic guide to developing theory-based and behavior outcome-focused health education programs. PMID:26062288

  13. 75 FR 26791 - Solicitation for a Cooperative Agreement-Evaluation of Technical Assistance for Evidence-Based...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-05-12

    ... From the Federal Register Online via the Government Publishing Office ] DEPARTMENT OF JUSTICE National Institute of Corrections Solicitation for a Cooperative Agreement--Evaluation of Technical Assistance for Evidence-Based Decisionmaking in Local Criminal Justice Systems Funding Opportunity...

  14. Examining Agreement and Longitudinal Stability among Traditional and RTI-Based Definitions of Reading Disability Using the Affected-Status Agreement Statistic

    ERIC Educational Resources Information Center

    Waesche, Jessica S. Brown; Schatschneider, Christopher; Maner, Jon K.; Ahmed, Yusra; Wagner, Richard K.

    2011-01-01

    Rates of agreement among alternative definitions of reading disability and their 1- and 2-year stabilities were examined using a new measure of agreement, the affected-status agreement statistic. Participants were 288,114 first through third grade students. Reading measures were "Dynamic Indicators of Basic Early Literacy Skills" Oral Reading…

  15. Integrating heterogeneous classifier ensembles for EMG signal decomposition based on classifier agreement.

    PubMed

    Rasheed, Sarbast; Stashuk, Daniel W; Kamel, Mohamed S

    2010-05-01

    In this paper, we present a design methodology for integrating heterogeneous classifier ensembles by employing a diversity-based hybrid classifier fusion approach, whose aggregator module consists of two classifier combiners, to achieve an improved classification performance for motor unit potential classification during electromyographic (EMG) signal decomposition. Following the so-called overproduce and choose strategy to classifier ensemble combination, the developed system allows the construction of a large set of base classifiers, and then automatically chooses subsets of classifiers to form candidate classifier ensembles for each combiner. The system exploits kappa statistic diversity measure to design classifier teams through estimating the level of agreement between base classifier outputs. The pool of base classifiers consists of different kinds of classifiers: the adaptive certainty-based, the adaptive fuzzy k -NN, and the adaptive matched template filter classifiers; and utilizes different types of features. Performance of the developed system was evaluated using real and simulated EMG signals, and was compared with the performance of the constituent base classifiers. Across the EMG signal datasets used, the developed system had better average classification performance overall, especially in terms of reducing classification errors. For simulated signals of varying intensity, the developed system had an average correct classification rate CCr of 93.8% and an error rate Er of 2.2% compared to 93.6% and 3.2%, respectively, for the best base classifier in the ensemble. For simulated signals with varying amounts of shape and/or firing pattern variability, the developed system had a CCr of 89.1% with an Er of 4.7% compared to 86.3% and 5.6%, respectively, for the best classifier. For real signals, the developed system had a CCr of 89.4% with an Er of 3.9% compared to 84.6% and 7.1%, respectively, for the best classifier.

  16. Key rate for calibration robust entanglement based BB84 quantum key distribution protocol

    SciTech Connect

    Gittsovich, O.; Moroder, T.

    2014-12-04

    We apply the approach of verifying entanglement, which is based on the sole knowledge of the dimension of the underlying physical system to the entanglement based version of the BB84 quantum key distribution protocol. We show that the familiar one-way key rate formula holds already if one assumes the assumption that one of the parties is measuring a qubit and no further assumptions about the measurement are needed.

  17. Advertisement-Based Energy Efficient Medium Access Protocols for Wireless Sensor Networks

    NASA Astrophysics Data System (ADS)

    Ray, Surjya Sarathi

    . Simulations show that the optimized ADV-MAC provides substantial energy gains (50% to 70% less than other MAC protocols for WSNs such as T-MAC and S-MAC for the scenarios investigated) while faring as well as T-MAC in terms of packet delivery ratio and latency. Although ADV-MAC provides substantial energy gains over S-MAC and T-MAC, it is not optimal in terms of energy savings because contention is done twice -- once in the Advertisement Period and once in the Data Period. In the next part of my research, the second contention in the Data Period is eliminated and the advantages of contention-based and TDMA-based protocols are combined to form Advertisement based Time-division Multiple Access (ATMA), a distributed TDMA-based MAC protocol for WSNs. ATMA utilizes the bursty nature of the traffic to prevent energy waste through advertisements and reservations for data slots. Extensive simulations and qualitative analysis show that with bursty traffic, ATMA outperforms contention-based protocols (S-MAC, T-MAC and ADV-MAC), a TDMA based protocol (TRAMA) and hybrid protocols (Z-MAC and IEEE 802.15.4). ATMA provides energy reductions of up to 80%, while providing the best packet delivery ratio (close to 100%) and latency among all the investigated protocols. Simulations alone cannot reflect many of the challenges faced by real implementations of MAC protocols, such as clock-drift, synchronization, imperfect physical layers, and irregular interference from other transmissions. Such issues may cripple a protocol that otherwise performs very well in software simulations. Hence, to validate my research, I conclude with a hardware implementation of the ATMA protocol on SORA (Software Radio), developed by Microsoft Research Asia. SORA is a reprogrammable Software Defined Radio (SDR) platform that satisfies the throughput and timing requirements of modern wireless protocols while utilizing the rich general purpose PC development environment. Experimental results obtained from the hardware

  18. Advertisement-Based Energy Efficient Medium Access Protocols for Wireless Sensor Networks

    NASA Astrophysics Data System (ADS)

    Ray, Surjya Sarathi

    . Simulations show that the optimized ADV-MAC provides substantial energy gains (50% to 70% less than other MAC protocols for WSNs such as T-MAC and S-MAC for the scenarios investigated) while faring as well as T-MAC in terms of packet delivery ratio and latency. Although ADV-MAC provides substantial energy gains over S-MAC and T-MAC, it is not optimal in terms of energy savings because contention is done twice -- once in the Advertisement Period and once in the Data Period. In the next part of my research, the second contention in the Data Period is eliminated and the advantages of contention-based and TDMA-based protocols are combined to form Advertisement based Time-division Multiple Access (ATMA), a distributed TDMA-based MAC protocol for WSNs. ATMA utilizes the bursty nature of the traffic to prevent energy waste through advertisements and reservations for data slots. Extensive simulations and qualitative analysis show that with bursty traffic, ATMA outperforms contention-based protocols (S-MAC, T-MAC and ADV-MAC), a TDMA based protocol (TRAMA) and hybrid protocols (Z-MAC and IEEE 802.15.4). ATMA provides energy reductions of up to 80%, while providing the best packet delivery ratio (close to 100%) and latency among all the investigated protocols. Simulations alone cannot reflect many of the challenges faced by real implementations of MAC protocols, such as clock-drift, synchronization, imperfect physical layers, and irregular interference from other transmissions. Such issues may cripple a protocol that otherwise performs very well in software simulations. Hence, to validate my research, I conclude with a hardware implementation of the ATMA protocol on SORA (Software Radio), developed by Microsoft Research Asia. SORA is a reprogrammable Software Defined Radio (SDR) platform that satisfies the throughput and timing requirements of modern wireless protocols while utilizing the rich general purpose PC development environment. Experimental results obtained from the hardware

  19. A microsoft excel(®) 2010 based tool for calculating interobserver agreement.

    PubMed

    Reed, Derek D; Azulay, Richard L

    2011-01-01

    This technical report provides detailed information on the rationale for using a common computer spreadsheet program (Microsoft Excel(®)) to calculate various forms of interobserver agreement for both continuous and discontinuous data sets. In addition, we provide a brief tutorial on how to use an Excel spreadsheet to automatically compute traditional total count, partial agreement-within-intervals, exact agreement, trial-by-trial, interval-by-interval, scored-interval, unscored-interval, total duration, and mean duration-per-interval interobserver agreement algorithms. We conclude with a discussion of how practitioners may integrate this tool into their clinical work.

  20. Developing a Referral Protocol for Community-Based Occupational Therapy Services in Taiwan: A Logistic Regression Analysis.

    PubMed

    Mao, Hui-Fen; Chang, Ling-Hui; Tsai, Athena Yi-Jung; Huang, Wen-Ni; Wang, Jye

    2016-01-01

    Because resources for long-term care services are limited, timely and appropriate referral for rehabilitation services is critical for optimizing clients' functions and successfully integrating them into the community. We investigated which client characteristics are most relevant in predicting Taiwan's community-based occupational therapy (OT) service referral based on experts' beliefs. Data were collected in face-to-face interviews using the Multidimensional Assessment Instrument (MDAI). Community-dwelling participants (n = 221) ≥ 18 years old who reported disabilities in the previous National Survey of Long-term Care Needs in Taiwan were enrolled. The standard for referral was the judgment and agreement of two experienced occupational therapists who reviewed the results of the MDAI. Logistic regressions and Generalized Additive Models were used for analysis. Two predictive models were proposed, one using basic activities of daily living (BADLs) and one using instrumental ADLs (IADLs). Dementia, psychiatric disorders, cognitive impairment, joint range-of-motion limitations, fear of falling, behavioral or emotional problems, expressive deficits (in the BADL-based model), and limitations in IADLs or BADLs were significantly correlated with the need for referral. Both models showed high area under the curve (AUC) values on receiver operating curve testing (AUC = 0.977 and 0.972, respectively). The probability of being referred for community OT services was calculated using the referral algorithm. The referral protocol facilitated communication between healthcare professionals to make appropriate decisions for OT referrals. The methods and findings should be useful for developing referral protocols for other long-term care services.

  1. A fast and scalable content transfer protocol (FSCTP) for VANET based architecture

    NASA Astrophysics Data System (ADS)

    Santamaria, A. F.; Scala, F.; Sottile, C.; Tropea, M.; Raimondo, P.

    2016-05-01

    In the modern Vehicular Ad-hoc Networks (VANET) based systems even more applications require lot of data to be exchanged among vehicles and infrastructure entities. Due to mobility issues and unplanned events that may occurs it is important that contents should be transferred as fast as possible by taking into account consistence of the exchanged data and reliability of the connections. In order to face with these issues, in this work we propose a new transfer data protocol called Fast and Scalable Content Transfer Protocol (FSCTP). This protocol allows a data transfer by using a bidirectional channel among content suppliers and receivers exploiting several cooperative sessions. Each session will be based on User Datagram Protocol (UDP) and Transmission Control Protocol (TCP) to start and manage data transfer. Often in urban area the VANET scenario is composed of several vehicle and infrastructures points. The main idea is to exploit ad-hoc connections between vehicles to reach content suppliers. Moreover, in order to obtain a faster data transfer, more than one session is exploited to achieve a higher transfer rate. Of course it is important to manage data transfer between suppliers to avoid redundancy and resource wastages. The main goal is to instantiate a cooperative multi-session layer efficiently managed in a VANET environment exploiting the wide coverage area and avoiding common issues known in this kind of scenario. High mobility and unstable connections between nodes are some of the most common issues to address, thus a cooperative work between network, transport and application layers needs to be designed.

  2. Protein supplementation during a short-interval prostaglandin-based protocol for timed AI in sheep.

    PubMed

    Fierro, S; Gil, J; Viñoles, C; Soca, F; Banchero, G; Olivera-Muzante, J

    2014-10-01

    The aim of this experiment was to improve the reproductive performance of a short-interval prostaglandin (PG)-based protocol for timed artificial insemination in sheep, using a short-term nutritional treatment. During the breeding season (March-April), 132 multiparous and 61 nulliparous Corriedale ewes grazing natural pastures (600 kg DM/ha, 8.5% CP), were allocated to two groups: 1, Control group (n=100) two injections of D-Cloprostenol (75 μg per dose, 7d apart: Synchrovine(®) protocol); and 2, Supplemented group (n=93) ewes in which stage of the oestrous cycle was synchronised with Synchrovine(®) protocol plus focus feeding of a protein supplement (33.8% CP) between PG doses (Day -7 to -2). Cervical AI was performed at fixed time (Day 0), 46 ± 1.0 h after the second PG injection using 150 million sperm per ewe. Ovulation rate (Day 10), pregnancy rate, prolificacy and fecundity at Day 69 were evaluated by ultrasonography. Ovulation rate at Day 10 (1.20 ± 0.05 vs. 1.22 ± 0.05), pregnancy (46 ± 0.05 vs. 56 ± 0.05), prolificacy (1.09 ± 0.04 vs. 1.06 ± 0.05), and fecundity (0.49 ± 0.06 vs. 0.59 ± 0.06) at Day 69, were similar between groups (P>0.05; Control and Supplemented group respectively). It is concluded that focus feeding for 6d with protein supplementation during a short-interval PG-based protocol (Synchrovine(®)) did not improve the reproductive outcome associated with this protocol.

  3. Protein supplementation during a short-interval prostaglandin-based protocol for timed AI in sheep.

    PubMed

    Fierro, S; Gil, J; Viñoles, C; Soca, F; Banchero, G; Olivera-Muzante, J

    2014-10-01

    The aim of this experiment was to improve the reproductive performance of a short-interval prostaglandin (PG)-based protocol for timed artificial insemination in sheep, using a short-term nutritional treatment. During the breeding season (March-April), 132 multiparous and 61 nulliparous Corriedale ewes grazing natural pastures (600 kg DM/ha, 8.5% CP), were allocated to two groups: 1, Control group (n=100) two injections of D-Cloprostenol (75 μg per dose, 7d apart: Synchrovine(®) protocol); and 2, Supplemented group (n=93) ewes in which stage of the oestrous cycle was synchronised with Synchrovine(®) protocol plus focus feeding of a protein supplement (33.8% CP) between PG doses (Day -7 to -2). Cervical AI was performed at fixed time (Day 0), 46 ± 1.0 h after the second PG injection using 150 million sperm per ewe. Ovulation rate (Day 10), pregnancy rate, prolificacy and fecundity at Day 69 were evaluated by ultrasonography. Ovulation rate at Day 10 (1.20 ± 0.05 vs. 1.22 ± 0.05), pregnancy (46 ± 0.05 vs. 56 ± 0.05), prolificacy (1.09 ± 0.04 vs. 1.06 ± 0.05), and fecundity (0.49 ± 0.06 vs. 0.59 ± 0.06) at Day 69, were similar between groups (P>0.05; Control and Supplemented group respectively). It is concluded that focus feeding for 6d with protein supplementation during a short-interval PG-based protocol (Synchrovine(®)) did not improve the reproductive outcome associated with this protocol. PMID:25129637

  4. 77 FR 40634 - Solicitation for a Cooperative Agreement: Pretrial Technical Assistance for Evidence-Based...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-07-10

    ... National Institute of Corrections (NIC) Community Services Division is soliciting proposals from organizations, groups, or individuals to enter into a cooperative agreement with NIC for up to 12 months beginning in September 2012. Work under this cooperative agreement is part of a larger NIC...

  5. 77 FR 43120 - Solicitation for a Cooperative Agreement-Dosage-Based Probation as an Effective Intervention

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-07-23

    ...: Solicitation for a Cooperative Agreement. SUMMARY: The National Institute of Corrections (NIC) Community... cooperative agreement with NIC for up to 16 months beginning in October 2012. DATES: Application must be... announcement can be downloaded from the NIC Web site at www.nicic.gov/cooperativeagreements . All technical...

  6. Proficiency and Working Memory Based Explanations for Nonnative Speakers' Sensitivity to Agreement in Sentence Processing

    ERIC Educational Resources Information Center

    Coughlin, Caitlin E.; Tremblay, Annie

    2013-01-01

    This study examines the roles of proficiency and working memory (WM) capacity in second-/foreign-language (L2) learners' processing of agreement morphology. It investigates the processing of grammatical and ungrammatical short- and long-distance number agreement dependencies by native English speakers at two proficiencies in French, and the…

  7. Receiver-Based Ad Hoc On Demand Multipath Routing Protocol for Mobile Ad Hoc Networks.

    PubMed

    Al-Nahari, Abdulaziz; Mohamad, Mohd Murtadha

    2016-01-01

    Decreasing the route rediscovery time process in reactive routing protocols is challenging in mobile ad hoc networks. Links between nodes are continuously established and broken because of the characteristics of the network. Finding multiple routes to increase the reliability is also important but requires a fast update, especially in high traffic load and high mobility where paths can be broken as well. The sender node keeps re-establishing path discovery to find new paths, which makes for long time delay. In this paper we propose an improved multipath routing protocol, called Receiver-based ad hoc on demand multipath routing protocol (RB-AOMDV), which takes advantage of the reliability of the state of the art ad hoc on demand multipath distance vector (AOMDV) protocol with less re-established discovery time. The receiver node assumes the role of discovering paths when finding data packets that have not been received after a period of time. Simulation results show the delay and delivery ratio performances are improved compared with AOMDV. PMID:27258013

  8. Receiver-Based Ad Hoc On Demand Multipath Routing Protocol for Mobile Ad Hoc Networks

    PubMed Central

    Al-Nahari, Abdulaziz; Mohamad, Mohd Murtadha

    2016-01-01

    Decreasing the route rediscovery time process in reactive routing protocols is challenging in mobile ad hoc networks. Links between nodes are continuously established and broken because of the characteristics of the network. Finding multiple routes to increase the reliability is also important but requires a fast update, especially in high traffic load and high mobility where paths can be broken as well. The sender node keeps re-establishing path discovery to find new paths, which makes for long time delay. In this paper we propose an improved multipath routing protocol, called Receiver-based ad hoc on demand multipath routing protocol (RB-AOMDV), which takes advantage of the reliability of the state of the art ad hoc on demand multipath distance vector (AOMDV) protocol with less re-established discovery time. The receiver node assumes the role of discovering paths when finding data packets that have not been received after a period of time. Simulation results show the delay and delivery ratio performances are improved compared with AOMDV. PMID:27258013

  9. MRI-based Protocol to Characterize the Relationship Between Bicuspid Aortic Valve Morphology and Hemodynamics.

    PubMed

    Mirabella, Lucia; Barker, Alex J; Saikrishnan, Neelakantan; Coco, Elizabeth R; Mangiameli, Daniel J; Markl, Michael; Yoganathan, Ajit P

    2015-08-01

    Bicuspid aortic valve (BAV) is the most common congenital heart defect and can lead to severe complications. Many studies have been conducted to evaluate the potential of geometric and hemodynamic biomarkers to predict BAV-related aortopathy. This work proposes a novel semi-automatic protocol to characterize geometry and hemodynamics of aorta and aortic valve based on 2D cine and 4D flow MRI data. The protocol was applied to 12 BAV and 12 control subjects. Statistical differences between the groups were identified and linear regression models were investigated to elucidate the potential of this protocol to investigate the risk of disease progression. Statistical differences between the groups were found for orifice eccentricity, aorta diameter, velocity, jet angle and flow displacement. Key findings of the regression analysis include the association in the proximal ascending aorta between aorta diameter and mean velocity (negative), jet angle (positive) and flow displacement (positive), in the combined cohort. Positive association between flow displacement in the proximal aorta and orifice jet angle in TAV subjects was found. This study represents a pilot application of a protocol for standardized assessment of aortic geometry and hemodynamics associated with BAV disease. Its limited need for user input is advantageous for large cohort studies. PMID:25533768

  10. Measurement of cooling and warming rates in vitrification-based plant cryopreservation protocols.

    PubMed

    Teixeira, Aline S; González-Benito, M Elena; Molina-García, Antonio D

    2014-01-01

    Cryopreservation protocols include the use of additives and pretreatments aimed to reduce the probability of ice nucleation at all temperatures, mainly through micro-viscosity increase. Still, there is a risk of ice formation in the temperature region comprised between the equilibrium freezing (Tf ) and the glass transition (TG ) temperatures. Consequently, fast cooling and warming, especially in this region, is a must to avoid ice-derived damage. Vitrification and droplet-vitrification techniques, frequently used cryopreservation protocols based in fast cooling, were studied, alongside with the corresponding warming procedures. A very fast data acquisition system, able to read very low temperatures, down to that of liquid nitrogen, was employed. Cooling rates, measured between -20°C and -120°C, ranged from ca. 5°C s(-1) to 400°C s(-1) , while warming rates spanned from ca. 2°C s(-1) to 280°C s(-1) , for the different protocols and conditions studied. A wider measuring window (0°C to -150°C) produced lower rates for all cases. The cooling and warming rates were also related to the survival observed after the different procedures. Those protocols with the faster rates yielded the highest survival percentages. PMID:24933257

  11. Measurement of cooling and warming rates in vitrification-based plant cryopreservation protocols.

    PubMed

    Teixeira, Aline S; González-Benito, M Elena; Molina-García, Antonio D

    2014-01-01

    Cryopreservation protocols include the use of additives and pretreatments aimed to reduce the probability of ice nucleation at all temperatures, mainly through micro-viscosity increase. Still, there is a risk of ice formation in the temperature region comprised between the equilibrium freezing (Tf ) and the glass transition (TG ) temperatures. Consequently, fast cooling and warming, especially in this region, is a must to avoid ice-derived damage. Vitrification and droplet-vitrification techniques, frequently used cryopreservation protocols based in fast cooling, were studied, alongside with the corresponding warming procedures. A very fast data acquisition system, able to read very low temperatures, down to that of liquid nitrogen, was employed. Cooling rates, measured between -20°C and -120°C, ranged from ca. 5°C s(-1) to 400°C s(-1) , while warming rates spanned from ca. 2°C s(-1) to 280°C s(-1) , for the different protocols and conditions studied. A wider measuring window (0°C to -150°C) produced lower rates for all cases. The cooling and warming rates were also related to the survival observed after the different procedures. Those protocols with the faster rates yielded the highest survival percentages.

  12. IJS: An Intelligent Junction Selection Based Routing Protocol for VANET to Support ITS Services

    PubMed Central

    Khilar, Pabitra Mohan

    2014-01-01

    Selecting junctions intelligently for data transmission provides better intelligent transportation system (ITS) services. The main problem in vehicular communication is high disturbances of link connectivity due to mobility and less density of vehicles. If link conditions are predicted earlier, then there is a less chance of performance degradation. In this paper, an intelligent junction selection based routing protocol (IJS) is proposed to transmit the data in a quickest path, in which the vehicles are mostly connected and have less link connectivity problem. In this protocol, a helping vehicle is set at every junction to control the communication by predicting link failures or network gaps in a route. Helping vehicle at the junction produces a score for every neighboring junction to forward the data to the destination by considering the current traffic information and selects that junction which has minimum score. IJS protocol is implemented and compared with GyTAR, A-STAR, and GSR routing protocols. Simulation results show that IJS performs better in terms of average end-to-end delay, network gap encounter, and number of hops. PMID:27433485

  13. Receiver-Based Ad Hoc On Demand Multipath Routing Protocol for Mobile Ad Hoc Networks.

    PubMed

    Al-Nahari, Abdulaziz; Mohamad, Mohd Murtadha

    2016-01-01

    Decreasing the route rediscovery time process in reactive routing protocols is challenging in mobile ad hoc networks. Links between nodes are continuously established and broken because of the characteristics of the network. Finding multiple routes to increase the reliability is also important but requires a fast update, especially in high traffic load and high mobility where paths can be broken as well. The sender node keeps re-establishing path discovery to find new paths, which makes for long time delay. In this paper we propose an improved multipath routing protocol, called Receiver-based ad hoc on demand multipath routing protocol (RB-AOMDV), which takes advantage of the reliability of the state of the art ad hoc on demand multipath distance vector (AOMDV) protocol with less re-established discovery time. The receiver node assumes the role of discovering paths when finding data packets that have not been received after a period of time. Simulation results show the delay and delivery ratio performances are improved compared with AOMDV.

  14. MRI-based protocol to characterize the relationship between bicuspid aortic valve morphology and hemodynamics

    PubMed Central

    Mirabella, Lucia; Barker, Alex J.; Saikrishnan, Neelakantan; Coco, Elizabeth R.; Mangiameli, Daniel J.; Markl, Michael; Yoganathan, Ajit P.

    2015-01-01

    Bicuspid aortic valve (BAV) is the most common congenital heart defect and can lead to severe complications. Many studies have been conducted to evaluate the potential of geometric and hemodynamic biomarkers to predict BAV-related aortopathy. This work proposes a novel semi-automatic protocol to characterize geometry and hemodynamics of aorta and aortic valve based on 2D cine and 4D Flow MRI data. The protocol was applied to 12 BAV and 12 control subjects. Statistical differences between the groups were identified and linear regression models were investigated to elucidate the potential of this protocol to investigate the risk of disease progression. Statistical differences between the groups were found for orifice eccentricity, aorta diameter, velocity, jet angle and flow displacement. Key findings of the regression analysis include the association in the proximal ascending aorta between aorta diameter and mean velocity (negative), jet angle (positive) and flow displacement (positive), in the combined cohort. Positive association between flow displacement in the proximal aorta and orifice jet angle in TAV subjects was found. This study represents a pilot application of a protocol for standardized assessment of aortic geometry and hemodynamics associated with BAV disease. Its limited need for user input is advantageous for large cohort studies. PMID:25533768

  15. IDMA-based MAC protocol for satellite networks with consideration on channel quality.

    PubMed

    Liu, Gongliang; Fang, Xinrui; Kang, Wenjing

    2014-01-01

    In order to overcome the shortcomings of existing medium access control (MAC) protocols based on TDMA or CDMA in satellite networks, interleave division multiple access (IDMA) technique is introduced into satellite communication networks. Therefore, a novel wide-band IDMA MAC protocol based on channel quality is proposed in this paper, consisting of a dynamic power allocation algorithm, a rate adaptation algorithm, and a call admission control (CAC) scheme. Firstly, the power allocation algorithm combining the technique of IDMA SINR-evolution and channel quality prediction is developed to guarantee high power efficiency even in terrible channel conditions. Secondly, the effective rate adaptation algorithm, based on accurate channel information per timeslot and by the means of rate degradation, can be realized. What is more, based on channel quality prediction, the CAC scheme, combining the new power allocation algorithm, rate scheduling, and buffering strategies together, is proposed for the emerging IDMA systems, which can support a variety of traffic types, and offering quality of service (QoS) requirements corresponding to different priority levels. Simulation results show that the new wide-band IDMA MAC protocol can make accurate estimation of available resource considering the effect of multiuser detection (MUD) and QoS requirements of multimedia traffic, leading to low outage probability as well as high overall system throughput. PMID:25126592

  16. IDMA-Based MAC Protocol for Satellite Networks with Consideration on Channel Quality

    PubMed Central

    2014-01-01

    In order to overcome the shortcomings of existing medium access control (MAC) protocols based on TDMA or CDMA in satellite networks, interleave division multiple access (IDMA) technique is introduced into satellite communication networks. Therefore, a novel wide-band IDMA MAC protocol based on channel quality is proposed in this paper, consisting of a dynamic power allocation algorithm, a rate adaptation algorithm, and a call admission control (CAC) scheme. Firstly, the power allocation algorithm combining the technique of IDMA SINR-evolution and channel quality prediction is developed to guarantee high power efficiency even in terrible channel conditions. Secondly, the effective rate adaptation algorithm, based on accurate channel information per timeslot and by the means of rate degradation, can be realized. What is more, based on channel quality prediction, the CAC scheme, combining the new power allocation algorithm, rate scheduling, and buffering strategies together, is proposed for the emerging IDMA systems, which can support a variety of traffic types, and offering quality of service (QoS) requirements corresponding to different priority levels. Simulation results show that the new wide-band IDMA MAC protocol can make accurate estimation of available resource considering the effect of multiuser detection (MUD) and QoS requirements of multimedia traffic, leading to low outage probability as well as high overall system throughput. PMID:25126592

  17. IDMA-based MAC protocol for satellite networks with consideration on channel quality.

    PubMed

    Liu, Gongliang; Fang, Xinrui; Kang, Wenjing

    2014-01-01

    In order to overcome the shortcomings of existing medium access control (MAC) protocols based on TDMA or CDMA in satellite networks, interleave division multiple access (IDMA) technique is introduced into satellite communication networks. Therefore, a novel wide-band IDMA MAC protocol based on channel quality is proposed in this paper, consisting of a dynamic power allocation algorithm, a rate adaptation algorithm, and a call admission control (CAC) scheme. Firstly, the power allocation algorithm combining the technique of IDMA SINR-evolution and channel quality prediction is developed to guarantee high power efficiency even in terrible channel conditions. Secondly, the effective rate adaptation algorithm, based on accurate channel information per timeslot and by the means of rate degradation, can be realized. What is more, based on channel quality prediction, the CAC scheme, combining the new power allocation algorithm, rate scheduling, and buffering strategies together, is proposed for the emerging IDMA systems, which can support a variety of traffic types, and offering quality of service (QoS) requirements corresponding to different priority levels. Simulation results show that the new wide-band IDMA MAC protocol can make accurate estimation of available resource considering the effect of multiuser detection (MUD) and QoS requirements of multimedia traffic, leading to low outage probability as well as high overall system throughput.

  18. A Local Energy Consumption Prediction-Based Clustering Protocol for Wireless Sensor Networks

    PubMed Central

    Yu, Jiguo; Feng, Li; Jia, Lili; Gu, Xin; Yu, Dongxiao

    2014-01-01

    Clustering is a fundamental and effective technique for utilizing sensor nodes' energy and extending the network lifetime for wireless sensor networks. In this paper, we propose a novel clustering protocol, LECP-CP (local energy consumption prediction-based clustering protocol), the core of which includes a novel cluster head election algorithm and an inter-cluster communication routing tree construction algorithm, both based on the predicted local energy consumption ratio of nodes. We also provide a more accurate and realistic cluster radius to minimize the energy consumption of the entire network. The global energy consumption can be optimized by the optimization of the local energy consumption, and the energy consumption among nodes can be balanced well. Simulation results validate our theoretical analysis and show that LECP-CP has high efficiency of energy utilization, good scalability and significant improvement in the network lifetime. PMID:25479330

  19. Industrial WSN Based on IR-UWB and a Low-Latency MAC Protocol

    NASA Astrophysics Data System (ADS)

    Reinhold, Rafael; Underberg, Lisa; Wulf, Armin; Kays, Ruediger

    2016-07-01

    Wireless sensor networks for industrial communication require high reliability and low latency. As current wireless sensor networks do not entirely meet these requirements, novel system approaches need to be developed. Since ultra wideband communication systems seem to be a promising approach, this paper evaluates the performance of the IEEE 802.15.4 impulse-radio ultra-wideband physical layer and the IEEE 802.15.4 Low Latency Deterministic Network (LLDN) MAC for industrial applications. Novel approaches and system adaptions are proposed to meet the application requirements. In this regard, a synchronization approach based on circular average magnitude difference functions (CAMDF) and on a clean template (CT) is presented for the correlation receiver. An adapted MAC protocol titled aggregated low latency (ALL) MAC is proposed to significantly reduce the resulting latency. Based on the system proposals, a hardware prototype has been developed, which proves the feasibility of the system and visualizes the real-time performance of the MAC protocol.

  20. An Efficient Buyer-Seller Watermarking Protocol Based on Chameleon Encryption

    NASA Astrophysics Data System (ADS)

    Poh, Geong Sen; Martin, Keith M.

    Buyer-seller watermarking protocols are designed to deter clients from illegally distributing copies of digital content. This is achieved by allowing a distributor to insert a unique watermark into content in such a way that the distributor does not know the final watermarked copy that is given to the client. This protects both the client and distributor from attempts by one to falsely accuse the other of misuse. Buyer-seller watermarking protocols are normally based on asymmetric cryptographic primitives known as homomorphic encryption schemes. However, the computational and communication overhead of this conventional approach is high. In this paper we propose a different approach, based on the symmetric Chameleon encryption scheme. We show that this leads to significant gains in computational and operational efficiency.

  1. Total synthesis of Ivorenolide A following a base-induced elimination protocol.

    PubMed

    Mohapatra, Debendra K; Umamaheshwar, Gonela; Rao, R Nageshwar; Rao, T Srinivasa; R, Sudheer Kumar; Yadav, Jhillu S

    2015-02-20

    A concise and stereocontrolled first total synthesis of Ivorenolide A (1) is reported in 16 longest linear steps with a 13.4% overall yield starting from (+)-diethyl tartrate (DET). Key features are base-induced elimination protocol for the construction of chiral propargyl alcohols in both fragments, Pd-catalyzed cross-coupling of terminal acetylenes, and Shiina's 2-methyl-6-nitrobezoic anhydride (MNBA) mediated macrolactonization.

  2. Chemical Bum from Vinegar Following an Internet-based Protocol for Self-removal of Nevi

    PubMed Central

    Feldstein, Stephanie; Afshar, Maryam

    2015-01-01

    “Natural home remedies” for nevi removal found on the Internet can be ineffective, or worse, dangerous. Children and teens, in particular, may be more likely to attempt self-treatment in order to avoid discussing their concerns with their parents. Here, the authors report a case of an adolescent who presented with a chemical burn after following an Internet-based protocol for nevi removal using apple cider vinegar. PMID:26155328

  3. The Predigest Project of TCP/IP Protocol Communication System Based on DSP Technology and Ethernet

    NASA Astrophysics Data System (ADS)

    hong-you, Wang; san-ping, Zhao

    The paper introduce a predigest project of TCP/IP based on DSP CMOS chip TMS320F2407 and Ethernet interface. The system design the Network Interface Controller using TMS320F2407and TRL8019AS,it simplify TCP/IP, achieve simple protocol stack in DSP, and achieve Data transmission by software program. The experiment indicated that, the communication system constructed by TMS320F2407andTRL8019AS is low cast, simple and reliable.

  4. Use of clomiphene-based stimulation protocol in oocyte donors: A comparative study

    PubMed Central

    Singh, Aparna; Bhandari, Shilpa; Agrawal, Pallavi; Gupta, Nitika; Munaganuru, Niharika

    2016-01-01

    INTRODUCTION: This study was undertaken to compare between clomiphene citrate (CC) and gonadotropin-releasing hormone antagonist-based protocols in donor-recipient cycles in terms of parameters of ovarian stimulation and obstetric outcome. MATERIALS AND METHODS: Two hundred and three fertile oocyte donors were stimulated using two different protocols: Clomiphene based (n = 103) and antagonist based (n = 100). Donors in the one group were stimulated from day 1 or 2 of spontaneous or withdrawal bleeds with CC (50 mg/day) and recombinant follicle-stimulating hormone (FSH) till the day of trigger while donors in the other group were stimulated using recombinant FSH from day 1 or 2, and the antagonist was added as per flexible antagonist protocol. When >3 follicles were >17 mm in diameter, trigger was given with 2 mg leuprolide intramuscular. Transvaginal oocyte retrieval was done after 34 h of trigger. RESULTS: There was no significant difference in between the two groups in terms of age, antral follicle count, starting dose of gonadotropins, total dose required, duration of stimulation, number of follicles retrieved, mature follicles, and fertilization rate. The serum estradiol levels were significantly raised in the clomiphene group (P < 0.001). Pregnancy rate was similar in both the groups. The clinical pregnancy rate was 65.94% in the clomiphene group and 57.46% in the antagonist group. The live birth rate per cycle started was 47.8% in the clomiphene group and 39.55% in the antagonist group. There was one case of ectopic pregnancy in the antagonist group. CONCLUSION: Controlled ovarian stimulation using clomiphene and gonadotropin is a viable option for donor oocyte cycles. The cost and number of injections used per cycle can be reduced by using the clomiphene-based protocols. PMID:27803583

  5. Agent-based models of strategies for the emergence and evolution of grammatical agreement.

    PubMed

    Beuls, Katrien; Steels, Luc

    2013-01-01

    Grammatical agreement means that features associated with one linguistic unit (for example number or gender) become associated with another unit and then possibly overtly expressed, typically with morphological markers. It is one of the key mechanisms used in many languages to show that certain linguistic units within an utterance grammatically depend on each other. Agreement systems are puzzling because they can be highly complex in terms of what features they use and how they are expressed. Moreover, agreement systems have undergone considerable change in the historical evolution of languages. This article presents language game models with populations of agents in order to find out for what reasons and by what cultural processes and cognitive strategies agreement systems arise. It demonstrates that agreement systems are motivated by the need to minimize combinatorial search and semantic ambiguity, and it shows, for the first time, that once a population of agents adopts a strategy to invent, acquire and coordinate meaningful markers through social learning, linguistic self-organization leads to the spontaneous emergence and cultural transmission of an agreement system. The article also demonstrates how attested grammaticalization phenomena, such as phonetic reduction and conventionalized use of agreement markers, happens as a side effect of additional economizing principles, in particular minimization of articulatory effort and reduction of the marker inventory. More generally, the article illustrates a novel approach for studying how key features of human languages might emerge.

  6. Agent-Based Models of Strategies for the Emergence and Evolution of Grammatical Agreement

    PubMed Central

    Beuls, Katrien; Steels, Luc

    2013-01-01

    Grammatical agreement means that features associated with one linguistic unit (for example number or gender) become associated with another unit and then possibly overtly expressed, typically with morphological markers. It is one of the key mechanisms used in many languages to show that certain linguistic units within an utterance grammatically depend on each other. Agreement systems are puzzling because they can be highly complex in terms of what features they use and how they are expressed. Moreover, agreement systems have undergone considerable change in the historical evolution of languages. This article presents language game models with populations of agents in order to find out for what reasons and by what cultural processes and cognitive strategies agreement systems arise. It demonstrates that agreement systems are motivated by the need to minimize combinatorial search and semantic ambiguity, and it shows, for the first time, that once a population of agents adopts a strategy to invent, acquire and coordinate meaningful markers through social learning, linguistic self-organization leads to the spontaneous emergence and cultural transmission of an agreement system. The article also demonstrates how attested grammaticalization phenomena, such as phonetic reduction and conventionalized use of agreement markers, happens as a side effect of additional economizing principles, in particular minimization of articulatory effort and reduction of the marker inventory. More generally, the article illustrates a novel approach for studying how key features of human languages might emerge. PMID:23527055

  7. Agent-based models of strategies for the emergence and evolution of grammatical agreement.

    PubMed

    Beuls, Katrien; Steels, Luc

    2013-01-01

    Grammatical agreement means that features associated with one linguistic unit (for example number or gender) become associated with another unit and then possibly overtly expressed, typically with morphological markers. It is one of the key mechanisms used in many languages to show that certain linguistic units within an utterance grammatically depend on each other. Agreement systems are puzzling because they can be highly complex in terms of what features they use and how they are expressed. Moreover, agreement systems have undergone considerable change in the historical evolution of languages. This article presents language game models with populations of agents in order to find out for what reasons and by what cultural processes and cognitive strategies agreement systems arise. It demonstrates that agreement systems are motivated by the need to minimize combinatorial search and semantic ambiguity, and it shows, for the first time, that once a population of agents adopts a strategy to invent, acquire and coordinate meaningful markers through social learning, linguistic self-organization leads to the spontaneous emergence and cultural transmission of an agreement system. The article also demonstrates how attested grammaticalization phenomena, such as phonetic reduction and conventionalized use of agreement markers, happens as a side effect of additional economizing principles, in particular minimization of articulatory effort and reduction of the marker inventory. More generally, the article illustrates a novel approach for studying how key features of human languages might emerge. PMID:23527055

  8. Self-adaptive trust based ABR protocol for MANETs using Q-learning.

    PubMed

    Kumar, Anitha Vijaya; Jeyapal, Akilandeswari

    2014-01-01

    Mobile ad hoc networks (MANETs) are a collection of mobile nodes with a dynamic topology. MANETs work under scalable conditions for many applications and pose different security challenges. Due to the nomadic nature of nodes, detecting misbehaviour is a complex problem. Nodes also share routing information among the neighbours in order to find the route to the destination. This requires nodes to trust each other. Thus we can state that trust is a key concept in secure routing mechanisms. A number of cryptographic protection techniques based on trust have been proposed. Q-learning is a recently used technique, to achieve adaptive trust in MANETs. In comparison to other machine learning computational intelligence techniques, Q-learning achieves optimal results. Our work focuses on computing a score using Q-learning to weigh the trust of a particular node over associativity based routing (ABR) protocol. Thus secure and stable route is calculated as a weighted average of the trust value of the nodes in the route and associativity ticks ensure the stability of the route. Simulation results show that Q-learning based trust ABR protocol improves packet delivery ratio by 27% and reduces the route selection time by 40% over ABR protocol without trust calculation. PMID:25254243

  9. Self-Adaptive Trust Based ABR Protocol for MANETs Using Q-Learning

    PubMed Central

    Jeyapal, Akilandeswari

    2014-01-01

    Mobile ad hoc networks (MANETs) are a collection of mobile nodes with a dynamic topology. MANETs work under scalable conditions for many applications and pose different security challenges. Due to the nomadic nature of nodes, detecting misbehaviour is a complex problem. Nodes also share routing information among the neighbours in order to find the route to the destination. This requires nodes to trust each other. Thus we can state that trust is a key concept in secure routing mechanisms. A number of cryptographic protection techniques based on trust have been proposed. Q-learning is a recently used technique, to achieve adaptive trust in MANETs. In comparison to other machine learning computational intelligence techniques, Q-learning achieves optimal results. Our work focuses on computing a score using Q-learning to weigh the trust of a particular node over associativity based routing (ABR) protocol. Thus secure and stable route is calculated as a weighted average of the trust value of the nodes in the route and associativity ticks ensure the stability of the route. Simulation results show that Q-learning based trust ABR protocol improves packet delivery ratio by 27% and reduces the route selection time by 40% over ABR protocol without trust calculation. PMID:25254243

  10. Self-adaptive trust based ABR protocol for MANETs using Q-learning.

    PubMed

    Kumar, Anitha Vijaya; Jeyapal, Akilandeswari

    2014-01-01

    Mobile ad hoc networks (MANETs) are a collection of mobile nodes with a dynamic topology. MANETs work under scalable conditions for many applications and pose different security challenges. Due to the nomadic nature of nodes, detecting misbehaviour is a complex problem. Nodes also share routing information among the neighbours in order to find the route to the destination. This requires nodes to trust each other. Thus we can state that trust is a key concept in secure routing mechanisms. A number of cryptographic protection techniques based on trust have been proposed. Q-learning is a recently used technique, to achieve adaptive trust in MANETs. In comparison to other machine learning computational intelligence techniques, Q-learning achieves optimal results. Our work focuses on computing a score using Q-learning to weigh the trust of a particular node over associativity based routing (ABR) protocol. Thus secure and stable route is calculated as a weighted average of the trust value of the nodes in the route and associativity ticks ensure the stability of the route. Simulation results show that Q-learning based trust ABR protocol improves packet delivery ratio by 27% and reduces the route selection time by 40% over ABR protocol without trust calculation.

  11. An Improved EKG-Based Key Agreement Scheme for Body Area Networks

    NASA Astrophysics Data System (ADS)

    Ali, Aftab; Khan, Farrukh Aslam

    Body area networks (BANs) play an important role in mobile health monitoring such as, monitoring the health of patients in a hospital or physical status of soldiers in a battlefield. By securing the BAN, we actually secure the lives of soldiers or patients. This work presents an electrocardiogram (EKG) based key agreement scheme using discrete wavelet transform (DWT) for the sake of generating a common key in a body area network. The use of EKG brings plug-and-play capability in BANs; i.e., the sensors are just placed on the human body and a secure communication is started among these sensors. The process is made secure by using the iris or fingerprints to lock and then unlock the blocks during exchange between the communicating sensors. The locking and unlocking is done through watermarking. When a watermark is added at the sender side, the block is locked and when it is removed at the receiver side, the block is unlocked. By using iris or fingerprints, the security of the technique improves and its plug-and-play capability is not affected. The analysis is done by using real 2-lead EKG data sampled at a rate of 125 Hz taken from MIT PhysioBank database.

  12. 48 CFR 22.1002-3 - Wage determinations based on collective bargaining agreements.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... locality or (2) that the wages and fringe benefits are not the result of arm's length negotiations. (b... collective bargaining agreement can be challenged due to a variance with prevailing rates or lack of arm's length bargaining....

  13. 48 CFR 22.1002-3 - Wage determinations based on collective bargaining agreements.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... locality or (2) that the wages and fringe benefits are not the result of arm's length negotiations. (b... collective bargaining agreement can be challenged due to a variance with prevailing rates or lack of arm's length bargaining....

  14. 48 CFR 22.1002-3 - Wage determinations based on collective bargaining agreements.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... locality or (2) that the wages and fringe benefits are not the result of arm's length negotiations. (b... collective bargaining agreement can be challenged due to a variance with prevailing rates or lack of arm's length bargaining....

  15. 48 CFR 22.1002-3 - Wage determinations based on collective bargaining agreements.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ...) that the wages and fringe benefits are not the result of arm's length negotiations. (b) Paragraphs in... collective bargaining agreement can be challenged due to a variance with prevailing rates or lack of arm's length bargaining....

  16. Priority Based Congestion Control Dynamic Clustering Protocol in Mobile Wireless Sensor Networks

    PubMed Central

    Beulah Jayakumari, R.; Jawahar Senthilkumar, V.

    2015-01-01

    Wireless sensor network is widely used to monitor natural phenomena because natural disaster has globally increased which causes significant loss of life, economic setback, and social development. Saving energy in a wireless sensor network (WSN) is a critical factor to be considered. The sensor nodes are deployed to sense, compute, and communicate alerts in a WSN which are used to prevent natural hazards. Generally communication consumes more energy than sensing and computing; hence cluster based protocol is preferred. Even with clustering, multiclass traffic creates congested hotspots in the cluster, thereby causing packet loss and delay. In order to conserve energy and to avoid congestion during multiclass traffic a novel Priority Based Congestion Control Dynamic Clustering (PCCDC) protocol is developed. PCCDC is designed with mobile nodes which are organized dynamically into clusters to provide complete coverage and connectivity. PCCDC computes congestion at intra- and intercluster level using linear and binary feedback method. Each mobile node within the cluster has an appropriate queue model for scheduling prioritized packet during congestion without drop or delay. Simulation results have proven that packet drop, control overhead, and end-to-end delay are much lower in PCCDC which in turn significantly increases packet delivery ratio, network lifetime, and residual energy when compared with PASCC protocol. PMID:26504898

  17. [Short-Term Psychodynamic Therapy in Depression - An Evidence-Based Unified Protocol].

    PubMed

    Steinert, Christiane; Schauenburg, Henning; Dinger, Ulrike; Leichsenring, Falk

    2016-01-01

    With a lifetime prevalence of about 17% depression is the most common mental disorder. Psychotherapy is efficacious in the treatment of depression, with no significant differences between different forms of psychotherapies. For psychodynamic therapy (PDT) various models proved to be efficacious in randomized controlled trials (RCTs). As a consequence the evidence for PDT is scattered between different forms or orientations of PDT entailing problems regarding psychotherapy training and the transfer of research into clinical practice. Thus, our aim was to develop a unified protocol for the dynamic treatment of depression that is based on those models of PDT that proved efficacious in randomized controlled trials (RCTs). As a first step we conducted a systematic search of RCTs investigating manualized or manual-based individual psychodynamic therapy for depressive disorders in adults that proved to be efficacious compared to comparison conditions. 11 studies fulfilled our inclusion criteria. In a second step we systematically reviewed the studies with regard to the treatment concepts they had applied. 7 highly consistent treatment components could be identified. We conceptualized them in the form of 7 interrelated treatment modules which constitute the unified psychodynamic protocol for depression. The protocol may enhance the empirical status of PDT and facilitate both psychotherapy training as well as the transfer of research to clinical practice. Through the focused use of techniques that proofed efficacious it is expected to bring more benefit to depressed patients and therefore also have a positive impact on the health care system.

  18. Priority Based Congestion Control Dynamic Clustering Protocol in Mobile Wireless Sensor Networks.

    PubMed

    Jayakumari, R Beulah; Senthilkumar, V Jawahar

    2015-01-01

    Wireless sensor network is widely used to monitor natural phenomena because natural disaster has globally increased which causes significant loss of life, economic setback, and social development. Saving energy in a wireless sensor network (WSN) is a critical factor to be considered. The sensor nodes are deployed to sense, compute, and communicate alerts in a WSN which are used to prevent natural hazards. Generally communication consumes more energy than sensing and computing; hence cluster based protocol is preferred. Even with clustering, multiclass traffic creates congested hotspots in the cluster, thereby causing packet loss and delay. In order to conserve energy and to avoid congestion during multiclass traffic a novel Priority Based Congestion Control Dynamic Clustering (PCCDC) protocol is developed. PCCDC is designed with mobile nodes which are organized dynamically into clusters to provide complete coverage and connectivity. PCCDC computes congestion at intra- and intercluster level using linear and binary feedback method. Each mobile node within the cluster has an appropriate queue model for scheduling prioritized packet during congestion without drop or delay. Simulation results have proven that packet drop, control overhead, and end-to-end delay are much lower in PCCDC which in turn significantly increases packet delivery ratio, network lifetime, and residual energy when compared with PASCC protocol. PMID:26504898

  19. A Network Coding Based Hybrid ARQ Protocol for Underwater Acoustic Sensor Networks

    PubMed Central

    Wang, Hao; Wang, Shilian; Zhang, Eryang; Zou, Jianbin

    2016-01-01

    Underwater Acoustic Sensor Networks (UASNs) have attracted increasing interest in recent years due to their extensive commercial and military applications. However, the harsh underwater channel causes many challenges for the design of reliable underwater data transport protocol. In this paper, we propose an energy efficient data transport protocol based on network coding and hybrid automatic repeat request (NCHARQ) to ensure reliability, efficiency and availability in UASNs. Moreover, an adaptive window length estimation algorithm is designed to optimize the throughput and energy consumption tradeoff. The algorithm can adaptively change the code rate and can be insensitive to the environment change. Extensive simulations and analysis show that NCHARQ significantly reduces energy consumption with short end-to-end delay. PMID:27618044

  20. A Network Coding Based Hybrid ARQ Protocol for Underwater Acoustic Sensor Networks.

    PubMed

    Wang, Hao; Wang, Shilian; Zhang, Eryang; Zou, Jianbin

    2016-01-01

    Underwater Acoustic Sensor Networks (UASNs) have attracted increasing interest in recent years due to their extensive commercial and military applications. However, the harsh underwater channel causes many challenges for the design of reliable underwater data transport protocol. In this paper, we propose an energy efficient data transport protocol based on network coding and hybrid automatic repeat request (NCHARQ) to ensure reliability, efficiency and availability in UASNs. Moreover, an adaptive window length estimation algorithm is designed to optimize the throughput and energy consumption tradeoff. The algorithm can adaptively change the code rate and can be insensitive to the environment change. Extensive simulations and analysis show that NCHARQ significantly reduces energy consumption with short end-to-end delay. PMID:27618044

  1. A Network Coding Based Hybrid ARQ Protocol for Underwater Acoustic Sensor Networks.

    PubMed

    Wang, Hao; Wang, Shilian; Zhang, Eryang; Zou, Jianbin

    2016-09-07

    Underwater Acoustic Sensor Networks (UASNs) have attracted increasing interest in recent years due to their extensive commercial and military applications. However, the harsh underwater channel causes many challenges for the design of reliable underwater data transport protocol. In this paper, we propose an energy efficient data transport protocol based on network coding and hybrid automatic repeat request (NCHARQ) to ensure reliability, efficiency and availability in UASNs. Moreover, an adaptive window length estimation algorithm is designed to optimize the throughput and energy consumption tradeoff. The algorithm can adaptively change the code rate and can be insensitive to the environment change. Extensive simulations and analysis show that NCHARQ significantly reduces energy consumption with short end-to-end delay.

  2. An Improved Quantum Information Hiding Protocol Based on Entanglement Swapping of χ-type Quantum States

    NASA Astrophysics Data System (ADS)

    Xu, Shu-Jiang; Chen, Xiu-Bo; Wang, Lian-Hai; Ding, Qing-Yan; Zhang, Shu-Hui

    2016-06-01

    In 2011, Qu et al. proposed a quantum information hiding protocol based on the entanglement swapping of χ-type quantum states. Because a χ-type state can be described by the 4-particle cat states which have good symmetry, the possible output results of the entanglement swapping between a given χ-type state and all of the 16 χ-type states are divided into 8 groups instead of 16 groups of different results when the global phase is not considered. So it is difficult to read out the secret messages since each result occurs twice in each line (column) of the secret messages encoding rule for the original protocol. In fact, a 3-bit instead of a 4-bit secret message can be encoded by performing two unitary transformations on 2 particles of a χ-type quantum state in the original protocol. To overcome this defect, we propose an improved quantum information hiding protocol based on the general term formulas of the entanglement swapping among χ-type states. Supported by the National Natural Science Foundation of China under Grant Nos. 61572297, 61303199, 61272514, and 61373131, the Shandong Provincial Natural Science Foundation of China under Grant Nos. ZR2013FM025, ZR2013FQ001, ZR2014FM003, and ZY2015YL018, the Shandong Provincial Outstanding Research Award Fund for Young Scientists of China under Grant Nos. BS2015DX006 and BS2014DX007, the National Development Foundation for Cryptological Research, China under Grant No. MMJJ201401012, the Priority Academic Program Development of Jiangsu Higher Education Institutions and Jiangsu Collaborative Innovation Center on Atmospheric Environment and Equipment Technology Funds, and the Shandong Academy of Sciences Youth Fund Project, China under Grant Nos. 2015QN003 and 2013QN007

  3. A carrier sensed multiple access protocol for high data base rate ring networks

    NASA Technical Reports Server (NTRS)

    Foudriat, E. C.; Maly, Kurt J.; Overstreet, C. Michael; Khanna, S.; Paterra, Frank

    1990-01-01

    The results of the study of a simple but effective media access protocol for high data rate networks are presented. The protocol is based on the fact that at high data rates networks can contain multiple messages simultaneously over their span, and that in a ring, nodes used to detect the presence of a message arriving from the immediate upstream neighbor. When an incoming signal is detected, the node must either abort or truncate a message it is presently sending. Thus, the protocol with local carrier sensing and multiple access is designated CSMA/RN. The performance of CSMA/RN with TTattempt and truncate is studied using analytic and simulation models. Three performance factors, wait or access time, service time and response or end-to-end travel time are presented. The service time is basically a function of the network rate, it changes by a factor of 1 between no load and full load. Wait time, which is zero for no load, remains small for load factors up to 70 percent of full load. Response time, which adds travel time while on the network to wait and service time, is mainly a function of network length, especially for longer distance networks. Simulation results are shown for CSMA/RN where messages are removed at the destination. A wide range of local and metropolitan area network parameters including variations in message size, network length, and node count are studied. Finally, a scaling factor based upon the ratio of message to network length demonstrates that the results, and hence, the CSMA/RN protocol, are applicable to wide area networks.

  4. Efficient and Secure Temporal Credential-Based Authenticated Key Agreement Using Extended Chaotic Maps for Wireless Sensor Networks.

    PubMed

    Lee, Tian-Fu

    2015-06-25

    A secure temporal credential-based authenticated key agreement scheme for Wireless Sensor Networks (WSNs) enables a user, a sensor node and a gateway node to realize mutual authentication using temporal credentials. The user and the sensor node then negotiate a common secret key with the help of the gateway node, and establish a secure and authenticated channel using this common secret key. To increase efficiency, recent temporal credential-based authenticated key agreement schemes for WSNs have been designed to involve few computational operations, such as hash and exclusive-or operations. However, these schemes cannot protect the privacy of users and withstand possible attacks. This work develops a novel temporal credential-based authenticated key agreement scheme for WSNs using extended chaotic maps, in which operations are more efficient than modular exponential computations and scalar multiplications on an elliptic curve. The proposed scheme not only provides higher security and efficiency than related schemes, but also resolves their weaknesses.

  5. Efficient and Secure Temporal Credential-Based Authenticated Key Agreement Using Extended Chaotic Maps for Wireless Sensor Networks

    PubMed Central

    Lee, Tian-Fu

    2015-01-01

    A secure temporal credential-based authenticated key agreement scheme for Wireless Sensor Networks (WSNs) enables a user, a sensor node and a gateway node to realize mutual authentication using temporal credentials. The user and the sensor node then negotiate a common secret key with the help of the gateway node, and establish a secure and authenticated channel using this common secret key. To increase efficiency, recent temporal credential-based authenticated key agreement schemes for WSNs have been designed to involve few computational operations, such as hash and exclusive-or operations. However, these schemes cannot protect the privacy of users and withstand possible attacks. This work develops a novel temporal credential-based authenticated key agreement scheme for WSNs using extended chaotic maps, in which operations are more efficient than modular exponential computations and scalar multiplications on an elliptic curve. The proposed scheme not only provides higher security and efficiency than related schemes, but also resolves their weaknesses. PMID:26121612

  6. Efficient and Secure Temporal Credential-Based Authenticated Key Agreement Using Extended Chaotic Maps for Wireless Sensor Networks.

    PubMed

    Lee, Tian-Fu

    2015-01-01

    A secure temporal credential-based authenticated key agreement scheme for Wireless Sensor Networks (WSNs) enables a user, a sensor node and a gateway node to realize mutual authentication using temporal credentials. The user and the sensor node then negotiate a common secret key with the help of the gateway node, and establish a secure and authenticated channel using this common secret key. To increase efficiency, recent temporal credential-based authenticated key agreement schemes for WSNs have been designed to involve few computational operations, such as hash and exclusive-or operations. However, these schemes cannot protect the privacy of users and withstand possible attacks. This work develops a novel temporal credential-based authenticated key agreement scheme for WSNs using extended chaotic maps, in which operations are more efficient than modular exponential computations and scalar multiplications on an elliptic curve. The proposed scheme not only provides higher security and efficiency than related schemes, but also resolves their weaknesses. PMID:26121612

  7. A Unique Approach to Dissemination of Evidence-Based Protocols: A Successful CAUTI Reduction Pilot.

    PubMed

    Dols, Jean Dowling; White, Sondra K; Timmons, Amy L; Bush, Michelle; Tripp, Joanne; Childers, Amanda Kay; Mathers, Nicholas; Tobias, Maria M

    2016-01-01

    A unique approach to disseminate an evidence-based protocol for urinary catheter management was led by a staff-driven catheter-associated urinary tract infection (CAUTI) reduction team in one hospital. The nurseeducators, faculty from a local university, and the facility's clinical nurse leader mentored the team. As an approachto reduce CAUTIs in the transplant care and intensive care units, the team developed an interdisciplinary CAUTIEducation Fair, which provided a safe, nonthreateningenvironment to unlearn prior behaviors and showcompetency in new evidence-based ones. PMID:26797307

  8. Performance Analysis of AODV Routing Protocol for Wireless Sensor Network based Smart Metering

    NASA Astrophysics Data System (ADS)

    >Hasan Farooq, Low Tang Jung,

    2013-06-01

    Today no one can deny the need for Smart Grid and it is being considered as of utmost importance to upgrade outdated electric infrastructure to cope with the ever increasing electric load demand. Wireless Sensor Network (WSN) is considered a promising candidate for internetworking of smart meters with the gateway using mesh topology. This paper investigates the performance of AODV routing protocol for WSN based smart metering deployment. Three case studies are presented to analyze its performance based on four metrics of (i) Packet Delivery Ratio, (ii) Average Energy Consumption of Nodes (iii) Average End-End Delay and (iv) Normalized Routing Load.

  9. Security Analysis of DTN Architecture and Bundle Protocol Specification for Space-Based Networks

    NASA Technical Reports Server (NTRS)

    Ivancic, William D.

    2009-01-01

    A Delay-Tolerant Network (DTN) Architecture (Request for Comment, RFC-4838) and Bundle Protocol Specification, RFC-5050, have been proposed for space and terrestrial networks. Additional security specifications have been provided via the Bundle Security Specification (currently a work in progress as an Internet Research Task Force internet-draft) and, for link-layer protocols applicable to Space networks, the Licklider Transport Protocol Security Extensions. This document provides a security analysis of the current DTN RFCs and proposed security related internet drafts with a focus on space-based communication networks, which is a rather restricted subset of DTN networks. Note, the original focus and motivation of DTN work was for the Interplanetary Internet . This document does not address general store-and-forward network overlays, just the current work being done by the Internet Research Task Force (IRTF) and the Consultative Committee for Space Data Systems (CCSDS) Space Internetworking Services Area (SIS) - DTN working group under the DTN and Bundle umbrellas. However, much of the analysis is relevant to general store-and-forward overlays.

  10. Design and Performance Evaluation of a Distributed OFDMA-Based MAC Protocol for MANETs

    PubMed Central

    Chung, Jiyoung; Lee, Hyungyu; Lee, Jung-Ryun

    2014-01-01

    In this paper, we propose a distributed MAC protocol for OFDMA-based wireless mobile ad hoc multihop networks, in which the resource reservation and data transmission procedures are operated in a distributed manner. A frame format is designed considering the characteristics of OFDMA that each node can transmit or receive data to or from multiple nodes simultaneously. Under this frame structure, we propose a distributed resource management method including network state estimation and resource reservation processes. We categorize five types of logical errors according to their root causes and show that two of the logical errors are inevitable while three of them are avoided under the proposed distributed MAC protocol. In addition, we provide a systematic method to determine the advertisement period of each node by presenting a clear relation between the accuracy of estimated network states and the signaling overhead. We evaluate the performance of the proposed protocol in respect of the reservation success rate and the success rate of data transmission. Since our method focuses on avoiding logical errors, it could be easily placed on top of the other resource allocation methods focusing on the physical layer issues of the resource management problem and interworked with them. PMID:25133254

  11. Performance of a quantum teleportation protocol based on collective spontaneous emission

    SciTech Connect

    Wagner, Richard Jr.; Clemens, James P.

    2009-03-15

    Recently a conditional quantum teleportation protocol has been proposed by Chen et al. [New J. Phys. 7, 172 (2005)], which is based on the collective spontaneous emission of a photon from a pair of quantum dots. We formulate a similar protocol for collective emission from a pair of atoms, one of which is entangled with a single mode of an optical cavity. We focus on the performance of the protocol as characterized by the fidelity of the teleported state and the overall success probability. We consider a strategy employing spatially resolved photodetection of the emitted photon in order to distinguish superradiant from subradiant emission on the basis of a single detected photon. We find that fidelity approaches unity as the spacing of the atoms becomes much smaller than the emission wavelength with a success probability of 0.25. The fidelity remains above the classical limit of 2/3 for arbitrary atomic separations with the ultimate limit of performance coming from the spatial resolution of the detectors.

  12. Design and performance evaluation of a distributed OFDMA-based MAC protocol for MANETs.

    PubMed

    Park, Jaesung; Chung, Jiyoung; Lee, Hyungyu; Lee, Jung-Ryun

    2014-01-01

    In this paper, we propose a distributed MAC protocol for OFDMA-based wireless mobile ad hoc multihop networks, in which the resource reservation and data transmission procedures are operated in a distributed manner. A frame format is designed considering the characteristics of OFDMA that each node can transmit or receive data to or from multiple nodes simultaneously. Under this frame structure, we propose a distributed resource management method including network state estimation and resource reservation processes. We categorize five types of logical errors according to their root causes and show that two of the logical errors are inevitable while three of them are avoided under the proposed distributed MAC protocol. In addition, we provide a systematic method to determine the advertisement period of each node by presenting a clear relation between the accuracy of estimated network states and the signaling overhead. We evaluate the performance of the proposed protocol in respect of the reservation success rate and the success rate of data transmission. Since our method focuses on avoiding logical errors, it could be easily placed on top of the other resource allocation methods focusing on the physical layer issues of the resource management problem and interworked with them.

  13. An Authentication Protocol for Mobile IPTV Users Based on an RFID-USB Convergence Technique

    NASA Astrophysics Data System (ADS)

    Jeong, Yoon-Su; Kim, Yong-Tae

    With the growing trend towards convergence in broadcast and communications media, Internet Protocol television (IPTV) that delivers real-time multimedia content over diverse types of communications networks (e.g., broadband Internet, cable TV, and satellite TV) has become a mainstream technology. Authenticating mobile IPTV subscribers who are continuously on the move is a challenge. A complex authentication process often impairs conditional access security or service quality as increasing illegal users and delaying service. This paper proposes an RFID-USB authentication protocol, for mobile IPTV users, combined with USIM-based personalized authentication and lightweight authentication that utilizes the RFID-USB technology with an implanted agent module (called an "agent tag") which temporarily enhanced user status information. The proposed authentication protocol adopts a plug-and-play security agent module that is placed in both an RFID tag and an RFID-USB. The implanted security agents cooperate in such a way that multiple RFID tags are connected seamlessly to an RFID-USB.

  14. Testing a Theory-Based Mobility Monitoring Protocol Using In-Home Sensors: A Feasibility Study

    PubMed Central

    Reeder, Blaine; Chung, Jane; Lazar, Amanda; Joe, Jonathan; Demiris, George; Thompson, Hilaire J.

    2014-01-01

    Mobility is a key factor in the performance of many everyday tasks required for independent living as a person grows older. The purpose of this mixed methods study was to test a theory-based mobility monitoring protocol by comparing sensor-based measures to self-report measures of mobility and assessing the acceptability of in-home sensors with older adults. Standardized instruments to measure physical, psychosocial and cognitive parameters were administered to 8 community-dwelling older adults at baseline, 3 month and 6 month visits (examples: FES, GDS-SF, Mini-cog). Semi-structured interviews to characterize acceptability of the technology were conducted at 3 month and 6 month visits. Technical issues prevented comparison of sensor-based measures with self-report measures. In-home sensor technology for monitoring mobility is acceptable to older adults. Implementing our theory-based mobility monitoring protocol in a field study in the homes of older adults is a feasible undertaking but requires more robust technology for sensor-based measure validation. PMID:23938159

  15. Agreement among 2 x 2 Agreement Indices.

    ERIC Educational Resources Information Center

    Conger, Anthony J.; Ward, David G.

    1984-01-01

    Sixteen measures of reliability for two-category nominal scales are compared. Upon correcting for chance agreement, there are only five distinct indices: Fleiss's modification of A-sub-1, the phi coefficient, Cohen's kappa, and two intraclass coefficients. Recommendations for choosing an agreement index are made based on definitions, magnitude,…

  16. Developing an Anti-Xa-Based Anticoagulation Protocol for Patients with Percutaneous Ventricular Assist Devices.

    PubMed

    Sieg, Adam; Mardis, B Andrew; Mardis, Caitlin R; Huber, Michelle R; New, James P; Meadows, Holly B; Cook, Jennifer L; Toole, J Matthew; Uber, Walter E

    2015-01-01

    Because of the complexities associated with anticoagulation in temporary percutaneous ventricular assist device (pVAD) recipients, a lack of standardization exists in their management. This retrospective analysis evaluates current anticoagulation practices at a single center with the aim of identifying an optimal anticoagulation strategy and protocol. Patients were divided into two cohorts based on pVAD implanted (CentriMag (Thoratec; Pleasanton, CA) / TandemHeart (CardiacAssist; Pittsburgh, PA) or Impella (Abiomed, Danvers, MA)), with each group individually analyzed for bleeding and thrombotic complications. Patients in the CentriMag/TandemHeart cohort were subdivided based on the anticoagulation monitoring strategy (activated partial thromboplastin time (aPTT) or antifactor Xa unfractionated heparin (anti-Xa) values). In the CentriMag/TandemHeart cohort, there were five patients with anticoagulation titrated based on anti-Xa values; one patient developed a device thrombosis and a major bleed, whereas another patient experienced major bleeding. Eight patients received an Impella pVAD. Seven total major bleeds in three patients and no thrombotic events were detected. Based on distinct differences between the devices, anti-Xa values, and outcomes, two protocols were created to guide anticoagulation adjustments. However, anticoagulation in patients who require pVAD support is complex with constantly evolving anticoagulation goals. The ideal level of anticoagulation should be individually determined using several coagulation laboratory parameters in concert with hemodynamic changes in the patient's clinical status, the device, and the device cannulation.

  17. Developing an Anti-Xa-Based Anticoagulation Protocol for Patients with Percutaneous Ventricular Assist Devices.

    PubMed

    Sieg, Adam; Mardis, B Andrew; Mardis, Caitlin R; Huber, Michelle R; New, James P; Meadows, Holly B; Cook, Jennifer L; Toole, J Matthew; Uber, Walter E

    2015-01-01

    Because of the complexities associated with anticoagulation in temporary percutaneous ventricular assist device (pVAD) recipients, a lack of standardization exists in their management. This retrospective analysis evaluates current anticoagulation practices at a single center with the aim of identifying an optimal anticoagulation strategy and protocol. Patients were divided into two cohorts based on pVAD implanted (CentriMag (Thoratec; Pleasanton, CA) / TandemHeart (CardiacAssist; Pittsburgh, PA) or Impella (Abiomed, Danvers, MA)), with each group individually analyzed for bleeding and thrombotic complications. Patients in the CentriMag/TandemHeart cohort were subdivided based on the anticoagulation monitoring strategy (activated partial thromboplastin time (aPTT) or antifactor Xa unfractionated heparin (anti-Xa) values). In the CentriMag/TandemHeart cohort, there were five patients with anticoagulation titrated based on anti-Xa values; one patient developed a device thrombosis and a major bleed, whereas another patient experienced major bleeding. Eight patients received an Impella pVAD. Seven total major bleeds in three patients and no thrombotic events were detected. Based on distinct differences between the devices, anti-Xa values, and outcomes, two protocols were created to guide anticoagulation adjustments. However, anticoagulation in patients who require pVAD support is complex with constantly evolving anticoagulation goals. The ideal level of anticoagulation should be individually determined using several coagulation laboratory parameters in concert with hemodynamic changes in the patient's clinical status, the device, and the device cannulation. PMID:26273933

  18. Are RIASEC Interests Traits? Evidence Based on Self-Other Agreement

    ERIC Educational Resources Information Center

    Nauta, Margaret M.

    2012-01-01

    Two studies examined the conceptualization of career interests as traits using self-other agreement data. Study 1 participants were 114 college student-friend dyads, and Study 2 participants were 93 student-parent dyads. In each study, students provided interest (using Holland's realistic, investigative, artistic, social, enterprising, and…

  19. Integrating human impacts and ecological integrity into a risk-based protocol for conservation planning

    USGS Publications Warehouse

    Mattson, K.M.; Angermeier, P.L.

    2007-01-01

    Conservation planning aims to protect biodiversity by sustainng the natural physical, chemical, and biological processes within representative ecosystems. Often data to measure these components are inadequate or unavailable. The impact of human activities on ecosystem processes complicates integrity assessments and might alter ecosystem organization at multiple spatial scales. Freshwater conservation targets, such as populations and communities, are influenced by both intrinsic aquatic properties and the surrounding landscape, and locally collected data might not accurately reflect potential impacts. We suggest that changes in five major biotic drivers-energy sources, physical habitat, flow regime, water quality, and biotic interactions-might be used as surrogates to inform conservation planners of the ecological integrity of freshwater ecosystems. Threats to freshwater systems might be evaluated based on their impact to these drivers to provide an overview of potential risk to conservation targets. We developed a risk-based protocol, the Ecological Risk Index (ERI), to identify watersheds with least/most risk to conservation targets. Our protocol combines risk-based components, specifically the frequency and severity of human-induced stressors, with biotic drivers and mappable land- and water-use data to provide a summary of relative risk to watersheds. We illustrate application of our protocol with a case study of the upper Tennessee River basin, USA. Differences in risk patterns among the major drainages in the basin reflect dominant land uses, such as mining and agriculture. A principal components analysis showed that localized, moderately severe threats accounted for most of the threat composition differences among our watersheds. We also found that the relative importance of threats is sensitive to the spatial grain of the analysis. Our case study demonstrates that the ERI is useful for evaluating the frequency and severity of ecosystemwide risk, which can

  20. Coping with Pain in the Motivational Context of Values: Comparison between an Acceptance-Based and a Cognitive Control-Based Protocol

    ERIC Educational Resources Information Center

    Paez-Blarrina, Marisa; Luciano, Carmen; Gutierrez-Martinez, Olga; Valdivia, Sonsoles; Rodriguez-Valverde, Miguel; Ortega, Jose

    2008-01-01

    This study compares the effect of an acceptance-based protocol (ACT) and a cognitive control-based (CONT) protocol on three measures of pain coping: tolerance, self-report, and believability. Specific methodological controls were employed to further isolate the role of the value of participating in a pain task, compared to previous investigations…

  1. 17 CFR 240.3a69-3 - Books and records requirements for security-based swap agreements.

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ... 17 Commodity and Securities Exchanges 4 2014-04-01 2014-04-01 false Books and records requirements... § 240.3a69-3 Books and records requirements for security-based swap agreements. (a) A person registered... and regulations thereunder: (1) Shall not be required to keep and maintain additional books...

  2. 17 CFR 240.3a69-3 - Books and records requirements for security-based swap agreements.

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ... 17 Commodity and Securities Exchanges 3 2013-04-01 2013-04-01 false Books and records requirements... § 240.3a69-3 Books and records requirements for security-based swap agreements. (a) A person registered... and regulations thereunder: (1) Shall not be required to keep and maintain additional books...

  3. Lightweight ECC based RFID authentication integrated with an ID verifier transfer protocol.

    PubMed

    He, Debiao; Kumar, Neeraj; Chilamkurti, Naveen; Lee, Jong-Hyouk

    2014-10-01

    The radio frequency identification (RFID) technology has been widely adopted and being deployed as a dominant identification technology in a health care domain such as medical information authentication, patient tracking, blood transfusion medicine, etc. With more and more stringent security and privacy requirements to RFID based authentication schemes, elliptic curve cryptography (ECC) based RFID authentication schemes have been proposed to meet the requirements. However, many recently published ECC based RFID authentication schemes have serious security weaknesses. In this paper, we propose a new ECC based RFID authentication integrated with an ID verifier transfer protocol that overcomes the weaknesses of the existing schemes. A comprehensive security analysis has been conducted to show strong security properties that are provided from the proposed authentication scheme. Moreover, the performance of the proposed authentication scheme is analyzed in terms of computational cost, communicational cost, and storage requirement.

  4. An ICT-Based Platform to Monitor Protocols in the Healthcare Environment.

    PubMed

    Rorís, Víctor M Alonso; Gago, Juan M Santos; Sabucedo, Luis Álvarez; Merino, Mateo Ramos; Valero, Javier Sanz

    2016-10-01

    Procedures from the healthcare domain involve highly critical actions as they may pose a risk for patients' life. Therefore, a large effort is devoted to the standardization in clinical praxis and to the control of quality for these protocols in order to minimize hazards. In this line, this work is compelled to provide an ICT-based support to carry out these controls in a simple and effective manner. Using a methodology based on HACCP and taking advantage of Semantic tools, a holistic platform of services for traceability and control of processes has been designed and implemented. The applied paradigm is based on the use of Control Points as singular points to generate traces using observations and measures relevant for the processes considered. Based on those, it is possible to offer services for advanced querying and knowledge inference. The local deployment just requires regular mobile phones or tablets making this solution cost-effective and easily replicable. PMID:27624494

  5. Research on an E-mail Encryption Protocol Based on Quantum Teleportation

    NASA Astrophysics Data System (ADS)

    Shufen, Xiao; Yumin, Dong; Hongyang, Ma; Libo, Chen

    2016-07-01

    With the rapid development of information technology (IT), E-mail has become an important communication tool between human beings. Meanwhile, E-mail safety becomes increasingly important because of its universal applications. In order to overcome shortages of classical E-mail encryption, an E-mail encryption protocol based on quantum teleportation was proposed. It makes quantum encryption of E-mails during sending and receiving processes by taking advantages of entanglement and nonclonability of quantum, thus ensuring safety and reliability of E-mail transmission.

  6. Injury of the Internal Carotid Artery During Endoscopic Skull Base Surgery: Prevention and Management Protocol.

    PubMed

    AlQahtani, AbdulAziz; Castelnuovo, Paolo; Nicolai, Piero; Prevedello, Daniel M; Locatelli, Davide; Carrau, Ricardo L

    2016-02-01

    Injury of the internal carotid artery during endoscopic endonasal skull base surgery is a feared and perilous scenario. This article discusses perioperative strategies to prevent or manage an internal carotid artery injury to optimize outcomes. Meticulous preoperative planning is crucial in preventing its occurrence and minimizing its consequences. An effective plan of action relies on a well-prepared protocol, availability of proper instruments and devices, and an experienced multidisciplinary team. Intraoperative control of hemorrhage and stabilization of the patient's cardiovascular status is followed by an angiography and endovascular treatment whenever possible. Close clinical and radiologic monitoring of the patient prevents early and late complications.

  7. A hybrid path-oriented code assignment CDMA-based MAC protocol for underwater acoustic sensor networks.

    PubMed

    Chen, Huifang; Fan, Guangyu; Xie, Lei; Cui, Jun-Hong

    2013-11-04

    Due to the characteristics of underwater acoustic channel, media access control (MAC) protocols designed for underwater acoustic sensor networks (UWASNs) are quite different from those for terrestrial wireless sensor networks. Moreover, in a sink-oriented network with event information generation in a sensor field and message forwarding to the sink hop-by-hop, the sensors near the sink have to transmit more packets than those far from the sink, and then a funneling effect occurs, which leads to packet congestion, collisions and losses, especially in UWASNs with long propagation delays. An improved CDMA-based MAC protocol, named path-oriented code assignment (POCA) CDMA MAC (POCA-CDMA-MAC), is proposed for UWASNs in this paper. In the proposed MAC protocol, both the round-robin method and CDMA technology are adopted to make the sink receive packets from multiple paths simultaneously. Since the number of paths for information gathering is much less than that of nodes, the length of the spreading code used in the POCA-CDMA-MAC protocol is shorter greatly than that used in the CDMA-based protocols with transmitter-oriented code assignment (TOCA) or receiver-oriented code assignment (ROCA). Simulation results show that the proposed POCA-CDMA-MAC protocol achieves a higher network throughput and a lower end-to-end delay compared to other CDMA-based MAC protocols.

  8. Modeling and Simulation of a Novel Relay Node Based Secure Routing Protocol Using Multiple Mobile Sink for Wireless Sensor Networks

    PubMed Central

    Perumal, Madhumathy; Dhandapani, Sivakumar

    2015-01-01

    Data gathering and optimal path selection for wireless sensor networks (WSN) using existing protocols result in collision. Increase in collision further increases the possibility of packet drop. Thus there is a necessity to eliminate collision during data aggregation. Increasing the efficiency is the need of the hour with maximum security. This paper is an effort to come up with a reliable and energy efficient WSN routing and secure protocol with minimum delay. This technique is named as relay node based secure routing protocol for multiple mobile sink (RSRPMS). This protocol finds the rendezvous point for optimal transmission of data using a “splitting tree” technique in tree-shaped network topology and then to determine all the subsequent positions of a sink the “Biased Random Walk” model is used. In case of an event, the sink gathers the data from all sources, when they are in the sensing range of rendezvous point. Otherwise relay node is selected from its neighbor to transfer packets from rendezvous point to sink. A symmetric key cryptography is used for secure transmission. The proposed relay node based secure routing protocol for multiple mobile sink (RSRPMS) is experimented and simulation results are compared with Intelligent Agent-Based Routing (IAR) protocol to prove that there is increase in the network lifetime compared with other routing protocols. PMID:26495426

  9. Modeling and Simulation of a Novel Relay Node Based Secure Routing Protocol Using Multiple Mobile Sink for Wireless Sensor Networks.

    PubMed

    Perumal, Madhumathy; Dhandapani, Sivakumar

    2015-01-01

    Data gathering and optimal path selection for wireless sensor networks (WSN) using existing protocols result in collision. Increase in collision further increases the possibility of packet drop. Thus there is a necessity to eliminate collision during data aggregation. Increasing the efficiency is the need of the hour with maximum security. This paper is an effort to come up with a reliable and energy efficient WSN routing and secure protocol with minimum delay. This technique is named as relay node based secure routing protocol for multiple mobile sink (RSRPMS). This protocol finds the rendezvous point for optimal transmission of data using a "splitting tree" technique in tree-shaped network topology and then to determine all the subsequent positions of a sink the "Biased Random Walk" model is used. In case of an event, the sink gathers the data from all sources, when they are in the sensing range of rendezvous point. Otherwise relay node is selected from its neighbor to transfer packets from rendezvous point to sink. A symmetric key cryptography is used for secure transmission. The proposed relay node based secure routing protocol for multiple mobile sink (RSRPMS) is experimented and simulation results are compared with Intelligent Agent-Based Routing (IAR) protocol to prove that there is increase in the network lifetime compared with other routing protocols. PMID:26495426

  10. A Hybrid Path-Oriented Code Assignment CDMA-Based MAC Protocol for Underwater Acoustic Sensor Networks

    PubMed Central

    Chen, Huifang; Fan, Guangyu; Xie, Lei; Cui, Jun-Hong

    2013-01-01

    Due to the characteristics of underwater acoustic channel, media access control (MAC) protocols designed for underwater acoustic sensor networks (UWASNs) are quite different from those for terrestrial wireless sensor networks. Moreover, in a sink-oriented network with event information generation in a sensor field and message forwarding to the sink hop-by-hop, the sensors near the sink have to transmit more packets than those far from the sink, and then a funneling effect occurs, which leads to packet congestion, collisions and losses, especially in UWASNs with long propagation delays. An improved CDMA-based MAC protocol, named path-oriented code assignment (POCA) CDMA MAC (POCA-CDMA-MAC), is proposed for UWASNs in this paper. In the proposed MAC protocol, both the round-robin method and CDMA technology are adopted to make the sink receive packets from multiple paths simultaneously. Since the number of paths for information gathering is much less than that of nodes, the length of the spreading code used in the POCA-CDMA-MAC protocol is shorter greatly than that used in the CDMA-based protocols with transmitter-oriented code assignment (TOCA) or receiver-oriented code assignment (ROCA). Simulation results show that the proposed POCA-CDMA-MAC protocol achieves a higher network throughput and a lower end-to-end delay compared to other CDMA-based MAC protocols. PMID:24193100

  11. A game theory-based obstacle avoidance routing protocol for wireless sensor networks.

    PubMed

    Guan, Xin; Wu, Huayang; Bi, Shujun

    2011-01-01

    The obstacle avoidance problem in geographic forwarding is an important issue for location-based routing in wireless sensor networks. The presence of an obstacle leads to several geographic routing problems such as excessive energy consumption and data congestion. Obstacles are hard to avoid in realistic environments. To bypass obstacles, most routing protocols tend to forward packets along the obstacle boundaries. This leads to a situation where the nodes at the boundaries exhaust their energy rapidly and the obstacle area is diffused. In this paper, we introduce a novel routing algorithm to solve the obstacle problem in wireless sensor networks based on a game-theory model. Our algorithm forms a concave region that cannot forward packets to achieve the aim of improving the transmission success rate and decreasing packet transmission delays. We consider the residual energy, out-degree and forwarding angle to determine the forwarding probability and payoff function of forwarding candidates. This achieves the aim of load balance and reduces network energy consumption. Simulation results show that based on the average delivery delay, energy consumption and packet delivery ratio performances our protocol is superior to other traditional schemes.

  12. Upper-Extremity Transplantation Using a Cell-Based Protocol to Minimize Immunosuppression

    PubMed Central

    Schneeberger, Stefan; Gorantla, Vijay S.; Brandacher, Gerald; Zeevi, Adriana; Demetris, Anthony J.; Lunz, John G.; Metes, Diana M.; Donnenberg, Albert D.; Shores, Jaimie T.; Dimartini, Andrea F.; Kiss, Joseph E.; Imbriglia, Joseph E.; Azari, Kodi; Goitz, Robert J.; Manders, Ernest K.; Nguyen, Vu T.; Cooney, Damon S.; Wachtman, Galen S.; Keith, Jonathan D.; Fletcher, Derek R.; Macedo, Camila; Planinsic, Raymond; Losee, Joseph E.; Shapiro, Ron; Starzl, Thomas E.; Andrew Lee, W. P.

    2014-01-01

    Objective To minimize maintenance immunosuppression in upper-extremity transplantation to favor the risk-benefit balance of this procedure. Background Despite favorable outcomes, broad clinical application of reconstructive transplantation is limited by the risks and side effects of multidrug immunosuppression. We present our experience with upper-extremity transplantation under a novel, donor bone marrow (BM) cell-based treatment protocol (“Pittsburgh protocol”). Methods Between March 2009 and September 2010, 5 patients received a bilateral hand (n = 2), a bilateral hand/forearm (n = 1), or a unilateral (n = 2) hand transplant. Patients were treated with alemtuzumab and methylprednisolone for induction, followed by tacrolimus monotherapy. On day 14, patients received an infusion of donor BM cells isolated from 9 vertebral bodies. Comprehensive follow-up included functional evaluation, imaging, and immunomonitoring. Results All patients are maintained on tacrolimus monotherapy with trough levels ranging between 4 and 12 ng/mL. Skin rejections were infrequent and reversible. Patients demonstrated sustained improvements in motor function and sensory return correlating with time after transplantation and level of amputation. Side effects included transient increase in serum creatinine, hyperglycemia managed with oral hypoglycemics, minor wound infection, and hyperuricemia but no infections. Immunomonitoring revealed transient moderate levels of donor-specific antibodies, adequate immunocompetence, and no peripheral blood chimerism. Imaging demonstrated patent vessels with only mild luminal narrowing/occlusion in 1 case. Protocol skin biopsies showed absent or minimal perivascular cellular infiltrates. Conclusions Our data suggest that this BM cell-based treatment protocol is safe, is well tolerated, and allows upper-extremity transplantation using low-dose tacrolimus monotherapy. PMID:23001085

  13. Towards a protocol for validating satellite-based Land Surface Temperature: Theoretical considerations

    NASA Astrophysics Data System (ADS)

    Schneider, Philipp; Ghent, Darren J.; Corlett, Gary C.; Prata, Fred; Remedios, John J.

    2013-04-01

    Land Surface Temperature (LST) and emissivity are important parameters for environmental monitoring and earth system modelling. LST has been observed from space for several decades using a wide variety of satellite instruments with different characteristics, including both platforms in low-earth orbit and in geostationary orbit. This includes for example the series of Advanced Very High Resolution Radiometers (AVHRR) delivering a continuous thermal infrared (TIR) data stream since the early 1980s, the series of Along-Track Scanning Radiometers (ATSR) providing TIR data since 1991, and the Moderate Resolution Imaging Spectroradiometer (MODIS) instruments onboard NASA's Terra and Aqua platforms, providing data since the year 2000. In addition, the Spinning Enhanced Visible and Infrared Imager (SEVIRI) onboard of the geostationary Meteosat satellites is now providing LST at unprecedented sub-hour frequency. The data record provided by such instruments is extremely valuable for a wide variety of applications, including climate change, land/atmosphere feedbacks, fire monitoring, modelling, land cover change, geology, crop- and water management. All of these applications, however, require a rigorous validation of the data in order to assess the product quality and the associated uncertainty. Here we report on recent work towards developing a protocol for validation of satellite-based Land Surface Temperature products. Four main validation categories are distinguished within the protocol: A) Comparison with in situ observations, B) Radiance-based validation, C) Inter-comparison with similar LST products, and D) Time-series analysis. Each category is further subdivided into several quality classes, which approximately reflect the validation accuracy that can be achieved by the different approaches, as well as the complexity involved with each method. Advice on best practices is given for methodology common to all categories. For each validation category, recommendations

  14. Agreement between task-based estimates of the full-shift noise exposure and the full-shift noise dosimetry.

    PubMed

    Virji, M Abbas; Woskie, Susan R; Waters, Martha; Brueck, Scott; Stancescu, Daniel; Gore, Rebecca; Estill, Cheryl; Prince, Mary

    2009-04-01

    Noise assessments have been conducted using full-shift dosimetry and short-term task-based measurements. Advantages of the task-based method include the opportunity to directly identify high-noise exposure tasks and to target control measures, as well as obtain estimates of task-based full-shift exposures; however, there is little empirical evidence comparing the two methods. National Institute for Occupational Safety and Health assessed noise exposures at three industrial facilities using dosimetry and task-based methods with the objective of comparing the two strategies and assessing the degree of agreement and causes of disagreement. Eight indices of task-based full-shift exposures were created from task-based sampling using three methods to assess time-at-task (direct observation by industrial hygienist, end-of-shift worker estimates and supervisor estimates) and three methods to assign noise levels to tasks [direct measurement, arithmetic mean (AM) and geometric mean (GM)]. We assessed aspects of agreement (precision, bias and absolute agreement) using Bland-Altman plots and concordance correlation coefficient (CCC). Overall, the task-based methods worked fairly well, with mean biases less than +/-2.8 dBA and precision ranges of 3.3-4.4 dBA. By all measures, task-based full-shift estimates based on supervisor assessment of time-at-task agreed most poorly with the dosimetry data. The task-based full-shift estimates based on worker estimates of time-at-task generally agreed as well as those based on direct observation. For task noise level, task-based full-shift estimates based on directly measured task agreed the best with dosimetry data, while agreement for task-based indices based on task AM or GM was variable. Overall, the task-based full-shift estimates based on direct observation task and direct measured task noise level achieved the best agreement with the dosimetry data (CCC 0.84) with 95% of their differences being within 7.4 dBA and 56% of the

  15. A Frame-based Representation for a Bedside Ventilator Weaning Protocol

    PubMed Central

    Sorenson, D; Grissom, CK; Carpenter, L; Austin, A; Sward, K; Napoli, L; Warner, HR; Morris, AH

    2016-01-01

    We describe the use of a frame-based knowledge representation to construct an adequately-explicit bedside clinical decision support application for ventilator weaning. The application consists of a data entry form, a knowledge base, an inference engine, and a patient database. The knowledge base contains database queries, a data dictionary, and decision frames. A frame consists of a title, a list of findings necessary to make a decision or carry out an action, and a logic or mathematical statement to determine its output. Frames for knowledge representation are advantageous because they can be created, visualized, and conceptualized as self-contained entities that correspond to accepted medical constructs. They facilitate knowledge engineering and provide understandable explanations of protocol outputs for clinicians. Our frames are elements of a hierarchical decision process. In addition to running diagnostic and therapeutic logic, frames can run database queries, make changes to the user interface, and modify computer variables. PMID:18358789

  16. Individualized music for dementia: Evolution and application of evidence-based protocol

    PubMed Central

    Gerdner, Linda A

    2012-01-01

    The theory-based intervention of individualized music has been evaluated clinically and empirically leading to advancement and refinement of an evidence-based protocol, currently in its 5th edition. An expanded version of the protocol was written for professional health care providers with a consumer version tailored for family caregivers. The underlying mid-range theory is presented along with a seminal study that was followed by further research in the United States, Canada, Great Britain, France, Sweden, Norway, Japan and Taiwan. Key studies are summarized. Given its efficacy when implemented by research staff, studies have advanced to testing the intervention under real-life conditions when implemented and evaluated by trained nursing assistants in long-term care facilities and visiting family members. In addition, one study evaluated the implementation of music by family members in the home setting. Initial research focused on agitation as the dependent variable with subsequent research indicating a more holistic response such as positive affect, expressed satisfaction, and meaningful interaction with others. The article advances by describing on-line programs designed to train health care professionals in the assessment, implementation and evaluation of individualized music. In addition, Gerdner has written a story for a picture book intended for children and their families (in press). The story models principles of individualized music to elicit positive memories, reduce anxiety and agitation, and promote communication. The article concludes with implications for future research. PMID:24175165

  17. A high-speed multi-protocol quantum key distribution transmitter based on a dual-drive modulator.

    PubMed

    Korzh, Boris; Walenta, Nino; Houlmann, Raphael; Zbinden, Hugo

    2013-08-26

    We propose a novel source based on a dual-drive modulator that is adaptable and allows Alice to choose between various practical quantum key distribution (QKD) protocols depending on what receiver she is communicating with. Experimental results show that the proposed transmitter is suitable for implementation of the Bennett and Brassard 1984 (BB84), coherent one-way (COW) and differential phase shift (DPS) protocols with stable and low quantum bit error rate. This could become a useful component in network QKD, where multi-protocol capability is highly desirable. PMID:24105505

  18. Outcome based on treatment protocol in patients with primary canine immune-mediated thrombocytopenia: 46 cases (2000-2013).

    PubMed

    Scuderi, Margaret Ann; Snead, Elizabeth; Mehain, Susan; Waldner, Cheryl; Epp, Tasha

    2016-05-01

    This study investigated the relationship between treatment protocol, survival to discharge, and relapse in 46 dogs diagnosed with primary immune-mediated thrombocytopenia (ITP) at the Western College of Veterinary Medicine between 2000 and 2013. Treatment was at the discretion of the attending clinician and consisted of either a corticosteroid alone or a corticosteroid plus a secondary therapy. There was no association between survival to discharge and treatment protocol (P = 0.23). Of the surviving in-patients, 39% experienced a relapse. Our study failed to show a significant difference in survival and relapse based on treatment protocol.

  19. A universal TaqMan-based RT-PCR protocol for cost-efficient detection of small noncoding RNA

    PubMed Central

    Jung, Ulrike; Jiang, Xiaoou; Kaufmann, Stefan H.E.; Patzel, Volker

    2013-01-01

    Several methods for the detection of RNA have been developed over time. For small RNA detection, a stem–loop reverse primer-based protocol relying on TaqMan RT-PCR has been described. This protocol requires an individual specific TaqMan probe for each target RNA and, hence, is highly cost-intensive for experiments with small sample sizes or large numbers of different samples. We describe a universal TaqMan-based probe protocol which can be used to detect any target sequence and demonstrate its applicability for the detection of endogenous as well as artificial eukaryotic and bacterial small RNAs. While the specific and the universal probe-based protocol showed the same sensitivity, the absolute sensitivity of detection was found to be more than 100-fold lower for both than previously reported. In subsequent experiments, we found previously unknown limitations intrinsic to the method affecting its feasibility in determination of mature template RISC incorporation as well as in multiplexing. Both protocols were equally specific in discriminating between correct and incorrect small RNA targets or between mature miRNA and its unprocessed RNA precursor, indicating the stem–loop RT-primer, but not the TaqMan probe, triggers target specificity. The presented universal TaqMan-based RT-PCR protocol represents a cost-efficient method for the detection of small RNAs. PMID:24149841

  20. Poster — Thur Eve — 20: CTDI Measurements using a Radiochromic Film-based clinical protocol

    SciTech Connect

    Quintero, C.; Bekerat, H.; DeBlois, F.; Tomic, N.; Devic, S.; Seuntjens, J.

    2014-08-15

    The purpose of the study was evaluating accuracy and reproducibility of a radiochromic film-based protocol to measure computer tomography dose index (CTDI) as a part of annual QA on CT scanners and kV-CBCT systems attached to linear accelerators. Energy dependence of Gafchromic XR-QA2 ® film model was tested over imaging beam qualities (50 – 140 kVp). Film pieces were irradiated in air to known values of air-kerma (up to 10 cGy). Calibration curves for each beam quality were created (Film reflectance change Vs. Air-kerma in air). Film responses for same air-kerma values were compared. Film strips were placed into holes of a CTDI phantom and irradiated for several clinical scanning protocols. Film reflectance change was converted into dose to water and used to calculate CTDIvol values. Measured and tabulated CTDIvol values were compared. Average variations of ±5.2% in the mean film reflectance change were observed in the energy range of 80 to 140 keV, and 11.1% between 50 and 140 keV. Measured CTDI values were in average 10% lower than tabulated CTDI values for CT-simulators, and 44% higher for CBCT systems. Results presented a mean variation for the same machine and protocol of 2.6%. Variation of film response is within ±5% resulting in ±15% systematic error in dose estimation if a single calibration curve is used. Relatively large discrepancy between measured and tabulated CTDI values strongly support the trend towards replacing CTDI value with equilibrium dose measurement in the center of cylindrical phantom, as suggested by TG- 111.

  1. Library design and screening protocol for artificial metalloenzymes based on the biotin-streptavidin technology.

    PubMed

    Mallin, Hendrik; Hestericová, Martina; Reuter, Raphael; Ward, Thomas R

    2016-05-01

    Artificial metalloenzymes (ArMs) based on the incorporation of a biotinylated metal cofactor within streptavidin (Sav) combine attractive features of both homogeneous and enzymatic catalysts. To speed up their optimization, we present a streamlined protocol for the design, expression, partial purification and screening of Sav libraries. Twenty-eight positions have been subjected to mutagenesis to yield 335 Sav isoforms, which can be expressed in 24-deep-well plates using autoinduction medium. The resulting cell-free extracts (CFEs) typically contain >1 mg of soluble Sav. Two straightforward alternatives are presented, which allow the screening of ArMs using CFEs containing Sav. To produce an artificial transfer hydrogenase, Sav is coupled to a biotinylated three-legged iridium pianostool complex Cp*Ir(Biot-p-L)Cl (the cofactor). To screen Sav variants for this application, you would determine the number of free binding sites, treat them with diamide, incubate them with the cofactor and then perform the reaction with your test compound (the example used in this protocol is 1-phenyl-3,4-dihydroisoquinoline). This process takes 20 d. If you want to perform metathesis reactions, Sav is coupled to a biotinylated second-generation Grubbs-Hoveyda catalyst. In this application, it is best to first immobilize Sav on Sepharose-iminobiotin beads and then perform washing steps. Elution from the beads is achieved in an acidic reaction buffer before incubation with the cofactor. Catalysis using your test compound (in this protocol, 2-(4-(N,N-diallylsulfamoyl)phenyl)-N,N,N-trimethylethan-1-aminium iodide) is performed using the formed metalloenzyme. Screening using this approach takes 19 d. PMID:27031496

  2. Optimizing Equivalence-Based Instruction: Effects of Training Protocols on Equivalence Class Formation

    ERIC Educational Resources Information Center

    Fienup, Daniel M.; Wright, Nicole A.; Fields, Lanny

    2015-01-01

    Two experiments evaluated the effects of the simple-to-complex and simultaneous training protocols on the formation of academically relevant equivalence classes. The simple-to-complex protocol intersperses derived relations probes with training baseline relations. The simultaneous protocol conducts all training trials and test trials in separate…

  3. On the Supply Chain Management Supported by E-Commerce Service Platform for Agreement based Circulation of Fruits and Vegetables

    NASA Astrophysics Data System (ADS)

    Bao, Liwei; Huang, Yuchi; Ma, Zengjun; Zhang, Jie; Lv, Qingchu

    According to analysis of the supply chain process of agricultural products, the IT application requirements of the market entities participating in the agreement based circulation of fruits and vegetables have been discussed. The strategy of supply chain management basing on E-commerce service platform for fruits and vegetables has been proposed in this paper. The architecture and function composing of the service platform have been designed and implemented. The platform is constructed on a set of application service modules User can choose some of the application service modules and define them according to the business process. The application service modules chosen and defined by user are integrated as an application service package and applied as management information system of business process. With the E-commerce service platform, the supply chain management for agreement based circulation of agricultural products of vegetables and fruits can be implemented.

  4. Distance-to-Agreement Investigation of Tomotherapy's Bony Anatomy-Based Autoregistration and Planning Target Volume Contour-Based Optimization

    SciTech Connect

    Suh, Steve; Schultheiss, Timothy E.

    2013-03-01

    Purpose: To compare Tomotherapy's megavoltage computed tomography bony anatomy autoregistration with the best achievable registration, assuming no deformation and perfect knowledge of planning target volume (PTV) location. Methods and Materials: Distance-to-agreement (DTA) of the PTV was determined by applying a rigid-body shift to the PTV region of interest of the prostate from its reference position, assuming no deformations. Planning target volume region of interest of the prostate was extracted from the patient archives. The reference position was set by the 6 degrees of freedom (dof)—x, y, z, roll, pitch, and yaw—optimization results from the previous study at this institution. The DTA and the compensating parameters were calculated by the shift of the PTV from the reference 6-dof to the 4-dof—x, y, z, and roll—optimization. In this study, the effectiveness of Tomotherapy's 4-dof bony anatomy–based autoregistration was compared with the idealized 4-dof PTV contour-based optimization. Results: The maximum DTA (maxDTA) of the bony anatomy-based autoregistration was 3.2 ± 1.9 mm, with the maximum value of 8.0 mm. The maxDTA of the contour-based optimization was 1.8 ± 1.3 mm, with the maximum value of 5.7 mm. Comparison of Pearson correlation of the compensating parameters between the 2 4-dof optimization algorithms shows that there is a small but statistically significant correlation in y and z (0.236 and 0.300, respectively), whereas there is very weak correlation in x and roll (0.062 and 0.025, respectively). Conclusions: We find that there is an average improvement of approximately 1 mm in terms of maxDTA on the PTV going from 4-dof bony anatomy-based autoregistration to the 4-dof contour-based optimization. Pearson correlation analysis of the 2 4-dof optimizations suggests that uncertainties due to deformation and inadequate resolution account for much of the compensating parameters, but pitch variation also makes a statistically significant

  5. Assessment of individual agreements with repeated measurements based on generalized confidence intervals.

    PubMed

    Quiroz, Jorge; Burdick, Richard K

    2009-01-01

    Individual agreement between two measurement systems is determined using the total deviation index (TDI) or the coverage probability (CP) criteria as proposed by Lin (2000) and Lin et al. (2002). We used a variance component model as proposed by Choudhary (2007). Using the bootstrap approach, Choudhary (2007), and generalized confidence intervals, we construct bounds on TDI and CP. A simulation study was conducted to assess whether the bounds maintain the stated type I error probability of the test. We also present a computational example to demonstrate the statistical methods described in the paper.

  6. Quantum Chemical-Based Protocol for the Rational Design of Covalent Inhibitors.

    PubMed

    Schirmeister, Tanja; Kesselring, Jochen; Jung, Sascha; Schneider, Thomas H; Weickert, Anastasia; Becker, Johannes; Lee, Wook; Bamberger, Denise; Wich, Peter R; Distler, Ute; Tenzer, Stefan; Johé, Patrick; Hellmich, Ute A; Engels, Bernd

    2016-07-13

    We propose a structure-based protocol for the development of customized covalent inhibitors. Starting from a known inhibitor, in the first and second steps appropriate substituents of the warhead are selected on the basis of quantum mechanical (QM) computations and hybrid approaches combining QM with molecular mechanics (QM/MM). In the third step the recognition unit is optimized using docking approaches for the noncovalent complex. These predictions are finally verified by QM/MM or molecular dynamic simulations. The applicability of our approach is successfully demonstrated by the design of reversible covalent vinylsulfone-based inhibitors for rhodesain. The examples show that our approach is sufficiently accurate to identify compounds with the desired properties but also to exclude nonpromising ones.

  7. Improving the efficiency of single and multiple teleportation protocols based on the direct use of partially entangled states

    SciTech Connect

    Fortes, Raphael; Rigolin, Gustavo

    2013-09-15

    We push the limits of the direct use of partially pure entangled states to perform quantum teleportation by presenting several protocols in many different scenarios that achieve the optimal efficiency possible. We review and put in a single formalism the three major strategies known to date that allow one to use partially entangled states for direct quantum teleportation (no distillation strategies permitted) and compare their efficiencies in real world implementations. We show how one can improve the efficiency of many direct teleportation protocols by combining these techniques. We then develop new teleportation protocols employing multipartite partially entangled states. The three techniques are also used here in order to achieve the highest efficiency possible. Finally, we prove the upper bound for the optimal success rate for protocols based on partially entangled Bell states and show that some of the protocols here developed achieve such a bound. -- Highlights: •Optimal direct teleportation protocols using directly partially entangled states. •We put in a single formalism all strategies of direct teleportation. •We extend these techniques for multipartite partially entangle states. •We give upper bounds for the optimal efficiency of these protocols.

  8. IDMA: improving the defense against malicious attack for mobile ad hoc networks based on ARIP protocol

    NASA Astrophysics Data System (ADS)

    Peng, Chaorong; Chen, Chang Wen

    2008-04-01

    Malicious nodes are mounting increasingly sophisticated attacking operations on the Mobile Ad Hoc Networks (MANETs). This is mainly because the IP-based MANETs are vulnerable to attacks by various malicious nodes. However, the defense against malicious attack can be improved when a new layer of network architecture can be developed to separate true IP address from disclosing to the malicious nodes. In this paper, we propose a new algorithm to improve the defense against malicious attack (IDMA) that is based on a recently developed Assignment Router Identify Protocol (ARIP) for the clustering-based MANET management. In the ARIP protocol, we design the ARIP architecture based on the new Identity instead of the vulnerable IP addresses to provide the required security that is embedded seamlessly into the overall network architecture. We make full use of ARIP's special property to monitor gateway forward packets by Reply Request Route Packets (RREP) without additional intrusion detection layer. We name this new algorithm IDMA because of its inherent capability to improve the defense against malicious attacks. Through IDMA, a watching algorithm can be established so as to counterattack the malicious node in the routing path when it unusually drops up packets. We provide analysis examples for IDMA for the defense against a malicious node that disrupts the route discovery by impersonating the destination, or by responding with state of corrupted routing information, or by disseminating forged control traffic. The IDMA algorithm is able to counterattack the malicious node in the cases when the node lunch DoS attack by broadcast a large number of route requests, or make Target traffic congestion by delivering huge mount of data; or spoof the IP addresses and send forge packets with a fake ID to the same Target causing traffic congestion at that destination. We have implemented IDMA algorism using the GloMoSim simulator and have demonstrated its performance under a variety of

  9. Chaotic maps and biometrics-based anonymous three-party authenticated key exchange protocol without using passwords

    NASA Astrophysics Data System (ADS)

    Xie, Qi; Hu, Bin; Chen, Ke-Fei; Liu, Wen-Hao; Tan, Xiao

    2015-11-01

    In three-party password authenticated key exchange (AKE) protocol, since two users use their passwords to establish a secure session key over an insecure communication channel with the help of the trusted server, such a protocol may suffer the password guessing attacks and the server has to maintain the password table. To eliminate the shortages of password-based AKE protocol, very recently, according to chaotic maps, Lee et al. [2015 Nonlinear Dyn. 79 2485] proposed a first three-party-authenticated key exchange scheme without using passwords, and claimed its security by providing a well-organized BAN logic test. Unfortunately, their protocol cannot resist impersonation attack, which is demonstrated in the present paper. To overcome their security weakness, by using chaotic maps, we propose a biometrics-based anonymous three-party AKE protocol with the same advantages. Further, we use the pi calculus-based formal verification tool ProVerif to show that our AKE protocol achieves authentication, security and anonymity, and an acceptable efficiency. Project supported by the Natural Science Foundation of Zhejiang Province, China (Grant No. LZ12F02005), the Major State Basic Research Development Program of China (Grant No. 2013CB834205), and the National Natural Science Foundation of China (Grant No. 61070153).

  10. A routing protocol based on energy and link quality for Internet of Things applications.

    PubMed

    Machado, Kássio; Rosário, Denis; Cerqueira, Eduardo; Loureiro, Antonio A F; Neto, Augusto; Souza, José Neuman de

    2013-02-04

    The Internet of Things (IoT) is attracting considerable attention from the universities, industries, citizens and governments for applications, such as healthcare, environmental monitoring and smart buildings. IoT enables network connectivity between smart devices at all times, everywhere, and about everything. In this context, Wireless Sensor Networks (WSNs) play an important role in increasing the ubiquity of networks with smart devices that are low-cost and easy to deploy. However, sensor nodes are restricted in terms of energy, processing and memory. Additionally, low-power radios are very sensitive to noise, interference and multipath distortions. In this context, this article proposes a routing protocol based on Routing by Energy and Link quality (REL) for IoT applications. To increase reliability and energy-efficiency, REL selects routes on the basis of a proposed end-to-end link quality estimator mechanism, residual energy and hop count. Furthermore, REL proposes an event-driven mechanism to provide load balancing and avoid the premature energy depletion of nodes/networks. Performance evaluations were carried out using simulation and testbed experiments to show the impact and benefits of REL in small and large-scale networks. The results show that REL increases the network lifetime and services availability, as well as the quality of service of IoT applications. It also provides an even distribution of scarce network resources and reduces the packet loss rate, compared with the performance of well-known protocols.

  11. A routing protocol based on energy and link quality for Internet of Things applications.

    PubMed

    Machado, Kássio; Rosário, Denis; Cerqueira, Eduardo; Loureiro, Antonio A F; Neto, Augusto; Souza, José Neuman de

    2013-01-01

    The Internet of Things (IoT) is attracting considerable attention from the universities, industries, citizens and governments for applications, such as healthcare, environmental monitoring and smart buildings. IoT enables network connectivity between smart devices at all times, everywhere, and about everything. In this context, Wireless Sensor Networks (WSNs) play an important role in increasing the ubiquity of networks with smart devices that are low-cost and easy to deploy. However, sensor nodes are restricted in terms of energy, processing and memory. Additionally, low-power radios are very sensitive to noise, interference and multipath distortions. In this context, this article proposes a routing protocol based on Routing by Energy and Link quality (REL) for IoT applications. To increase reliability and energy-efficiency, REL selects routes on the basis of a proposed end-to-end link quality estimator mechanism, residual energy and hop count. Furthermore, REL proposes an event-driven mechanism to provide load balancing and avoid the premature energy depletion of nodes/networks. Performance evaluations were carried out using simulation and testbed experiments to show the impact and benefits of REL in small and large-scale networks. The results show that REL increases the network lifetime and services availability, as well as the quality of service of IoT applications. It also provides an even distribution of scarce network resources and reduces the packet loss rate, compared with the performance of well-known protocols. PMID:23385410

  12. A Routing Protocol Based on Energy and Link Quality for Internet of Things Applications

    PubMed Central

    Machado, Kassio; Rosário, Denis; Cerqueira, Eduardo; Loureiro, Antonio A. F.; Neto, Augusto; de Souza, José Neuman

    2013-01-01

    The Internet of Things (IoT) is attracting considerable attention from the universities, industries, citizens and governments for applications, such as healthcare,environmental monitoring and smart buildings. IoT enables network connectivity between smart devices at all times, everywhere, and about everything. In this context, Wireless Sensor Networks (WSNs) play an important role in increasing the ubiquity of networks with smart devices that are low-cost and easy to deploy. However, sensor nodes are restricted in terms of energy, processing and memory. Additionally, low-power radios are very sensitive to noise, interference and multipath distortions. In this context, this article proposes a routing protocol based on Routing by Energy and Link quality (REL) for IoT applications. To increase reliability and energy-efficiency, REL selects routes on the basis of a proposed end-to-end link quality estimator mechanism, residual energy and hop count. Furthermore, REL proposes an event-driven mechanism to provide load balancing and avoid the premature energy depletion of nodes/networks. Performance evaluations were carried out using simulation and testbed experiments to show the impact and benefits of REL in small and large-scale networks. The results show that REL increases the network lifetime and services availability, as well as the quality of service of IoT applications. It also provides an even distribution of scarce network resources and reduces the packet loss rate, compared with the performance of well-known protocols. PMID:23385410

  13. Acute Liver Failure in Adults: An Evidence-Based Management Protocol for Clinicians

    PubMed Central

    Misel, Michael; Gish, Robert G.

    2012-01-01

    With the goal of providing guidance on the provision of optimal intensive care to adult patients with acute liver failure (ALF), this paper defines ALF and describes a protocol for appropriately diagnosing this relatively rare clinical entity and ascertaining its etiology, where possible. This paper also identifies the few known therapies that may be effective for specific causes of ALF and provides a comprehensive approach for anticipating, identifying, and managing complications. Finally, one of the more important aspects of care for patients with ALF is the determination of prognosis and, specifically, the need for liver transplantation. Prognostic tools are provided to help guide the clinician in this critical decision process. Management of patients with ALF is complex and challenging, even in centers where staff members have high levels of expertise and substantial experience. This evidence-based protocol may, therefore, assist in the delivery of optimal care to this critically ill patient population and may substantially increase the likelihood of positive outcomes. PMID:22675278

  14. A novel quantum information hiding protocol based on entanglement swapping of high-level Bell states

    NASA Astrophysics Data System (ADS)

    Xu, Shu-Jiang; Chen, Xiu-Bo; Wang, Lian-Hai; Niu, Xin-Xin; Yang, Yi-Xian

    2015-05-01

    Using entanglement swapping of high-level Bell states, we first derive a covert layer between the secret message and the possible output results of the entanglement swapping between any two generalized Bell states, and then propose a novel high-efficiency quantum information hiding protocol based on the covert layer. In the proposed scheme, a covert channel can be built up under the cover of a high-level quantum secure direct communication (QSDC) channel for securely transmitting secret messages without consuming any auxiliary quantum state or any extra communication resource. It is shown that this protocol not only has a high embedding efficiency but also achieves a good imperceptibility as well as a high security. Project supported by the National Natural Science Foundation of China (Grant Nos. 61303199, 61272514, 61170272, 61121061, and 61411146001), the Shandong Provincial Natural Science Foundation of China (Grant Nos. ZR2013FM025, ZR2013FQ001, and ZR2014FM003), the Shandong Provincial Outstanding Research Award Fund for Young Scientists of China (Grant Nos. BS2013DX010 and BS2014DX007), the Program for New Century Excellent Talents in Universities, China (Grant No. NCET-13-0681), the National Development Foundation for Cryptological Research, China (Grant No. MMJJ201401012), the Fok Ying Tong Education Foundation, China (Grant No. 131067), and the Shandong Academy of Sciences Youth Fund Project, China (Grant No. 2013QN007).

  15. Grader agreement, and sensitivity and specificity of digital photography in a community optometry-based diabetic eye screening program

    PubMed Central

    Sellahewa, Luckni; Simpson, Craig; Maharajan, Prema; Duffy, John; Idris, Iskandar

    2014-01-01

    Background Digital retinal photography with mydriasis is the preferred modality for diabetes eye screening. The purpose of this study was to evaluate agreement in grading levels between primary and secondary graders and to calculate their sensitivity and specificity for identifying sight-threatening disease in an optometry-based retinopathy screening program. Methods This was a retrospective study using data from 8,977 patients registered in the North Nottinghamshire retinal screening program. In all cases, the ophthalmology diagnosis was used as the arbitrator and considered to be the gold standard. Kappa statistics were used to evaluate the level of agreement between graders. Results Agreement between primary and secondary graders was 51.4% and 79.7% for detecting no retinopathy (R0) and background retinopathy (R1), respectively. For preproliferative (R2) and proliferative retinopathy (R3) at primary grading, agreement between the primary and secondary grader was 100%. Where there was disagreement between the primary and secondary grader for R1, only 2.6% (n=41) were upgraded by an ophthalmologist. The sensitivity and specificity for detecting R3 was 78.2% and 98.1%, respectively. None of the patients upgraded from any level of retinopathy to R3 required photocoagulation therapy. The observed kappa between the primary and secondary grader was 0.3223 (95% confidence interval 0.2937–0.3509), ie, fair agreement, and between the primary grader and ophthalmology for R3 was 0.5667 (95% confidence interval 0.4557–0.6123), ie, moderate agreement. Conclusion These data provide information on the safety of a community optometry-based retinal screening program for screening as a primary and as a secondary grader. The level of agreement between the primary and secondary grader at a higher level of retinopathy (R2 and R3) was 100%. Sensitivity and specificity for R3 were 78.2% and 98.1%, respectively. None of the false-negative results required photocoagulation therapy

  16. A Randomized Controlled Study to Compare Conventional and Evidence Based Treatment Protocols in Fresh Compound Fractures

    PubMed Central

    Mahajan, Kanika; Singh, Girish Kumar; Kumar, Santosh; Avasthi, Sachin

    2016-01-01

    Introduction A recent concept review in Journal of Bone and Joint Surgery (JBJS) outlines evidence to control peri-operative infections in compound fractures. However, evidence for impact of adopting a protocol combining measures that have some evidence is lacking in literature. The present method of treatment at King George’s Medical University (KGMU) is representative of the conventional practice of managing compound fractures in India and is an appropriate control for trial against the Experimental Evidence Based Protocol (EBP). Aim To study the additional impact of adopting Evidence Based Protocol on parameters defining infection rate and bone union. Materials and Methods This randomized controlled study was conducted at the orthopaedics department of KGMU. Two hundred and twenty six patients of compound fractures of both bone leg, age > 12y were randomized to two groups. One group received standard treatment and the experimental group received treatment as per JBJS review. Statistical Analysis Random allocation was tested by comparing baseline characteristics of the two groups. The two groups were compared for all the outcome variables in terms of time to a negative wound culture, time to wound healing, time to union at fracture site and time to achieve complete range of motion at knee joint. Results Random allocation was successful. EBP group reported significantly lesser time to a negative culture report from wound (mean in conventional=4.619, experimental=1.9146, p=0.0006), lesser time to bony union (mean in conventional=23.8427 weeks, experimental=22.8125 weeks, p=0.0027), lesser time to wound healing (mean in conventional=14.4425 weeks experimental=10.4513 weeks, p=0.0032), and a lesser duration of hospital stay (mean in conventional=6.5982 days, experimental=4.5000 days, p=0.0343). Conclusion EBP based on the guidelines suggested by Fletcher et al., significantly shorten the time taken for achieving a negative culture and hasten wound and fracture

  17. Standard Care versus Protocol Based Therapy for New Onset Pseudomonas aeruginosa in Cystic Fibrosis

    PubMed Central

    Mayer-Hamblett, Nicole; Rosenfeld, Margaret; Treggiari, Miriam M.; Konstan, Michael W.; Retsch-Bogart, George; Morgan, Wayne; Wagener, Jeff; Gibson, Ronald L.; Khan, Umer; Emerson, Julia; Thompson, Valeria; Elkin, Eric P.; Ramsey, Bonnie W.

    2014-01-01

    Rationale The Early Pseudomonal Infection Control (EPIC) randomized trial rigorously evaluated the efficacy of different antibiotic regimens for eradication of newly identified Pseudomonas (Pa) in children with cystic fibrosis (CF). Protocol based therapy in the trial was provided based on culture positivity independent of symptoms. It is unclear whether outcomes observed in the clinical trial were different than those that would have been observed with historical standard of care driven more heavily by respiratory symptoms than culture positivity alone. We hypothesized that the incidence of Pa recurrence and hospitalizations would be significantly reduced among trial participants as compared to historical controls whose standard of care preceded the widespread adoption of tobramycin inhalation solution (TIS) as initial eradication therapy at the time of new isolation of Pa. Methods Eligibility criteria from the trial were used to derive historical controls from the Epidemiologic Study of CF (ESCF) who received standard of care treatment from 1995 to 1998, before widespread availability of TIS. Pa recurrence and hospitalization outcomes were assessed over a 15-month time period. Results As compared to 100% of the 304 trial participants, only 296/608 (49%) historical controls received antibiotics within an average of 20 weeks after new onset Pa. Pa recurrence occurred among 104/298 (35%) of the trial participants as compared to 295/549 (54%) of historical controls (19% difference, 95% CI: 12%, 26%, p<0.001). No significant differences in the incidence of hospitalization were observed between cohorts. Conclusions Protocol-based antimicrobial therapy for newly acquired Pa resulted in a lower rate of Pa recurrence but comparable hospitalization rates as compared to a historical control cohort less aggressively treated with antibiotics for new onset Pa. PMID:23818295

  18. Towards a Hybrid Energy Efficient Multi-Tree-Based Optimized Routing Protocol for Wireless Networks

    PubMed Central

    Mitton, Nathalie; Razafindralambo, Tahiry; Simplot-Ryl, David; Stojmenovic, Ivan

    2012-01-01

    This paper considers the problem of designing power efficient routing with guaranteed delivery for sensor networks with unknown geographic locations. We propose HECTOR, a hybrid energy efficient tree-based optimized routing protocol, based on two sets of virtual coordinates. One set is based on rooted tree coordinates, and the other is based on hop distances toward several landmarks. In HECTOR, the node currently holding the packet forwards it to its neighbor that optimizes ratio of power cost over distance progress with landmark coordinates, among nodes that reduce landmark coordinates and do not increase distance in tree coordinates. If such a node does not exist, then forwarding is made to the neighbor that reduces tree-based distance only and optimizes power cost over tree distance progress ratio. We theoretically prove the packet delivery and propose an extension based on the use of multiple trees. Our simulations show the superiority of our algorithm over existing alternatives while guaranteeing delivery, and only up to 30% additional power compared to centralized shortest weighted path algorithm. PMID:23443398

  19. REVIEW OF THE NEGOTIATION OF THE MODEL PROTOCOL ADDITIONAL TO THE AGREEMENT(S) BETWEEN STATE(S) AND THE INTERNATIONAL ATOMIC ENERGY AGENCY FOR THE APPLICATION OF SAFEGUARDS,INFCIRC/540 (Corrected) VOLUME I/III SETTING THE STAGE: 1991-1996.

    SciTech Connect

    Rosenthal, M.D.; Saum-Manning, L.; Houck, F.; Anzelon, G.

    2010-01-01

    Events in Iraq at the beginning of the 1990s demonstrated that the safeguards system of the International Atomic Energy Agency (IAEA) needed to be improved. It had failed, after all, to detect Iraq's clandestine nuclear weapon program even though some of Iraq's's activities had been pursued at inspected facilities in buildings adjacent to ones being inspected by the IAEA. Although there were aspects of the implementation of safeguards where the IAEA needed to improve, the primary limitations were considered to be part of the safeguards system itself. That system was based on the Nuclear Nonproliferation Treaty of 1970, to which Iraq was a party, and implemented on the basis of a model NPT safeguards agreement, published by the IAEA 1972 as INFCIRC/153 (corrected). The agreement calls for states to accept and for the IAEA to apply safeguards to all nuclear material in the state. Iraq was a party to such an agreement, but it violated the agreement by concealing nuclear material and other nuclear activities from the IAEA. Although the IAEA was inspecting in Iraq, it was hindered by aspects of the agreement that essentially limited its access to points in declared facilities and provided the IAEA with little information about nuclear activities anywhere else in Iraq. As a result, a major review of the NPT safeguards system was initiated by its Director General and Member States with the objective of finding the best means to enable the IAEA to detect both diversions from declared stocks and any undeclared nuclear material or activities in the state. Significant improvements that could be made within existing legal authority were taken quickly, most importantly a change in 1992 in how and when and what design information would be reported to the IAEA. During 1991-1996, the IAEA pursued intensive study, legal and technical analysis, and field trials and held numerous consultations with Member States. The Board of Governors discussed the issue of strengthening safeguards

  20. Agreement between parents and adolescents on dental fluorosis: a population-based study.

    PubMed

    Almeida, Maria Eneide Leitão de; Teixeira, Ana Karine Macedo; Alencar, Carlos Henrique; Paiva, Saul Martins; Abreu, Mauro Henrique Nogueira Guimarães de

    2013-01-01

    This study evaluated the prevalence and severity of dental fluorosis and compared the reports from adolescents aged 12 to 18 years with those of their parents regarding the perceptions and concerns arising from this disease. The study was conducted in the cities of Viçosa and Sobral and the District of Rafael Arruda (Sobral), Ceará. A cross-sectional study was conducted from October 2010 to March 2011, with 891 students examined and 780 parents or guardians interviewed. Dental fluorosis was measured using the Dean's Index, and the Child's and Parent's Questionnaire about Teeth Appearance was used to assess the reports from parents and adolescents. A chi-squared test for trends was used to compare the opinions of parents and adolescents about fluorosis, and the agreement was measured using the weighted kappa. For the dichotomous variables, we used the unweighted kappa coefficient. The prevalence of fluorosis was 29.7%, but in the District of Rafael Arruda, evidence of very mild and mild fluorosis was found in 32.5% of the subjects, and moderate and severe fluorosis was found in 28.7%. There was poor agreement between the data reported by the adolescents and their parents or guardians regarding areas of concern and their perceived satisfaction with the appearance and color of their teeth. The prevalence of dental fluorosis was high in one of the communities studied, but the clinical diagnosis of this condition should not necessarily equate with concern and dissatisfaction with aesthetic appearances among teenagers and their parents.

  1. Direction based Hazard Routing Protocol (DHRP) for disseminating road hazard information using road side infrastructures in VANETs.

    PubMed

    Berlin, M A; Anand, Sheila

    2014-01-01

    This paper presents Direction based Hazard Routing Protocol (DHRP) for disseminating information about fixed road hazards such as road blocks, tree fall, boulders on road, snow pile up, landslide, road maintenance work and other obstacles to the vehicles approaching the hazardous location. The proposed work focuses on dissemination of hazard messages on highways with sparse traffic. The vehicle coming across the hazard would report the presence of the hazard. It is proposed to use Road Side fixed infrastructure Units for reliable and timely delivery of hazard messages to vehicles. The vehicles can then take appropriate safety action to avoid the hazardous location. The proposed protocol has been implemented and tested using SUMO simulator to generate road traffic and NS 2.33 network simulator to analyze the performance of DHRP. The performance of the proposed protocol was also compared with simple flooding protocol and the results are presented.

  2. Direction based Hazard Routing Protocol (DHRP) for disseminating road hazard information using road side infrastructures in VANETs.

    PubMed

    Berlin, M A; Anand, Sheila

    2014-01-01

    This paper presents Direction based Hazard Routing Protocol (DHRP) for disseminating information about fixed road hazards such as road blocks, tree fall, boulders on road, snow pile up, landslide, road maintenance work and other obstacles to the vehicles approaching the hazardous location. The proposed work focuses on dissemination of hazard messages on highways with sparse traffic. The vehicle coming across the hazard would report the presence of the hazard. It is proposed to use Road Side fixed infrastructure Units for reliable and timely delivery of hazard messages to vehicles. The vehicles can then take appropriate safety action to avoid the hazardous location. The proposed protocol has been implemented and tested using SUMO simulator to generate road traffic and NS 2.33 network simulator to analyze the performance of DHRP. The performance of the proposed protocol was also compared with simple flooding protocol and the results are presented. PMID:24834371

  3. Deterministic Secure Quantum Communication and Authentication Protocol based on Extended GHZ-W State and Quantum One-time Pad

    NASA Astrophysics Data System (ADS)

    Li, Na; Li, Jian; Li, Lei-Lei; Wang, Zheng; Wang, Tao

    2016-08-01

    A deterministic secure quantum communication and authentication protocol based on extended GHZ-W state and quantum one-time pad is proposed. In the protocol, state | φ -> is used as the carrier. One photon of | φ -> state is sent to Alice, and Alice obtains a random key by measuring photons with bases determined by ID. The information of bases is secret to others except Alice and Bob. Extended GHZ-W states are used as decoy photons, the positions of which in information sequence are encoded with identity string ID of the legal user, and the eavesdropping detection rate reaches 81%. The eavesdropping detection based on extended GHZ-W state combines with authentication and the secret ID ensures the security of the protocol.

  4. A Fluorescence-Based Screening Protocol for the Identification of Water Oxidation Catalysts.

    PubMed

    Detz, Remko J; Abiri, Zohar; Kluwer, Alexander M; Reek, Joost N H

    2015-09-21

    Efficient catalysts are crucial for the sustainable generation of fuel by splitting water. A versatile screening protocol would simplify the identification of novel and better catalysts by using high throughput experimentation. Herein, such a screening approach for the identification of molecular catalysts for chemical oxidation of water is reported, which is based on oxygen-sensitive fluorescence quenching using an OxoDish. More than 200 reactions were performed revealing several catalysts, for example, a dinuclear Fe complex that produced oxygen under the used reaction conditions. Clark electrode measurements confirmed a similar rate in oxygen evolution, making the developed parallel screening approach a robust and versatile tool to screen for molecular water oxidation catalysts using chemical oxidants under acidic and neutral conditions.

  5. Architecture Design and Experimental Platform Demonstration of Optical Network based on OpenFlow Protocol

    NASA Astrophysics Data System (ADS)

    Xing, Fangyuan; Wang, Honghuan; Yin, Hongxi; Li, Ming; Luo, Shenzi; Wu, Chenguang

    2016-02-01

    With the extensive application of cloud computing and data centres, as well as the constantly emerging services, the big data with the burst characteristic has brought huge challenges to optical networks. Consequently, the software defined optical network (SDON) that combines optical networks with software defined network (SDN), has attracted much attention. In this paper, an OpenFlow-enabled optical node employed in optical cross-connect (OXC) and reconfigurable optical add/drop multiplexer (ROADM), is proposed. An open source OpenFlow controller is extended on routing strategies. In addition, the experiment platform based on OpenFlow protocol for software defined optical network, is designed. The feasibility and availability of the OpenFlow-enabled optical nodes and the extended OpenFlow controller are validated by the connectivity test, protection switching and load balancing experiments in this test platform.

  6. Practical private database queries based on a quantum-key-distribution protocol

    SciTech Connect

    Jakobi, Markus; Simon, Christoph; Gisin, Nicolas; Bancal, Jean-Daniel; Branciard, Cyril; Walenta, Nino; Zbinden, Hugo

    2011-02-15

    Private queries allow a user, Alice, to learn an element of a database held by a provider, Bob, without revealing which element she is interested in, while limiting her information about the other elements. We propose to implement private queries based on a quantum-key-distribution protocol, with changes only in the classical postprocessing of the key. This approach makes our scheme both easy to implement and loss tolerant. While unconditionally secure private queries are known to be impossible, we argue that an interesting degree of security can be achieved by relying on fundamental physical principles instead of unverifiable security assumptions in order to protect both the user and the database. We think that the scope exists for such practical private queries to become another remarkable application of quantum information in the footsteps of quantum key distribution.

  7. Protocol for the prevention and management of complications related to ADM implant-based breast reconstructions.

    PubMed

    Citron, Isabelle; Dower, Rory; Ho-Asjoe, Mark

    2016-01-01

    Acellular dermal matrix (ADM) implant-based reconstructions have transformed direct-to-implant breast reconstruction (DTI). But like all surgery, it is not deplete of complications such as seroma, infections and wound healing problems. These are cited with varying frequencies in the literature. With increased experience and through a series of measures instituted to minimize complications, we have been able to improve outcomes for our patients. We report our technical refinements for prevention of ADM reconstruction associated complications including patient selection, implant selection, drains, dressing and our post operative antibiotic regime. We also outline our protocol for the management of ADM associated complications including seroma, simple and complex infection and red breast syndrome, such that the sequelae of complications are minimized and patients achieve a better long-term outcome. PMID:26816672

  8. Protocol for the prevention and management of complications related to ADM implant-based breast reconstructions

    PubMed Central

    Citron, Isabelle; Dower, Rory; Ho-Asjoe, Mark

    2016-01-01

    Acellular dermal matrix (ADM) implant-based reconstructions have transformed direct-to-implant breast reconstruction (DTI). But like all surgery, it is not deplete of complications such as seroma, infections and wound healing problems. These are cited with varying frequencies in the literature. With increased experience and through a series of measures instituted to minimize complications, we have been able to improve outcomes for our patients. We report our technical refinements for prevention of ADM reconstruction associated complications including patient selection, implant selection, drains, dressing and our post operative antibiotic regime. We also outline our protocol for the management of ADM associated complications including seroma, simple and complex infection and red breast syndrome, such that the sequelae of complications are minimized and patients achieve a better long-term outcome. PMID:26816672

  9. CENTERA: A Centralized Trust-Based Efficient Routing Protocol with Authentication for Wireless Sensor Networks †

    PubMed Central

    Tajeddine, Ayman; Kayssi, Ayman; Chehab, Ali; Elhajj, Imad; Itani, Wassim

    2015-01-01

    In this paper, we present CENTERA, a CENtralized Trust-based Efficient Routing protocol with an appropriate authentication scheme for wireless sensor networks (WSN). CENTERA utilizes the more powerful base station (BS) to gather minimal neighbor trust information from nodes and calculate the best routes after isolating different types of “bad” nodes. By periodically accumulating these simple local observations and approximating the nodes' battery lives, the BS draws a global view of the network, calculates three quality metrics—maliciousness, cooperation, and compatibility—and evaluates the Data Trust and Forwarding Trust values of each node. Based on these metrics, the BS isolates “bad”, “misbehaving” or malicious nodes for a certain period, and put some nodes on probation. CENTERA increases the node's bad/probation level with repeated “bad” behavior, and decreases it otherwise. Then it uses a very efficient method to distribute the routing information to “good” nodes. Based on its target environment, and if required, CENTERA uses an authentication scheme suitable for severely constrained nodes, ranging from the symmetric RC5 for safe environments under close administration, to pairing-based cryptography (PBC) for hostile environments with a strong attacker model. We simulate CENTERA using TOSSIM and verify its correctness and show some energy calculations. PMID:25648712

  10. CENTERA: a centralized trust-based efficient routing protocol with authentication for wireless sensor networks.

    PubMed

    Tajeddine, Ayman; Kayssi, Ayman; Chehab, Ali; Elhajj, Imad; Itani, Wassim

    2015-01-01

    In this paper, we present CENTERA, a CENtralized Trust-based Efficient Routing protocol with an appropriate authentication scheme for wireless sensor networks (WSN). CENTERA utilizes the more powerful base station (BS) to gather minimal neighbor trust information from nodes and calculate the best routes after isolating different types of "bad" nodes. By periodically accumulating these simple local observations and approximating the nodes' battery lives, the BS draws a global view of the network, calculates three quality metrics-maliciousness, cooperation, and compatibility-and evaluates the Data Trust and Forwarding Trust values of each node. Based on these metrics, the BS isolates "bad", "misbehaving" or malicious nodes for a certain period, and put some nodes on probation. CENTERA increases the node's bad/probation level with repeated "bad" behavior, and decreases it otherwise. Then it uses a very efficient method to distribute the routing information to "good" nodes. Based on its target environment, and if required, CENTERA uses an authentication scheme suitable for severely constrained nodes, ranging from the symmetric RC5 for safe environments under close administration, to pairing-based cryptography (PBC) for hostile environments with a strong attacker model. We simulate CENTERA using TOSSIM and verify its correctness and show some energy calculations. PMID:25648712

  11. An Extended Chaotic Maps-Based Three-Party Password-Authenticated Key Agreement with User Anonymity.

    PubMed

    Lu, Yanrong; Li, Lixiang; Zhang, Hao; Yang, Yixian

    2016-01-01

    User anonymity is one of the key security features of an authenticated key agreement especially for communicating messages via an insecure network. Owing to the better properties and higher performance of chaotic theory, the chaotic maps have been introduced into the security schemes, and hence numerous key agreement schemes have been put forward under chaotic-maps. Recently, Xie et al. released an enhanced scheme under Farash et al.'s scheme and claimed their improvements could withstand the security loopholes pointed out in the scheme of Farash et al., i.e., resistance to the off-line password guessing and user impersonation attacks. Nevertheless, through our careful analysis, the improvements were released by Xie et al. still could not solve the problems troubled in Farash et al‥ Besides, Xie et al.'s improvements failed to achieve the user anonymity and the session key security. With the purpose of eliminating the security risks of the scheme of Xie et al., we design an anonymous password-based three-party authenticated key agreement under chaotic maps. Both the formal analysis and the formal security verification using AVISPA are presented. Also, BAN logic is used to show the correctness of the enhancements. Furthermore, we also demonstrate that the design thwarts most of the common attacks. We also make a comparison between the recent chaotic-maps based schemes and our enhancements in terms of performance.

  12. An Extended Chaotic Maps-Based Three-Party Password-Authenticated Key Agreement with User Anonymity

    PubMed Central

    Lu, Yanrong; Li, Lixiang; Zhang, Hao; Yang, Yixian

    2016-01-01

    User anonymity is one of the key security features of an authenticated key agreement especially for communicating messages via an insecure network. Owing to the better properties and higher performance of chaotic theory, the chaotic maps have been introduced into the security schemes, and hence numerous key agreement schemes have been put forward under chaotic-maps. Recently, Xie et al. released an enhanced scheme under Farash et al.’s scheme and claimed their improvements could withstand the security loopholes pointed out in the scheme of Farash et al., i.e., resistance to the off-line password guessing and user impersonation attacks. Nevertheless, through our careful analysis, the improvements were released by Xie et al. still could not solve the problems troubled in Farash et al‥ Besides, Xie et al.’s improvements failed to achieve the user anonymity and the session key security. With the purpose of eliminating the security risks of the scheme of Xie et al., we design an anonymous password-based three-party authenticated key agreement under chaotic maps. Both the formal analysis and the formal security verification using AVISPA are presented. Also, BAN logic is used to show the correctness of the enhancements. Furthermore, we also demonstrate that the design thwarts most of the common attacks. We also make a comparison between the recent chaotic-maps based schemes and our enhancements in terms of performance. PMID:27101305

  13. Likelihood-based Quantification of Agreement between Climate Model Output and NASA Data Records

    NASA Astrophysics Data System (ADS)

    Braverman, A. J.; Huey, G.; Cressie, N.; Teixeira, J.

    2012-12-01

    In this talk we discuss the use of formal statistical likelihoods to quantify and assess the consistency of an observed data record with climate model predictions of it. The likelihood function is the conditional probability distribution of an unknown quantity as a function of the conditioning quantity. For instance, if P(A|B) (read ``the probability of A given B") is Gaussian with mean B, then the likelihood function for the mean is a function of different candidate values of B: L(b)=P(A|B=b). It shows how the probability of A changes when we assume different values of B are true. Here we let A be an observational statistic, and b be a climate model identifier. We use the time series generated by that climate model to estimate the sampling distribution of A under the hypothesis that the climate model correctly represents the behavior of the atmosphere. Then we ``score" the agreement between observations and models by the likelihood value, L(b). In this talk, we discuss our computational approach to estimating the sampling distributions, and report results achieved thus far in scoring the climate models used in the CMIP5 decadal experiments against water vapor data records from NASA's AIRS instrument.

  14. An improved and effective secure password-based authentication and key agreement scheme using smart cards for the telecare medicine information system.

    PubMed

    Das, Ashok Kumar; Bruhadeshwar, Bezawada

    2013-10-01

    Recently Lee and Liu proposed an efficient password based authentication and key agreement scheme using smart card for the telecare medicine information system [J. Med. Syst. (2013) 37:9933]. In this paper, we show that though their scheme is efficient, their scheme still has two security weaknesses such as (1) it has design flaws in authentication phase and (2) it has design flaws in password change phase. In order to withstand these flaws found in Lee-Liu's scheme, we propose an improvement of their scheme. Our improved scheme keeps also the original merits of Lee-Liu's scheme. We show that our scheme is efficient as compared to Lee-Liu's scheme. Further, through the security analysis, we show that our scheme is secure against possible known attacks. In addition, we simulate our scheme for the formal security verification using the widely-accepted AVISPA (Automated Validation of Internet Security Protocols and Applications) tool to show that our scheme is secure against passive and active attacks.

  15. An improved and effective secure password-based authentication and key agreement scheme using smart cards for the telecare medicine information system.

    PubMed

    Das, Ashok Kumar; Bruhadeshwar, Bezawada

    2013-10-01

    Recently Lee and Liu proposed an efficient password based authentication and key agreement scheme using smart card for the telecare medicine information system [J. Med. Syst. (2013) 37:9933]. In this paper, we show that though their scheme is efficient, their scheme still has two security weaknesses such as (1) it has design flaws in authentication phase and (2) it has design flaws in password change phase. In order to withstand these flaws found in Lee-Liu's scheme, we propose an improvement of their scheme. Our improved scheme keeps also the original merits of Lee-Liu's scheme. We show that our scheme is efficient as compared to Lee-Liu's scheme. Further, through the security analysis, we show that our scheme is secure against possible known attacks. In addition, we simulate our scheme for the formal security verification using the widely-accepted AVISPA (Automated Validation of Internet Security Protocols and Applications) tool to show that our scheme is secure against passive and active attacks. PMID:24061705

  16. An Empirical Evaluation of Lightweight Random Walk Based Routing Protocol in Duty Cycle Aware Wireless Sensor Networks

    PubMed Central

    Fatima, Mehwish

    2014-01-01

    Energy efficiency is an important design paradigm in Wireless Sensor Networks (WSNs) and its consumption in dynamic environment is even more critical. Duty cycling of sensor nodes is used to address the energy consumption problem. However, along with advantages, duty cycle aware networks introduce some complexities like synchronization and latency. Due to their inherent characteristics, many traditional routing protocols show low performance in densely deployed WSNs with duty cycle awareness, when sensor nodes are supposed to have high mobility. In this paper we first present a three messages exchange Lightweight Random Walk Routing (LRWR) protocol and then evaluate its performance in WSNs for routing low data rate packets. Through NS-2 based simulations, we examine the LRWR protocol by comparing it with DYMO, a widely used WSN protocol, in both static and dynamic environments with varying duty cycles, assuming the standard IEEE 802.15.4 in lower layers. Results for the three metrics, that is, reliability, end-to-end delay, and energy consumption, show that LRWR protocol outperforms DYMO in scalability, mobility, and robustness, showing this protocol as a suitable choice in low duty cycle and dense WSNs. PMID:24696667

  17. First in vivo assessment of "Outwalk": a novel protocol for clinical gait analysis based on inertial and magnetic sensors.

    PubMed

    Ferrari, Alberto; Cutti, Andrea Giovanni; Garofalo, Pietro; Raggi, Michele; Heijboer, Monique; Cappello, Angelo; Davalli, Angelo

    2010-01-01

    A protocol named "Outwalk" was recently proposed to measure the thorax-pelvis and lower-limb kinematics during gait in free-living conditions, by means of an inertial and magnetic measurement system (IMMS). The aim of this study was to validate Outwalk on four healthy subjects when it is used in combination with a specific IMMS (Xsens Technologies, NL), against a reference protocol (CAST) and measurement system (optoelectronic system; Vicon, Oxford Metrics Group, UK). For this purpose, we developed an original approach based on three tests, which allowed to separately investigate: (1) the consequences on joint kinematics of the differences between protocols (Outwalk vs. CAST), (2) the accuracy of the hardware (Xsens vs. Vicon), and (3) the summation of protocols' differences and hardware accuracy (Outwalk + Xsens vs. CAST + Vicon). In order to assess joint-angles similarity, the coefficient of multiple correlation (CMC) was used. For test 3, the CMC showed that Outwalk + Xsens and CAST + Vicon kinematics can be interchanged, offset included, for hip, knee and ankle flexion-extension, and hip ab-adduction (CMC > 0.88). The other joint-angles can be interchanged offset excluded (CMC > 0.85). Tests 1 and 2 also showed that differences in offset between joint-angles were predominantly induced by differences in the protocols; differences in correlation by both hardware and protocols; differences in range of motion by the Xsens accuracy. Results thus support the commencement of a clinical trial of Outwalk on transtibial amputees. PMID:19911215

  18. First in vivo assessment of "Outwalk": a novel protocol for clinical gait analysis based on inertial and magnetic sensors.

    PubMed

    Ferrari, Alberto; Cutti, Andrea Giovanni; Garofalo, Pietro; Raggi, Michele; Heijboer, Monique; Cappello, Angelo; Davalli, Angelo

    2010-01-01

    A protocol named "Outwalk" was recently proposed to measure the thorax-pelvis and lower-limb kinematics during gait in free-living conditions, by means of an inertial and magnetic measurement system (IMMS). The aim of this study was to validate Outwalk on four healthy subjects when it is used in combination with a specific IMMS (Xsens Technologies, NL), against a reference protocol (CAST) and measurement system (optoelectronic system; Vicon, Oxford Metrics Group, UK). For this purpose, we developed an original approach based on three tests, which allowed to separately investigate: (1) the consequences on joint kinematics of the differences between protocols (Outwalk vs. CAST), (2) the accuracy of the hardware (Xsens vs. Vicon), and (3) the summation of protocols' differences and hardware accuracy (Outwalk + Xsens vs. CAST + Vicon). In order to assess joint-angles similarity, the coefficient of multiple correlation (CMC) was used. For test 3, the CMC showed that Outwalk + Xsens and CAST + Vicon kinematics can be interchanged, offset included, for hip, knee and ankle flexion-extension, and hip ab-adduction (CMC > 0.88). The other joint-angles can be interchanged offset excluded (CMC > 0.85). Tests 1 and 2 also showed that differences in offset between joint-angles were predominantly induced by differences in the protocols; differences in correlation by both hardware and protocols; differences in range of motion by the Xsens accuracy. Results thus support the commencement of a clinical trial of Outwalk on transtibial amputees.

  19. Resynchronization with unknown pregnancy status using progestin-based timed artificial insemination protocol in beef cattle.

    PubMed

    Sá Filho, M F; Marques, M O; Girotto, R; Santos, F A; Sala, R V; Barbuio, J P; Baruselli, P S

    2014-01-15

    Two experiments were designed to evaluate the use of resynchronization (RESYNCH) protocols using a progestin-based timed artificial insemination (TAI) protocol in beef cattle. In experiment 1, 475 cyclic Nelore heifers were resynchronized 22 days after the first TAI using two different inducers of new follicular wave emergence (estradiol benzoate [EB; n = 241] or GnRH [n = 234]) with the insertion of a norgestomet ear implant. At ear implant removal (7 days later), a pregnancy test was performed, and nonpregnant heifers received a dose of prostaglandin plus 0.5 mg of estradiol cypionate, with a timed insemination 48 hours later. The pregnancy rate after the first TAI was similar (P = 0.97) between treatments (EB [41.9%] vs. GnRH [41.5%]). However, EB-treated heifers (49.3%) had a greater (P = 0.04) pregnancy per AI (P/AI) after the resynchronization than the GnRH-treated heifers (37.2%). In experiment 2, the pregnancy loss in 664 zebu females (344 nonlactating cows and 320 cyclic heifers) between 30 and 60 days after resynchronization was evaluated. Females were randomly assigned to one of two groups (RESYNCH 22 days after the first TAI [n = 317] or submitted only to natural mating [NM; n = 347]). Females from the NM group were maintained with bulls from 15 to 30 days after the first TAI. The RESYNC-treated females were resynchronized 22 days after the first TAI using 1 mg of EB on the first day of the resynchronization, similar to experiment 1. No difference was found in P/AI (NM [57.1%] vs. RESYNC [61.5%]; P = 0.32) or pregnancy loss (NM [2.0%] vs. RESYNC [4.1%]; P = 0.21) after the first TAI. Moreover, the overall P/AI after the RESYNCH protocol was 47.5%. Thus, the administration of 1 mg of EB on day 22 after the first TAI, when the pregnancy status was undetermined, promotes a higher P/AI in the resynchronized TAI than the use of GnRH. Also, the administration of 1 mg of EB 22 days after the TAI did not affect the preestablished pregnancy.

  20. Study of accent-based music speech protocol development for improving voice problems in stroke patients with mixed dysarthria.

    PubMed

    Kim, Soo Ji; Jo, Uiri

    2013-01-01

    Based on the anatomical and functional commonality between singing and speech, various types of musical elements have been employed in music therapy research for speech rehabilitation. This study was to develop an accent-based music speech protocol to address voice problems of stroke patients with mixed dysarthria. Subjects were 6 stroke patients with mixed dysarthria and they received individual music therapy sessions. Each session was conducted for 30 minutes and 12 sessions including pre- and post-test were administered for each patient. For examining the protocol efficacy, the measures of maximum phonation time (MPT), fundamental frequency (F0), average intensity (dB), jitter, shimmer, noise to harmonics ratio (NHR), and diadochokinesis (DDK) were compared between pre and post-test and analyzed with a paired sample t-test. The results showed that the measures of MPT, F0, dB, and sequential motion rates (SMR) were significantly increased after administering the protocol. Also, there were statistically significant differences in the measures of shimmer, and alternating motion rates (AMR) of the syllable /K$\\inve$/ between pre- and post-test. The results indicated that the accent-based music speech protocol may improve speech motor coordination including respiration, phonation, articulation, resonance, and prosody of patients with dysarthria. This suggests the possibility of utilizing the music speech protocol to maximize immediate treatment effects in the course of a long-term treatment for patients with dysarthria.

  1. Utilization of Internet Protocol-Based Voice Systems in Remote Payload Operations

    NASA Technical Reports Server (NTRS)

    Chamberlain, jim; Bradford, Bob; Best, Susan; Nichols, Kelvin

    2002-01-01

    Due to limited crew availability to support science and the large number of experiments to be operated simultaneously, telescience is key to a successful International Space Station (ISS) science program. Crew, operations personnel at NASA centers, and researchers at universities and companies around the world must work closely together to per orm scientific experiments on-board ISS. The deployment of reliable high-speed Internet Protocol (IP)-based networks promises to greatly enhance telescience capabilities. These networks are now being used to cost-effectively extend the reach of remote mission support systems. They reduce the need for dedicated leased lines and travel while improving distributed workgroup collaboration capabilities. NASA has initiated use of Voice over Internet Protocol (VoIP) to supplement the existing mission voice communications system used by researchers at their remote sites. The Internet Voice Distribution System (IVoDS) connects remote researchers to mission support "loopsll or conferences via NASA networks and Internet 2. Researchers use NODS software on personal computers to talk with operations personnel at NASA centers. IVoDS also has the ;capability, if authorized, to allow researchers to communicate with the ISS crew during experiment operations. NODS was developed by Marshall Space Flight Center with contractors & Technology, First Virtual Communications, Lockheed-Martin, and VoIP Group. NODS is currently undergoing field-testing with full deployment for up to 50 simultaneous users expected in 2002. Research is being performed in parallel with IVoDS deployment for a next-generation system to qualitatively enhance communications among ISS operations personnel. In addition to the current voice capability, video and data/application-sharing capabilities are being investigated. IVoDS technology is also being considered for mission support systems for programs such as Space Launch Initiative and Homeland Defense.

  2. A research-based child welfare employee selection protocol: strengthening retention of the workforce.

    PubMed

    Ellett, Alberta J; Ellett, Chad D; Ellis, Jacquelyn; Lerner, Betsy

    2009-01-01

    This article describes the development and initial implementation of a new employee selection protocol (ESP) for child welfare grounded in the results of recent large-scale employee retention studies and a set of research-based, minimally essential knowledge, skills, abilities, and values. The complete ESP consists of a sequenced set of Web- and site-based assessment processes and procedures for potential applicants. Using the ESP, applicants and employers make informed decisions about the goodness of fit between the applicant and the demands of a career in child welfare. To date, the new ESP has been piloted in three Georgia Division of Family and Children Services (DFCS) regions and implemented by all nine colleges and universities participating in IV-E child welfare education programs. Evaluation data collected from students and new employees in one DFCS region strongly support the value of the ESP Web-based activities to make a more informed decision about whether to apply for the IV-E stipends and child welfare positions. Feedback from trained ESP assessors supports the value of various ESP activities. A major goal of implementing the ESP is to select more professionally committed and highly qualified applicants to strengthen employee retention and outcomes for children and families. PMID:20187562

  3. An RSA-Based Leakage-Resilient Authenticated Key Exchange Protocol Secure against Replacement Attacks, and Its Extensions

    NASA Astrophysics Data System (ADS)

    Shin, Seonghan; Kobara, Kazukuni; Imai, Hideki

    Secure channels can be realized by an authenticated key exchange (AKE) protocol that generates authenticated session keys between the involving parties. In [32], Shin et al., proposed a new kind of AKE (RSA-AKE) protocol whose goal is to provide high efficiency and security against leakage of stored secrets as much as possible. Let us consider more powerful attacks where an adversary completely controls the communications and the stored secrets (the latter is denoted by “replacement” attacks). In this paper, we first show that the RSA-AKE protocol [32] is no longer secure against such an adversary. The main contributions of this paper are as follows: (1) we propose an RSA-based leakage-resilient AKE (RSA-AKE2) protocol that is secure against active attacks as well as replacement attacks; (2) we prove that the RSA-AKE2 protocol is secure against replacement attacks based on the number theory results; (3) we show that it is provably secure in the random oracle model, by showing the reduction to the RSA one-wayness, under an extended model that covers active attacks and replacement attacks; (4) in terms of efficiency, the RSA-AKE2 protocol is comparable to [32] in the sense that the client needs to compute only one modular multiplication with pre-computation; and (5) we also discuss about extensions of the RSA-AKE2 protocol for several security properties (i.e., synchronization of stored secrets, privacy of client and solution to server compromise-impersonation attacks).

  4. Comparison of long-term progestin-based estrus synchronization protocols in beef heifers.

    PubMed

    Mallory, D A; Wilson, D J; Busch, D C; Ellersieck, M R; Smith, M F; Patterson, D J

    2010-11-01

    Two experiments evaluated long-term progestin-based estrus-synchronization programs on the basis of potential for use in facilitating fixed-time AI in estrous cycling and prepubertal beef heifers. In Exp. 1, heifers were assigned to 1 of 2 treatments by age, BW, and estrous cyclicity status. Heifers assigned to the melengestrol acetate-PGF(2α) protocol (MGA-PG; n = 50) received MGA (0.5 mg·animal(-1)·d(-1)) in a 1.0-kg carrier from d 0 to 13 and were administered PGF(2α) (25 mg, intramuscularly) 19 d after MGA withdrawal (d 32). Heifers assigned to the Show-Me-Synch protocol (n = 49) received a controlled internal drug release (CIDR) insert (1.38 g of progesterone) from d 2 to 16 followed by PGF(2α) administration 16 d after CIDR removal (d 32). All heifers were fitted with HeatWatch estrus-detection transmitters at the time of progestin removal for continuous estrus detection through the synchronized period after PGF(2α). In Exp. 2, heifers (n = 396) were assigned to the same 2 treatments described in Exp. 1 by age, BW, and reproductive tract score. Heifers in Exp. 2, however, were fitted with HeatWatch estrus-detection transmitters at PGF(2α) to characterize estrus-distribution patterns during the synchronized period after PGF(2α). Heifers in both experiments were inseminated approximately 12 h after the onset of estrus. In Exp. 1, estrous response after PGF(2α) and mean interval to estrus after PGF(2α) did not differ between MGA-PG and Show-Me-Synch treatments (P = 0.97). The variance for interval to estrus after PGF(2α) tended (P = 0.06) to be reduced among MGA-PG-treated heifers compared with Show-Me-Synch-treated heifers. Conception to AI, AI pregnancy, and final pregnancy rates did not differ (P > 0.1) between treatments. In Exp. 2, estrous response after PGF(2α) was greater (P = 0.01) among Show-Me-Synch-treated heifers (92%) compared with MGA-PG-treated heifers (85%); however, mean interval to estrus after PGF(2α) did not differ (P = 0

  5. Poor agreement between endoscopists and gastrointestinal pathologists for the interpretation of probe-based confocal laser endomicroscopy findings

    PubMed Central

    Peter, Shajan; Council, Leona; Bang, Ji Young; Neumann, Helmut; Mönkemüller, Klaus; Varadarajulu, Shyam; Wilcox, Charles Melbern

    2014-01-01

    AIM: To compare the interpretation of probe-based confocal laser endomicroscopy (pCLE) findings between endoscopists and gastrointestinal (GI)-pathologists. METHODS: All pCLE procedures were undertaken and the endoscopist rendered assessment. The same pCLE videos were then viewed offline by an expert GI pathologist. Histopathology was considered the gold standard for definitive diagnosis. The sensitivity, specificity and accuracy for diagnosis of dysplastic/ neoplastic GI lesions and interobserver agreement between endoscopists and experienced gastrointestinal pathologist for pCLE findings were analyzed. RESULTS: Of the 66 included patients, 40 (60.6%) had lesions in the esophagus, 7 (10.6%) in the stomach, 15 (22.7%) in the biliary tract, 3 (4.5%) in the ampulla and 1 (1.5%) in the colon. The overall sensitivity, specificity and accuracy for diagnosing dysplastic/neoplastic lesions using pCLE were higher for endoscopists than pathologist at 87.0% vs 69.6%, 80.0% vs 40.0% and 84.8% vs 60.6% (P = 0.0003), respectively. Area under the ROC curve (AUC) was greater for endoscopists than the pathologist (0.83 vs 0.55, P = 0.0001). Overall agreement between endoscopists and pathologist was moderate for all GI lesions (K = 0.43; 95%CI: 0.26-0.61), luminal lesions (K = 0.40; 95%CI: 0.20-0.60) and those of dysplastic/neoplastic pathology (K = 0.55; 95%CI: 0.37-0.72), the agreement was poor for benign (K = 0.13; 95%CI: -0.097-0.36) and pancreaticobiliary lesions (K = 0.19; 95%CI: -0.26-0.63). CONCLUSION: There is a wide discrepancy in the interpretation of pCLE findings between endoscopists and pathologist, particularly for benign and malignant pancreaticobiliary lesions. Further studies are needed to identify the cause of this poor agreement. PMID:25548499

  6. The 9-day CIDR-PG protocol: Incorporation of PGF2α pretreatment into a long-term progestin-based estrus synchronization protocol for postpartum beef cows.

    PubMed

    Thomas, Jordan M; Bishop, Brianne E; Abel, Jillian M; Ellersieck, Mark R; Smith, Michael F; Patterson, David J

    2016-06-01

    A pilot experiment was designed to test the hypothesis that administration of PGF2α before progestin treatment would allow for a reduced duration of progestin treatment in a long-term progestin-based estrus synchronization protocol. A modified presynchronization treatment was compared with a standard long-term controlled internal drug release (CIDR) treatment, and treatments were compared on the basis of ovarian follicular dynamics, estrous response rate, synchrony of estrus expression, and pregnancy rates resulting from timed artificial insemination (TAI) in postpartum beef cows. Estrous was synchronized for 85 cows, with cows assigned to one of two treatments based on age, days postpartum, and body condition score. Cows assigned to the 14-day CIDR-PG protocol received a CIDR insert (1.38 g progesterone) on Day 0, CIDR removal on Day 14, and administration of PGF2α (25 mg im) on Day 30. Cows assigned to the 9-day CIDR-PG protocol received PGF2α concurrent with CIDR insertion on Day 5, PGF2α concurrent with CIDR removal on Day 14, and administration of PGF2α on Day 30. In both treatments, split-time AI was performed based on estrous response. At 72 hours after PGF2α (Day 33), cows having expressed estrus received TAI; cows that failed to express estrus by 72 hours received TAI 24 hours later (96 hours after PGF2α on Day 34), with GnRH (100 μg im) administered to nonestrous cows. Estrus-detection transmitters were used from CIDR removal until AI to determine onset time of estrus expression both after CIDR removal and after PGF2α. Ovarian ultrasonography was performed at CIDR removal on Day 14, PGF2α on Day 30, and AI on Days 33 or 34. At CIDR removal on Day 14, diameter of the largest follicle present on the ovary was similar between treatments. The proportion of cows expressing estrus after CIDR removal tended to be higher (P = 0.09) among cows assigned to the 9-day CIDR-PG treatment (93%; 40 of 43) than among cows assigned to the 14-day CIDR

  7. A Gossip-based Energy Efficient Protocol for Robust In-network Aggregation in Wireless Sensor Networks

    NASA Astrophysics Data System (ADS)

    Fauji, Shantanu

    We consider the problem of energy efficient and fault tolerant in--network aggregation for wireless sensor networks (WSNs). In-network aggregation is the process of aggregation while collecting data from sensors to the base station. This process should be energy efficient due to the limited energy at the sensors and tolerant to the high failure rates common in sensor networks. Tree based in--network aggregation protocols, although energy efficient, are not robust to network failures. Multipath routing protocols are robust to failures to a certain degree but are not energy efficient due to the overhead in the maintenance of multiple paths. We propose a new protocol for in-network aggregation in WSNs, which is energy efficient, achieves high lifetime, and is robust to the changes in the network topology. Our protocol, gossip--based protocol for in-network aggregation (GPIA) is based on the spreading of information via gossip. GPIA is not only adaptive to failures and changes in the network topology, but is also energy efficient. Energy efficiency of GPIA comes from all the nodes being capable of selective message reception and detecting convergence of the aggregation early. We experimentally show that GPIA provides significant improvement over some other competitors like the Ridesharing, Synopsis Diffusion and the pure version of gossip. GPIA shows ten fold, five fold and two fold improvement over the pure gossip, the synopsis diffusion and Ridesharing protocols in terms of network lifetime, respectively. Further, GPIA retains gossip's robustness to failures and improves upon the accuracy of synopsis diffusion and Ridesharing.

  8. Arterial pressure: agreement between a brachial cuff-based device and radial tonometry

    PubMed Central

    Park, Chloe M.; Korolkova, Olga; Davies, Justin E.; Parker, Kim H.; Siggers, Jennifer H.; March, Katherine; Tillin, Therese; Chaturvedi, Nish; Hughes, Alun D.

    2014-01-01

    Objectives: Aortic (central) blood pressure (BP) differs from brachial BP and may be a superior predictor of cardiovascular events. However, its measurement is currently restricted to research settings, owing to a moderate level of operator dependency. We tested a new noninvasive device in a large UK cohort. The device estimates central BP using measurements obtained with an upper arm cuff inflated to suprasystolic pressure. We compared these estimates with those obtained using radial tonometry as well as with invasively acquired measurements of aortic BP in a limited number of individuals. Methods: Consecutive cuff-based and tonometry-based estimates of the pressure waveform and the central BP were obtained from 1107 individuals (70 ± 6 years). Short-term and long-term reproducibility studies were performed on 28 individuals. Simultaneous cuff-based and invasively measured pressure traces were acquired and compared in an additional six individuals (65 ± 20 years). Results: Central systolic BP, as estimated by the cuff-based device, was found to be highly reproducible (coefficient of variation 4 and 8% for short and long-term reproducibility, respectively) and was comparable to that estimated by tonometry (average difference 3 ± 6 mmHg, intraclass correlation coefficient = 0.91). The cuff-based pressure waveforms were similar to those acquired invasively (cross-correlation coefficient 0.93), and the difference in the estimated central systolic BP was −5 ± 8 mmHg (P = 0.2). Conclusion: Cuff-based devices show promise to simplify the measurement of central BP, whilst maintaining a similar fidelity to tonometry. This could lead to improved adoption of estimates of central BP in clinical practice. PMID:24379000

  9. Cross-layer cluster-based energy-efficient protocol for wireless sensor networks.

    PubMed

    Mammu, Aboobeker Sidhik Koyamparambil; Hernandez-Jayo, Unai; Sainz, Nekane; de la Iglesia, Idoia

    2015-01-01

    Recent developments in electronics and wireless communications have enabled the improvement of low-power and low-cost wireless sensors networks (WSNs). One of the most important challenges in WSNs is to increase the network lifetime due to the limited energy capacity of the network nodes. Another major challenge in WSNs is the hot spots that emerge as locations under heavy traffic load. Nodes in such areas quickly drain energy resources, leading to disconnection in network services. In such an environment, cross-layer cluster-based energy-efficient algorithms (CCBE) can prolong the network lifetime and energy efficiency. CCBE is based on clustering the nodes to different hexagonal structures. A hexagonal cluster consists of cluster members (CMs) and a cluster head (CH). The CHs are selected from the CMs based on nodes near the optimal CH distance and the residual energy of the nodes. Additionally, the optimal CH distance that links to optimal energy consumption is derived. To balance the energy consumption and the traffic load in the network, the CHs are rotated among all CMs. In WSNs, energy is mostly consumed during transmission and reception. Transmission collisions can further decrease the energy efficiency. These collisions can be avoided by using a contention-free protocol during the transmission period. Additionally, the CH allocates slots to the CMs based on their residual energy to increase sleep time. Furthermore, the energy consumption of CH can be further reduced by data aggregation. In this paper, we propose a data aggregation level based on the residual energy of CH and a cost-aware decision scheme for the fusion of data. Performance results show that the CCBE scheme performs better in terms of network lifetime, energy consumption and throughput compared to low-energy adaptive clustering hierarchy (LEACH) and hybrid energy-efficient distributed clustering (HEED).

  10. Cross-Layer Cluster-Based Energy-Efficient Protocol for Wireless Sensor Networks

    PubMed Central

    Mammu, Aboobeker Sidhik Koyamparambil; Hernandez-Jayo, Unai; Sainz, Nekane; de la Iglesia, Idoia

    2015-01-01

    Recent developments in electronics and wireless communications have enabled the improvement of low-power and low-cost wireless sensors networks (WSNs). One of the most important challenges in WSNs is to increase the network lifetime due to the limited energy capacity of the network nodes. Another major challenge in WSNs is the hot spots that emerge as locations under heavy traffic load. Nodes in such areas quickly drain energy resources, leading to disconnection in network services. In such an environment, cross-layer cluster-based energy-efficient algorithms (CCBE) can prolong the network lifetime and energy efficiency. CCBE is based on clustering the nodes to different hexagonal structures. A hexagonal cluster consists of cluster members (CMs) and a cluster head (CH). The CHs are selected from the CMs based on nodes near the optimal CH distance and the residual energy of the nodes. Additionally, the optimal CH distance that links to optimal energy consumption is derived. To balance the energy consumption and the traffic load in the network, the CHs are rotated among all CMs. In WSNs, energy is mostly consumed during transmission and reception. Transmission collisions can further decrease the energy efficiency. These collisions can be avoided by using a contention-free protocol during the transmission period. Additionally, the CH allocates slots to the CMs based on their residual energy to increase sleep time. Furthermore, the energy consumption of CH can be further reduced by data aggregation. In this paper, we propose a data aggregation level based on the residual energy of CH and a cost-aware decision scheme for the fusion of data. Performance results show that the CCBE scheme performs better in terms of network lifetime, energy consumption and throughput compared to low-energy adaptive clustering hierarchy (LEACH) and hybrid energy-efficient distributed clustering (HEED). PMID:25860073

  11. Hand, hip and knee osteoarthritis in a Norwegian population-based study - The MUST protocol

    PubMed Central

    2013-01-01

    Background Knowledge about the prevalence and consequences of osteoarthritis (OA) in the Norwegian population is limited. This study has been designed to gain a greater understanding of musculoskeletal pain in the general population with a focus on clinically and radiologically confirmed OA, as well as risk factors, consequences, and management of OA. Methods/Design The Musculoskeletal pain in Ullensaker STudy (MUST) has been designed as an observational study comprising a population-based postal survey and a comprehensive clinical examination of a sub-sample with self-reported OA (MUST OA cohort). All inhabitants in Ullensaker municipality, Norway, aged 40 to 79 years receive the initial population-based postal survey questionnaire with questions about life style, general health, musculoskeletal pain, self-reported OA, comorbidities, health care utilisation, medication use, and functional ability. Participants who self-report OA in their hip, knee and/or hand joints are asked to attend a comprehensive clinical examination at Diakonhjemmet Hospital, Oslo, including a comprehensive medical examination, performance-based functional tests, different imaging modalities, cardiovascular assessment, blood and urine samples, and a number of patient-reported questionnaires including five OA disease specific instruments. Data will be merged with six national data registries. A subsample of those who receive the questionnaire has previously participated in postal surveys conducted in 1990, 1994, and 2004 with data on musculoskeletal pain and functional ability in addition to demographic characteristics and a number of health related factors. This subsample constitutes a population based cohort with 20 years follow-up. Discussion This protocol describes the design of an observational population-based study that will involve the collection of data from a postal survey on musculoskeletal pain, and a comprehensive clinical examination on those with self-reported hand, hip and

  12. Comparison of prostaglandin- and progesterone-based protocols for timed artificial insemination in sheep.

    PubMed

    Olivera-Muzante, J; Fierro, S; López, V; Gil, J

    2011-04-15

    The objective was to compare the reproductive performance of a new PGF(2α)-based timed artificial insemination (TAI) protocol in sheep (Synchrovine®: two doses of PGF(2α), 7 d apart) to a traditional progesterone-eCG (P4-eCG) protocol, considering the effects of seminal state, AI-times, and AI-pathway. Three experiments involving 1297 multiparous Australian Merino ewes were done during the physiologic breeding season (location 32 °S-57 °W). Reproductive performance was assessed as non-return rate to service 21 d after AI (NRR21d), based on detection with androgenized wethers, as well as Fertility (pregnant/inseminated ewes), Prolificacy (fetuses/pregnant ewe), and Fecundity (fetuses/inseminated ewe), which were based on transabdominal ultrasonography 50 d after TAI. In Experiment 1, Synchrovine® treated ewes TAI cervically with fresh semen at 42, 48, or 54 h had similar NRR21d (0.51, 0.46, 0.57), Fertility (0.27, 0.31, 0.26), and Fecundity (0.29, 0.32, 0.27), all of which were lower (P < 0.05) than in a control P4-eCG group inseminated at 54 h (0.61, 0.48, 0.52, NRR21d, Fertility and Fecundity respectively). In Experiment 2, using chilled semen and cervical TAI, Synchrovine® treated ewes inseminated at 42 h yielded lower (P < 0.05) NRR21d, Fertility and Fecundity (0.28, 0.06, 0.06) compared to 48 (0.43, 0.24, 0.24) and 54 h (0.44, 0.22, 0.23). In Experiment 3 with chilled semen, Synchrovine® treated ewes TAI into the cervix at 51 or 57 h were similar in NRR21d (0.16 vs 0.20), Fertility (0.12 vs 0.14), and Fecundity (0.12 vs 0.15), respectively; but lower (P < 0.05) than P4-eCG treated ewes TAI at 54 h (0.34, 0.28, and 0.33 for NRR21d, Fertility and Fecundity respectively). Synchrovine® treated ewes intrauterine TAI at 51 or 57 h yielded similar NRR21d (0.51 vs 0.58), Fertility (0.43 vs 0.51), and Fecundity (0.45 vs 0.56) respectively, but lower (P < 0.05) results compared to P4-eCG treated ewes (0.75, 0.71, and 0.88 for NRR21d, Fertility and Fecundity

  13. 17 CFR 1.7 - Books and records requirements for security-based swap agreements.

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ... 17 Commodity and Securities Exchanges 1 2014-04-01 2014-04-01 false Books and records requirements... FUTURES TRADING COMMISSION GENERAL REGULATIONS UNDER THE COMMODITY EXCHANGE ACT Definitions § 1.7 Books... not be required to keep and maintain additional books and records regarding security-based...

  14. 17 CFR 1.7 - Books and records requirements for security-based swap agreements.

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ... 17 Commodity and Securities Exchanges 1 2013-04-01 2013-04-01 false Books and records requirements... FUTURES TRADING COMMISSION GENERAL REGULATIONS UNDER THE COMMODITY EXCHANGE ACT Definitions § 1.7 Books... not be required to keep and maintain additional books and records regarding security-based...

  15. Framingham Ten-Year General Cardiovascular Disease Risk: Agreement between BMI-Based and Cholesterol-Based Estimates in a South Asian Convenience Sample

    PubMed Central

    Jones, Charlotte A.; Ross, Leanne; Surani, Nadia; Dharamshi, Narissa; Karmali, Karima

    2015-01-01

    The goal of this analysis was to determine the agreement between body mass index-based and cholesterol-based ten-year Framingham general cardiovascular disease risk scores among a convenience sample of 773 South Asian Canadian adults attending community-based screening clinics. Scores were calculated using age, systolic blood pressure, antihypertensive use, current smoking, diabetes, and total cholesterol and high density lipoprotein (for cholesterol-based risk) or height and weight (for body mass index-based risk). Mean risk score differences (body mass index-based risk minus cholesterol-based risk) were estimated using paired t-tests. Bland-Altman plots were used to assess agreement between scores. Finally, agreement across risk categories (low [<10%], moderate [10% to <20%], high [> = 20%]) was examined using the kappa statistic. Average agreement between the two risk scores was quite good overall (mean differences of 0.6% for men and 0.5% for women), but increased to about 3% among participants 60–74 years of age. However, Bland-Altman plots revealed that the differences between the two scores and the variability of the differences increased with increasing average 10-year risk. In terms of clinical importance, the limits of agreement were reasonable for women < 60 years (95% confidence interval: -3.2% to 3.1%), but of concern for women 60-74 years (95% confidence interval: -6.0% to 12.3%), men < 60 years (95% confidence interval: -7.1% to 7.3%) and men 6-074 years (95% confidence interval: -13.8% to 18.8%). Agreement across categories was moderate for most sex and age groups examined (kappa values: 0.51 for women < 60 years, 0.50 for women 60-74 years, 0.65 for men < 60 years), except for men 60-74 years, where agreement was only fair (kappa = 0.26). In light of these disagreements, evaluation of a participant’s change in cardiovascular disease risk over time will necessitate use of the same risk score (i.e., either body mass index-based or cholesterol-based

  16. Efficacy of treatments and pain management for trapeziometacarpal (thumb base) osteoarthritis: protocol for a systematic review

    PubMed Central

    Hamasaki, Tokiko; Lalonde, Lyne; Harris, Patrick; Bureau, Nathalie J; Gaudreault, Nathaly; Ziegler, Daniela; Choinière, Manon

    2015-01-01

    Introduction The thumb is essential for daily activities. Unfortunately, this digit is commonly affected by trapeziometacarpal osteoarthritis (TMO), handicapping a large number of individuals. TMO constitutes an increasing human and economic burden for our society whose population is ageing. Limited access to adequate treatment is among the most important obstacles to optimal TMO management. Poor understanding of TMO characteristics, lack of knowledge about evidence-based treatments, simplistic pain management plans based solely on the patient's physical condition, absence of interprofessional communication and lack of multidisciplinary treatment guidelines contribute to inadequate TMO management. On the long term, our research project aims at improving the quality of care and services offered to patients with TMO by developing a patient-centred, evidence-based multidisciplinary management clinical pathway coordinated across the healthcare system. This proposed systematic review is a prerequisite to ensuring evidence-based practices and aims to document the efficacy of all the existing modalities for TMO management. Methods and analysis The protocol of the systematic review is registered with PROSPERO and will be conducted using the guidelines Cochrane Handbook for Systematic Reviews of Interventions. We will identify studies in English and French concerning TMO treatments through searches in Cochrane Central, EMBASE, MEDLINE, PsychINFO, CINHAL, PubMed, OT Seekers, PEDRO and the grey literature. 2 reviewers will independently screen study eligibility, extract data and appraise studies using published assessment tools. Meta-analyses will be undertaken where feasible; otherwise, narrative syntheses will be carried out. The robustness of evidence will be assessed using the GRADE system. Ethics and dissemination Ethics approval is not required for this study. A comprehensive knowledge exchange and transfer plan incorporating effective strategies will be used to

  17. SCPS-TP, TCP, and Rate-Based Protocol Evaluation. Revised

    NASA Technical Reports Server (NTRS)

    Tran, Diepchi T.; Lawas-Grodek, Frances J.; Dimond, Robert P.; Ivancic, William D.

    2005-01-01

    Tests were performed at Glenn Research Center to compare the performance of the Space Communications Protocol Standard Transport Protocol (SCPS TP, otherwise known as "TCP Tranquility") relative to other variants of TCP and to determine the implementation maturity level of these protocols, particularly for higher speeds. The testing was performed over reasonably high data rates of up to 100 Mbps with delays that are characteristic of near-planetary environments. The tests were run for a fixed packet size, but for variously errored environments. This report documents the testing performed to date.

  18. Mapping a competency-based surgical curriculum in urology: Agreement (and discrepancies) in the Canadian national opinion

    PubMed Central

    Rourke, Keith Francis; MacNeily, Andrew E.

    2016-01-01

    Introduction: Urology residency training in Canada is quickly evolving from a time-based to a competency-based model. We aim to better define core surgical competencies that would comprise a surgical curriculum and assess any discrepancies in opinion nationally. Methods: A web-based survey was validated and sent to the 536 practicing members of the Canadian Urological Association (CUA) in August and October 2014. The survey consisted of questions regarding practice demographics, fellowship training, and evaluated the 76 most common urological procedures (using a five-point Likert scale) in the context of the question, “After completion of residency training in Canada a urologist should be proficient in…” A core procedure was defined as one for which there was ≥75% agreement. Descriptive statistics and non-parametric testing were used to summarize the findings. Results: A total of 138 urologists completed the survey (25.7% response rate) with representation from all geographic regions. Respondents included 40.6% community and 59.4% academic urologists. The survey identified 16 procedures with 90–100% agreement and a total of 30 core procedures with ≥75% agreement. When comparing community and academic urologists, there was statistically significant disagreement on 27 procedures, including 11 core procedures, most notably cystectomy (88.5% agreement vs. 67.1%; p=0.002), open pyeloplasty (84.6% vs. 65.8%; p=0.04), simple prostatectomy (78.9% vs. 69.7%; p=0.03), perineal urethrostomy (80.8% vs. 67.1%; p=0.02), open radical prostatectomy (96.1% vs. 80.3%; p=0.007), and Boari flap (90.4% vs. 76.3%; p=0.004). Regional discrepancies were also found, demonstrating eight procedures deemed uniquely core and three core procedures deemed less important regionally. Conclusions: This national survey has provided some consensus on 30 procedures that should comprise a core surgical curriculum in urology. However, there are some key differences of opinion (most notably

  19. Therapeutic hypothermia in the postresuscitation patient: the development and implementation of an evidence-based protocol for the emergency department.

    PubMed

    Koran, Zeb

    2009-01-01

    Studies have shown that therapeutic hypothermia (TH) improves outcomes in patients who have experienced a cardiac arrest (; ). This article discusses TH and the process used by one emergency department to develop and implement an evidence-based protocol on TH for the postresuscitation patient.

  20. Reducing Tobacco Use among Youth: Community-Based Approaches. A Guideline for Prevention Practitioners. Prevention Enhancement Protocols System (PEPS) Series.

    ERIC Educational Resources Information Center

    Birch & Davis Associates, Inc., Silver Spring, MD.

    A substantial knowledge base exists on reduction of tobacco use by youth. Effective prevention in this area can have major health and economic benefits. Information from research and prevention practice, organized by means of the Prevention Enhancement Protocols System (PEPS), is provided in the form of guidelines and recommendations for planning…

  1. Assessing the Fecal Microbiota: An Optimized Ion Torrent 16S rRNA Gene-Based Analysis Protocol

    PubMed Central

    Foroni, Elena; Duranti, Sabrina; Turroni, Francesca; Lugli, Gabriele Andrea; Sanchez, Borja; Martín, Rebeca; Gueimonde, Miguel; van Sinderen, Douwe; Margolles, Abelardo; Ventura, Marco

    2013-01-01

    Assessing the distribution of 16S rRNA gene sequences within a biological sample represents the current state-of-the-art for determination of human gut microbiota composition. Advances in dissecting the microbial biodiversity of this ecosystem have very much been dependent on the development of novel high-throughput DNA sequencing technologies, like the Ion Torrent. However, the precise representation of this bacterial community may be affected by the protocols used for DNA extraction as well as by the PCR primers employed in the amplification reaction. Here, we describe an optimized protocol for 16S rRNA gene-based profiling of the fecal microbiota. PMID:23869230

  2. Facilitators and barriers to the successful implementation of a protocol to detect child abuse based on parental characteristics.

    PubMed

    Diderich, Hester M; Dechesne, Mark; Fekkes, Minne; Verkerk, Paul H; Pannebakker, Fieke D; Klein Velderman, Mariska; Sorensen, Peggy J G; Buitendijk, Simone E; Oudesluys-Murphy, Anne Marie

    2014-11-01

    To determine the critical facilitating and impeding factors underlying successful implementation of a method to detect child abuse based on parental rather than child characteristics known as the Hague Protocol. The original implementation region of the protocol (The Hague) was compared to a new implementation region (Friesland), using analysis of referrals, focus group interviews (n=6) at the Emergency departments (ED) and at the Reporting Centers for Child abuse and Neglect (RCCAN) as well as questionnaires (n=76) at the EDs. Implementation of the Hague Protocol substantially increased the number of referrals to the RCCAN in both regions. In Friesland, the new implementation region, the number of referrals increased from 2 out of 92,464 patients (three per 100,000) to 108 out of 167,037 patients (62 per 100,000). However in Friesland, child abuse was confirmed in a substantially lower percentage of cases relative to the initial implementation region (62% vs. 91%, respectively). Follow-up analyses suggest that this lower positive predictive value may be due to the lack of training for RCCAN professionals concerning the Hague Protocol. The focus group interviews and questionnaires point to time limitations as the main impediment for implementation, whereas an implementation coach has been mentioned as the most important facilitating factor for success. The Hague Protocol can be used to detect child abuse beyond the initial implementation region. However, training is essential in order to assure a consistent evaluation by the RCCAN. PMID:25192959

  3. Facilitators and barriers to the successful implementation of a protocol to detect child abuse based on parental characteristics.

    PubMed

    Diderich, Hester M; Dechesne, Mark; Fekkes, Minne; Verkerk, Paul H; Pannebakker, Fieke D; Klein Velderman, Mariska; Sorensen, Peggy J G; Buitendijk, Simone E; Oudesluys-Murphy, Anne Marie

    2014-11-01

    To determine the critical facilitating and impeding factors underlying successful implementation of a method to detect child abuse based on parental rather than child characteristics known as the Hague Protocol. The original implementation region of the protocol (The Hague) was compared to a new implementation region (Friesland), using analysis of referrals, focus group interviews (n=6) at the Emergency departments (ED) and at the Reporting Centers for Child abuse and Neglect (RCCAN) as well as questionnaires (n=76) at the EDs. Implementation of the Hague Protocol substantially increased the number of referrals to the RCCAN in both regions. In Friesland, the new implementation region, the number of referrals increased from 2 out of 92,464 patients (three per 100,000) to 108 out of 167,037 patients (62 per 100,000). However in Friesland, child abuse was confirmed in a substantially lower percentage of cases relative to the initial implementation region (62% vs. 91%, respectively). Follow-up analyses suggest that this lower positive predictive value may be due to the lack of training for RCCAN professionals concerning the Hague Protocol. The focus group interviews and questionnaires point to time limitations as the main impediment for implementation, whereas an implementation coach has been mentioned as the most important facilitating factor for success. The Hague Protocol can be used to detect child abuse beyond the initial implementation region. However, training is essential in order to assure a consistent evaluation by the RCCAN.

  4. GENERAL: A New Solution to Detectable Byzantine Agreement Problem

    NASA Astrophysics Data System (ADS)

    Qin, Su-Juan; Wen, Qiao-Yan; Meng, Luo-Ming; Zhu, Fu-Chen

    2009-12-01

    We present a new quantum protocol for solving detectable Byzantine agreement problem between three parties by employing one quantum key distribution protocol. The protocol is suggested by a special four-qubit entangled state instead of singlet states, which shows that singlet states are not necessary to achieve detectable Byzantine agreement.

  5. 1H NMR-based protocol for the detection of adulterations of refined olive oil with refined hazelnut oil.

    PubMed

    Mannina, Luisa; D'Imperio, Marco; Capitani, Donatella; Rezzi, Serge; Guillou, Claude; Mavromoustakos, Thomas; Vilchez, María Dolores Molero; Fernández, Antonio Herrera; Thomas, Freddy; Aparicio, Ramon

    2009-12-23

    A (1)H NMR analytical protocol for the detection of refined hazelnut oils in admixtures with refined olive oils is reported according to ISO format. The main purpose of this research activity is to suggest a novel analytical methodology easily usable by operators with a basic knowledge of NMR spectroscopy. The protocol, developed on 92 oil samples of different origins within the European MEDEO project, is based on (1)H NMR measurements combined with a suitable statistical analysis. It was developed using a 600 MHz instrument and was tested by two independent laboratories on 600 MHz spectrometers, allowing detection down to 10% adulteration of olive oils with refined hazelnut oils. Finally, the potential and limitations of the protocol applied on spectrometers operating at different magnetic fields, that is, at the proton frequencies of 500 and 400 MHz, were investigated.

  6. A Multipath Routing Protocol Based on Clustering and Ant Colony Optimization for Wireless Sensor Networks

    PubMed Central

    Yang, Jing; Xu, Mai; Zhao, Wei; Xu, Baoguo

    2010-01-01

    For monitoring burst events in a kind of reactive wireless sensor networks (WSNs), a multipath routing protocol (MRP) based on dynamic clustering and ant colony optimization (ACO) is proposed. Such an approach can maximize the network lifetime and reduce the energy consumption. An important attribute of WSNs is their limited power supply, and therefore some metrics (such as energy consumption of communication among nodes, residual energy, path length) were considered as very important criteria while designing routing in the MRP. Firstly, a cluster head (CH) is selected among nodes located in the event area according to some parameters, such as residual energy. Secondly, an improved ACO algorithm is applied in the search for multiple paths between the CH and sink node. Finally, the CH dynamically chooses a route to transmit data with a probability that depends on many path metrics, such as energy consumption. The simulation results show that MRP can prolong the network lifetime, as well as balance of energy consumption among nodes and reduce the average energy consumption effectively. PMID:22399890

  7. Gender-based violence and absent fathers: a scoping review protocol

    PubMed Central

    Sikweyiya, Yandisa; Nduna, Mzikazi; Khuzwayo, Nelisiwe; Mthombeni, Andile; Mashamba-Thompson, Tivani Phosa

    2016-01-01

    Introduction Gender-based violence (GBV) and absent fathers are two epidemics that affect women and children in sub-Saharan Africa. However, the understanding of the complex links between GBV and absent fathers is currently inadequate. The aim of the study is to provide an overview of documented evidence that links GBV and absent fathers as well as identifies areas that require systematic review and where more primary research is needed. Methods and analysis The search strategy for this scoping review study will involve electronic databases including: Academic Search Premier, Ingenta, Kluwer Online, PsycARTICLES (EBSCO), PsycINFO (EBSCO), Social Work Abstracts and Sociological Collection. The studies will be mapped in 2 stages: stage 1 will map studies descriptively by focus and method; stage 2 will involve additional inclusion criteria, quality assessment and data extraction undertaken by two reviewers in parallel. A thematic analysis of the studies will be carried out to extract relevant outcomes using NVIVO. Discussion We anticipate finding a large number of studies on GBV diagnostic interventions in sub-Saharan Africa which, once summarised, will be useful to guide future research. The protocol for the scoping review has been registered in PROSPERO. Dissemination The study will be disseminated electronically and in print. It will also be presented to conferences related to GBV, Father Connections and Children's Health. PROSPERO registration number CRD42015022094. PMID:27297007

  8. Implementation of NAT for VoIP based on H.323 protocol

    NASA Astrophysics Data System (ADS)

    Huang, Yong-feng; Xu, Shi-ming; Li, Xing

    2004-04-01

    In this paper, firstly, we introduce the protocol of VoIP, and analyze the process of a call establishment based on H.323, including RAS, H.225, and H.245 phases. Then, we focus on implementing ALG, which allow an application on a host in one address realm to connect to its counterpart running on a host in different realm transparently. An ALG may interact with NAT to set up state, use NAT state information, modify application specific payload and perform whatever else necessary to get the application running across disparate address realm. In addition, this section presents many important data structures and algorithms, for example, the algorithm to check for match of remote IP address and port, the algorithm for classifier to look at both outbound as well as an inbound packets, and etc. Finally, the paper describes and analyzes the results of experiments, and we obtain some significant parameters, namely, call setup latency and packet forwarding latency. The experiments and applications demonstrate it feasible for ALG to realize NAT for VoIP.

  9. A fission matrix based validation protocol for computed power distributions in the advanced test reactor

    SciTech Connect

    Nielsen, J. W.; Nigg, D. W.; LaPorta, A. W.

    2013-07-01

    The Idaho National Laboratory (INL) has been engaged in a significant multi year effort to modernize the computational reactor physics tools and validation procedures used to support operations of the Advanced Test Reactor (ATR) and its companion critical facility (ATRC). Several new protocols for validation of computed neutron flux distributions and spectra as well as for validation of computed fission power distributions, based on new experiments and well-recognized least-squares statistical analysis techniques, have been under development. In the case of power distributions, estimates of the a priori ATR-specific fuel element-to-element fission power correlation and covariance matrices are required for validation analysis. A practical method for generating these matrices using the element-to-element fission matrix is presented, along with a high-order scheme for estimating the underlying fission matrix itself. The proposed methodology is illustrated using the MCNP5 neutron transport code for the required neutronics calculations. The general approach is readily adaptable for implementation using any multidimensional stochastic or deterministic transport code that offers the required level of spatial, angular, and energy resolution in the computed solution for the neutron flux and fission source. (authors)

  10. Protocol Improvements for Low Concentration DNA-Based Bioaerosol Sampling and Analysis

    PubMed Central

    Ng, Chun Kiat; Miller, Dana; Cao, Bin

    2015-01-01

    Introduction As bioaerosol research attracts increasing attention, there is a need for additional efforts that focus on method development to deal with different environmental samples. Bioaerosol environmental samples typically have very low biomass concentrations in the air, which often leaves researchers with limited options in choosing the downstream analysis steps, especially when culture-independent methods are intended. Objectives This study investigates the impacts of three important factors that can influence the performance of culture-independent DNA-based analysis in dealing with bioaerosol environmental samples engaged in this study. The factors are: 1) enhanced high temperature sonication during DNA extraction; 2) effect of sampling duration on DNA recoverability; and 3) an alternative method for concentrating composite samples. In this study, DNA extracted from samples was analysed using the Qubit fluorometer (for direct total DNA measurement) and quantitative polymerase chain reaction (qPCR). Results and Findings The findings suggest that additional lysis from high temperature sonication is crucial: DNA yields from both high and low biomass samples increased up to 600% when the protocol included 30-min sonication at 65°C. Long air sampling duration on a filter media was shown to have a negative impact on DNA recoverability with up to 98% of DNA lost over a 20-h sampling period. Pooling DNA from separate samples during extraction was proven to be feasible with margins of error below 30%. PMID:26619279

  11. Outpatient-based treatment protocols in the management of venous thromboembolic disease.

    PubMed

    Spyropoulos, A C

    2000-11-01

    Clinical trial data are demonstrating that the safety and efficacy of treating deep vein thrombosis (DVT) on an outpatient basis with low-molecular weight heparin (LMWH) are equal to inpatient care with unfractionated heparin (UFH). Moreover, LMWH therapy offers multiple advantages, including improved bioavailability at lower doses, reduced heparin resistance, a longer half-life, and potentially, less bleeding. Although these potential advantages are acknowledged, patient selection and risk stratification criteria for patients being considered for LMWH therapy are discussed less frequently; nonetheless, they deserve careful consideration. The protocol utilized by Lovelace Health Systems, a staff model health maintenance organization, features an outpatient-based DVT treatment program that includes exclusionary risk factors for outpatient treatment of venous thromboembolic disease (VTE). Evidence from clinical findings at Lovelace suggests that patients without absolute exclusionary risk factors can successfully be treated with LMWH as outpatients. Specific study results show that 61% of patients were eligible for outpatient therapy and had fewer recurrences of VTE (1.9%) than those comorbid matched patients who were hospitalized with traditional UFH therapy the previous year (4.1%). These findings suggest that LMWH is both safe and efficacious in the home treatment of VTE in a managed care setting when established patient selection criteria and risk stratification strategies are carefully maintained.

  12. Modified calibration protocol evaluated in a model-based testing of SBR flexibility.

    PubMed

    Corominas, Lluís; Sin, Gürkan; Puig, Sebastià; Balaguer, Maria Dolors; Vanrolleghem, Peter A; Colprim, Jesús

    2011-02-01

    The purpose of this paper is to refine the BIOMATH calibration protocol for SBR systems, in particular to develop a pragmatic calibration protocol that takes advantage of SBR information-rich data, defines a simulation strategy to obtain proper initial conditions for model calibration and provides statistical evaluation of the calibration outcome. The updated calibration protocol is then evaluated on a case study to obtain a thoroughly validated model for testing the flexibility of an N-removing SBR to adapt the operating conditions to the changing influent wastewater load. The performance of reference operation using fixed phase length and dissolved oxygen set points and two real-time control strategies is compared to find optimal operation under dynamic conditions. The results show that a validated model of high quality is obtained using the updated protocol and that the optimization of the system's performance can be achieved in different manners by implementing the proposed control strategies.

  13. Evidence-based protocol for structural rehabilitation of the spine and posture: review of clinical biomechanics of posture (CBP®) publications

    PubMed Central

    Oakley, Paul A.; Harrison, Donald D.; Harrison, Deed E.; Haas, Jason W.

    2005-01-01

    BACKGROUND Although practice protocols exist for SMT and functional rehabilitation, no practice protocols exist for structural rehabilitation. Traditional chiropractic practice guidelines have been limited to acute and chronic pain treatment, with limited inclusion of functional and exclusion of structural rehabilitation procedures. OBJECTIVE (1) To derive an evidence-based practice protocol for structural rehabilitation from publications on Clinical Biomechanics of Posture (CBP®) methods, and (2) to compare the evidence for Diversified, SMT, and CBP®. METHODS Clinical control trials utilizing CBP® methods and spinal manipulative therapy (SMT) were obtained from searches in Mantis, CINAHL, and Index Medicus. Using data from SMT review articles, evidence for Diversified Technique (as taught in chiropractic colleges), SMT, and CBP® were rated and compared. RESULTS From the evidence from Clinical Control Trials on SMT and CBP®, there is very little evidence support for Diversified (our rating = 18), as taught in chiropractic colleges, for the treatment of pain subjects, while CBP® (our rating = 46) and SMT for neck pain (rating = 58) and low back pain (our rating = 202) have evidence-based support. CONCLUSIONS While CBP® Technique has approximately as much evidence-based support as SMT for neck pain, CBP® has more evidence to support its methods than the Diversified technique taught in chiropractic colleges, but not as much as SMT for low back pain. The evolution of chiropractic specialization has occurred, and doctors providing structural-based chiropractic care require protocol guidelines for patient quality assurance and standardization. A structural rehabilitation protocol was developed based on evidence from CBP® publications. PMID:17549209

  14. Practical quantum private query of blocks based on unbalanced-state Bennett-Brassard-1984 quantum-key-distribution protocol

    PubMed Central

    Wei, Chun-Yan; Gao, Fei; Wen, Qiao-Yan; Wang, Tian-Yin

    2014-01-01

    Until now, the only kind of practical quantum private query (QPQ), quantum-key-distribution (QKD)-based QPQ, focuses on the retrieval of a single bit. In fact, meaningful message is generally composed of multiple adjacent bits (i.e., a multi-bit block). To obtain a message from database, the user Alice has to query l times to get each ai. In this condition, the server Bob could gain Alice's privacy once he obtains the address she queried in any of the l queries, since each ai contributes to the message Alice retrieves. Apparently, the longer the retrieved message is, the worse the user privacy becomes. To solve this problem, via an unbalanced-state technique and based on a variant of multi-level BB84 protocol, we present a protocol for QPQ of blocks, which allows the user to retrieve a multi-bit block from database in one query. Our protocol is somewhat like the high-dimension version of the first QKD-based QPQ protocol proposed by Jacobi et al., but some nontrivial modifications are necessary. PMID:25518810

  15. Practical quantum private query of blocks based on unbalanced-state Bennett-Brassard-1984 quantum-key-distribution protocol.

    PubMed

    Wei, Chun-Yan; Gao, Fei; Wen, Qiao-Yan; Wang, Tian-Yin

    2014-01-01

    Until now, the only kind of practical quantum private query (QPQ), quantum-key-distribution (QKD)-based QPQ, focuses on the retrieval of a single bit. In fact, meaningful message is generally composed of multiple adjacent bits (i.e., a multi-bit block). To obtain a message a1a2···al from database, the user Alice has to query l times to get each ai. In this condition, the server Bob could gain Alice's privacy once he obtains the address she queried in any of the l queries, since each a(i) contributes to the message Alice retrieves. Apparently, the longer the retrieved message is, the worse the user privacy becomes. To solve this problem, via an unbalanced-state technique and based on a variant of multi-level BB84 protocol, we present a protocol for QPQ of blocks, which allows the user to retrieve a multi-bit block from database in one query. Our protocol is somewhat like the high-dimension version of the first QKD-based QPQ protocol proposed by Jacobi et al., but some nontrivial modifications are necessary. PMID:25518810

  16. Optimized Protocol for Quantitative Multiple Reaction Monitoring-Based Proteomic Analysis of Formalin-Fixed, Paraffin-Embedded Tissues.

    PubMed

    Kennedy, Jacob J; Whiteaker, Jeffrey R; Schoenherr, Regine M; Yan, Ping; Allison, Kimberly; Shipley, Melissa; Lerch, Melissa; Hoofnagle, Andrew N; Baird, Geoffrey Stuart; Paulovich, Amanda G

    2016-08-01

    Despite a clinical, economic, and regulatory imperative to develop companion diagnostics, precious few new biomarkers have been successfully translated into clinical use, due in part to inadequate protein assay technologies to support large-scale testing of hundreds of candidate biomarkers in formalin-fixed paraffin-embedded (FFPE) tissues. Although the feasibility of using targeted, multiple reaction monitoring mass spectrometry (MRM-MS) for quantitative analyses of FFPE tissues has been demonstrated, protocols have not been systematically optimized for robust quantification across a large number of analytes, nor has the performance of peptide immuno-MRM been evaluated. To address this gap, we used a test battery approach coupled to MRM-MS with the addition of stable isotope-labeled standard peptides (targeting 512 analytes) to quantitatively evaluate the performance of three extraction protocols in combination with three trypsin digestion protocols (i.e., nine processes). A process based on RapiGest buffer extraction and urea-based digestion was identified to enable similar quantitation results from FFPE and frozen tissues. Using the optimized protocols for MRM-based analysis of FFPE tissues, median precision was 11.4% (across 249 analytes). There was excellent correlation between measurements made on matched FFPE and frozen tissues, both for direct MRM analysis (R(2) = 0.94) and immuno-MRM (R(2) = 0.89). The optimized process enables highly reproducible, multiplex, standardizable, quantitative MRM in archival tissue specimens.

  17. Optimized Protocol for Quantitative Multiple Reaction Monitoring-Based Proteomic Analysis of Formalin-Fixed, Paraffin-Embedded Tissues.

    PubMed

    Kennedy, Jacob J; Whiteaker, Jeffrey R; Schoenherr, Regine M; Yan, Ping; Allison, Kimberly; Shipley, Melissa; Lerch, Melissa; Hoofnagle, Andrew N; Baird, Geoffrey Stuart; Paulovich, Amanda G

    2016-08-01

    Despite a clinical, economic, and regulatory imperative to develop companion diagnostics, precious few new biomarkers have been successfully translated into clinical use, due in part to inadequate protein assay technologies to support large-scale testing of hundreds of candidate biomarkers in formalin-fixed paraffin-embedded (FFPE) tissues. Although the feasibility of using targeted, multiple reaction monitoring mass spectrometry (MRM-MS) for quantitative analyses of FFPE tissues has been demonstrated, protocols have not been systematically optimized for robust quantification across a large number of analytes, nor has the performance of peptide immuno-MRM been evaluated. To address this gap, we used a test battery approach coupled to MRM-MS with the addition of stable isotope-labeled standard peptides (targeting 512 analytes) to quantitatively evaluate the performance of three extraction protocols in combination with three trypsin digestion protocols (i.e., nine processes). A process based on RapiGest buffer extraction and urea-based digestion was identified to enable similar quantitation results from FFPE and frozen tissues. Using the optimized protocols for MRM-based analysis of FFPE tissues, median precision was 11.4% (across 249 analytes). There was excellent correlation between measurements made on matched FFPE and frozen tissues, both for direct MRM analysis (R(2) = 0.94) and immuno-MRM (R(2) = 0.89). The optimized process enables highly reproducible, multiplex, standardizable, quantitative MRM in archival tissue specimens. PMID:27462933

  18. Optimized protocol for quantitative multiple reaction monitoring-based proteomic analysis of formalin-fixed, paraffin embedded tissues

    PubMed Central

    Kennedy, Jacob J.; Whiteaker, Jeffrey R.; Schoenherr, Regine M.; Yan, Ping; Allison, Kimberly; Shipley, Melissa; Lerch, Melissa; Hoofnagle, Andrew N.; Baird, Geoffrey Stuart; Paulovich, Amanda G.

    2016-01-01

    Despite a clinical, economic, and regulatory imperative to develop companion diagnostics, precious few new biomarkers have been successfully translated into clinical use, due in part to inadequate protein assay technologies to support large-scale testing of hundreds of candidate biomarkers in formalin-fixed paraffin embedded (FFPE) tissues. While the feasibility of using targeted, multiple reaction monitoring-mass spectrometry (MRM-MS) for quantitative analyses of FFPE tissues has been demonstrated, protocols have not been systematically optimized for robust quantification across a large number of analytes, nor has the performance of peptide immuno-MRM been evaluated. To address this gap, we used a test battery approach coupled to MRM-MS with the addition of stable isotope labeled standard peptides (targeting 512 analytes) to quantitatively evaluate the performance of three extraction protocols in combination with three trypsin digestion protocols (i.e. 9 processes). A process based on RapiGest buffer extraction and urea-based digestion was identified to enable similar quantitation results from FFPE and frozen tissues. Using the optimized protocols for MRM-based analysis of FFPE tissues, median precision was 11.4% (across 249 analytes). There was excellent correlation between measurements made on matched FFPE and frozen tissues, both for direct MRM analysis (R2 = 0.94) and immuno-MRM (R2 = 0.89). The optimized process enables highly reproducible, multiplex, standardizable, quantitative MRM in archival tissue specimens. PMID:27462933

  19. The protocols for the 10/66 dementia research group population-based research programme

    PubMed Central

    Prince, Martin; Ferri, Cleusa P; Acosta, Daisy; Albanese, Emiliano; Arizaga, Raul; Dewey, Michael; Gavrilova, Svetlana I; Guerra, Mariella; Huang, Yueqin; Jacob, KS; Krishnamoorthy, ES; McKeigue, Paul; Rodriguez, Juan Llibre; Salas, Aquiles; Sosa, Ana Luisa; Sousa, Renata MM; Stewart, Robert; Uwakwe, Richard

    2007-01-01

    Background Latin America, China and India are experiencing unprecedentedly rapid demographic ageing with an increasing number of people with dementia. The 10/66 Dementia Research Group's title refers to the 66% of people with dementia that live in developing countries and the less than one tenth of population-based research carried out in those settings. This paper describes the protocols for the 10/66 population-based and intervention studies that aim to redress this imbalance. Methods/design Cross-sectional comprehensive one phase surveys have been conducted of all residents aged 65 and over of geographically defined catchment areas in ten low and middle income countries (India, China, Nigeria, Cuba, Dominican Republic, Brazil, Venezuela, Mexico, Peru and Argentina), with a sample size of between 1000 and 3000 (generally 2000). Each of the studies uses the same core minimum data set with cross-culturally validated assessments (dementia diagnosis and subtypes, mental disorders, physical health, anthropometry, demographics, extensive non communicable disease risk factor questionnaires, disability/functioning, health service utilisation, care arrangements and caregiver strain). Nested within the population based studies is a randomised controlled trial of a caregiver intervention for people with dementia and their families (ISRCTN41039907; ISRCTN41062011; ISRCTN95135433; ISRCTN66355402; ISRCTN93378627; ISRCTN94921815). A follow up of 2.5 to 3.5 years will be conducted in 7 countries (China, Cuba, Dominican Republic, Venezuela, Mexico, Peru and Argentina) to assess risk factors for incident dementia, stroke and all cause and cause-specific mortality; verbal autopsy will be used to identify causes of death. Discussion The 10/66 DRG baseline population-based studies are nearly complete. The incidence phase will be completed in 2009. All investigators are committed to establish an anonymised file sharing archive with monitored public access. Our aim is to create an

  20. Strong Password-Based Authentication in TLS Using the Three-PartyGroup Diffie-Hellman Protocol

    SciTech Connect

    Abdalla, Michel; Bresson, Emmanuel; Chevassut, Olivier; Moeller,Bodo; Pointcheval, David

    2006-08-26

    The Internet has evolved into a very hostile ecosystem where"phishing'' attacks are common practice. This paper shows that thethree-party group Diffie-Hellman key exchange can help protect againstthese attacks. We have developed a suite of password-based cipher suitesfor the Transport Layer Security (TLS) protocol that are not onlyprovably secure but also assumed to be free from patent and licensingrestrictions based on an analysis of relevant patents in thearea.

  1. Q-Learning and p-persistent CSMA based rendezvous protocol for cognitive radio networks operating with shared spectrum activity

    NASA Astrophysics Data System (ADS)

    Watson, Clifton L.; Biswas, Subir

    2014-06-01

    With an increasing demand for spectrum, dynamic spectrum access (DSA) has been proposed as viable means for providing the flexibility and greater access to spectrum necessary to meet this demand. Within the DSA concept, unlicensed secondary users temporarily "borrow" or access licensed spectrum, while respecting the licensed primary user's rights to that spectrum. As key enablers for DSA, cognitive radios (CRs) are based on software-defined radios which allow them to sense, learn, and adapt to the spectrum environment. These radios can operate independently and rapidly switch channels. Thus, the initial setup and maintenance of cognitive radio networks are dependent upon the ability of CR nodes to find each other, in a process known as rendezvous, and create a link on a common channel for the exchange of data and control information. In this paper, we propose a novel rendezvous protocol, known as QLP, which is based on Q-learning and the p-persistent CSMA protocol. With the QLP protocol, CR nodes learn which channels are best for rendezvous and thus adapt their behavior to visit those channels more frequently. We demonstrate through simulation that the QLP protocol provides a rendevous capability for DSA environments with different dynamics of PU activity, while attempting to achieve the following performance goals: (1) minimize the average time-to-rendezvous, (2) maximize system throughput, (3) minimize primary user interference, and (4) minimize collisions among CR nodes.

  2. Shock in the first 24 h of intensive care unit stay: observational study of protocol-based fluid management.

    PubMed

    See, Kay Choong; Mukhopadhyay, Amartya; Lau, Samuel Chuan-Xian; Tan, Sandra Ming-Yien; Lim, Tow Keang; Phua, Jason

    2015-05-01

    Precision in fluid management for shock could lead to better clinical outcomes. We evaluated the association of protocol-based fluid management with intensive care unit (ICU) and hospital mortality. We performed an observational study of mechanically ventilated patients admitted directly from our emergency department to the ICU from August 2011 to December 2013, who had circulatory shock in the first 24 h of ICU stay (systolic blood pressure <90 mmHg at ICU admission or lactate >4 mmol/L). Patients with onset of shock beyond 24 h of ICU stay were excluded. Protocol-based fluid management required close physician-nurse cooperation and computerized documentation, checking for fluid response (≥10% arterial pulse pressure or stroke volume increase after two consecutive 250-mL crystalloid boluses), and fluid loading with repeated 500-mL boluses until fluid response became negative. Six hundred twelve mechanically ventilated patients with shock (mean [±SD] age, 63.0 years [16.5]; 252 or 41.2% females; mean Acute Physiology and Chronic Health Evaluation II score, 30.2 [8.8]) were studied. The fluid management protocol was used 455 times for 242 patients (39.5% of 612 patients) within the first 24 h of ICU stay, with 244 (53.6% of 455) positive responses. Adjusted for age, sex, Acute Physiology and Chronic Health Evaluation II score, comorbidity, and admission year, protocol use was associated with reduced ICU mortality (odds ratio, 0.60; 95% confidence interval, 0.39-0.94; P = 0.025) but not hospital mortality (odds ratio, 0.82; 95% confidence interval, 0.54-1.23; P = 0.369). Among mechanically ventilated patients with shock within the first 24 h of ICU stay, about half had positive fluid responses. Adherence to protocol-based fluid management was associated with improved ICU survival.

  3. FDG-PET-Based Radiotherapy Planning in Lung Cancer: Optimum Breathing Protocol and Patient Positioning-An Intraindividual Comparison

    SciTech Connect

    Grgic, Aleksandar

    2009-01-01

    Purpose: Fluoro-2-deoxy-D-glucose (FDG)-positron emission tomography (PET) and PET/computed tomography (CT) are increasingly used for radiotherapy (RT) planning in patients with non-small-cell lung carcinoma. The planning process often is based on separately acquired FDG-PET/CT and planning CT scans. We compared intraindividual differences between PET acquired in diagnostic (D-PET) and RT treatment position (RT-PET) coregistered with planning CTs acquired using different breathing protocols. Methods and Materials: Sixteen patients with non-small-cell lung carcinoma underwent two PET acquisitions (D-PET and RT-PET) and three planning CT acquisitions (expiration [EXP], inspiration [INS], and mid-breath hold [MID]) on the same day. All scans were rigidly coregistered, resulting in six fused data sets: D-INS, D-EXP, D-MID, RT-INS, RT-EXP, and RT-MID. Fusion accuracy was assessed by three readers at eight anatomic landmarks, lung apices, aortic arch, heart, spine, sternum, carina, diaphragm, and tumor, by using an alignment score ranging from 1 (no alignment) to 5 (exact alignment). Results: The RT-PET showed better alignment with any CT than D-PET (p < 0.001). With regard to breathing, RT-MID showed the best mean alignment score (3.7 {+-} 1.0), followed by RT-EXP (3.5 {+-} 0.9) and RT-INS (3.0 {+-} 0.8), with all differences significant (p < 0.001). Comparing alignment scores with regard to anatomic landmarks, the largest deviations were found at the diaphragm, heart, and apices. Overall, there was fair agreement ({kappa} = 0.48; p < 0.001) among the three readers. Conclusions: Significantly better fusion of PET and planning CT can be reached with PET acquired in the RT position. The best intraindividual fusion results are obtained with the planning CT performed during mid-breath hold. Our data justify the acquisition of a separate planning PET in RT treatment position if only a diagnostic PET scan is available.

  4. Patient-based estimation of organ dose for a population of 58 adult patients across 13 protocol categories

    SciTech Connect

    Sahbaee, Pooyan; Segars, W. Paul; Samei, Ehsan

    2014-07-15

    Purpose: This study aimed to provide a comprehensive patient-specific organ dose estimation across a multiplicity of computed tomography (CT) examination protocols. Methods: A validated Monte Carlo program was employed to model a common CT system (LightSpeed VCT, GE Healthcare). The organ and effective doses were estimated from 13 commonly used body and neurological CT examination. The dose estimation was performed on 58 adult computational extended cardiac-torso phantoms (35 male, 23 female, mean age 51.5 years, mean weight 80.2 kg). The organ dose normalized by CTDI{sub vol} (h factor) and effective dose normalized by the dose length product (DLP) (k factor) were calculated from the results. A mathematical model was derived for the correlation between the h and k factors with the patient size across the protocols. Based on this mathematical model, a dose estimation iPhone operating system application was designed and developed to be used as a tool to estimate dose to the patients for a variety of routinely used CT examinations. Results: The organ dose results across all the protocols showed an exponential decrease with patient body size. The correlation was generally strong for the organs which were fully or partially located inside the scan coverage (Pearson sample correlation coefficient (r) of 0.49). The correlation was weaker for organs outside the scan coverage for which distance between the organ and the irradiation area was a stronger predictor of dose to the organ. For body protocols, the effective dose before and after normalization by DLP decreased exponentially with increasing patient's body diameter (r > 0.85). The exponential relationship between effective dose and patient's body diameter was significantly weaker for neurological protocols (r < 0.41), where the trunk length was a slightly stronger predictor of effective dose (0.15 < r < 0.46). Conclusions: While the most accurate estimation of a patient dose requires specific modeling of the patient

  5. Patient-based estimation of organ dose for a population of 58 adult patients across 13 protocol categories

    PubMed Central

    Sahbaee, Pooyan; Segars, W. Paul; Samei, Ehsan

    2014-01-01

    Purpose: This study aimed to provide a comprehensive patient-specific organ dose estimation across a multiplicity of computed tomography (CT) examination protocols. Methods: A validated Monte Carlo program was employed to model a common CT system (LightSpeed VCT, GE Healthcare). The organ and effective doses were estimated from 13 commonly used body and neurological CT examination. The dose estimation was performed on 58 adult computational extended cardiac-torso phantoms (35 male, 23 female, mean age 51.5 years, mean weight 80.2 kg). The organ dose normalized by CTDIvol (h factor) and effective dose normalized by the dose length product (DLP) (k factor) were calculated from the results. A mathematical model was derived for the correlation between the h and k factors with the patient size across the protocols. Based on this mathematical model, a dose estimation iPhone operating system application was designed and developed to be used as a tool to estimate dose to the patients for a variety of routinely used CT examinations. Results: The organ dose results across all the protocols showed an exponential decrease with patient body size. The correlation was generally strong for the organs which were fully or partially located inside the scan coverage (Pearson sample correlation coefficient (r) of 0.49). The correlation was weaker for organs outside the scan coverage for which distance between the organ and the irradiation area was a stronger predictor of dose to the organ. For body protocols, the effective dose before and after normalization by DLP decreased exponentially with increasing patient's body diameter (r > 0.85). The exponential relationship between effective dose and patient's body diameter was significantly weaker for neurological protocols (r < 0.41), where the trunk length was a slightly stronger predictor of effective dose (0.15 < r < 0.46). Conclusions: While the most accurate estimation of a patient dose requires specific modeling of the patient

  6. ANALOG I/O MODULE TEST SYSTEM BASED ON EPICS CA PROTOCOL AND ACTIVEX CA INTERFACE

    SciTech Connect

    YENG,YHOFF,L.

    2003-10-13

    Analog input (ADC) and output (DAC) modules play a substantial role in device level control of accelerator and large experiment physics control system. In order to get the best performance some features of analog modules including linearity, accuracy, crosstalk, thermal drift and so on have to be evaluated during the preliminary design phase. Gain and offset error calibration and thermal drift compensation (if needed) may have to be done in the implementation phase as well. A natural technique for performing these tasks is to interface the analog VO modules and GPIB interface programmable test instruments with a computer, which can complete measurements or calibration automatically. A difficulty is that drivers of analog modules and test instruments usually work on totally different platforms (vxworks VS Windows). Developing new test routines and drivers for testing instruments under VxWorks (or any other RTOS) platform is not a good solution because such systems have relatively poor user interface and developing such software requires substantial effort. EPICS CA protocol and ActiveX CA interface provide another choice, a PC and LabVIEW based test system. Analog 110 module can be interfaced from LabVIEW test routines via ActiveX CA interface. Test instruments can be controlled via LabVIEW drivers, most of which are provided by instrument vendors or by National Instruments. Labview also provides extensive data analysis and process functions. Using these functions, users can generate powerful test routines very easily. Several applications built for Spallation Neutron Source (SNS) Beam Loss Monitor (BLM) system are described in this paper.

  7. An efficient and reliable geographic routing protocol based on partial network coding for underwater sensor networks.

    PubMed

    Hao, Kun; Jin, Zhigang; Shen, Haifeng; Wang, Ying

    2015-01-01

    Efficient routing protocols for data packet delivery are crucial to underwater sensor networks (UWSNs). However, communication in UWSNs is a challenging task because of the characteristics of the acoustic channel. Network coding is a promising technique for efficient data packet delivery thanks to the broadcast nature of acoustic channels and the relatively high computation capabilities of the sensor nodes. In this work, we present GPNC, a novel geographic routing protocol for UWSNs that incorporates partial network coding to encode data packets and uses sensor nodes' location information to greedily forward data packets to sink nodes. GPNC can effectively reduce network delays and retransmissions of redundant packets causing additional network energy consumption. Simulation results show that GPNC can significantly improve network throughput and packet delivery ratio, while reducing energy consumption and network latency when compared with other routing protocols.

  8. An Efficient and Reliable Geographic Routing Protocol Based on Partial Network Coding for Underwater Sensor Networks

    PubMed Central

    Hao, Kun; Jin, Zhigang; Shen, Haifeng; Wang, Ying

    2015-01-01

    Efficient routing protocols for data packet delivery are crucial to underwater sensor networks (UWSNs). However, communication in UWSNs is a challenging task because of the characteristics of the acoustic channel. Network coding is a promising technique for efficient data packet delivery thanks to the broadcast nature of acoustic channels and the relatively high computation capabilities of the sensor nodes. In this work, we present GPNC, a novel geographic routing protocol for UWSNs that incorporates partial network coding to encode data packets and uses sensor nodes’ location information to greedily forward data packets to sink nodes. GPNC can effectively reduce network delays and retransmissions of redundant packets causing additional network energy consumption. Simulation results show that GPNC can significantly improve network throughput and packet delivery ratio, while reducing energy consumption and network latency when compared with other routing protocols. PMID:26029955

  9. The specification-based validation of reliable multicast protocol: Problem Report. M.S. Thesis

    NASA Technical Reports Server (NTRS)

    Wu, Yunqing

    1995-01-01

    Reliable Multicast Protocol (RMP) is a communication protocol that provides an atomic, totally ordered, reliable multicast service on top of unreliable IP multicasting. In this report, we develop formal models for RMP using existing automated verification systems, and perform validation on the formal RMP specifications. The validation analysis help identifies some minor specification and design problems. We also use the formal models of RMP to generate a test suite for conformance testing of the implementation. Throughout the process of RMP development, we follow an iterative, interactive approach that emphasizes concurrent and parallel progress of implementation and verification processes. Through this approach, we incorporate formal techniques into our development process, promote a common understanding for the protocol, increase the reliability of our software, and maintain high fidelity between the specifications of RMP and its implementation.

  10. A Bidirectional Quantum Secure Direct Communication Protocol Based on Five-Particle Cluster State

    NASA Astrophysics Data System (ADS)

    Chang, Yan; Zhang, Shi-Bin; Yan, Li-Li

    2013-09-01

    To transmit a message safely, five-particle cluster state particles are used to construct a bidirectional quantum secure direct communication protocol. Five-particle cluster state particles are used for both detecting eavesdroppers and transmitting secret messages. All of the five-particle cluster states' photons for detection are mixed to the sending sequence to detect eavesdroppers. The detection rate approaches 88% per qubit. The five-particle cluster states needed are only one fifth of the photons in the sending sequence. In this protocol, there is no photon carrying secret information transmitting in quantum channel, and the classical XOR operation which serves as a one-time-pad is used to ensure the security of the protocol. Compared with three photons of each five-particle cluster state as detection photons, the five photons in this study will decrease the five-particle cluster states needed for detection greatly.

  11. An advanced temporal credential-based security scheme with mutual authentication and key agreement for wireless sensor networks.

    PubMed

    Li, Chun-Ta; Weng, Chi-Yao; Lee, Cheng-Chi

    2013-01-01

    Wireless sensor networks (WSNs) can be quickly and randomly deployed in any harsh and unattended environment and only authorized users are allowed to access reliable sensor nodes in WSNs with the aid of gateways (GWNs). Secure authentication models among the users, the sensor nodes and GWN are important research issues for ensuring communication security and data privacy in WSNs. In 2013, Xue et al. proposed a temporal-credential-based mutual authentication and key agreement scheme for WSNs. However, in this paper, we point out that Xue et al.'s scheme cannot resist stolen-verifier, insider, off-line password guessing, smart card lost problem and many logged-in users' attacks and these security weaknesses make the scheme inapplicable to practical WSN applications. To tackle these problems, we suggest a simple countermeasure to prevent proposed attacks while the other merits of Xue et al.'s authentication scheme are left unchanged. PMID:23887085

  12. An Advanced Temporal Credential-Based Security Scheme with Mutual Authentication and Key Agreement for Wireless Sensor Networks

    PubMed Central

    Li, Chun-Ta; Weng, Chi-Yao; Lee, Cheng-Chi

    2013-01-01

    Wireless sensor networks (WSNs) can be quickly and randomly deployed in any harsh and unattended environment and only authorized users are allowed to access reliable sensor nodes in WSNs with the aid of gateways (GWNs). Secure authentication models among the users, the sensor nodes and GWN are important research issues for ensuring communication security and data privacy in WSNs. In 2013, Xue et al. proposed a temporal-credential-based mutual authentication and key agreement scheme for WSNs. However, in this paper, we point out that Xue et al.'s scheme cannot resist stolen-verifier, insider, off-line password guessing, smart card lost problem and many logged-in users' attacks and these security weaknesses make the scheme inapplicable to practical WSN applications. To tackle these problems, we suggest a simple countermeasure to prevent proposed attacks while the other merits of Xue et al.'s authentication scheme are left unchanged. PMID:23887085

  13. An advanced temporal credential-based security scheme with mutual authentication and key agreement for wireless sensor networks.

    PubMed

    Li, Chun-Ta; Weng, Chi-Yao; Lee, Cheng-Chi

    2013-07-24

    Wireless sensor networks (WSNs) can be quickly and randomly deployed in any harsh and unattended environment and only authorized users are allowed to access reliable sensor nodes in WSNs with the aid of gateways (GWNs). Secure authentication models among the users, the sensor nodes and GWN are important research issues for ensuring communication security and data privacy in WSNs. In 2013, Xue et al. proposed a temporal-credential-based mutual authentication and key agreement scheme for WSNs. However, in this paper, we point out that Xue et al.'s scheme cannot resist stolen-verifier, insider, off-line password guessing, smart card lost problem and many logged-in users' attacks and these security weaknesses make the scheme inapplicable to practical WSN applications. To tackle these problems, we suggest a simple countermeasure to prevent proposed attacks while the other merits of Xue et al.'s authentication scheme are left unchanged.

  14. Size-based protocol optimization using automatic tube current modulation and automatic kV selection in computed tomography.

    PubMed

    MacDougall, Robert D; Kleinman, Patricia L; Callahan, Michael J

    2016-01-01

    Size-based diagnostic reference ranges (DRRs) for contrast-enhanced pediatric abdominal computed tomography (CT) have been published in order to establish practical upper and lower limits of CTDI, DLP, and SSDE. Based on these DRRs, guidelines for establishing size-based SSDE target levels from the SSDE of a standard adult by applying a linear correction factor have been published and provide a great reference for dose optimization initiatives. The necessary step of designing manufacturer-specific CT protocols to achieve established SSDE targets is the responsibility of the Qualified Medical Physicist. The task is straightforward if fixed-mA protocols are used, however, more difficult when automatic exposure control (AEC) and automatic kV selection are considered. In such cases, the physicist must deduce the operation of AEC algorithms from technical documentation or through testing, using a wide range of phantom sizes. Our study presents the results of such testing using anthropomorphic phantoms ranging in size from the newborn to the obese adult. The effect of each user-controlled parameter was modeled for a single-manufacturer AEC algorithm (Siemens CARE Dose4D) and automatic kV selection algorithm (Siemens CARE kV). Based on the results presented in this study, a process for designing mA-modulated, pediatric abdominal CT protocols that achieve user-defined SSDE and kV targets is described. PMID:26894344

  15. Low-dose tacrolimus (FK506)-based immunosuppressive protocol in living donor renal transplantation.

    PubMed

    Kokado, Y; Takahara, S; Kyo, M; Ichimaru, N; Jing-Ding, W; Miki, T; Okuyama, A

    1998-01-01

    In order to avoid the side effects of tacrolimus (FK506), a lowdose FK506-based regimen was started from 1 June 1991. The dose was adjusted to maintain the FK506 whole blood trough level at 15-20 ng/ml for 7 days postoperatively, at 10-15 ng/ml for 2 months, and under 10 ng/ml thereafter. The graft survival rates at 3 years and 5 years were 87.8 and 82.3% (FK506) vs 86.8 and 86.8% [cyclosporine (CyA)]. The incidence of acute rejection within the first 90 days was 31.6% in the FK506 group which was lower than the 57.1% of the CyA group (P = 0.0585). Grades of acute rejection episodes over IIA in the FK506 group were 20%, which was lower than the 37% in the CyA group. The mean oral dosages of FK506 were 0.061 and 0.04 mg/kg per day at 3 and 5 years, respectively. The incidence of new onset diabetes was 27.8% in the FK506 group and 17.1% in the CyA group. However, insulin therapy was withdrawn in all patients of the FK506 group within 5 months. The percentage of patients who required an antihypertensive agent was 28.6% and 40% in the FK506 group and 73.2% and 88% in the CyA group at 1 and 3 years, respectively (P < 0.05). Nephrotoxicity was seen in 20% of the FK506 group and 14.3% of the CyA group. Hypercholesterolemia was less frequent in the FK506 group than the CyA group. The FK506-based regimen described here is a protocol with the potential to reduce its adverse effects. The Whole blood concentration of FK506 should be monitored and blood levels maintained in the range of 5-10 ng/ml after 90 postoperative days for optimal efficacy and minimal toxicity.

  16. Randomized control trial of computer-based rehabilitation of spatial neglect syndrome: the RESPONSE trial protocol

    PubMed Central

    2014-01-01

    Background Spatial neglect is a frequent and debilitating consequence of acquired brain injury and currently has no widely accepted standard of care. While previous interventions for spatial neglect have targeted patients’ overt spatial deficits (e.g., reduced contralesional visual scanning), far fewer have directly targeted patients’ non-spatial deficits (e.g., sustained attention deficits). Considering that non-spatial deficits have shown to be highly predictive of long-term disability, we developed a novel computer based training program that targets both sustained (tonic) and moment-to-moment (phasic) aspects of non-spatial attention (Tonic and Phasic Alertness Training, TAPAT). Preliminary studies demonstrate that TAPAT is safe and effective in improving both spatial and non-spatial attention deficits in the post-acute recovery phase in neglect patients. The purpose of the current trial (referred to as the REmediation of SPatial Neglect or RESPONSE trial) is to compare TAPAT to an active control training condition, include a larger sample of patients, and assess both cognitive and functional outcomes. Methods/Design We will employ a multi-site, longitudinal, blinded randomized controlled trial (RCT) design with a target sample of 114 patients with spatial neglect. Patients will either perform, at their home, the experimental TAPAT training program or an active control computer games condition for thirty minutes/day, five days a week, over three months. Patients will be assessed on a battery of cognitive and functional outcomes on three occasions: a) immediately before training, b) within forty-eight hours post completion of total training, and c) after a three-month no-contact period post completion of total training, to assess the longevity of potential training effects. Discussion The strengths of this protocol are that it tests an innovative, in-home administered treatment that targets a fundamental deficit in neglect, employs highly sensitive computer-based

  17. Cost-Effective Encryption-Based Autonomous Routing Protocol for Efficient and Secure Wireless Sensor Networks.

    PubMed

    Saleem, Kashif; Derhab, Abdelouahid; Orgun, Mehmet A; Al-Muhtadi, Jalal; Rodrigues, Joel J P C; Khalil, Mohammed Sayim; Ali Ahmed, Adel

    2016-01-01

    The deployment of intelligent remote surveillance systems depends on wireless sensor networks (WSNs) composed of various miniature resource-constrained wireless sensor nodes. The development of routing protocols for WSNs is a major challenge because of their severe resource constraints, ad hoc topology and dynamic nature. Among those proposed routing protocols, the biology-inspired self-organized secure autonomous routing protocol (BIOSARP) involves an artificial immune system (AIS) that requires a certain amount of time to build up knowledge of neighboring nodes. The AIS algorithm uses this knowledge to distinguish between self and non-self neighboring nodes. The knowledge-building phase is a critical period in the WSN lifespan and requires active security measures. This paper proposes an enhanced BIOSARP (E-BIOSARP) that incorporates a random key encryption mechanism in a cost-effective manner to provide active security measures in WSNs. A detailed description of E-BIOSARP is presented, followed by an extensive security and performance analysis to demonstrate its efficiency. A scenario with E-BIOSARP is implemented in network simulator 2 (ns-2) and is populated with malicious nodes for analysis. Furthermore, E-BIOSARP is compared with state-of-the-art secure routing protocols in terms of processing time, delivery ratio, energy consumption, and packet overhead. The findings show that the proposed mechanism can efficiently protect WSNs from selective forwarding, brute-force or exhaustive key search, spoofing, eavesdropping, replaying or altering of routing information, cloning, acknowledgment spoofing, HELLO flood attacks, and Sybil attacks. PMID:27043572

  18. Cost-Effective Encryption-Based Autonomous Routing Protocol for Efficient and Secure Wireless Sensor Networks

    PubMed Central

    Saleem, Kashif; Derhab, Abdelouahid; Orgun, Mehmet A.; Al-Muhtadi, Jalal; Rodrigues, Joel J. P. C.; Khalil, Mohammed Sayim; Ali Ahmed, Adel

    2016-01-01

    The deployment of intelligent remote surveillance systems depends on wireless sensor networks (WSNs) composed of various miniature resource-constrained wireless sensor nodes. The development of routing protocols for WSNs is a major challenge because of their severe resource constraints, ad hoc topology and dynamic nature. Among those proposed routing protocols, the biology-inspired self-organized secure autonomous routing protocol (BIOSARP) involves an artificial immune system (AIS) that requires a certain amount of time to build up knowledge of neighboring nodes. The AIS algorithm uses this knowledge to distinguish between self and non-self neighboring nodes. The knowledge-building phase is a critical period in the WSN lifespan and requires active security measures. This paper proposes an enhanced BIOSARP (E-BIOSARP) that incorporates a random key encryption mechanism in a cost-effective manner to provide active security measures in WSNs. A detailed description of E-BIOSARP is presented, followed by an extensive security and performance analysis to demonstrate its efficiency. A scenario with E-BIOSARP is implemented in network simulator 2 (ns-2) and is populated with malicious nodes for analysis. Furthermore, E-BIOSARP is compared with state-of-the-art secure routing protocols in terms of processing time, delivery ratio, energy consumption, and packet overhead. The findings show that the proposed mechanism can efficiently protect WSNs from selective forwarding, brute-force or exhaustive key search, spoofing, eavesdropping, replaying or altering of routing information, cloning, acknowledgment spoofing, HELLO flood attacks, and Sybil attacks. PMID:27043572

  19. Cost-Effective Encryption-Based Autonomous Routing Protocol for Efficient and Secure Wireless Sensor Networks.

    PubMed

    Saleem, Kashif; Derhab, Abdelouahid; Orgun, Mehmet A; Al-Muhtadi, Jalal; Rodrigues, Joel J P C; Khalil, Mohammed Sayim; Ali Ahmed, Adel

    2016-01-01

    The deployment of intelligent remote surveillance systems depends on wireless sensor networks (WSNs) composed of various miniature resource-constrained wireless sensor nodes. The development of routing protocols for WSNs is a major challenge because of their severe resource constraints, ad hoc topology and dynamic nature. Among those proposed routing protocols, the biology-inspired self-organized secure autonomous routing protocol (BIOSARP) involves an artificial immune system (AIS) that requires a certain amount of time to build up knowledge of neighboring nodes. The AIS algorithm uses this knowledge to distinguish between self and non-self neighboring nodes. The knowledge-building phase is a critical period in the WSN lifespan and requires active security measures. This paper proposes an enhanced BIOSARP (E-BIOSARP) that incorporates a random key encryption mechanism in a cost-effective manner to provide active security measures in WSNs. A detailed description of E-BIOSARP is presented, followed by an extensive security and performance analysis to demonstrate its efficiency. A scenario with E-BIOSARP is implemented in network simulator 2 (ns-2) and is populated with malicious nodes for analysis. Furthermore, E-BIOSARP is compared with state-of-the-art secure routing protocols in terms of processing time, delivery ratio, energy consumption, and packet overhead. The findings show that the proposed mechanism can efficiently protect WSNs from selective forwarding, brute-force or exhaustive key search, spoofing, eavesdropping, replaying or altering of routing information, cloning, acknowledgment spoofing, HELLO flood attacks, and Sybil attacks.

  20. Ant-based distributed protocol for coordination of a swarm of robots in demining mission

    NASA Astrophysics Data System (ADS)

    De Rango, Floriano; Palmieri, Nunzia

    2016-05-01

    Coordination among multiple robots has been extensively studied, since a number of practical real problem s can be performed using an effective approach. In this paper is investigated a collective task that requires a multi-robot system to search for randomly distributed mines in an unknown environment and disarm them cooperatively. The communication among the swarm of robots influences the overall performance in terms of time to execute the task or consumed energy. To address this problem, a new distributed recruiting protocol to coordinate a swarm of robots in demining mission, is described. This problem is a multi-objective problem and two bio inspired strategies are used. The novelty of this approach lies in the combination of direct and indirect communication: on one hand an indirect communication among robots is used for the exploration of the environment, on the other hand a novel protocol is used to accomplish the recruiting and coordination of the robots for demining task. This protocol attempts to tackle the question of how autonomous robot can coordinate themselves into an unknown environment relying on simple low-level capabilities. The strategy is able to adapt the current system dynamics if the number of robots or the environment structure or both change. The proposed approach has been implemented and has been evaluated in several simulated environments. We analyzed the impact of our approach in the overall performance of a robot team. Experimental results indicated the effectiveness and efficiency of the proposed protocol to spread the robots in the environment.

  1. Treatment Protocols for Eating Disorders: Clinicians' Attitudes, Concerns, Adherence and Difficulties Delivering Evidence-Based Psychological Interventions.

    PubMed

    Waller, Glenn

    2016-04-01

    There are several protocols in existence that guide clinicians in the implementation of effective, evidence-based psychological interventions for eating disorders. These have been made accessible in the form of treatment manuals. However, relatively few clinicians use those protocols, preferring to offer more eclectic or integrative approaches. Following a summary of the research that shows that these evidence-based approaches can be used successfully in routine clinical settings, this review considers why there is such poor uptake of these therapies in such settings. This review focuses on the role of service culture and on clinicians' own attitudes, beliefs and emotions. Possible means of enhancing uptake are considered, but these cannot be considered to be ideal solutions at present. PMID:26893234

  2. Robust chaotic map-based authentication and key agreement scheme with strong anonymity for telecare medicine information systems.

    PubMed

    Jiang, Qi; Ma, Jianfeng; Lu, Xiang; Tian, Youliang

    2014-02-01

    To ensure only authorized access to medical services, several authentication schemes for telecare medicine information systems (TMIS) have been proposed in the literature. Due to its better performance than traditional cryptography, Hao et al. proposed an authentication scheme for TMIS using chaotic map based cryptography. They claimed that their scheme could resist various attacks, including the smart card stolen attack. However, we identify that their scheme is vulnerable to the stolen smart card attack. The reason causing the stolen smart card attack is that the scheme is designed based on the assumption that the scheme itself achieves user untraceability. Then, we propose a robust authentication and key agreement scheme. Compared with the previous schemes, our scheme not only enjoys more security features, but also has better efficiency. Our analysis indicates that designing a two-factor authentication scheme based on the assumption that privacy protection is achieved in the scheme itself may pose potential security risks. The lesson learned is that, we should avoid this situation in the future design of two-factor authentication schemes. PMID:24493073

  3. Application Agreement and Integration Services

    NASA Technical Reports Server (NTRS)

    Driscoll, Kevin R.; Hall, Brendan; Schweiker, Kevin

    2013-01-01

    Application agreement and integration services are required by distributed, fault-tolerant, safety critical systems to assure required performance. An analysis of distributed and hierarchical agreement strategies are developed against the backdrop of observed agreement failures in fielded systems. The documented work was performed under NASA Task Order NNL10AB32T, Validation And Verification of Safety-Critical Integrated Distributed Systems Area 2. This document is intended to satisfy the requirements for deliverable 5.2.11 under Task 4.2.2.3. This report discusses the challenges of maintaining application agreement and integration services. A literature search is presented that documents previous work in the area of replica determinism. Sources of non-deterministic behavior are identified and examples are presented where system level agreement failed to be achieved. We then explore how TTEthernet services can be extended to supply some interesting application agreement frameworks. This document assumes that the reader is familiar with the TTEthernet protocol. The reader is advised to read the TTEthernet protocol standard [1] before reading this document. This document does not re-iterate the content of the standard.

  4. Evidence based decontamination protocols for the removal of external Δ9-tetrahydrocannabinol (THC) from contaminated hair.

    PubMed

    Duvivier, Wilco F; Peeters, Ruth J P; van Beek, Teris A; Nielen, Michel W F

    2016-02-01

    External contamination can cause false positive results in forensic hair testing for drugs of abuse and is therefore a major concern when hair evidence is used in court. Current literature about decontamination strategies is mainly focused on external cocaine contamination and no consensus on the best decontamination procedure for hair samples containing cannabinoids has been reached so far. In this study, different protocols with solvents, both organic as well as aqueous, were tested on blank and drug user hair for their performance on removing external cannabis contamination originating from either smoke or indirect contact with cannabis plant material. Smoke contamination was mimicked by exposing hair samples to smoke from a cannabis cigarette and indirect contact contamination by handling hair with cannabis contaminated gloves or hands. Δ9-tetrahydrocannabinol (THC) levels in the hair samples and wash solvents were determined using liquid chromatography tandem mass spectrometry (LC-MS/MS) analysis. Aqueous surfactant solutions removed more THC contamination compared to water, but much less than organic solvents. Methanol, dichloromethane and chloroform were most efficient in removing THC contamination. Due to its lower environmental impact, methanol was chosen as the preferred decontamination solvent. After testing of different sequential wash steps on externally contaminated blank hair, three protocols performed equally well, removing all normal level and more than 99% of unrealistically high levels of external cannabis contamination. Thorough testing on cannabis users' hair, both as such and after deliberate contamination, showed that using these protocols all contamination could be washed from the hair while no incorporated THC was removed from truly positive samples. The present study provides detailed scientific evidence in support of the recommendations of the Society of Hair Testing: a protocol using a single methanol wash followed by a single aqueous

  5. Outband Sensing-Based Dynamic Frequency Selection (DFS) Algorithm without Full DFS Test in IEEE 802.11h Protocol

    NASA Astrophysics Data System (ADS)

    Jeung, Jaemin; Jeong, Seungmyeong; Lim, Jaesung

    We propose an outband sensing-based IEEE 802.11h protocol without a full dynamic frequency selection (DFS) test. This scheme has two features. Firstly, every station performs a cooperative outband sensing, instead of inband sensing during a quiet period. And secondly, as soon as a current channel becomes bad, every station immediately hops to a good channel using the result of outband sensing. Simulation shows the proposed scheme increases network throughput against the legacy IEEE 802.11h.

  6. Comparison of human septal nuclei MRI measurements using automated segmentation and a new manual protocol based on histology.

    PubMed

    Butler, Tracy; Zaborszky, Laszlo; Pirraglia, Elizabeth; Li, Jinyu; Wang, Xiuyuan Hugh; Li, Yi; Tsui, Wai; Talos, Delia; Devinsky, Orrin; Kuchna, Izabela; Nowicki, Krzysztof; French, Jacqueline; Kuzniecky, Rubin; Wegiel, Jerzy; Glodzik, Lidia; Rusinek, Henry; deLeon, Mony J; Thesen, Thomas

    2014-08-15

    Septal nuclei, located in basal forebrain, are strongly connected with hippocampi and important in learning and memory, but have received limited research attention in human MRI studies. While probabilistic maps for estimating septal volume on MRI are now available, they have not been independently validated against manual tracing of MRI, typically considered the gold standard for delineating brain structures. We developed a protocol for manual tracing of the human septal region on MRI based on examination of neuroanatomical specimens. We applied this tracing protocol to T1 MRI scans (n=86) from subjects with temporal epilepsy and healthy controls to measure septal volume. To assess the inter-rater reliability of the protocol, a second tracer used the same protocol on 20 scans that were randomly selected from the 72 healthy controls. In addition to measuring septal volume, maximum septal thickness between the ventricles was measured and recorded. The same scans (n=86) were also analyzed using septal probabilistic maps and DARTEL toolbox in SPM. Results show that our manual tracing algorithm is reliable, and that septal volume measurements obtained via manual and automated methods correlate significantly with each other (p<.001). Both manual and automated methods detected significantly enlarged septal nuclei in patients with temporal lobe epilepsy in accord with a proposed compensatory neuroplastic process related to the strong connections between septal nuclei and hippocampi. Septal thickness, which was simple to measure with excellent inter-rater reliability, correlated well with both manual and automated septal volume, suggesting it could serve as an easy-to-measure surrogate for septal volume in future studies. Our results call attention to the important though understudied human septal region, confirm its enlargement in temporal lobe epilepsy, and provide a reliable new manual delineation protocol that will facilitate continued study of this critical region.

  7. Effects of Detergent-Based Protocols on Decellularization of Corneas With Sclerocorneal Limbus. Evaluation of Regional Differences

    PubMed Central

    González-Andrades, Miguel; Carriel, Victor; Rivera-Izquierdo, Mario; Garzón, Ingrid; González-Andrades, Elena; Medialdea, Santiago; Alaminos, Miguel; Campos, Antonio

    2015-01-01

    Purpose: In this work, we decellularized whole porcine corneas including the sclerocorneal limbus (SCL) and we evaluated regional differences in order to identify an efficient method to decellularize whole corneas for future clinical use. Methods: We analyzed the efficiency of four decellularization protocols based on benzalkonium chloride (BAK), Igepal, sodium dodecyl sulfate (SDS), and Triton X-100 detergents on whole porcine corneas. Results: Results showed that the decellularization efficiency of most protocols was low, with the specific protocol resulting in more efficient levels of decellularization being 0.1% SDS for 48 hours, especially in the medium and posterior cornea regions. A significant correlation was found between the decellularization efficiency and the concentration of agent used (P = 0.0174; r = 0.1540), but not for the incubation time (P > 0.05). The analysis of cornea components preservation demonstrated that all protocols were able to preserve the integrity of the Bowman's layer and Descemet's membrane. Although the collagen structure was partially altered, the global decellularization groups showing highest preservation of the ECM collagen contents and orientation were Igepal and SDS, with differences among the three regions of the cornea. All global groups showed high levels of proteoglycan and glycoprotein preservation after decellularization, with the best results were found in the SDS group followed by the Igepal group. Conclusions: These results suggest that very powerful protocols are necessary for whole-cornea decellularization. For the generation of lamelar corneas for clinical use, decellularization regional differences should be taken into account. Translational Relevance: Decellularized whole corneas may be potential therapeutic agents for lamelar keratoplasty. PMID:25909036

  8. Individualized Immunosuppressive Protocol of Liver Transplant Recipient Should be Made Based on Splenic Function Status

    PubMed Central

    Song, Ji-Yong; Du, Guo-Sheng; Xiao, Li; Chen, Wen; Suo, Long-Long; Gao, Yu; Feng, Li-Kui; Shi, Bing-Yi

    2016-01-01

    Background: Lymphocyte subsets play important roles in rejection in liver transplant recipients, and the effect of splenic function on these roles remains unknown. The aim of this study was to explore the feasibility to adjust immunosuppressive agents based on splenic function status through detecting the lymphocyte subsets in liver transplant recipients. Methods: The lymphocyte subsets of 49 liver transplant recipients were assessed in the 309th Hospital of Chinese People's Liberation Army between June 2014 and August 2015. The patients were divided into splenectomy group (n = 9), normal splenic function group (n = 24), and hypersplenism group (n = 16). The percentages and counts of CD4+ T, CD8+ T, natural killer (NK) cell, B-cell, regulatory B-cell (Breg), and regulatory T-cell (Treg) were detected by flow cytometer. In addition, the immunosuppressive agents, histories of rejection and infection, and postoperative time of the patients were compared among the three groups. Results: There was no significant difference of clinical characteristics among the three groups. The percentage of CD19+CD24+CD38+ Breg was significantly higher in hypersplenism group than normal splenic function group and splenectomy group (3.29 ± 0.97% vs. 2.12 ± 1.08% and 1.90 ± 0.99%, P = 0.001). The same result was found in CD4+CD25+FoxP3+ Treg percentage (0.97 ± 0.39% vs. 0.54 ± 0.31% and 0.56 ± 0.28%, P = 0.001). The counts of CD8+ T-cell, CD4+ T-cell, and NK cell were significantly lower in hypersplenism group than normal splenic function group (254.25 ± 149.08 vs. 476.96 ± 225.52, P = 0.002; 301.69 ± 154.39 vs. 532.50 ± 194.42, P = 0.000; and 88.56 ± 63.15 vs. 188.33 ± 134.51, P = 0.048). Moreover, the counts of CD4+ T-cell and NK cell were significantly lower in hypersplenism group than splenectomy group (301.69 ± 154.39 vs. 491.89 ± 132.31, P = 0.033; and 88.56 ± 63.15 vs. 226.00 ± 168.85, P = 0.032). Conclusion: Splenic function status might affect the immunity of

  9. The stages of implementation completion for evidence-based practice: protocol for a mixed methods study

    PubMed Central

    2014-01-01

    Background This protocol describes the ‘development of outcome measures and suitable methodologies for dissemination and implementation approaches,’ a priority for implementation research. Although many evidence-based practices (EBPs) have been developed, large knowledge gaps remain regarding how to routinely move EBPs into usual care. The lack of understanding of ‘what it takes’ to install EBPs has costly public health consequences, including a lack of availability of the most beneficial services, wasted efforts and resources on failed implementation attempts, and the potential for engendering reluctance to try implementing new EBPs after failed attempts. The Stages of Implementation Completion (SIC) is an eight-stage tool of implementation process and milestones, with stages spanning three implementation phases (pre-implementation, implementation, sustainability). Items delineate the date that a site completes implementation activities, yielding an assessment of duration (time to complete a stage), proportion (of stage activities completed), and a general measure of how far a site moved in the implementation process. Methods/Design We propose to extend the SIC to EBPs operating in child service sectors (juvenile justice, schools, substance use, child welfare). Both successful and failed implementation attempts will be scrutinized using a mixed methods design. Stage costs will be measured and examined. Both retrospective data (from previous site implementation efforts) and prospective data (from newly adopting sites) will be analyzed. The influence of pre-implementation on implementation and sustainability outcomes will be examined (Aim 1). Mixed methods procedures will focus on increasing understanding of the process of implementation failure in an effort to determine if the SIC can provide early detection of sites that are unlikely to succeed (Aim 2). Study activities will include cost mapping of SIC stages and an examination of the relationship between

  10. Clarifying CLARITY: Quantitative Optimization of the Diffusion Based Delipidation Protocol for Genetically Labeled Tissue.

    PubMed

    Magliaro, Chiara; Callara, Alejandro L; Mattei, Giorgio; Morcinelli, Marco; Viaggi, Cristina; Vaglini, Francesca; Ahluwalia, Arti

    2016-01-01

    Tissue clarification has been recently proposed to allow deep tissue imaging without light scattering. The clarification parameters are somewhat arbitrary and dependent on tissue type, source and dimension: every laboratory has its own protocol, but a quantitative approach to determine the optimum clearing time is still lacking. Since the use of transgenic mouse lines that express fluorescent proteins to visualize specific cell populations is widespread, a quantitative approach to determine the optimum clearing time for genetically labeled neurons from thick murine brain slices using CLARITY2 is described. In particular, as the main objective of the delipidation treatment is to clarify tissues, while limiting loss of fluorescent signal, the "goodness" of clarification was evaluated by considering the bulk tissue clarification index (BTCi) and the fraction of the fluorescent marker retained in the slice as easily quantifiable macroscale parameters. Here we describe the approach, illustrating an example of how it can be used to determine the optimum clearing time for 1 mm-thick cerebellar slice from transgenic L7GFP mice, in which Purkinje neurons express the GFP (green fluorescent protein) tag. To validate the method, we evaluated confocal stacks of our samples using standard image processing indices (i.e., the mean pixel intensity of neurons and the contrast-to-noise ratio) as figures of merit for image quality. The results show that detergent-based delipidation for more than 5 days does not increase tissue clarity but the fraction of GFP in the tissue continues to diminish. The optimum clearing time for 1 mm-thick slices was thus identified as 5 days, which is the best compromise between the increase in light penetration depth due to removal of lipids and a decrease in fluorescent signal as a consequence of protein loss: further clearing does not improve tissue transparency, but only leads to more protein removal or degradation. The rigorous quantitative approach

  11. Clarifying CLARITY: Quantitative Optimization of the Diffusion Based Delipidation Protocol for Genetically Labeled Tissue

    PubMed Central

    Magliaro, Chiara; Callara, Alejandro L.; Mattei, Giorgio; Morcinelli, Marco; Viaggi, Cristina; Vaglini, Francesca; Ahluwalia, Arti

    2016-01-01

    Tissue clarification has been recently proposed to allow deep tissue imaging without light scattering. The clarification parameters are somewhat arbitrary and dependent on tissue type, source and dimension: every laboratory has its own protocol, but a quantitative approach to determine the optimum clearing time is still lacking. Since the use of transgenic mouse lines that express fluorescent proteins to visualize specific cell populations is widespread, a quantitative approach to determine the optimum clearing time for genetically labeled neurons from thick murine brain slices using CLARITY2 is described. In particular, as the main objective of the delipidation treatment is to clarify tissues, while limiting loss of fluorescent signal, the “goodness” of clarification was evaluated by considering the bulk tissue clarification index (BTCi) and the fraction of the fluorescent marker retained in the slice as easily quantifiable macroscale parameters. Here we describe the approach, illustrating an example of how it can be used to determine the optimum clearing time for 1 mm-thick cerebellar slice from transgenic L7GFP mice, in which Purkinje neurons express the GFP (green fluorescent protein) tag. To validate the method, we evaluated confocal stacks of our samples using standard image processing indices (i.e., the mean pixel intensity of neurons and the contrast-to-noise ratio) as figures of merit for image quality. The results show that detergent-based delipidation for more than 5 days does not increase tissue clarity but the fraction of GFP in the tissue continues to diminish. The optimum clearing time for 1 mm-thick slices was thus identified as 5 days, which is the best compromise between the increase in light penetration depth due to removal of lipids and a decrease in fluorescent signal as a consequence of protein loss: further clearing does not improve tissue transparency, but only leads to more protein removal or degradation. The rigorous quantitative

  12. Performance analysis of a proposed tightly-coupled medical instrument network based on CAN protocol.

    PubMed

    Mujumdar, Shantanu; Thongpithoonrat, Pongnarin; Gurkan, D; McKneely, Paul K; Chapman, Frank M; Merchant, Fatima

    2010-01-01

    Advances in medical devices and health care has been phenomenal during the recent years. Although medical device manufacturers have been improving their instruments, network connection of these instruments still rely on proprietary technologies. Even if the interface has been provided by the manufacturer (e.g., RS-232, USB, or Ethernet coupled with a proprietary API), there is no widely-accepted uniform data model to access data of various bedside instruments. There is a need for a common standard which allows for internetworking with the medical devices from different manufacturers. ISO/IEEE 11073 (X73) is a standard attempting to unify the interfaces of all medical devices. X73 defines a client access mechanism that would be implemented into the communication controllers (residing between an instrument and the network) in order to access/network patient data. On the other hand, MediCAN™ technology suite has been demonstrated with various medical instruments to achieve interfacing and networking with a similar goal in its open standardization approach. However, it provides a more generic definition for medical data to achieve flexibility for networking and client access mechanisms. The instruments are in turn becoming more sophisticated; however, the operation of an instrument is still expected to be locally done by authorized medical personnel. Unfortunately, each medical instrument has its unique proprietary API (application programming interface - if any) to provide automated and electronic access to monitoring data. Integration of these APIs requires an agreement with the manufacturers towards realization of interoperable health care networking. As long as the interoperability of instruments with a network is not possible, ubiquitous access to patient status is limited only to manual entry based systems. This paper demonstrates an attempt to realize an interoperable medical instrument interface for networking using MediCAN technology suite as an open

  13. Proposal of a quantitative PCR-based protocol for an optimal Pseudomonas aeruginosa detection in patients with cystic fibrosis

    PubMed Central

    2013-01-01

    Background The lung of patients with cystic fibrosis (CF) is particularly sensitive to Pseudomonas aeruginosa. This bacterium plays an important role in the poor outcome of CF patients. During the disease progress, first acquisition of P. aeruginosa is the key-step in the management of CF patients. Quantitative PCR (qPCR) offers an opportunity to detect earlier the first acquisition of P. aeruginosa by CF patients. Given the lack of a validated protocol, our goal was to find an optimal molecular protocol for detection of P. aeruginosa in CF patients. Methods We compared two formerly described qPCR formats in early detection of P. aeruginosa in CF sputum samples: a qPCR targeting oprL gene, and a multiplex PCR targeting gyrB and ecfX genes. Results Tested in vitro on a large panel of P. aeruginosa isolates and others gram-negative bacilli, oprL qPCR exhibited a better sensitivity (threshold of 10 CFU/mL versus 730 CFU/mL), whereas the gyrB/ecfX qPCR exhibited a better specificity (90% versus 73%). These results were validated ex vivo on 46 CF sputum samples positive for P. aeruginosa in culture. Ex vivo assays revealed that qPCR detected 100 times more bacterial cells than culture-based method did. Conclusion Based on these results, we proposed a reference molecular protocol combining the two qPCRs, which offers a sensitivity of 100% with a threshold of 10 CFU/mL and a specificity of 100%. This combined qPCR-based protocol can be adapted and used for other future prospective studies. PMID:24088260

  14. Development of a greenhouse-based inoculation protocol for the fungus Colletotrichum cereale pathogenic to annual bluegrass (Poa annua)

    PubMed Central

    Beirn, Lisa A.; Wang, Ruying; Clarke, Bruce B.

    2015-01-01

    The fungus Colletotrichum cereale incites anthracnose disease on Poa annua (annual bluegrass) turfgrass. Anthracnose disease is geographically widespread throughout the world and highly destructive to cool-season turfgrasses, with infections by C. cereale resulting in extensive turf loss. Comprehensive research aimed at controlling turfgrass anthracnose has been performed in the field, but knowledge of the causal organism and its basic biology is still needed. In particular, the lack of a reliable greenhouse-based inoculation protocol performed under controlled environmental conditions is an obstacle to the study of C. cereale and anthracnose disease. Our objective was to develop a consistent and reproducible inoculation protocol for the two major genetic lineages of C. cereale. By adapting previously successful field-based protocols and combining with components of existing inoculation procedures, the method we developed consistently produced C. cereale infection on two susceptible P. annua biotypes. Approximately 7 to 10 days post-inoculation, plants exhibited chlorosis and thinning consistent with anthracnose disease symptomology. Morphological inspection of inoculated plants revealed visual signs of the fungus (appressoria and acervuli), although acervuli were not always present. After stringent surface sterilization of inoculated host tissue, C. cereale was consistently re-isolated from symptomatic tissue. Real-time PCR detection analysis based on the Apn2 marker confirmed the presence of the pathogen in host tissue, with both lineages of C. cereale detected from all inoculated plants. When a humidifier was not used, no infection developed for any biotypes or fungal isolates tested. The inoculation protocol described here marks significant progress for in planta studies of C. cereale, and will enable scientifically reproducible investigations of the biology, infectivity and lifestyle of this important grass pathogen. PMID:26339538

  15. The RTS2 protocol

    NASA Astrophysics Data System (ADS)

    Kubánek, Petr; Jelínek, Martin; French, John; Prouza, Michal; Vítek, Stanislav; Castro-Tirado, Alberto J.; Reglero, Victor

    2008-07-01

    Remote Telescope System 2nd version (RTS2) is an open source project aimed at developing a software environment to control a fully robotic observatory. RTS2 consists of various components, which communicate via an ASCII based protocol. As the protocol was from the beginning designed as an observatory control system, it provides some unique features, which are hard to find in the other communication systems. These features include advanced synchronisation mechanisms and strategies for setting variables. This presentation describes the protocol and its unique features. It also assesses protocol performance, and provides examples how the RTS2 library can be used to quickly build an observatory control system.

  16. Distributed project scheduling at NASA: Requirements for manual protocols and computer-based support

    NASA Technical Reports Server (NTRS)

    Richards, Stephen F.

    1992-01-01

    The increasing complexity of space operations and the inclusion of interorganizational and international groups in the planning and control of space missions lead to requirements for greater communication, coordination, and cooperation among mission schedulers. These schedulers must jointly allocate scarce shared resources among the various operational and mission oriented activities while adhering to all constraints. This scheduling environment is complicated by such factors as the presence of varying perspectives and conflicting objectives among the schedulers, the need for different schedulers to work in parallel, and limited communication among schedulers. Smooth interaction among schedulers requires the use of protocols that govern such issues as resource sharing, authority to update the schedule, and communication of updates. This paper addresses the development and characteristics of such protocols and their use in a distributed scheduling environment that incorporates computer-aided scheduling tools. An example problem is drawn from the domain of Space Shuttle mission planning.

  17. Utilization of Internet Protocol-Based Voice Systems in Remote Payload Operations

    NASA Technical Reports Server (NTRS)

    Best, Susan; Nichols, Kelvin; Bradford, Robert

    2003-01-01

    This viewgraph presentation provides an overview of a proposed voice communication system for use in remote payload operations performed on the International Space Station. The system, Internet Voice Distribution System (IVoDS), would make use of existing Internet protocols, and offer a number of advantages over the system currently in use. Topics covered include: system description and operation, system software and hardware, system architecture, project status, and technology transfer applications.

  18. New Computational Approaches for NMR-based Drug Design: A Protocol for Ligand Docking to Flexible Target Sites

    SciTech Connect

    Gracia, Luis; Speidel, Joshua A.; Weinstein, Harel

    2006-08-24

    NMR-based drug design has met with some success in the last decade, as illustrated in numerous instances by Fesik's ''ligand screening by NMR'' approach. Ongoing efforts to generalize this success have led us to the development of a new paradigm in which quantitative computational approaches are being integrated with NMR derived data and biological assays. The key component of this work is the inclusion of the intrinsic dynamic quality of NMR structures in theoretical models and its use in docking. A new computational protocol is introduced here, designed to dock small molecule ligands to flexible proteins derived from NMR structures. The algorithm makes use of a combination of simulated annealing monte carlo simulations (SA/MC) and a mean field potential informed by the NMR data. The new protocol is illustrated in the context of an ongoing project aimed at developing new selective inhibitors for the PCAF bromodomains that interact with HIV Tat.

  19. A 1-dodecanethiol-based phase transfer protocol for the highly efficient extraction of noble metal ions from aqueous phase.

    PubMed

    Chen, Dong; Cui, Penglei; Cao, Hongbin; Yang, Jun

    2015-03-01

    A 1-dodecanethiol-based phase-transfer protocol is developed for the extraction of noble metal ions from aqueous solution to a hydrocarbon phase, which calls for first mixing the aqueous metal ion solution with an ethanolic solution of 1-dodecanethiol, and then extracting the coordination compounds formed between noble metal ions and 1-dodecanethiol into a non-polar organic solvent. A number of characterization techniques, including inductively coupled plasma atomic emission spectroscopy, Fourier transform infrared spectroscopy, and thermogravimetric analysis demonstrate that this protocol could be applied to extract a wide variety of noble metal ions from water to dichloromethane with an efficiency of >96%, and has high selectivity for the separation of the noble metal ions from other transition metals. It is therefore an attractive alternative for the extraction of noble metals from water, soil, or waste printed circuit boards.

  20. New Computational Approaches for NMR-based Drug Design: A Protocol for Ligand Docking to Flexible Target Sites

    NASA Astrophysics Data System (ADS)

    Gracia, Luis; Speidel, Joshua A.; Weinstein, Harel

    2006-08-01

    NMR-based drug design has met with some success in the last decade, as illustrated in numerous instances by Fesik's "ligand screening by NMR" approach. Ongoing efforts to generalize this success have led us to the development of a new paradigm in which quantitative computational approaches are being integrated with NMR derived data and biological assays. The key component of this work is the inclusion of the intrinsic dynamic quality of NMR structures in theoretical models and its use in docking. A new computational protocol is introduced here, designed to dock small molecule ligands to flexible proteins derived from NMR structures. The algorithm makes use of a combination of simulated annealing monte carlo simulations (SA/MC) and a mean field potential informed by the NMR data. The new protocol is illustrated in the context of an ongoing project aimed at developing new selective inhibitors for the PCAF bromodomains that interact with HIV Tat.

  1. Internet Protocol Television for Personalized Home-Based Health Information: Design-Based Research on a Diabetes Education System

    PubMed Central

    Clarke, Ken; Kwong, Mabel; Alzougool, Basil; Hines, Carolyn; Tidhar, Gil; Frukhtman, Feodor

    2014-01-01

    Background The use of Internet protocol television (IPTV) as a channel for consumer health information is a relatively under-explored area of medical Internet research. IPTV may afford new opportunities for health care service providers to provide health information and for consumers, patients, and caretakers to access health information. The technologies of Web 2.0 add a new and even less explored dimension to IPTV’s potential. Objective Our research explored an application of Web 2.0 integrated with IPTV for personalized home-based health information in diabetes education, particularly for people with diabetes who are not strong computer and Internet users, and thus may miss out on Web-based resources. We wanted to establish whether this system could enable diabetes educators to deliver personalized health information directly to people with diabetes in their homes; and whether this system could encourage people with diabetes who make little use of Web-based health information to build their health literacy via the interface of a home television screen and remote control. Methods This project was undertaken as design-based research in two stages. Stage 1 comprised a feasibility study into the technical work required to integrate an existing Web 2.0 platform with an existing IPTV system, populated with content and implemented for user trials in a laboratory setting. Stage 2 comprised an evaluation of the system by consumers and providers of diabetes information. Results The project succeeded in developing a Web 2.0 IPTV system for people with diabetes and low literacies and their diabetes educators. The performance of the system in the laboratory setting gave them the confidence to engage seriously in thinking about the actual and potential features and benefits of a more widely-implemented system. In their feedback they pointed out a range of critical usability and usefulness issues related to Web 2.0 affordances and learning fundamentals. They also described

  2. An Improvement of Robust Biometrics-Based Authentication and Key Agreement Scheme for Multi-Server Environments Using Smart Cards.

    PubMed

    Moon, Jongho; Choi, Younsung; Jung, Jaewook; Won, Dongho

    2015-01-01

    In multi-server environments, user authentication is a very important issue because it provides the authorization that enables users to access their data and services; furthermore, remote user authentication schemes for multi-server environments have solved the problem that has arisen from user's management of different identities and passwords. For this reason, numerous user authentication schemes that are designed for multi-server environments have been proposed over recent years. In 2015, Lu et al. improved upon Mishra et al.'s scheme, claiming that their remote user authentication scheme is more secure and practical; however, we found that Lu et al.'s scheme is still insecure and incorrect. In this paper, we demonstrate that Lu et al.'s scheme is vulnerable to outsider attack and user impersonation attack, and we propose a new biometrics-based scheme for authentication and key agreement that can be used in multi-server environments; then, we show that our proposed scheme is more secure and supports the required security properties. PMID:26709702

  3. An Improvement of Robust Biometrics-Based Authentication and Key Agreement Scheme for Multi-Server Environments Using Smart Cards.

    PubMed

    Moon, Jongho; Choi, Younsung; Jung, Jaewook; Won, Dongho

    2015-01-01

    In multi-server environments, user authentication is a very important issue because it provides the authorization that enables users to access their data and services; furthermore, remote user authentication schemes for multi-server environments have solved the problem that has arisen from user's management of different identities and passwords. For this reason, numerous user authentication schemes that are designed for multi-server environments have been proposed over recent years. In 2015, Lu et al. improved upon Mishra et al.'s scheme, claiming that their remote user authentication scheme is more secure and practical; however, we found that Lu et al.'s scheme is still insecure and incorrect. In this paper, we demonstrate that Lu et al.'s scheme is vulnerable to outsider attack and user impersonation attack, and we propose a new biometrics-based scheme for authentication and key agreement that can be used in multi-server environments; then, we show that our proposed scheme is more secure and supports the required security properties.

  4. An Improvement of Robust Biometrics-Based Authentication and Key Agreement Scheme for Multi-Server Environments Using Smart Cards

    PubMed Central

    Moon, Jongho; Choi, Younsung; Jung, Jaewook; Won, Dongho

    2015-01-01

    In multi-server environments, user authentication is a very important issue because it provides the authorization that enables users to access their data and services; furthermore, remote user authentication schemes for multi-server environments have solved the problem that has arisen from user’s management of different identities and passwords. For this reason, numerous user authentication schemes that are designed for multi-server environments have been proposed over recent years. In 2015, Lu et al. improved upon Mishra et al.’s scheme, claiming that their remote user authentication scheme is more secure and practical; however, we found that Lu et al.’s scheme is still insecure and incorrect. In this paper, we demonstrate that Lu et al.’s scheme is vulnerable to outsider attack and user impersonation attack, and we propose a new biometrics-based scheme for authentication and key agreement that can be used in multi-server environments; then, we show that our proposed scheme is more secure and supports the required security properties. PMID:26709702

  5. Controlled Deterministic Secure Quantum Communication Protocol Based on Three-Particle GHZ States in X-Basis

    NASA Astrophysics Data System (ADS)

    Chang, Yan; Zhang, Shi-Bin; Yan, Li-Li; Han, Gui-Hua

    2015-03-01

    A controlled deterministic secure quantum communication (CDSQC) protocol is proposed based on three-particle GHZ state in X-basis. Only X-basis and Z1Z2X3-basis (composed of Z-basis and X-basis) measurement are required, which makes the scheme more convenient than others in practical applications. By distributing a random key between both sides of the communication and performing classical XOR operation, we realize a one-time-pad scheme, therefore our protocol achieves unconditional secure. Because only user with legitimate identity string can decrypt the secret, our protocol can resist man-in-the middle attack. The three-particle GHZ state in X-basis is used as decoy photons to detect eavesdropping. The detection rate reaches 75% per qubit. Supported by the National Natural Science Foundation of China under Grant No. 61402058, Science and Technology, Sichuan Province of China under Grant No. 2013GZX0137, Fund for Young Persons Project of Sichuan Province of China under Grant No. 12ZB017, and the Foundation of Cyberspace Security Key Laboratory of Sichuan Higher Education Institutions under Grant No. szjj2014-074

  6. A protocol for the systematic and quantitative measurement of protein-lipid interactions using the liposome-microarray-based assay.

    PubMed

    Saliba, Antoine-Emmanuel; Vonkova, Ivana; Deghou, Samy; Ceschia, Stefano; Tischer, Christian; Kugler, Karl G; Bork, Peer; Ellenberg, Jan; Gavin, Anne-Claude

    2016-06-01

    Lipids organize the activity of the cell's proteome through a complex network of interactions. The assembly of comprehensive atlases embracing all protein-lipid interactions is an important challenge that requires innovative methods. We recently developed a liposome-microarray-based assay (LiMA) that integrates liposomes, microfluidics and fluorescence microscopy and which is capable of measuring protein recruitment to membranes in a quantitative and high-throughput manner. Compared with previous assays that are labor-intensive and difficult to scale up, LiMA improves the protein-lipid interaction assay throughput by at least three orders of magnitude. Here we provide a step-by-step LiMA protocol that includes the following: (i) the serial and generic production of the liposome microarray; (ii) its integration into a microfluidic format; (iii) the measurement of fluorescently labeled protein (either purified proteins or from cell lysate) recruitment to liposomal membranes using high-throughput microscopy; (iv) automated image analysis pipelines to quantify protein-lipid interactions; and (v) data quality analysis. In addition, we discuss the experimental design, including the relevant quality controls. Overall, the protocol-including device preparation, assay and data analysis-takes 6-8 d. This protocol paves the way for protein-lipid interaction screens to be performed on the proteome and lipidome scales. PMID:27149326

  7. A protocol for the systematic and quantitative measurement of protein-lipid interactions using the liposome-microarray-based assay.

    PubMed

    Saliba, Antoine-Emmanuel; Vonkova, Ivana; Deghou, Samy; Ceschia, Stefano; Tischer, Christian; Kugler, Karl G; Bork, Peer; Ellenberg, Jan; Gavin, Anne-Claude

    2016-06-01

    Lipids organize the activity of the cell's proteome through a complex network of interactions. The assembly of comprehensive atlases embracing all protein-lipid interactions is an important challenge that requires innovative methods. We recently developed a liposome-microarray-based assay (LiMA) that integrates liposomes, microfluidics and fluorescence microscopy and which is capable of measuring protein recruitment to membranes in a quantitative and high-throughput manner. Compared with previous assays that are labor-intensive and difficult to scale up, LiMA improves the protein-lipid interaction assay throughput by at least three orders of magnitude. Here we provide a step-by-step LiMA protocol that includes the following: (i) the serial and generic production of the liposome microarray; (ii) its integration into a microfluidic format; (iii) the measurement of fluorescently labeled protein (either purified proteins or from cell lysate) recruitment to liposomal membranes using high-throughput microscopy; (iv) automated image analysis pipelines to quantify protein-lipid interactions; and (v) data quality analysis. In addition, we discuss the experimental design, including the relevant quality controls. Overall, the protocol-including device preparation, assay and data analysis-takes 6-8 d. This protocol paves the way for protein-lipid interaction screens to be performed on the proteome and lipidome scales.

  8. 78 FR 16275 - Extension of the Duration of Programmatic Agreements Based on the Department of Energy Prototype...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-03-14

    ..., and Energy Efficiency and Conservation Block Grant; Notice of Program Comment AGENCY: Advisory Council... Programmatic Agreement for its Weatherization Assistance Program, State Energy Program, and Energy Efficiency... Department of Energy, Office of Federal Agency Programs, Advisory Council on Historic Preservation,...

  9. Secured Communication for Business Process Outsourcing Using Optimized Arithmetic Cryptography Protocol Based on Virtual Parties

    NASA Astrophysics Data System (ADS)

    Pathak, Rohit; Joshi, Satyadhar

    Within a span of over a decade, India has become one of the most favored destinations across the world for Business Process Outsourcing (BPO) operations. India has rapidly achieved the status of being the most preferred destination for BPO for companies located in the US and Europe. Security and privacy are the two major issues needed to be addressed by the Indian software industry to have an increased and long-term outsourcing contract from the US. Another important issue is about sharing employee’s information to ensure that data and vital information of an outsourcing company is secured and protected. To ensure that the confidentiality of a client’s information is maintained, BPOs need to implement some data security measures. In this paper, we propose a new protocol for specifically for BPO Secure Multi-Party Computation (SMC). As there are many computations and surveys which involve confidential data from many parties or organizations and the concerned data is property of the organization, preservation and security of this data is of prime importance for such type of computations. Although the computation requires data from all the parties, but none of the associated parties would want to reveal their data to the other parties. We have proposed a new efficient and scalable protocol to perform computation on encrypted information. The information is encrypted in a manner that it does not affect the result of the computation. It uses modifier tokens which are distributed among virtual parties, and finally used in the computation. The computation function uses the acquired data and modifier tokens to compute right result from the encrypted data. Thus without revealing the data, right result can be computed and privacy of the parties is maintained. We have given a probabilistic security analysis of hacking the protocol and shown how zero hacking security can be achieved. Also we have analyzed the specific case of Indian BPO.

  10. Computer-assisted machine-to-human protocols for authentication of a RAM-based embedded system

    NASA Astrophysics Data System (ADS)

    Idrissa, Abdourhamane; Aubert, Alain; Fournel, Thierry

    2012-06-01

    Mobile readers used for optical identification of manufactured products can be tampered in different ways: with hardware Trojan or by powering up with fake configuration data. How a human verifier can authenticate the reader to be handled for goods verification? In this paper, two cryptographic protocols are proposed to achieve the verification of a RAM-based system through a trusted auxiliary machine. Such a system is assumed to be composed of a RAM memory and a secure block (in practice a FPGA or a configurable microcontroller). The system is connected to an input/output interface and contains a Non Volatile Memory where the configuration data are stored. Here, except the secure block, all the blocks are exposed to attacks. At the registration stage of the first protocol, the MAC of both the secret and the configuration data, denoted M0 is computed by the mobile device without saving it then transmitted to the user in a secure environment. At the verification stage, the reader which is challenged with nonces sendsMACs / HMACs of both nonces and MAC M0 (to be recomputed), keyed with the secret. These responses are verified by the user through a trusted auxiliary MAC computer unit. Here the verifier does not need to tract a (long) list of challenge / response pairs. This makes the protocol tractable for a human verifier as its participation in the authentication process is increased. In counterpart the secret has to be shared with the auxiliary unit. This constraint is relaxed in a second protocol directly derived from Fiat-Shamir's scheme.

  11. Circumventing Traditional Conditioning Protocols in Polymer Membrane-Based Ion-Selective Electrodes.

    PubMed

    Rich, Michelle; Mendecki, Lukasz; Mensah, Samantha T; Blanco-Martinez, Enrique; Armas, Stephanie; Calvo-Marzal, Percy; Radu, Aleksandar; Chumbimuni-Torres, Karin Y

    2016-09-01

    Preparation of ion-selective electrodes (ISEs) often requires long and complicated conditioning protocols limiting their application as tools for in-field measurements. Herein, we eliminated the need for electrode conditioning by loading the membrane cocktail directly with primary ion solution. This proof of concept experiment was performed with iodide, silver, and sodium selective electrodes. The proposed methodology significantly shortened the preparation time of ISEs, yielding functional electrodes with submicromolar detection limits. Moreover, it is anticipated that this approach may form the basis for the development of miniaturized all-solid-state ion-selective electrodes for in situ measurements. PMID:27523089

  12. Security proof for cryptographic protocols based only on the monogamy of Bell's inequality violations

    SciTech Connect

    Pawlowski, M.

    2010-09-15

    We show that monogamy of Bell's inequality violations, which is strictly weaker condition than the no-signaling principle is enough to prove security of quantum key distribution. We derive our results for a whole class of monogamy constraints and generalize our results to any theory that communicating parties may have access to. Some of these theories do not respect the no-signaling principle yet still allow for secure communication. This proves that no signaling is only a sufficient condition for the possibility of secure communication, but not the necessary one. We also present some new qualitative results concerning the security of existing quantum key distribution protocols.

  13. Circumventing Traditional Conditioning Protocols in Polymer Membrane-Based Ion-Selective Electrodes.

    PubMed

    Rich, Michelle; Mendecki, Lukasz; Mensah, Samantha T; Blanco-Martinez, Enrique; Armas, Stephanie; Calvo-Marzal, Percy; Radu, Aleksandar; Chumbimuni-Torres, Karin Y

    2016-09-01

    Preparation of ion-selective electrodes (ISEs) often requires long and complicated conditioning protocols limiting their application as tools for in-field measurements. Herein, we eliminated the need for electrode conditioning by loading the membrane cocktail directly with primary ion solution. This proof of concept experiment was performed with iodide, silver, and sodium selective electrodes. The proposed methodology significantly shortened the preparation time of ISEs, yielding functional electrodes with submicromolar detection limits. Moreover, it is anticipated that this approach may form the basis for the development of miniaturized all-solid-state ion-selective electrodes for in situ measurements.

  14. Protocol for Landsat-Based Monitoring of Landscape Dynamics at North Coast and Cascades Network Parks

    USGS Publications Warehouse

    Kennedy, Robert E.; Cohen, Warren B.; Kirschbaum, Alan A.; Haunreiter, Erik

    2007-01-01

    Background and Objectives As part of the National Park Service's larger goal of developing long-term monitoring programs in response to the Natural Resource Challenge of 2000, the parks of the North Coast and Cascades Network (NCCN) have determined that monitoring of landscape dynamics is necessary to track ecosystem health (Weber and others, 2005). Landscape dynamics refer to a broad suite of ecological, geomorphological, and anthropogenic processes occurring across broad spatial scales. The NCCN has sought protocols that would leverage remote-sensing technologies to aid in monitoring landscape dynamics.

  15. Communications protocol

    NASA Technical Reports Server (NTRS)

    Zhou, Xiaoming (Inventor); Baras, John S. (Inventor)

    2010-01-01

    The present invention relates to an improved communications protocol which increases the efficiency of transmission in return channels on a multi-channel slotted Alohas system by incorporating advanced error correction algorithms, selective retransmission protocols and the use of reserved channels to satisfy the retransmission requests.

  16. An ESR protocol based on relaxation phenomena of irradiated Japanese pepper.

    PubMed

    Ukai, Mitsuko; Nakamura, Hideo; Shimoyama, Yuhei

    2006-03-13

    We found various free radicals in a commercially available pepper in Japan before and after irradiation using electron spin resonance (ESR) spectroscopy. The typical ESR spectrum of the pepper consists of a sextet centered at g = 2.0, a singlet at the same g-value and a singlet at g = 4.0. Upon gamma ray irradiation, a new pair of signals appeared in the pepper. The progressive saturation behavior (PSB) at various microwave power levels indicated quite different relaxation behaviors of those radicals. Namely, the peak intensity of the organic free radical component decreases in a monotonic fashion, whereas the Mn2+ and Fe3+ ESR signals substantially keep constant. This reflects the evidence of three independent radicals in the pepper before irradiation. The PSB of the pair peaks as induced by irradiation possessed quite different PSB from that of the free radical located at g = 2.0. We proposed a new protocol for the ESR detection of irradiated foods by the PSB method at different microwave power levels. This would call for a major modification of the CEN protocol in European Union.

  17. Definition of a VR-based protocol to treat social phobia.

    PubMed

    Roy, S; Klinger, E; Légeron, P; Lauer, F; Chemin, I; Nugues, P

    2003-08-01

    Social phobia is an anxiety disorder that is accessible to two forms of treatment yielding scientifically validated results: drugs and cognitive-behavioral therapies. Graded exposure to feared social situations is fundamental to obtain an improvement of the anxious symptoms. Traditionally, exposure therapies are done either in vivo or by imagining the situations. In vivo exposure is sometimes difficult to control and many patients have some difficulties in using imagination. Virtual reality (VR) seems to bring significant advantages. It allows exposures to numerous and varied situations. This paper reports the definition of a clinical protocol whose purpose is to assess the efficiency of a VR therapy compared to a CBT and to the absence of treatment for social phobic patients. It explains the illness' diagnosis and its usual treatments. It exposes all the architecture of the study, the assessment tools, the content and unfold of the therapy sessions. It finally reports first results of a clinical trial in a between-group design in 10 patients suffering from social phobia. The virtual environments used in the treatment reproduce four situations that social phobics feel the most threatening: performance, intimacy, scrutiny and assertiveness. With the help of the therapist, the patient learns adapted cognitions and behaviors with the aim of reducing her or his anxiety in the corresponding real situations. The novelty of our work is to address a group of situations that the phobic patient is most likely to experience and to treat patients according to a precise protocol. PMID:14511454

  18. A Field-Based Cleaning Protocol for Sampling Devices Used in Life-Detection Studies

    NASA Astrophysics Data System (ADS)

    Eigenbrode, Jennifer; Benning, Liane G.; Maule, Jake; Wainwright, Norm; Steele, Andrew; Amundsen, Hans E. F.

    2009-06-01

    Analytical approaches to extant and extinct life detection involve molecular detection often at trace levels. Thus, removal of biological materials and other organic molecules from the surfaces of devices used for sampling is essential for ascertaining meaningful results. Organic decontamination to levels consistent with null values on life-detection instruments is particularly challenging at remote field locations where Mars analog field investigations are carried out. Here, we present a seven-step, multi-reagent decontamination method that can be applied to sampling devices while in the field. In situ lipopolysaccharide detection via low-level endotoxin assays and molecular detection via gas chromatography-mass spectrometry were used to test the effectiveness of the decontamination protocol for sampling of glacial ice with a coring device and for sampling of sediments with a rover scoop during deployment at Arctic Mars-analog sites in Svalbard, Norway. Our results indicate that the protocols and detection technique sufficiently remove and detect low levels of molecular constituents necessary for life-detection tests.

  19. Alternating-Offers Protocol for Multi-issue Bilateral Negotiation in Semantic-Enabled Marketplaces

    NASA Astrophysics Data System (ADS)

    Ragone, Azzurra; di Noia, Tommaso; di Sciascio, Eugenio; Donini, Francesco M.

    We present a semantic-based approach to multi-issue bilateral negotiation for e-commerce. We use Description Logics to model advertisements, and relations among issues as axioms in a TBox. We then introduce a logic-based alternating-offers protocol, able to handle conflicting information, that merges non-standard reasoning services in Description Logics with utility thoery to find the most suitable agreements. We illustrate and motivate the theoretical framework, the logical language, and the negotiation protocol.

  20. Inter-observer agreement, diagnostic sensitivity and specificity of animal-based indicators of young lamb welfare.

    PubMed

    Phythian, C J; Toft, N; Cripps, P J; Michalopoulou, E; Winter, A C; Jones, P H; Grove-White, D; Duncan, J S

    2013-07-01

    A scientific literature review and consensus of expert opinion used the welfare definitions provided by the Farm Animal Welfare Council (FAWC) Five Freedoms as the framework for selecting a set of animal-based indicators that were sensitive to the current on-farm welfare issues of young lambs (aged ≤ 6 weeks). Ten animal-based indicators assessed by observation - demeanour, response to stimulation, shivering, standing ability, posture, abdominal fill, body condition, lameness, eye condition and salivation were tested as part of the objective of developing valid, reliable and feasible animal-based measures of lamb welfare The indicators were independently tested on 966 young lambs from 17 sheep flocks across Northwest England and Wales during December 2008 to April 2009 by four trained observers. Inter-observer reliability was assessed using Fleiss's kappa (κ), and the pair-wise agreement with an experienced, observer designated as the 'test standard observer' (TSO) was examined using Cohen's κ. Latent class analysis (LCA) estimated the sensitivity (Se) and specificity (Sp) of each observer without assuming a gold standard and predicted the Se and Sp of randomly selected observers who may apply the indicators in the future. Overall, good levels of inter-observer reliability, and high levels of Sp were identified for demeanour (κ = 0.54, Se ≥ 0.70, Sp ≥ 0.98), stimulation (κ = 0.57, Se = 0.30 to 0.77, Sp ≥ 0.98), shivering (κ = 0.55, Se = 0.37 to 0.85, Sp ≥ 0.99), standing ability (0.54, Se ≥ 0.80, Sp ≥ 0.99), posture (κ = 0.45, Se ≥ 0.56, Sp = 0.99), abdominal fill (κ = 0.44, Se = 0.39 to 0.98, Sp = 0.99), body condition (κ = 0.72, Se ⩾ 0.38 to 0.90, Sp = 0.99), lameness (κ = 0.68, Se > 0.73, Sp = 1.00), and eye condition (κ = 0.72, Se ≥ 0.86, Sp = 0.99). LCA predicted that randomly selected observers had Se > 0.77 (acceptable), and Sp ≥ 0.98 (high) for assessments of demeanour, lameness, abdominal fill posture, body condition and eye

  1. Uptake of a web-based oncology protocol system: how do cancer clinicians use eviQ cancer treatments online?

    PubMed Central

    2013-01-01

    Background The use of computerized systems to support evidence-based practice is commonplace in contemporary medicine. Despite the prolific use of electronic support systems there has been relatively little research on the uptake of web-based systems in the oncology setting. Our objective was to examine the uptake of a web-based oncology protocol system (http://www.eviq.org.au) by Australian cancer clinicians. Methods We used web-logfiles and Google Analytics to examine the characteristics of eviQ registrants from October 2009-December 2011 and patterns of use by cancer clinicians during a typical month. Results As of December 2011, there were 16,037 registrants; 85% of whom were Australian health care professionals. During a typical month 87% of webhits occurred in standard clinical hours (08:00 to 18:00 weekdays). Raw webhits were proportional to the size of clinician groups: nurses (47% of Australian registrants), followed by doctors (20%), and pharmacists (14%). However, pharmacists had up to three times the webhit rate of other clinical groups. Clinicians spent five times longer viewing chemotherapy protocol pages than other content and the protocols viewed reflect the most common cancers: lung, breast and colorectal. Conclusions Our results demonstrate eviQ is used by a range of health professionals involved in cancer treatment at the point-of-care. Continued monitoring of electronic decision support systems is vital to understanding how they are used in clinical practice and their impact on processes of care and patient outcomes. PMID:23497080

  2. Proposal and demonstration of lambda-based internet exchange (IX) point using GMPLS protocols and photonic cross-connect (PXC)

    NASA Astrophysics Data System (ADS)

    Tsuritani, Takehiro; Okamoto, Shuichi; Ogino, Nagao; Otani, Tomohiro; Tanaka, Hideaki

    2004-10-01

    This paper proposes an architecture of a next-generation Internet eXchange (IX) based on the Generalized Multi-Protocol Label Switching (GMPLS) technologies and the photonic cross-connect (PXC), hereafter referred to a Lambda-IX. At first, we investigate a basic Lambda-IX model where the PXC provides a GMPLS-controlled lambda label-switched path (LSP) to interconnect different ISPs' border routers. We verify that the proposed Lambda-IX model can achieve the lambda-based and resilient interconnection for the ISPs, thanks to the PXC's bit-rate insensitive operation as well as fast restoration operation. In addition, once GMPLS functionalities are introduced on the border routers as well as the PXC, very flexible interconnection can be achieved such as demand-based creation and deletion of lambda LSPs. Next, we initiatively demonstrate an experimental Lambda-IX using a PXC and IP/MPLS routers. A Lambda-LSP with OC-192 bandwidth can be successfully created by using the GMPLS RSVP-TE signaling protocol via a control plane, and an EGP session of Border Gateway Protocol 4 (BGP-4) can be established over the Lambda-LSP created between the GMPLS-enabled border routers via a data plane. We also evaluate the fault recovery operation in the case where such Lambda-IXs are consisted of several PXCs and demonstrate that the Lambda-LSP as well as the corresponding BGP session can be restored with a fast recovery time of less than 1s. Through these investigation and demonstration, it is revealed that the Lambda-IX can be put to practical use aiming at inter-exchanging a large traffic in a near future, while enriching the functions of IX.

  3. Effective audit in general practice: a method for systematically developing audit protocols containing evidence-based review criteria.

    PubMed Central

    Fraser, R C; Khunti, K; Baker, R; Lakhani, M

    1997-01-01

    Though many general practitioners (GPs) now take part in audit, there is still concern about the extent to which participation in audit leads to improvements in practice. Improved methods are needed for the incorporation of research evidence into criteria for use in audit. In this paper, a six-stage systematic method is described for developing audit protocols containing prioritized evidence-based criteria. The stages are: selection of a topic, identification of key elements of care, focused literature reviews, prioritization of the criteria on the strength of the evidence and impact on outcome, preparation of full documentation, and peer review. PMID:9519525

  4. Reducing software security risk through an integrated approach research initiative model based verification of the Secure Socket Layer (SSL) Protocol

    NASA Technical Reports Server (NTRS)

    Powell, John D.

    2003-01-01

    This document discusses the verification of the Secure Socket Layer (SSL) communication protocol as a demonstration of the Model Based Verification (MBV) portion of the verification instrument set being developed under the Reducing Software Security Risk (RSSR) Trough an Integrated Approach research initiative. Code Q of the National Aeronautics and Space Administration (NASA) funds this project. The NASA Goddard Independent Verification and Validation (IV&V) facility manages this research program at the NASA agency level and the Assurance Technology Program Office (ATPO) manages the research locally at the Jet Propulsion Laboratory (California institute of Technology) where the research is being carried out.

  5. Evidence-Based Referral: Effects of the Revised "Youth Fit 4 Life" Protocol on Physical Activity Outputs.

    PubMed

    Annesi, James J; Vaughn, Linda L

    2015-01-01

    The authors contrasted 2 physical activity/nutrition treatments on the basis of social cognitive and self-efficacy theory, and a comparison condition, on time in moderate-to-vigorous physical activity (MVPA) during the 45-min/day physical activity segment of elementary after-school care. The Revised Youth Fit 4 Life protocol that sought to maximize participants' cardiovascular physical activity appeared to improve upon the Original Youth Fit For Life treatment on time in MVPA. Thus, pediatricians might have confidence in referring their patients to such evidence-based approaches. PMID:26057685

  6. Test-Retest Reliability and Convergent Validity of a Computer Based Hand Function Test Protocol in People with Arthritis

    PubMed Central

    Srikesavan, Cynthia S.; Shay, Barbara; Szturm, Tony

    2015-01-01

    Objectives: A computer based hand function assessment tool has been developed to provide a standardized method for quantifying task performance during manipulations of common objects/tools/utensils with diverse physical properties and grip/grasp requirements for handling. The study objectives were to determine test-retest reliability and convergent validity of the test protocol in people with arthritis. Methods: Three different object manipulation tasks were evaluated twice in forty people with rheumatoid arthritis (RA) or hand osteoarthritis (HOA). Each object was instrumented with a motion sensor and moved in concert with a computer generated visual target. Self-reported joint pain and stiffness levels were recorded before and after each task. Task performance was determined by comparing the object movement with the computer target motion. This was correlated with grip strength, nine hole peg test, Disabilities of Arm, Shoulder, and Hand (DASH) questionnaire, and the Health Assessment Questionnaire (HAQ) scores. Results: The test protocol indicated moderate to high test-retest reliability of performance measures for three manipulation tasks, intraclass correlation coefficients (ICCs) ranging between 0.5 to 0.84, p<0.05. Strength of association between task performance measures with self- reported activity/participation composite scores was low to moderate (Spearman rho <0.7). Low correlations (Spearman rho < 0.4) were observed between task performance measures and grip strength; and between three objects’ performance measures. Significant reduction in pain and joint stiffness (p<0.05) was observed after performing each task. Conclusion: The study presents initial evidence on the test retest reliability and convergent validity of a computer based hand function assessment protocol in people with rheumatoid arthritis or hand osteoarthritis. The novel tool objectively measures overall task performance during a variety of object manipulation tasks done by tracking a

  7. An efficient protocol for incorporation of an unnatural amino acid in perdeuterated recombinant proteins using glucose-based media.

    PubMed

    Venditti, Vincenzo; Fawzi, Nicolas L; Clore, G Marius

    2012-03-01

    The in vivo incorporation of unnatural amino acids into proteins is a well-established technique requiring an orthogonal tRNA/aminoacyl-tRNA synthetase pair specific for the unnatural amino acid that is incorporated at a position encoded by a TAG amber codon. Although this technology provides unique opportunities to engineer protein structures, poor protein yields are usually obtained in deuterated media, hampering its application in the protein NMR field. Here, we describe a novel protocol for incorporating unnatural amino acids into fully deuterated proteins using glucose-based media (which are relevant to the production, for example, of amino acid-specific methyl-labeled proteins used in the study of large molecular weight systems). The method consists of pre-induction of the pEVOL plasmid encoding the tRNA/aminoacyl-tRNA synthetase pair in a rich, H(2)O-based medium prior to exchanging the culture into a D(2)O-based medium. Our protocol results in high level of isotopic incorporation (~95%) and retains the high expression level of the target protein observed in Luria-Bertani medium. PMID:22350951

  8. Optimized QKD BB84 protocol using quantum dense coding and CNOT gates: feasibility based on probabilistic optical devices

    NASA Astrophysics Data System (ADS)

    Gueddana, Amor; Attia, Moez; Chatta, Rihab

    2014-05-01

    In this work, we simulate a fiber-based Quantum Key Distribution Protocol (QKDP) BB84 working at the telecoms wavelength 1550 nm with taking into consideration an optimized attack strategy. We consider in our work a quantum channel composed by probabilistic Single Photon Source (SPS), single mode optical Fiber and quantum detector with high efficiency. We show the advantages of using the Quantum Dots (QD) embedded in micro-cavity compared to the Heralded Single Photon Sources (HSPS). Second, we show that Eve is always getting some information depending on the mean photon number per pulse of the used SPS and therefore, we propose an optimized version of the QKDP BB84 based on Quantum Dense Coding (QDC) that could be implemented by quantum CNOT gates. We evaluate the success probability of implementing the optimized QKDP BB84 when using nowadays probabilistic quantum optical devices for circuit realization. We use for our modeling an abstract probabilistic model of a CNOT gate based on linear optical components and having a success probability of sqrt (4/27), we take into consideration the best SPSs realizations, namely the QD and the HSPS, generating a single photon per pulse with a success probability of 0.73 and 0.37, respectively. We show that the protocol is totally secure against attacks but could be correctly implemented only with a success probability of few percent.

  9. A Provably Secure RFID Authentication Protocol Based on Elliptic Curve for Healthcare Environments.

    PubMed

    Farash, Mohammad Sabzinejad; Nawaz, Omer; Mahmood, Khalid; Chaudhry, Shehzad Ashraf; Khan, Muhammad Khurram

    2016-07-01

    To enhance the quality of healthcare in the management of chronic disease, telecare medical information systems have increasingly been used. Very recently, Zhang and Qi (J. Med. Syst. 38(5):47, 32), and Zhao (J. Med. Syst. 38(5):46, 33) separately proposed two authentication schemes for telecare medical information systems using radio frequency identification (RFID) technology. They claimed that their protocols achieve all security requirements including forward secrecy. However, this paper demonstrates that both Zhang and Qi's scheme, and Zhao's scheme could not provide forward secrecy. To augment the security, we propose an efficient RFID authentication scheme using elliptic curves for healthcare environments. The proposed RFID scheme is secure under common random oracle model. PMID:27221283

  10. A Structure-Based Design Protocol for Optimizing Combinatorial Protein Libraries.

    PubMed

    Lunt, Mark W; Snow, Christopher D

    2016-01-01

    Protein variant libraries created via site-directed mutagenesis are a powerful approach to engineer improved proteins for numerous applications such as altering enzyme substrate specificity. Conventional libraries commonly use a brute force approach: saturation mutagenesis via degenerate codons that encode all 20 natural amino acids. In contrast, this chapter describes a protocol for designing "smarter" degenerate codon libraries via direct combinatorial optimization in "library space." Several case studies illustrate how it is possible to design degenerate codon libraries that are highly enriched for favorable, low-energy sequences as assessed using a standard all-atom scoring function. There is much to gain for experimental protein engineering laboratories willing to think beyond site saturation mutagenesis. In the common case that the exact experimental screening budget is not fixed, it is particularly helpful to perform a Pareto analysis to inspect favorable libraries at a range of possible library sizes. PMID:27094288

  11. A Structure-Based Design Protocol for Optimizing Combinatorial Protein Libraries.

    PubMed

    Lunt, Mark W; Snow, Christopher D

    2016-01-01

    Protein variant libraries created via site-directed mutagenesis are a powerful approach to engineer improved proteins for numerous applications such as altering enzyme substrate specificity. Conventional libraries commonly use a brute force approach: saturation mutagenesis via degenerate codons that encode all 20 natural amino acids. In contrast, this chapter describes a protocol for designing "smarter" degenerate codon libraries via direct combinatorial optimization in "library space." Several case studies illustrate how it is possible to design degenerate codon libraries that are highly enriched for favorable, low-energy sequences as assessed using a standard all-atom scoring function. There is much to gain for experimental protein engineering laboratories willing to think beyond site saturation mutagenesis. In the common case that the exact experimental screening budget is not fixed, it is particularly helpful to perform a Pareto analysis to inspect favorable libraries at a range of possible library sizes.

  12. Based on asynchronous communication protocol of geographic space information service access mechanism research

    NASA Astrophysics Data System (ADS)

    Chen, G.; Zhao, J.; Gu, M.; Li, D.

    2014-04-01

    At present, the traditional way of accessing to classified network in geographic spatial information services is using network gatekeeper and firewall etc. to ensure public and classified network communications links. However, the physical isolation between classified network and public network is crossed, which is bound to cause classified network potential security hazard. In Yunnan province space Land dynamic monitoring integration project, it proposed the point to point text message communication protocol and asynchronous transmission mechanism. Using geo-spatial information encryption processing and data compression processing method, it reduced the risk of data sensitivity and monitored, namely to ensure data security, which realized geographic spatial information services data communication effectively between classified network and public network in the rigid field conditions.

  13. A General Purpose Connections type CTI Server Based on SIP Protocol and Its Implementation

    NASA Astrophysics Data System (ADS)

    Watanabe, Toru; Koizumi, Hisao

    In this paper, we propose a general purpose connections type CTI (Computer Telephony Integration) server that provides various CTI services such as voice logging where the CTI server communicates with IP-PBX using the SIP (Session Initiation Protocol), and accumulates voice packets of external line telephone call flowing between an IP telephone for extension and a VoIP gateway connected to outside line networks. The CTI server realizes CTI services such as voice logging, telephone conference, or IVR (interactive voice response) with accumulating and processing voice packets sampled. Furthermore, the CTI server incorporates a web server function which can provide various CTI services such as a Web telephone directory via a Web browser to PCs, cellular telephones or smart-phones in mobile environments.

  14. Satellite Communications Using Commercial Protocols

    NASA Technical Reports Server (NTRS)

    Ivancic, William D.; Griner, James H.; Dimond, Robert; Frantz, Brian D.; Kachmar, Brian; Shell, Dan

    2000-01-01

    NASA Glenn Research Center has been working with industry, academia, and other government agencies in assessing commercial communications protocols for satellite and space-based applications. In addition, NASA Glenn has been developing and advocating new satellite-friendly modifications to existing communications protocol standards. This paper summarizes recent research into the applicability of various commercial standard protocols for use over satellite and space- based communications networks as well as expectations for future protocol development. It serves as a reference point from which the detailed work can be readily accessed. Areas that will be addressed include asynchronous-transfer-mode quality of service; completed and ongoing work of the Internet Engineering Task Force; data-link-layer protocol development for unidirectional link routing; and protocols for aeronautical applications, including mobile Internet protocol routing for wireless/mobile hosts and the aeronautical telecommunications network protocol.

  15. Factors Influencing Agreement between OMI-based Ozone and NO2 Products and Ground-based Instrumentation during DISCOVER-AQ (July 2011, Maryland): Site Variability and Meteorology

    NASA Astrophysics Data System (ADS)

    Thompson, A. M.; Reed, A. J.; Martins, D. K.; Festa, J. M.; Szykman, J.; Joseph, E.; Herman, J. R.; Abuhassan, N.; Berkoff, T.

    2012-12-01

    The Pandora spectrophotometric column measurements of ozone and NO2 with OMI overpass comparisons are presented for 11 Maryland, USA, sites that operated in July 2011 in the DISCOVER-AQ (Deriving Information on Surface Conditions from Column and Vertically Resolved Observations Relevant to Air Quality) aircraft and ground campaign. In general, total ozone agreement between the Pandora and satellite is within 4%, with larger deviations present on very cloudy days. Both Pandora and OMI total ozone agree within a few percent of the integrated sonde total column ozones. In contrast, the TTOR tropospheric ozone column to 200 hPa, that is based on OMI and MLS differences, averages 20% offsets, usually too low, over Beltsville, 15 km from Washington, DC, and the Edgewood sampling site, 25 km northeast of Baltimore, where bay breeze is one factor enhancing lower tropospheric ozone. Site to site differences in NO2 column agreement are prominent, with the few rural sites displaying smaller offsets between OMI and Pandora. However, detailed examination of days with the largest discrepancies (greater than 30%) reveals that the ground NO2 measurement can be very sensitive to scattered clouds and low-lying aerosols. Implications for the use of satellite products by Air Quality decision-makers are discussed.

  16. 75 FR 21349 - Solicitation for a Cooperative Agreement-Evaluation of Technical Assistance for Evidence-Based...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-04-23

    ... National Institute of Corrections (NIC) is soliciting proposals to enter into a cooperative agreement for a... to the required application forms can be downloaded from the NIC Web site at http://www.nicic.gov... document. ] Scope of Work: NIC will work with a technical assistance provider under Phase II of the...

  17. A web-based computer-tailored smoking prevention programme for primary school children: intervention design and study protocol

    PubMed Central

    2012-01-01

    Background Although the number of smokers has declined in the last decade, smoking is still a major health problem among youngsters and adolescents. For this reason, there is a need for effective smoking prevention programmes targeting primary school children. A web-based computer-tailored feedback programme may be an effective intervention to stimulate youngsters not to start smoking, and increase their knowledge about the adverse effects of smoking and their attitudes and self-efficacy regarding non-smoking. Methods & design This paper describes the development and evaluation protocol of a web-based out-of-school smoking prevention programme for primary school children (age 10-13 years) entitled ‘Fun without Smokes’. It is a transformation of a postal mailed intervention to a web-based intervention. Besides this transformation the effects of prompts will be examined. This web-based intervention will be evaluated in a 2-year cluster randomised controlled trial (c-RCT) with three study arms. An intervention and intervention + prompt condition will be evaluated for effects on smoking behaviour, compared with a no information control condition. Information about pupils’ smoking status and other factors related to smoking will be obtained using a web-based questionnaire. After completing the questionnaire pupils in both intervention conditions will receive three computer-tailored feedback letters in their personal e-mail box. Attitudes, social influences and self-efficacy expectations will be the content of these personalised feedback letters. Pupils in the intervention + prompt condition will - in addition to the personalised feedback letters - receive e-mail and SMS messages prompting them to revisit the ‘Fun without Smokes’ website. The main outcome measures will be ever smoking and the utilisation of the ‘Fun without Smokes’ website. Measurements will be carried out at baseline, 12 months and 24 months of follow-up. Discussion The present study

  18. Faithful deterministic secure quantum communication and authentication protocol based on hyperentanglement against collective noise

    NASA Astrophysics Data System (ADS)

    Chang, Yan; Zhang, Shi-Bin; Yan, Li-Li; Han, Gui-Hua

    2015-08-01

    Higher channel capacity and security are difficult to reach in a noisy channel. The loss of photons and the distortion of the qubit state are caused by noise. To solve these problems, in our study, a hyperentangled Bell state is used to design faithful deterministic secure quantum communication and authentication protocol over collective-rotation and collective-dephasing noisy channel, which doubles the channel capacity compared with using an ordinary Bell state as a carrier; a logical hyperentangled Bell state immune to collective-rotation and collective-dephasing noise is constructed. The secret message is divided into several parts to transmit, however the identity strings of Alice and Bob are reused. Unitary operations are not used. Project supported by the National Natural Science Foundation of China (Grant No. 61402058), the Science and Technology Support Project of Sichuan Province, China (Grant No. 2013GZX0137), the Fund for Young Persons Project of Sichuan Province, China (Grant No. 12ZB017), and the Foundation of Cyberspace Security Key Laboratory of Sichuan Higher Education Institutions, China (Grant No. szjj2014-074).

  19. SU-F-18C-01: Minimum Detectability Analysis for Comprehensive Sized Based Optimization of Image Quality and Radiation Dose Across CT Protocols

    SciTech Connect

    Smitherman, C; Chen, B; Samei, E

    2014-06-15

    Purpose: This work involved a comprehensive modeling of task-based performance of CT across a wide range of protocols. The approach was used for optimization and consistency of dose and image quality within a large multi-vendor clinical facility. Methods: 150 adult protocols from the Duke University Medical Center were grouped into sub-protocols with similar acquisition characteristics. A size based image quality phantom (Duke Mercury Phantom) was imaged using these sub-protocols for a range of clinically relevant doses on two CT manufacturer platforms (Siemens, GE). The images were analyzed to extract task-based image quality metrics such as the Task Transfer Function (TTF), Noise Power Spectrum, and Az based on designer nodule task functions. The data were analyzed in terms of the detectability of a lesion size/contrast as a function of dose, patient size, and protocol. A graphical user interface (GUI) was developed to predict image quality and dose to achieve a minimum level of detectability. Results: Image quality trends with variations in dose, patient size, and lesion contrast/size were evaluated and calculated data behaved as predicted. The GUI proved effective to predict the Az values representing radiologist confidence for a targeted lesion, patient size, and dose. As an example, an abdomen pelvis exam for the GE scanner, with a task size/contrast of 5-mm/50-HU, and an Az of 0.9 requires a dose of 4.0, 8.9, and 16.9 mGy for patient diameters of 25, 30, and 35 cm, respectively. For a constant patient diameter of 30 cm, the minimum detected lesion size at those dose levels would be 8.4, 5, and 3.9 mm, respectively. Conclusion: The designed CT protocol optimization platform can be used to evaluate minimum detectability across dose levels and patient diameters. The method can be used to improve individual protocols as well as to improve protocol consistency across CT scanners.

  20. Attitudes towards acceptance of an innovative home-based and remote sensing rehabilitation protocol among cardiovascular patients in Shantou, China

    PubMed Central

    Fang, Jia-Ying; Li, Ji-Lin; Li, Zhong-Han; Xu, Duan-Min; Chen, Chang; Xie, Bin; Chen, Helen; Au, William W

    2016-01-01

    Background Cardiac rehabilitation (CR) protocols have diversified to include home-based cardiac tele-rehabilitation (HBCTR) as an alternative to hospital-based or center-based CR. To adopt the use of home-based cardiac tele-rehabilitation, it is necessary to assess cardiac patients' attitudes towards acceptance of such e-health technology, especially in China where knowledge of such technology is deficient. Methods Interviews were conducted in the First Affiliated Hospital of Shantou University Medical College, Shantou, China. After percutaneous coronary interventional (PCI) surgery, patients completed the survey. Results Among the 150 patients, only 13% had ever heard of HBCTR. After an introduction of our HBCTR program, 60% of patients were willing to participate in the program. From our multivariate analysis of questionnaire data, age (OR: 0.92, 95% CI: 0.86–0.98; P = 0.007), average family monthly income (OR: 0.13, 95% CI: 0.05–0.34; P < 0.001), education level (OR: 0.24, 95% CI: 0.10–0.59; P = 0.002) and physical exercise time (OR: 0.19, 95% CI: 0.06–0.56; P = 0.003) were independent predictors for acceptance of HBCTR. From the reasons for participation, patients selected: enhanced safety and independence (28.3%), ability to self-monitor physical conditions daily (25.4%), and having automatic and emergency alert (23.1%). Reasons for refusal were: too cumbersome operation (34.3%) and unnecessary protocol (19.4%). Conclusions Most patients lacked knowledge about HBCTR but volunteered to participate after they have learned about the program. Several personal and life-style factors influenced their acceptance of the program. These indicate that both improvement of technology and better understanding of the program will enhance active participation. PMID:27403142

  1. A Population-Based Assessment of the Agreement Between Grading of Goniophotographic Images and Gonioscopy in the Chinese-American Eye Study (CHES)

    PubMed Central

    Murakami, Yohko; Wang, Dandan; Burkemper, Bruce; Lin, Shan C.; Varma, Rohit

    2016-01-01

    Purpose To compare grading of goniophotographic images and gonioscopy in assessing the iridocorneal angle. Methods In a population-based, cross-sectional study, participants underwent gonioscopy and goniophotographic imaging during the same visit. The iridocorneal angle was classified as closed if the posterior trabecular meshwork could not be seen. A single masked observer graded the goniophotographic images, and each eye was classified as having angle closure based on the number of closed quadrants. Agreement between the methods was analyzed by calculating kappa (κ) and first-order agreement coefficient (AC1) statistics and comparison of area under receiver operating characteristic curves (AUC). Results A total of 4149 Chinese Americans (3994 eyes) were included in this study. The agreement for angle closure diagnosis between gonioscopy and EyeCam was moderate to excellent (κ = 0.60, AC1 0.90, AUC 0.76–0.80). Conclusions Detection of iridocorneal angle closure based on goniophotographic imaging shows moderate to very good agreement with angle closure assessment using gonioscopy. PMID:27571018

  2. Quantitative Computed Tomography Protocols Affect Material Mapping and Quantitative Computed Tomography-Based Finite-Element Analysis Predicted Stiffness.

    PubMed

    Giambini, Hugo; Dragomir-Daescu, Dan; Nassr, Ahmad; Yaszemski, Michael J; Zhao, Chunfeng

    2016-09-01

    Quantitative computed tomography-based finite-element analysis (QCT/FEA) has become increasingly popular in an attempt to understand and possibly reduce vertebral fracture risk. It is known that scanning acquisition settings affect Hounsfield units (HU) of the CT voxels. Material properties assignments in QCT/FEA, relating HU to Young's modulus, are performed by applying empirical equations. The purpose of this study was to evaluate the effect of QCT scanning protocols on predicted stiffness values from finite-element models. One fresh frozen cadaveric torso and a QCT calibration phantom were scanned six times varying voltage and current and reconstructed to obtain a total of 12 sets of images. Five vertebrae from the torso were experimentally tested to obtain stiffness values. QCT/FEA models of the five vertebrae were developed for the 12 image data resulting in a total of 60 models. Predicted stiffness was compared to the experimental values. The highest percent difference in stiffness was approximately 480% (80 kVp, 110 mAs, U70), while the lowest outcome was ∼1% (80 kVp, 110 mAs, U30). There was a clear distinction between reconstruction kernels in predicted outcomes, whereas voltage did not present a clear influence on results. The potential of QCT/FEA as an improvement to conventional fracture risk prediction tools is well established. However, it is important to establish research protocols that can lead to results that can be translated to the clinical setting. PMID:27428281

  3. Simulation-based optimisation of the PET data processing for partial saturation approach protocols.

    PubMed

    Wimberley, Catriona; Angelis, Georgios; Boisson, Frederic; Callaghan, Paul; Fischer, Kristina; Pichler, Bernd J; Meikle, Steven R; Grégoire, Marie-Claude; Reilhac, Anthonin

    2014-08-15

    Positron emission tomography (PET) with [(11)C]Raclopride is an important tool for studying dopamine D2 receptor expression in vivo. [(11)C]Raclopride PET binding experiments conducted using the Partial Saturation Approach (PSA) allow the estimation of receptor density (B(avail)) and the in vivo affinity appK(D). The PSA is a simple, single injection, single scan experimental protocol that does not require blood sampling, making it ideal for use in longitudinal studies. In this work, we generated a complete Monte Carlo simulated PET study involving two groups of scans, in between which a biological phenomenon was inferred (a 30% decrease of B(avail)), and used it in order to design an optimal data processing chain for the parameter estimation from PSA data. The impact of spatial smoothing, noise removal and image resolution recovery technique on the statistical detection was investigated in depth. We found that image resolution recovery using iterative deconvolution of the image with the system point spread function associated with temporal data denoising greatly improves the accuracy and the statistical reliability of detecting the imposed phenomenon. Before optimisation, the inferred B(avail) variation between the two groups was underestimated by 42% and detected in 66% of cases, while a false decrease of appK(D) by 13% was detected in more than 11% of cases. After optimisation, the calculated B(avail) variation was underestimated by only 3.7% and detected in 89% of cases, while a false slight increase of appK(D) by 3.7% was detected in only 2% of cases. We found during this investigation that it was essential to adjust a factor that accounts for difference in magnitude between the non-displaceable ligand concentrations measured in the target and in the reference regions, for different data processing pathways as this ratio was affected by different image resolutions. PMID:24742918

  4. Improving adherence to web-based cessation programs: a randomized controlled trial study protocol

    PubMed Central

    2013-01-01

    Background Reducing smoking prevalence is a public health priority that can save more lives and money than almost any other known preventive intervention. Internet interventions have the potential for enormous public health impact given their broad reach and effectiveness. However, most users engage only minimally with even the best designed websites, diminishing their impact due to an insufficient ‘dose’. Two approaches to improve adherence to Internet cessation programs are integrating smokers into an online social network and providing free nicotine replacement therapy (NRT). Active participation in online communities is associated with higher rates of cessation. Integrating smokers into an online social network can increase support and may also increase utilization of cessation tools and NRT. Removing barriers to NRT may increase uptake and adherence, and may also increase use of online cessation tools as smokers look for information and support while quitting. The combination of both strategies may exert the most powerful effects on adherence compared to either strategy alone. Methods/Design This study compares the efficacy of a smoking cessation website (WEB) alone and in conjunction with free NRT and a social network (SN) protocol designed to integrate participants into the online community. Using a 2 (SN, no SN) x 2 (NRT, no NRT) randomized, controlled factorial design with repeated measures at baseline, 3 months, and 9 months, this study will recruit N = 4,000 new members of an internet cessation program and randomize them to: 1) WEB, 2) WEB + SN, 3) WEB + NRT, or 4) WEB + SN + NRT. Hypotheses are that all interventions will outperform WEB and that WEB + SN + NRT will outperform WEB + NRT and WEB + SN on 30-day point prevalence abstinence at 9 months. Exploratory analyses will examine theory-driven hypotheses about the mediators and moderators of outcome. Discussion Addressing adherence in internet cessation programs is critical and timely to leverage

  5. A Space Based Internet Protocol System for Sub-Orbital Tracking and Control

    NASA Technical Reports Server (NTRS)

    Bull, Barton; Grant, Charles; Morgan, Dwayne; Streich, Ron; Bauer, Frank (Technical Monitor)

    2001-01-01

    Personnel from the Goddard Space Flight Center Wallops Flight Facility (GSFC/WFF) in Virginia are responsible for the overall management of the NASA Sounding Rocket Program. Payloads are generally in support of NASA's Space Science Enterprise's missions and return a variety of scientific data as well as providing a reasonably economical means of conducting engineering tests for instruments and devices used on satellites and other spacecraft. The fifteen types of sounding rockets used by NASA can carry payloads of various weights to altitudes from 50 km to more than 1,300 km. Launch activities are conducted not only from established missile ranges, but also from remote locations worldwide requiring mobile tracking and command equipment to be transported and set up at considerable expense. The advent of low earth orbit (LEO) commercial communications satellites provides an opportunity to dramatically reduce tracking and control costs of launch vehicles and Unpiloted Aerial Vehicles (UAVs) by reducing or eliminating this ground infrastructure. Additionally, since data transmission is by packetized Internet Protocol (IP), data can be received and commands initiated from practically any location. A low cost Commercial Off The Shelf (COTS) system is currently under development for sounding rockets which also has application to UAVs and scientific balloons. Due to relatively low data rate (9600 baud) currently available, the system will first be used to provide GPS data for tracking and vehicle recovery. Range safety requirements for launch vehicles usually stipulate at least two independent tracking sources. Most sounding rockets flown by NASA now carry GPS receivers that output position data via the payload telemetry system to the ground station. The Flight Modem can be configured as a completely separate link thereby eliminating requirement for tracking radar. The system architecture which integrates antennas, GPS receiver, commercial satellite packet data modem, and a

  6. A Space Based Internet Protocol System for Launch Vehicle Tracking and Control

    NASA Technical Reports Server (NTRS)

    Bull, Barton; Grant, Charles; Morgan, Dwayne; Streich, Ron; Bauer, Frank (Technical Monitor)

    2001-01-01

    Personnel from the Goddard Space Flight Center Wallops Flight Facility (GSFC/WFF) in Virginia are responsible for the overall management of the NASA Sounding Rocket and Scientific Balloon Programs. Payloads are generally in support of NASA's Space Science Enterprise's missions and return a variety of scientific data as well as providing a reasonably economical means of conducting engineering tests for instruments and devices used on satellites and other spacecraft. Sounding rockets used by NASA can carry payloads of various weights to altitudes from 50 km to more than 1,300 km. Scientific balloons can carry a payload weighing as much as 3,630 Kg to an altitude of 42 km. Launch activities for both are conducted not only from established ranges, but also from remote locations worldwide requiring mobile tracking and command equipment to be transported and set up at considerable expense. The advent of low earth orbit (LEO) commercial communications satellites provides an opportunity to dramatically reduce tracking and control costs of these launch vehicles and Unpiloted Aerial Vehicles (UAVs) by reducing or eliminating this ground infrastructure. Additionally, since data transmission is by packetized Internet Protocol (IP), data can be received and commands initiated from practically any location. A low cost Commercial Off The Shelf (COTS) system is currently under development for sounding rockets that also has application to UAVs and scientific balloons. Due to relatively low data rate (9600 baud) currently available, the system will first be used to provide GPS data for tracking and vehicle recovery. Range safety requirements for launch vehicles usually stipulate at least two independent tracking sources. Most sounding rockets flown by NASA now carry GP receivers that output position data via the payload telemetry system to the ground station. The Flight Modem can be configured as a completely separate link thereby eliminating the requirement for tracking radar. The

  7. Estrus synchronization in beef heifers with progestin-based protocols. I. Differences in response based on pubertal status at the initiation of treatment.

    PubMed

    Wood-Follis, S L; Kojima, F N; Lucy, M C; Smith, M F; Patterson, D J

    2004-11-01

    Two progestin-based protocols for estrus synchronization in replacement beef heifers were compared on the basis of estrous response, interval to and synchrony of estrus, and pregnancy rate. The objective was to determine, whether addition of GnRH to a melengestrol acetate (MGA)-prostaglandin F2alpha (PGF2alpha) estrus synchronization protocol would improve synchrony of estrus without compromising fertility in yearling beef heifers. Heifers at two locations (Location 1, n = 60 and Location 2, n = 64) were assigned randomly to one of two treatments by breed and pubertal status. Heifers were defined as, pubertal when concentrations of progesterone in serum were elevated (> or = 1 ng/mL) in either one of two samples obtained 10 and 1 day prior to treatment initiation. Prior to MGA administration, 18/60 (30%) and 36/64 (56%) of the heifers at Locations 1 and 2, respectively, were pubertal. Heifers in both treatments were fed MGA (0.5 mg/head/day in 1.8 kg/head/day supplement) for 14 days followed by 25 mg of PGF2alpha i.m. (MGA-PGF2alpha) 19 days after MGA withdrawal (Day 33 of treatment). One-half of the heifers at each location received 100 microg of GnRH i.m. 12 days after MGA withdrawal (Day 26 of treatment; MGA Select). The control group received only MGA-PGF2alpha. Heifers were observed for signs of behavioral estrus continuously during daylight hours for 7 days beginning on the day PGF2alpha was administered. Heifers were inseminated 12 h after observed estrus. There was a treatment by location by pubertal status interaction (P < 0.05) for interval to estrus. Compared to the respective control treatment at each location, prepubertal heifers assigned to the MGA Select protocol at Location 1 had longer intervals to estrus, whereas at Location 2, prepubertal heifers assigned to the MGA-PGF2alpha protocol had longer intervals to estrus. The higher number of pubertal heifers at Location 2 was associated with a reduced variance in the interval to estrus among MGA

  8. Combining Quality and Curriculum-Based Measurement: A Suggested Assessment Protocol in Writing

    ERIC Educational Resources Information Center

    Ganzeveld, Paula

    2015-01-01

    Curriculum-Based Measures in writing (CBM-W) assesses a variety of fluency-based components of writing. While support exists for the use of CBM measures in the area of writing, there is a need to conduct further validation studies to investigate the utility of these measures within elementary and secondary classrooms. Since only countable indices…

  9. Full-length protein extraction protocols and gel-based downstream applications in formalin-fixed tissue proteomics.

    PubMed

    Tanca, Alessandro; Uzzau, Sergio; Addis, Maria Filippa

    2015-01-01

    Archival formalin-fixed, paraffin-embedded (FFPE) tissue repositories and their associated clinical information can represent a valuable resource for tissue proteomics. In order to make these tissues available for protein biomarker discovery and validation studies, dedicated sample preparation procedures overcoming the intermolecular cross-links introduced by formalin need to be implemented. This chapter describes a full-length protein extraction protocol optimized for downstream gel-based proteomics applications. Using the procedures detailed here, SDS-PAGE, western immunoblotting, GeLC-MS/MS, 2D-PAGE, and 2D-DIGE can be carried out on FFPE tissues. Technical tips, critical aspects, and drawbacks of the method are presented and discussed.

  10. Enhanced Evidence-Based Chinese Medicine Clinical Practice Guidelines in Hong Kong: A Study Protocol for Three Common Diseases

    PubMed Central

    Shi, Nannan; Zhong, Linda L. D.; Han, XueJie; Ng, Bacon; Bian, Zhaoxiang; Lu, Aiping

    2015-01-01

    We presented a study protocol of developing Chinese medicine clinical practice guidelines for three common diseases in Hong Kong, including insomnia, chronic gastritis, and cerebral infarction. This research project will be conducted in three phases. First phase is the preparation stage which consists of the establishment of steering committee and panel. Second phase involves 6 steps, which are searching and identifying evidence, text mining process, Delphi survey, synthesizing of data, consensus conference, and drafting guidelines. In this phase, text mining technique, evidence-based method, and formal consensus method are combined to get consolidated supporting data as the source of CM CPGs. The final phase comprised external reviews, dissemination, and updating. The outputs from this project will provide three CM CPGs for insomnia, chronic gastritis, and cerebral infarction for Hong Kong local use. PMID:25815035

  11. A model-based information sharing protocol for profile Hidden Markov Models used for HIV-1 recombination detection

    PubMed Central

    2014-01-01

    Background In many applications, a family of nucleotide or protein sequences classified into several subfamilies has to be modeled. Profile Hidden Markov Models (pHMMs) are widely used for this task, modeling each subfamily separately by one pHMM. However, a major drawback of this approach is the difficulty of dealing with subfamilies composed of very few sequences. One of the most crucial bioinformatical tasks affected by the problem of small-size subfamilies is the subtyping of human immunodeficiency virus type 1 (HIV-1) sequences, i.e., HIV-1 subtypes for which only a small number of sequences is known. Results To deal with small samples for particular subfamilies of HIV-1, we introduce a novel model-based information sharing protocol. It estimates the emission probabilities of the pHMM modeling a particular subfamily not only based on the nucleotide frequencies of the respective subfamily but also incorporating the nucleotide frequencies of all available subfamilies. To this end, the underlying probabilistic model mimics the pattern of commonality and variation between the subtypes with regards to the biological characteristics of HI viruses. In order to implement the proposed protocol, we make use of an existing HMM architecture and its associated inference engine. Conclusions We apply the modified algorithm to classify HIV-1 sequence data in the form of partial HIV-1 sequences and semi-artificial recombinants. Thereby, we demonstrate that the performance of pHMMs can be significantly improved by the proposed technique. Moreover, we show that our algorithm performs significantly better than Simplot and Bootscanning. PMID:24946781

  12. Study protocol for the evaluation of an Infant Simulator based program delivered in schools: a pragmatic cluster randomised controlled trial

    PubMed Central

    2010-01-01

    Background This paper presents the study protocol for a pragmatic randomised controlled trial to evaluate the impact of a school based program developed to prevent teenage pregnancy. The program includes students taking care of an Infant Simulator; despite growing popularity and an increasing global presence of such programs, there is no published evidence of their long-term impact. The aim of this trial is to evaluate the Virtual Infant Parenting (VIP) program by investigating pre-conceptual health and risk behaviours, teen pregnancy and the resultant birth outcomes, early child health and maternal health. Methods and Design Fifty-seven schools (86% of 66 eligible secondary schools) in Perth, Australia were recruited to the clustered (by school) randomised trial, with even randomisation to the intervention and control arms. Between 2003 and 2006, the VIP program was administered to 1,267 participants in the intervention schools, while 1,567 participants in the non-intervention schools received standard curriculum. Participants were all female and aged between 13-15 years upon recruitment. Pre and post-intervention questionnaires measured short-term impact and participants are now being followed through their teenage years via data linkage to hospital medical records, abortion clinics and education records. Participants who have a live birth are interviewed by face-to-face interview. Kaplan-Meier survival analysis and proportional hazards regression will test for differences in pregnancy, birth and abortion rates during the teenage years between the study arms. Discussion This protocol paper provides a detailed overview of the trial design as well as initial results in the form of participant flow. The authors describe the intervention and its delivery within the natural school setting and discuss the practical issues in the conduct of the trial, including recruitment. The trial is pragmatic and will directly inform those who provide Infant Simulator based programs

  13. Treatment protocol based on assessment of clot quality during endovascular thrombectomy for acute ischemic stroke using the Trevo stent retriever.

    PubMed

    Ishikawa, Kojiro; Ohshima, Tomotaka; Nishihori, Masahiro; Imai, Tasuku; Goto, Shunsaku; Yamamoto, Taiki; Nishizawa, Toshihisa; Shimato, Shinji; Kato, Kyozo

    2016-08-01

    The optional endovascular approach for acute ischemic stroke is unclear. The Trevo stent retriever can be used as first-line treatment for fast mechanical recanalization. The authors developed a treatment protocol for acute ischemic stroke based on the assessment of clot quality during clot removal with the Trevo. This prospective single-center study included all patients admitted for acute ischemic stroke between July 2014 and February 2015, who underwent emergency endovascular treatment. According to the protocol, the Trevo was used for first-line treatment. Immediately after the Trevo was deployed, the stent delivery wire was pushed to open the stent by force (ACAPT technique). Clot quality was assessed on the basis of the perfusion status after deployment of the Trevo; continued occlusion or immediate reopening either reoccluded or maintained after the stent retriever had been in place for 5 min. If there was no obvious clot removal after the first pass with the Trevo, according to the quality of the clot, either a second pass was performed or another endovascular device was selected. Twelve consecutive patients with acute major cerebral artery occlusion were analyzed. Thrombolysis in cerebral infarction score 2b and 3 was achieved in 11 patients (91.7%) and 9 (75%) had a good clinical outcome after 90 days based on a modified Rankin scale score ≤ 2. Symptomatic intracranial hemorrhage occurred in 1 patient (8.3%). The overall mortality rate was 8.3%. Endovascular thrombectomy using the Trevo stent retriever for first-line treatment is feasible and effective. PMID:27578909

  14. Treatment protocol based on assessment of clot quality during endovascular thrombectomy for acute ischemic stroke using the Trevo stent retriever

    PubMed Central

    Ishikawa, Kojiro; Ohshima, Tomotaka; Nishihori, Masahiro; Imai, Tasuku; Goto, Shunsaku; Yamamoto, Taiki; Nishizawa, Toshihisa; Shimato, Shinji; Kato, Kyozo

    2016-01-01

    ABSTRACT The optional endovascular approach for acute ischemic stroke is unclear. The Trevo stent retriever can be used as first-line treatment for fast mechanical recanalization. The authors developed a treatment protocol for acute ischemic stroke based on the assessment of clot quality during clot removal with the Trevo. This prospective single-center study included all patients admitted for acute ischemic stroke between July 2014 and February 2015, who underwent emergency endovascular treatment. According to the protocol, the Trevo was used for first-line treatment. Immediately after the Trevo was deployed, the stent delivery wire was pushed to open the stent by force (ACAPT technique). Clot quality was assessed on the basis of the perfusion status after deployment of the Trevo; continued occlusion or immediate reopening either reoccluded or maintained after the stent retriever had been in place for 5 min. If there was no obvious clot removal after the first pass with the Trevo, according to the quality of the clot, either a second pass was performed or another endovascular device was selected. Twelve consecutive patients with acute major cerebral artery occlusion were analyzed. Thrombolysis in cerebral infarction score 2b and 3 was achieved in 11 patients (91.7%) and 9 (75%) had a good clinical outcome after 90 days based on a modified Rankin scale score ≤ 2. Symptomatic intracranial hemorrhage occurred in 1 patient (8.3%). The overall mortality rate was 8.3%. Endovascular thrombectomy using the Trevo stent retriever for first-line treatment is feasible and effective. PMID:27578909

  15. Design and evaluation of web-based image transmission and display with different protocols

    NASA Astrophysics Data System (ADS)

    Tan, Bin; Chen, Kuangyi; Zheng, Xichuan; Zhang, Jianguo

    2011-03-01

    There are many Web-based image accessing technologies used in medical imaging area, such as component-based (ActiveX Control) thick client Web display, Zerofootprint thin client Web viewer (or called server side processing Web viewer), Flash Rich Internet Application(RIA) ,or HTML5 based Web display. Different Web display methods have different peformance in different network environment. In this presenation, we give an evaluation on two developed Web based image display systems. The first one is used for thin client Web display. It works between a PACS Web server with WADO interface and thin client. The PACS Web server provides JPEG format images to HTML pages. The second one is for thick client Web display. It works between a PACS Web server with WADO interface and thick client running in browsers containing ActiveX control, Flash RIA program or HTML5 scripts. The PACS Web server provides native DICOM format images or JPIP stream for theses clients.

  16. Report of the National Panel for Evidence-Based School Counseling: Outcome Research Coding Protocol and Evaluation of Student Success Skills and Second Step

    ERIC Educational Resources Information Center

    Carey, John C.; Dimmitt, Carey; Hatch, Trish A.; Lapan, Richard T.; Whiston, Susan C.

    2008-01-01

    The National Panel for School Counseling Evidence-Based Practice was established by the Center for School Counseling Outcome Research to improve the practice of school counseling by helping to develop the research base that is necessary for responsible and effective practice. This article presents the panel's Outcome Research Coding Protocol and…

  17. An efficient diethyl ether-based soxhlet protocol to quantify faecal sterols from catchment waters.

    PubMed

    Shah, Vikas Kumar G; Dunstan, Hugh; Taylor, Warren

    2006-03-01

    A study was conducted to evaluate the efficiency and reproducibility of a diethyl ether-based soxhlet extraction procedure for faecal sterols occurring from catchment waters. Water samples spiked with a mixture of faecal sterols were filtered and analytes were extracted using the diethyl ether-based soxhlet method and the Bligh and Dyer chloroform extraction process. For diethyl ether-based soxhlet extraction procedure, solvent extracts were saponified with 100 microL of 10% KOH in methanol (100 degrees C/120 min) and then acidified with 60 microL of 6M HCl. Lipid contents were extracted by ethanol (0.5 mL) from the saponification products. The lipid extracts were then reacted with 100 microL of bis(trimethyl)trifluoroacetamide (BSTFA) containing 1% trimethyl chlorosilane (100 degrees C/60 min) to form the trimethylsilyl (TMS) derivatives. The derivatised extracts were then analyzed by gas chromatography-mass spectrometry. For sterol concentrations ranging from 35 to 175 microg mL(-1), the soxhlet-based extraction process yielded the following recovery efficiencies for coprostanol (101%), epicoprostanol (97%), cholesterol (97%), dihydrocholesterol (97%) and 5alpha-cholestane (111%), whereas the Bligh and Dyer process yielded recoveries of 32, 41, 0, 36 and 51%, respectively. The results suggested that the diethyl ether-based soxhlet extraction method was more efficient and reproducible than the Bligh and Dyer chloroform extraction process for the analyses of trace levels of faecal sterols from water samples. Moreover, it was revealed that the diethyl ether-based soxhlet extraction method used less solvent and was logistically easier.

  18. Bargaining for health: a case study of a collective agreement-based health program for manual workers.

    PubMed

    Pedersen, Morten Saaby; Arendt, Jacob Nielsen

    2014-09-01

    This paper examines the short- and medium-term effects of the PensionDanmark Health Scheme, the largest privately administered health program for workers in Denmark, which provides prevention and early management of work-related injuries. We use a difference-in-differences approach that exploits a natural variation in the program rollout across collective agreement areas in the construction sector and over time. The results show only little evidence of an effect on the prevention of injuries requiring medical attention in the first 3 years after the program was introduced. Despite this, we find evidence of significant positive effects on several labor market outcomes, suggesting that the program enables some work-injured individuals to maintain their work and earnings capacity. In view of its low costs, the program appears to be cost-effective overall. PMID:24992391

  19. SoyBase Simple Semantic Web Architecture and Protocol (SSWAP) Services

    Technology Transfer Automated Retrieval System (TEKTRAN)

    Semantic web technologies offer the potential to link internet resources and data by shared concepts without having to rely on absolute lexical matches. Thus two web sites or web resources which are concerned with similar data types could be identified based on similar semantics. In the biological...

  20. EQUIPping Teachers: A Protocol to Guide and Improve Inquiry-Based Instruction

    ERIC Educational Resources Information Center

    Marshall, Jeff; Horton, Robert; White, Chris

    2009-01-01

    For many years, publications such as the "National Science Education Standards" (NRC 1996) and "The Science Teacher" (TST) have encouraged teachers to focus science classes more heavily on inquiry-based instructional practice. One way to improve our teaching practice is to use a benchmark assessment to obtain a solid point of reference that…

  1. Reading Error Protocol Study: A Data Base. Volume V. Grade Six.

    ERIC Educational Resources Information Center

    Simons, Herbert D.; Chambers, Richard

    This is the fifth of six volumes providing information drawn from a project designed to compile a substantial data base on reading errors for use by researchers and teachers. This volume contains transcriptions of oral reading error studies conducted with sixth grade students. The transcriptions are organized according to grade and…

  2. Reading Error Protocol Study: A Data Base. Volume II. Grades One and Two.

    ERIC Educational Resources Information Center

    Simons, Herbert D.; Chambers, Richard

    This is the second of six volumes providing information drawn from a project designed to compile a substantial data base on reading errors for use by researchers and teachers. This volume contains transcriptions of oral reading error studies conducted with first and second grade students. The transcriptions are organized according to grade and the…

  3. Reading Error Protocol Study: A Data Base. Volume IV. Grade Five.

    ERIC Educational Resources Information Center

    Simons, Herbert D.; Chambers, Richard

    This is the fourth of six volumes providing information drawn from a project designed to compile a substantial data base on reading errors for use by researchers and teachers. This volume contains transcriptions of oral reading error studies conducted with fifth grade students. The transcriptions are organized according to grade and…

  4. Reading Error Protocol Study: A Data Base. Volume III. Grades Three and Four.

    ERIC Educational Resources Information Center

    Simons, Herbert D.; Chambers, Richard

    This is the third of six volumes providing information drawn from a project designed to compile a substantial data base on reading errors for use by researchers and teachers. This volume contains transcriptions of oral reading error studies conducted with third and fourth grade students. The transcriptions are organized according to grade and…

  5. Reading Error Protocol Study: A Data Base. Volume VI. Grades Eight through Ten.

    ERIC Educational Resources Information Center

    Simons, Herbert D.; Chambers, Richard

    This is the last of six volumes providing information drawn from a project designed to compile a substantial data base on reading errors for use by researchers and teachers. This volume contains transcriptions of oral reading error studies conducted with eighth, ninth, and tenth grade students. The transcriptions are organized according to grade…

  6. Establishment of a Cre recombinase based mutagenesis protocol for markerless gene deletion in Streptococcus suis.

    PubMed

    Koczula, A; Willenborg, J; Bertram, R; Takamatsu, D; Valentin-Weigand, P; Goethe, R

    2014-12-01

    The lack of knowledge about pathogenicity mechanisms of Streptococcus (S.) suis is, at least partially, attributed to limited methods for its genetic manipulation. Here, we established a Cre-lox based recombination system for markerless gene deletions in S. suis serotype 2 with high selective pressure and without undesired side effects.

  7. The effects of sweep numbers per average and protocol type on the accuracy of the p300-based concealed information test.

    PubMed

    Dietrich, Ariana B; Hu, Xiaoqing; Rosenfeld, J Peter

    2014-03-01

    In the first of two experiments, we compared the accuracy of the P300 concealed information test protocol as a function of numbers of trials experienced by subjects and ERP averages analyzed by investigators. Contrary to Farwell et al. (Cogn Neurodyn 6(2):115-154, 2012), we found no evidence that 100 trial based averages are more accurate than 66 or 33 trial based averages (all numbers led to accuracies of 84-94 %). There was actually a trend favoring the lowest trial numbers. The second study compared numbers of irrelevant stimuli recalled and recognized in the 3-stimulus protocol versus the complex trial protocol (Rosenfeld in Memory detection: theory and application of the concealed information test, Cambridge University Press, New York, pp 63-89, 2011). Again, in contrast to expectations from Farwell et al. (Cogn Neurodyn 6(2):115-154, 2012), there were no differences between protocols, although there were more irrelevant stimuli recognized than recalled, and irrelevant 4-digit number group stimuli were neither recalled nor recognized as well as irrelevant city name stimuli. We therefore conclude that stimulus processing in the P300-based complex trial protocol-with no more than 33 sweep averages-is adequate to allow accurate detection of concealed information. PMID:24531833

  8. The effects of sweep numbers per average and protocol type on the accuracy of the p300-based concealed information test.

    PubMed

    Dietrich, Ariana B; Hu, Xiaoqing; Rosenfeld, J Peter

    2014-03-01

    In the first of two experiments, we compared the accuracy of the P300 concealed information test protocol as a function of numbers of trials experienced by subjects and ERP averages analyzed by investigators. Contrary to Farwell et al. (Cogn Neurodyn 6(2):115-154, 2012), we found no evidence that 100 trial based averages are more accurate than 66 or 33 trial based averages (all numbers led to accuracies of 84-94 %). There was actually a trend favoring the lowest trial numbers. The second study compared numbers of irrelevant stimuli recalled and recognized in the 3-stimulus protocol versus the complex trial protocol (Rosenfeld in Memory detection: theory and application of the concealed information test, Cambridge University Press, New York, pp 63-89, 2011). Again, in contrast to expectations from Farwell et al. (Cogn Neurodyn 6(2):115-154, 2012), there were no differences between protocols, although there were more irrelevant stimuli recognized than recalled, and irrelevant 4-digit number group stimuli were neither recalled nor recognized as well as irrelevant city name stimuli. We therefore conclude that stimulus processing in the P300-based complex trial protocol-with no more than 33 sweep averages-is adequate to allow accurate detection of concealed information.

  9. A Secure ECC-based RFID Mutual Authentication Protocol to Enhance Patient Medication Safety.

    PubMed

    Jin, Chunhua; Xu, Chunxiang; Zhang, Xiaojun; Li, Fagen

    2016-01-01

    Patient medication safety is an important issue in patient medication systems. In order to prevent medication errors, integrating Radio Frequency Identification (RFID) technology into automated patient medication systems is required in hospitals. Based on RFID technology, such systems can provide medical evidence for patients' prescriptions and medicine doses, etc. Due to the mutual authentication between the medication server and the tag, RFID authentication scheme is the best choice for automated patient medication systems. In this paper, we present a RFID mutual authentication scheme based on elliptic curve cryptography (ECC) to enhance patient medication safety. Our scheme can achieve security requirements and overcome various attacks existing in other schemes. In addition, our scheme has better performance in terms of computational cost and communication overhead. Therefore, the proposed scheme is well suitable for patient medication systems. PMID:26573649

  10. A Secure ECC-based RFID Mutual Authentication Protocol to Enhance Patient Medication Safety.

    PubMed

    Jin, Chunhua; Xu, Chunxiang; Zhang, Xiaojun; Li, Fagen

    2016-01-01

    Patient medication safety is an important issue in patient medication systems. In order to prevent medication errors, integrating Radio Frequency Identification (RFID) technology into automated patient medication systems is required in hospitals. Based on RFID technology, such systems can provide medical evidence for patients' prescriptions and medicine doses, etc. Due to the mutual authentication between the medication server and the tag, RFID authentication scheme is the best choice for automated patient medication systems. In this paper, we present a RFID mutual authentication scheme based on elliptic curve cryptography (ECC) to enhance patient medication safety. Our scheme can achieve security requirements and overcome various attacks existing in other schemes. In addition, our scheme has better performance in terms of computational cost and communication overhead. Therefore, the proposed scheme is well suitable for patient medication systems.

  11. Optimized formulation and processing protocol for a supplementary bean-based composite flour.

    PubMed

    Ndagire, Catherine T; Muyonga, John H; Manju, Reddy; Nakimbugwe, Dorothy

    2015-11-01

    Protein-energy malnutrition is the most serious nutritional body depletion disorder among infants and young children in developing countries, attributable to inadequate energy and nutrient intake, partly due to high dietary bulk of weaning and infant foods. The gruels fed to children are typically of low nutrient and energy density due to the low flour incorporation rate required for drinking viscosity. The aim of this study was to develop a nutritious product, based on common dry beans and other grains, suitable for supplementary feeding. The optimal processing conditions for desired nutritional and sensory attributes were determined using Response Surface Methodology. For bean processing, soaking for 6, 15, or 24 h, germination for 24 or 48 h, and cooking under pressure for either 10 or 20 min were the independent variables. The processed bean flour's total polyphenol, phytic acid and protein content, the sensory acceptability of the bean-based composite porridge and its protein and starch digestibility were dependent variables. Based on product acceptability, antinutrients and protein content, as well as on protein and starch digestibility, the optimum processing conditions for the bean flour for infant and young child feeding were 24 h of soaking, 48 h of malting, and 19 min of steaming under pressure. These conditions resulted in a product with the highest desirability. The model equations developed can be used for predicting the quality of the bean flour and the bean-based composite porridge. Bean optimally processed and incorporated with grain amaranth and rice flours of a ratio of 40: 30: 30, respectively, resulted into flour with high energy, mineral, and nutrient density of the final porridge. The composite is well adaptable to preparation at rural community level. The use of these locally available grains and feasible processes could make a great contribution to nutrition security in sub-Saharan Africa and other developing countries. PMID:26788294

  12. A model-based framework for the quality assessment of surface albedo in situ measurement protocols

    NASA Astrophysics Data System (ADS)

    Adams, Jennifer; Gobron, Nadine; Widlowski, Jean-Luc; Mio, Corrado

    2016-09-01

    Satellite-based retrievals of land surface albedo are essential for climate and environmental modelling communities. To be of use, satellite-retrievals are required to comply to given accuracy requirements, mainly achieved through comparison with in situ measurements. Differences between in situ and satellite-based retrievals depend on their actual difference and their associated uncertainties. It is essential that these uncertainties can be computed to properly understand the differences between satellite-based and in situ measurements of albedo, however quantifying the individual contributions of uncertainty is difficult. This study introduces a model-based framework for assessing the quality of in situ albedo measurements. A 3D Monte Carlo Ray Tracing (MCRT) radiative transfer model is used to simulate field measurements of surface albedo, and is able to identify and quantify potential sources of error in the field measurement. Compliance with the World Meteorological Organisation (WMO) requirement for 3% accuracy is tested. 8 scenarios were investigated, covering a range of ecosystem types and canopy structures, seasons, illumination angles and tree heights. Results indicate that height of measurement above the canopy is the controlling factor in accuracy, with each canopy scenario reaching the WMO requirement at different heights. Increasing canopy heterogeneity and tree height noticeably reduces the accuracy, whereas changing seasonality from summer to winter in a deciduous forest increases accuracy. For canopies with a row structure, illumination angle can significantly impact accuracy as a result of shadowing effects. Tests were made on the potential use of multiple in situ measurements, indicating considerably increased accuracy if two or more in situ measurements can be made.

  13. A Unified Fault-Tolerance Protocol

    NASA Technical Reports Server (NTRS)

    Miner, Paul; Gedser, Alfons; Pike, Lee; Maddalon, Jeffrey

    2004-01-01

    Davies and Wakerly show that Byzantine fault tolerance can be achieved by a cascade of broadcasts and middle value select functions. We present an extension of the Davies and Wakerly protocol, the unified protocol, and its proof of correctness. We prove that it satisfies validity and agreement properties for communication of exact values. We then introduce bounded communication error into the model. Inexact communication is inherent for clock synchronization protocols. We prove that validity and agreement properties hold for inexact communication, and that exact communication is a special case. As a running example, we illustrate the unified protocol using the SPIDER family of fault-tolerant architectures. In particular we demonstrate that the SPIDER interactive consistency, distributed diagnosis, and clock synchronization protocols are instances of the unified protocol.

  14. Rational Protocols

    NASA Astrophysics Data System (ADS)

    Cachin, Christian

    Security research continues to provide a plethora of new protocols and mechanisms; these solutions patch either existing vulnerabilities found in practical systems or solve hypothetical security problems in the sense that the problem is often conceived at the same time when the first solution is proposed. Yet only a very small fraction of this research is relevant to ordinary users in the sense that they are willing to actually deploy the technology.

  15. Community-based interventions to prevent fatal overdose from illegal drugs: a systematic review protocol

    PubMed Central

    Okolie, Chukwudi; Evans, Bridie Angela; John, Ann; Moore, Chris; Russell, Daphne; Snooks, Helen

    2015-01-01

    Introduction Drug overdose is the most frequent cause of death among people who misuse illegal drugs. People who inject these drugs are 14–17 times more likely to die than their non-drug using peers. Various strategies to reduce drug-related deaths have failed to meet target reductions. Research into community-based interventions for preventing drug overdose deaths is promising. This review seeks to identify published studies describing community-based interventions and to evaluate their effectiveness at reducing drug overdose deaths. Methods and analysis We will systematically search key electronic databases using a search strategy which groups terms into four facets: (1) Overdose event, (2) Drug classification, (3) Intervention and (4) Setting. Searches will be limited where possible to international literature published in English between 1998 and 2014. Data will be extracted by two independent reviewers using a predefined table adapted from the Cochrane Collaboration handbook. The quality of included studies will be evaluated using the Cochrane Collaboration's tool for assessing risk of bias. We will conduct a meta-analysis for variables which can be compared across studies, using statistical methods to control for heterogeneity where appropriate. Where clinical or statistical heterogeneity prevents a valid numerical synthesis, we will employ a narrative synthesis to describe community-based interventions, their delivery and use and how effectively they prevent fatal overdoses. Ethics and dissemination We will publish findings from this systematic review in a peer-reviewed scientific journal and present results at national and international conferences. It will be disseminated electronically and in print. Trial registration number PROSPERO CRD42015017833. PMID:26534734

  16. Protocol for Atomic Oxygen Testing of Materials in Ground-Based Facilities. No. 2

    NASA Technical Reports Server (NTRS)

    Minton, Timothy K.

    1995-01-01

    A second version of standard guidelines is proposed for improving materials testing in ground-based atomic oxygen environments for the purpose of predicting the durability of the tested materials in low Earth orbit (LEO). Accompanying these guidelines are background information and notes about testing. Both the guidelines and the additional information are intended to aid users who wish to evaluate the potential hazard of atomic oxygen in LEO to a candidate space component without actually flying the component in space, and to provide a framework for more consistent atomic oxygen testing in the future.

  17. The research on electronic commerce security payment system based on set protocol

    NASA Astrophysics Data System (ADS)

    Guo, Hongliang

    2012-04-01

    With the rapid development of network technology, online transactions have become more and more common. In this paper, we firstly introduce the principle and the basic principal and technical foundation of SET, and then we analyze the progress of designing a system in the foundation of the procedure of the electronic business based on SET. On this basis, we design a system of the Payment System for Electronic Business. It will not only take on crucial realism signification for large-scale, medium-sized and mini-type corporations, but also provide guide meaning with programmer and design-developer to realize Electronic Commerce (EC).

  18. A comparative study of Sterofundin and Ringer lactate based infusion protocol in scoliosis correction surgery

    PubMed Central

    Sharma, Ashima; Yadav, Monu; Kumar, B. Rajesh; Lakshman, P. Sai; Iyenger, Raju; Ramchandran, Gopinath

    2016-01-01

    Background: A major change in anesthesia practice as regards to intraoperative infusion therapy is the present requirement. Switching over to balanced fluids can substantially decrease the incidence of lactic acidosis and hyperchloremic acidosis. The deleterious effects of unbalanced fluids are more recognizable during major surgeries. We prospectively studied the influence of Sterofundin (SF) and Ringer lactate (RL) on acid–base changes, hemodynamics, and readiness for extubation during scoliosis surgery. Subjects and Methods: Thirty consecutive children posted for scoliosis surgery were randomized to receive either RL (n = 15) or SF (n = 15) as intraoperative fluid at 10 mg/kg/h. Fluid boluses were added according to the study fluid algorithm. Arterial blood was sampled and analyzed at hourly intervals during surgery. Red blood cell transfusion was guided by hematocrit below 27. Patients were followed for 24 h postoperatively in the Intensive Care Unit. Results: There was no statistically significant difference in the volume of infused fluid (2400 ± 512 ml in Group RL and 2200 ± 640 ml in Group SF. There were no significant changes in pH of patients infused with SF. Statistically, significant higher lactate levels were seen in RL-infused group. The strong ion difference was decreased in both groups, but it normalized earlier with SF. Conclusions: SF-infused patients had nonremarkable changes in acid–base physiology in scoliosis surgery. PMID:27746547

  19. Reducing the agreement cost of BFT replication

    NASA Astrophysics Data System (ADS)

    Zbierski, Maciej

    2015-09-01

    Byzantine fault-tolerant (BFT) replication is a powerful technique for guaranteeing correctness of distributed services despite arbitrary faults. BFT replication protocols are typically composed of two phases: agreement and execution. Although some monolithic solutions exist that incorporate both phases, providing a clear separation between agreement and execution is often desired, due to for instance higher level of abstraction or better resource utilization. At the same time, however, separation can increase latency and reduce throughput, as an additional communication round is typically required to relay the requests between the phases. In this article we address this issue by proposing an approach that reduces the cost of agreement in BFT replication protocols without sacrificing phase separation. The article presents Otonaru, a dedicated sequencer that achieves around 30% higher performance than solutions usually deployed in the agreement phase of modern BFT replication protocols. As a result, the solutions built using the proposed approach can inherit all benefits of separation, at the same time providing a performance competitive to monolithic BFT protocols.

  20. 31 CFR 540.305 - HEU Agreements.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... current and future amendments thereto; as well as the related current and future implementing agreements, memoranda of understanding, protocols, and contracts, including all current and future amendments thereto..., Acting By and Through the United States Department of State, and the United States Department of...

  1. 31 CFR 540.305 - HEU Agreements.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... current and future amendments thereto; as well as the related current and future implementing agreements, memoranda of understanding, protocols, and contracts, including all current and future amendments thereto..., Acting By and Through the United States Department of State, and the United States Department of...

  2. 31 CFR 540.305 - HEU Agreements.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... current and future amendments thereto; as well as the related current and future implementing agreements, memoranda of understanding, protocols, and contracts, including all current and future amendments thereto..., Acting By and Through the United States Department of State, and the United States Department of...

  3. Throughput and delay analysis of IEEE 802.15.6-based CSMA/CA protocol.

    PubMed

    Ullah, Sana; Chen, Min; Kwak, Kyung Sup

    2012-12-01

    The IEEE 802.15.6 is a new communication standard on Wireless Body Area Network (WBAN) that focuses on a variety of medical, Consumer Electronics (CE) and entertainment applications. In this paper, the throughput and delay performance of the IEEE 802.15.6 is presented. Numerical formulas are derived to determine the maximum throughput and minimum delay limits of the IEEE 802.15.6 for an ideal channel with no transmission errors. These limits are derived for different frequency bands and data rates. Our analysis is validated by extensive simulations using a custom C+ + simulator. Based on analytical and simulation results, useful conclusions are derived for network provisioning and packet size optimization for different applications.

  4. Hip prothesis: an in vitro wear protocol based on a comparison between gravimetric and profilometric analysis.

    PubMed

    Affatato, S; Tagliati, M; Toni, A

    1999-01-01

    Ultra high molecular weight polyethylene acetabular cups were analysed by means of a shadowgraph method (using a profile projector) to measure linear wear. The results were compared with those of previous wear tests performed on a hip joint simulator. Twelve polyethylene acetabular cups were analysed. The specimens were evaluated visually for evidence of polyethylene wear. Examination of the polyethylene inner surface did not reveal evidence of surface failure such as delamination, fatigue cracks or scratches. Volumetric wear was calculated using a formula based on dimensional change due to the penetration of the femoral head in the acetabular cup. It was found to be of the same order of magnitude as the wear obtained in in vitro experimental tests.

  5. Replacing Amalgam Restorations: A Standardized Protocol Based on Analyzing Tissue Physicochemical Modifications.

    PubMed

    Decup, Franck; Epaillard, Alexandre; Chemla, Florence

    2015-12-01

    Almost 60% of operative dentistry is devoted to replacing restorations. When practitioners have to replace an amalgam restoration, they tend to opt for an adhesive restoration, as it is conservative of tooth tissues and mimics the natural appearance of teeth. Based on a literature review, the aim of this article is to determine the best tissue approach when replacing an old amalgam by a new adhesive restoration. After analyzing and understanding tissue alterations due to the amalgam corrosion process, the authors propose an analytical approach to managing the situation. Both tissue orientated and specific mechanical approaches are developed and should be implemented to carry out the optimal clinical procedure and achieve the most conservative and durable treatment. PMID:26767237

  6. Development of a new cell culture-based method and optimized protocol for the detection of enteric viruses.

    PubMed

    Lee, Jae Ho; Lee, Gyu-Cheol; Kim, Jong Ik; Yi, Hyun Ah; Lee, Chan Hee

    2013-07-01

    The development of rapid and effective methods to detect water- and food-borne enteric viruses is important for the prevention and control of mass infection. This study represents an attempt to develop a reliable cell culture-based detection system and optimize an effective and rapid protocol for the assaying of environmental samples for the presence of infectious enteric viruses. Six enteric viruses were used in this study: poliovirus, Coxsackie virus A9, Coxsackie virus B5, human rotavirus G1, hepatitis A virus, and adenovirus type 41. Among the cell lines from humans (A549, HeLa, HEK293, and HFF) and other primates (Vero, BS-C-1, FRhK-4, BGMK, and MA104), a cytopathic effect (CPE) analysis indicated that the MA104 cell line was the most optimal for use in the detection of infectious enteric viruses. Both the sensitivity and specificity of virus detection in MA104 cells were similar to or higher than those in standard BGMK cells. Next, a method was developed for the determination of the infectiousness of enteric viruses using the colorimetric thiazolyl blue (MTT) assay. This assay utilizes 3-(4,5-dimethylthiazol-2-yl)-2,5-diphenyl tetrazolium bromide to yield % values based on colorimetric results. These results were compared with those from a conventional CPE-based TCID(50) assay, revealing no statistically significant difference between the two methods. The MTT% values in MA104 cells were comparable to those in BGMK cells. This MA104 cell-based MTT assay could substitute for the classical BGMK cell-based CPE assay for infectious enteric viruses.

  7. A PCR based protocol for detecting indel mutations induced by TALENs and CRISPR/Cas9 in zebrafish.

    PubMed

    Yu, Chuan; Zhang, Yaguang; Yao, Shaohua; Wei, Yuquan

    2014-01-01

    Genome editing techniques such as the zinc-finger nucleases (ZFNs), transcription activator-like effecter nucleases (TALENs) and clustered regularly interspaced short palindromic repeats (CRISPR)/CRISPR-associated (Cas) system Cas9 can induce efficient DNA double strand breaks (DSBs) at the target genomic sequence and result in indel mutations by the error-prone non-homologous end joining (NHEJ) DNA repair system. Several methods including sequence specific endonuclease assay, T7E1 assay and high resolution melting curve assay (HRM) etc have been developed to detect the efficiency of the induced mutations. However, these assays have some limitations in that they either require specific sequences in the target sites or are unable to generate sequencing-ready mutant DNA fragments or unable to distinguish induced mutations from natural nucleotide polymorphism. Here, we developed a simple PCR-based protocol for detecting indel mutations induced by TALEN and Cas9 in zebrafish. We designed 2 pairs of primers for each target locus, with one putative amplicon extending beyond the putative indel site and the other overlapping it. With these primers, we performed a qPCR assay to efficiently detect the frequencies of newly induced mutations, which was accompanied with a T-vector-based colony analysis to generate single-copy mutant fragment clones for subsequent DNA sequencing. Thus, our work has provided a very simple, efficient and fast assay for detecting induced mutations, which we anticipate will be widely used in the area of genome editing. PMID:24901507

  8. A community-based event delivery protocol in publish/subscribe systems for delay tolerant sensor networks.

    PubMed

    Liu, Nianbo; Liu, Ming; Zhu, Jinqi; Gong, Haigang

    2009-01-01

    The basic operation of a Delay Tolerant Sensor Network (DTSN) is to finish pervasive data gathering in networks with intermittent connectivity, while the publish/subscribe (Pub/Sub for short) paradigm is used to deliver events from a source to interested clients in an asynchronous way. Recently, extension of Pub/Sub systems in DTSNs has become a promising research topic. However, due to the unique frequent partitioning characteristic of DTSNs, extension of a Pub/Sub system in a DTSN is a considerably difficult and challenging problem, and there are no good solutions to this problem in published works. To ad apt Pub/Sub systems to DTSNs, we propose CED, a community-based event delivery protocol. In our design, event delivery is based on several unchanged communities, which are formed by sensor nodes in the network according to their connectivity. CED consists of two components: event delivery and queue management. In event delivery, events in a community are delivered to mobile subscribers once a subscriber comes into the community, for improving the data delivery ratio. The queue management employs both the event successful delivery time and the event survival time to decide whether an event should be delivered or dropped for minimizing the transmission overhead. The effectiveness of CED is demonstrated through comprehensive simulation studies.

  9. Protocol: high throughput silica-based purification of RNA from Arabidopsis seedlings in a 96-well format

    PubMed Central

    2011-01-01

    The increasing popularity of systems-based approaches to plant research has resulted in a demand for high throughput (HTP) methods to be developed. RNA extraction from multiple samples in an experiment is a significant bottleneck in performing systems-level genomic studies. Therefore we have established a high throughput method of RNA extraction from Arabidopsis thaliana to facilitate gene expression studies in this widely used plant model. We present optimised manual and automated protocols for the extraction of total RNA from 9-day-old Arabidopsis seedlings in a 96 well plate format using silica membrane-based methodology. Consistent and reproducible yields of high quality RNA are isolated averaging 8.9 μg total RNA per sample (~20 mg plant tissue). The purified RNA is suitable for subsequent qPCR analysis of the expression of over 500 genes in triplicate from each sample. Using the automated procedure, 192 samples (2 × 96 well plates) can easily be fully processed (samples homogenised, RNA purified and quantified) in less than half a day. Additionally we demonstrate that plant samples can be stored in RNAlater at -20°C (but not 4°C) for 10 months prior to extraction with no significant effect on RNA yield or quality. Additionally, disrupted samples can be stored in the lysis buffer at -20°C for at least 6 months prior to completion of the extraction procedure providing a flexible sampling and storage scheme to facilitate complex time series experiments. PMID:22136293

  10. Improving practice in community-based settings: a randomized trial of supervision – study protocol

    PubMed Central

    2013-01-01

    Background Evidence-based treatments for child mental health problems are not consistently available in public mental health settings. Expanding availability requires workforce training. However, research has demonstrated that training alone is not sufficient for changing provider behavior, suggesting that ongoing intervention-specific supervision or consultation is required. Supervision is notably under-investigated, particularly as provided in public mental health. The degree to which supervision in this setting includes ‘gold standard’ supervision elements from efficacy trials (e.g., session review, model fidelity, outcome monitoring, skill-building) is unknown. The current federally-funded investigation leverages the Washington State Trauma-focused Cognitive Behavioral Therapy Initiative to describe usual supervision practices and test the impact of systematic implementation of gold standard supervision strategies on treatment fidelity and clinical outcomes. Methods/Design The study has two phases. We will conduct an initial descriptive study (Phase I) of supervision practices within public mental health in Washington State followed by a randomized controlled trial of gold standard supervision strategies (Phase II), with randomization at the clinician level (i.e., supervisors provide both conditions). Study participants will be 35 supervisors and 130 clinicians in community mental health centers. We will enroll one child per clinician in Phase I (N = 130) and three children per clinician in Phase II (N = 390). We use a multi-level mixed within- and between-subjects longitudinal design. Audio recordings of supervision and therapy sessions will be collected and coded throughout both phases. Child outcome data will be collected at the beginning of treatment and at three and six months into treatment. Discussion This study will provide insight into how supervisors can optimally support clinicians delivering evidence-based treatments. Phase I will

  11. Maximum Data Collection Rate Routing Protocol Based on Topology Control for Rechargeable Wireless Sensor Networks.

    PubMed

    Lin, Haifeng; Bai, Di; Gao, Demin; Liu, Yunfei

    2016-07-30

    In Rechargeable Wireless Sensor Networks (R-WSNs), in order to achieve the maximum data collection rate it is critical that sensors operate in very low duty cycles because of the sporadic availability of energy. A sensor has to stay in a dormant state in most of the time in order to recharge the battery and use the energy prudently. In addition, a sensor cannot always conserve energy if a network is able to harvest excessive energy from the environment due to its limited storage capacity. Therefore, energy exploitation and energy saving have to be traded off depending on distinct application scenarios. Since higher data collection rate or maximum data collection rate is the ultimate objective for sensor deployment, surplus energy of a node can be utilized for strengthening packet delivery efficiency and improving the data generating rate in R-WSNs. In this work, we propose an algorithm based on data aggregation to compute an upper data generation rate by maximizing it as an optimization problem for a network, which is formulated as a linear programming problem. Subsequently, a dual problem by introducing Lagrange multipliers is constructed, and subgradient algorithms are used to solve it in a distributed manner. At the same time, a topology controlling scheme is adopted for improving the network's performance. Through extensive simulation and experiments, we demonstrate that our algorithm is efficient at maximizing the data collection rate in rechargeable wireless sensor networks.

  12. Maximum Data Collection Rate Routing Protocol Based on Topology Control for Rechargeable Wireless Sensor Networks.

    PubMed

    Lin, Haifeng; Bai, Di; Gao, Demin; Liu, Yunfei

    2016-01-01

    In Rechargeable Wireless Sensor Networks (R-WSNs), in order to achieve the maximum data collection rate it is critical that sensors operate in very low duty cycles because of the sporadic availability of energy. A sensor has to stay in a dormant state in most of the time in order to recharge the battery and use the energy prudently. In addition, a sensor cannot always conserve energy if a network is able to harvest excessive energy from the environment due to its limited storage capacity. Therefore, energy exploitation and energy saving have to be traded off depending on distinct application scenarios. Since higher data collection rate or maximum data collection rate is the ultimate objective for sensor deployment, surplus energy of a node can be utilized for strengthening packet delivery efficiency and improving the data generating rate in R-WSNs. In this work, we propose an algorithm based on data aggregation to compute an upper data generation rate by maximizing it as an optimization problem for a network, which is formulated as a linear programming problem. Subsequently, a dual problem by introducing Lagrange multipliers is constructed, and subgradient algorithms are used to solve it in a distributed manner. At the same time, a topology controlling scheme is adopted for improving the network's performance. Through extensive simulation and experiments, we demonstrate that our algorithm is efficient at maximizing the data collection rate in rechargeable wireless sensor networks. PMID:27483282

  13. Maximum Data Collection Rate Routing Protocol Based on Topology Control for Rechargeable Wireless Sensor Networks

    PubMed Central

    Lin, Haifeng; Bai, Di; Gao, Demin; Liu, Yunfei

    2016-01-01

    In Rechargeable Wireless Sensor Networks (R-WSNs), in order to achieve the maximum data collection rate it is critical that sensors operate in very low duty cycles because of the sporadic availability of energy. A sensor has to stay in a dormant state in most of the time in order to recharge the battery and use the energy prudently. In addition, a sensor cannot always conserve energy if a network is able to harvest excessive energy from the environment due to its limited storage capacity. Therefore, energy exploitation and energy saving have to be traded off depending on distinct application scenarios. Since higher data collection rate or maximum data collection rate is the ultimate objective for sensor deployment, surplus energy of a node can be utilized for strengthening packet delivery efficiency and improving the data generating rate in R-WSNs. In this work, we propose an algorithm based on data aggregation to compute an upper data generation rate by maximizing it as an optimization problem for a network, which is formulated as a linear programming problem. Subsequently, a dual problem by introducing Lagrange multipliers is constructed, and subgradient algorithms are used to solve it in a distributed manner. At the same time, a topology controlling scheme is adopted for improving the network’s performance. Through extensive simulation and experiments, we demonstrate that our algorithm is efficient at maximizing the data collection rate in rechargeable wireless sensor networks. PMID:27483282

  14. Ketamine-Based Anesthetic Protocols and Evoked Potential Monitoring: A Risk/Benefit Overview

    PubMed Central

    Stoicea, Nicoleta; Versteeg, Gregory; Florescu, Diana; Joseph, Nicholas; Fiorda-Diaz, Juan; Navarrete, Víctor; Bergese, Sergio D.

    2016-01-01

    Since its discovery, ketamine, a non-competitive N-methyl D-aspartate (NMDA) receptor antagonist related to phencyclidine, has been linked to multiple adverse reactions sometimes described as “out of body” and “near death experiences,” including emergence phenomena, delusions, hallucinations, delirium, and confusion. Due to these effects, ketamine has been withdrawn from mainstream anesthetic use in adult patients. Evoked potentials (EPs) are utilized to monitor neural pathways during surgery, detect intraoperative stress or damage, detect and define the level of neural lesions, and define abnormalities. Unfortunately, many of the volatile anesthetics commonly used during spinal and neurologic procedures suppress EP amplitude and monitoring. Ketamine has been found in several preclinical and clinical studies to actually increase EP amplitude and thus has been used as an analgesic adjunct in procedures where EP monitoring is critical. Once the gap in our knowledge of ketamine's risks has been sufficiently addressed in animal models, informed clinical trials should be conducted in order to properly incorporate ketamine-based anesthetic regimens during EP-monitored neurosurgeries. PMID:26909017

  15. Ketamine-Based Anesthetic Protocols and Evoked Potential Monitoring: A Risk/Benefit Overview.

    PubMed

    Stoicea, Nicoleta; Versteeg, Gregory; Florescu, Diana; Joseph, Nicholas; Fiorda-Diaz, Juan; Navarrete, Víctor; Bergese, Sergio D

    2016-01-01

    Since its discovery, ketamine, a non-competitive N-methyl D-aspartate (NMDA) receptor antagonist related to phencyclidine, has been linked to multiple adverse reactions sometimes described as "out of body" and "near death experiences," including emergence phenomena, delusions, hallucinations, delirium, and confusion. Due to these effects, ketamine has been withdrawn from mainstream anesthetic use in adult patients. Evoked potentials (EPs) are utilized to monitor neural pathways during surgery, detect intraoperative stress or damage, detect and define the level of neural lesions, and define abnormalities. Unfortunately, many of the volatile anesthetics commonly used during spinal and neurologic procedures suppress EP amplitude and monitoring. Ketamine has been found in several preclinical and clinical studies to actually increase EP amplitude and thus has been used as an analgesic adjunct in procedures where EP monitoring is critical. Once the gap in our knowledge of ketamine's risks has been sufficiently addressed in animal models, informed clinical trials should be conducted in order to properly incorporate ketamine-based anesthetic regimens during EP-monitored neurosurgeries. PMID:26909017

  16. A Simple XML Producer-Consumer Protocol

    NASA Technical Reports Server (NTRS)

    Smith, Warren; Gunter, Dan; Quesnel, Darcy

    2000-01-01

    This document describes a simple XML-based protocol that can be used for producers of events to communicate with consumers of events. The protocol described here is not meant to be the most efficient protocol, the most logical protocol, or the best protocol in any way. This protocol was defined quickly and it's intent is to give us a reasonable protocol that we can implement relatively easily and then use to gain experience in distributed event services. This experience will help us evaluate proposals for event representations, XML-based encoding of information, and communication protocols. The next section of this document describes how we represent events in this protocol and then defines the two events that we choose to use for our initial experiments. These definitions are made by example so that they are informal and easy to understand. The following section then proceeds to define the producer-consumer protocol we have agreed upon for our initial experiments.

  17. Internet-Based Cognitive Behavior Therapy for Procrastination: Study Protocol for a Randomized Controlled Trial

    PubMed Central

    Rozental, Alexander

    2013-01-01

    period, albeit without therapist contact. Results The current study is believed to result in three important findings. First, a CBT intervention is assumed to be beneficial for people suffering from problems caused by procrastination. Second, the degree of therapist contact will have a positive effect on treatment outcome as procrastination can be partially explained as a self-regulatory failure. Third, an Internet based CBT intervention is presumed to be an effective way to administer treatment for procrastination, which is considered highly important, as the availability of adequate care is limited. The current study is therefore believed to render significant knowledge on the treatment of procrastination, as well as providing support for the use of Internet based CBT for difficulties due to delayed tasks and commitments. Conclusions To our knowledge, the current study is the first clinical trial to examine the effects of CBT for procrastination, and is assumed to render significant knowledge on the treatment of procrastination, as well as investigating whether it can be delivered via the Internet. Trial Registration ClinicalTrials.gov: NCT01842945; http://clinicaltrials.gov/show/NCT01842945 (Archived by WebCite at http://www.webcitation.org/6KSmaXewC). PMID:24220277

  18. Multicenter evaluation of a sequence-based protocol for subtyping Shiga toxins and standardizing Stx nomenclature.

    PubMed

    Scheutz, Flemming; Teel, Louise D; Beutin, Lothar; Piérard, Denis; Buvens, Glenn; Karch, Helge; Mellmann, Alexander; Caprioli, Alfredo; Tozzoli, Rosangela; Morabito, Stefano; Strockbine, Nancy A; Melton-Celsa, Angela R; Sanchez, Maria; Persson, Søren; O'Brien, Alison D

    2012-09-01

    When Shiga toxin-producing Escherichia coli (STEC) strains emerged as agents of human disease, two types of toxin were identified: Shiga toxin type 1 (Stx1) (almost identical to Shiga toxin produced by Shigella dysenteriae type 1) and the immunologically distinct type 2 (Stx2). Subsequently, numerous STEC strains have been characterized that express toxins with variations in amino acid sequence, some of which confer unique biological properties. These variants were grouped within the Stx1 or Stx2 type and often assigned names to indicate that they were not identical in sequence or phenotype to the main Stx1 or Stx2 type. A lack of specificity or consistency in toxin nomenclature has led to much confusion in the characterization of STEC strains. Because serious outcomes of infection have been attributed to certain Stx subtypes and less so with others, we sought to better define the toxin subtypes within the main Stx1 and Stx2 types. We compared the levels of relatedness of 285 valid sequence variants of Stx1 and Stx2 and identified common sequences characteristic of each of three Stx/Stx1 and seven Stx2 subtypes. A novel, simple PCR subtyping method was developed, independently tested on a battery of 48 prototypic STEC strains, and improved at six clinical and research centers to test the reproducibility, sensitivity, and specificity of the PCR. Using a consistent schema for nomenclature of the Stx toxins and stx genes by phylogenetic sequence-based relatedness of the holotoxin proteins, we developed a typing approach that should obviate the need to bioassay each newly described toxin and that predicts important biological characteristics. PMID:22760050

  19. Hepatocellular carcinoma: From clinical practice to evidence-based treatment protocols

    PubMed Central

    Galun, Danijel; Basaric, Dragan; Zuvela, Marinko; Bulajic, Predrag; Bogdanovic, Aleksandar; Bidzic, Nemanja; Milicevic, Miroslav

    2015-01-01

    Hepatocellular carcinoma (HCC) is one of the major malignant diseases in many healthcare systems. The growing number of new cases diagnosed each year is nearly equal to the number of deaths from this cancer. Worldwide, HCC is a leading cause of cancer-related deaths, as it is the fifth most common cancer and the third most important cause of cancer related death in men. Among various risk factors the two are prevailing: viral hepatitis, namely chronic hepatitis C virus is a well-established risk factor contributing to the rising incidence of HCC. The epidemic of obesity and the metabolic syndrome, not only in the United States but also in Asia, tend to become the leading cause of the long-term rise in the HCC incidence. Today, the diagnosis of HCC is established within the national surveillance programs in developed countries while the diagnosis of symptomatic, advanced stage disease still remains the characteristic of underdeveloped countries. Although many different staging systems have been developed and evaluated the Barcelona-Clinic Liver Cancer staging system has emerged as the most useful to guide HCC treatment. Treatment allocation should be decided by a multidisciplinary board involving hepatologists, pathologists, radiologists, liver surgeons and oncologists guided by personalized -based medicine. This approach is important not only to balance between different oncologic treatments strategies but also due to the complexity of the disease (chronic liver disease and the cancer) and due to the large number of potentially efficient therapies. Careful patient selection and a tailored treatment modality for every patient, either potentially curative (surgical treatment and tumor ablation) or palliative (transarterial therapy, radioembolization and medical treatment, i.e., sorafenib) is mandatory to achieve the best treatment outcome. PMID:26380652

  20. Multicenter evaluation of a sequence-based protocol for subtyping Shiga toxins and standardizing Stx nomenclature.

    PubMed

    Scheutz, Flemming; Teel, Louise D; Beutin, Lothar; Piérard, Denis; Buvens, Glenn; Karch, Helge; Mellmann, Alexander; Caprioli, Alfredo; Tozzoli, Rosangela; Morabito, Stefano; Strockbine, Nancy A; Melton-Celsa, Angela R; Sanchez, Maria; Persson, Søren; O'Brien, Alison D

    2012-09-01

    When Shiga toxin-producing Escherichia coli (STEC) strains emerged as agents of human disease, two types of toxin were identified: Shiga toxin type 1 (Stx1) (almost identical to Shiga toxin produced by Shigella dysenteriae type 1) and the immunologically distinct type 2 (Stx2). Subsequently, numerous STEC strains have been characterized that express toxins with variations in amino acid sequence, some of which confer unique biological properties. These variants were grouped within the Stx1 or Stx2 type and often assigned names to indicate that they were not identical in sequence or phenotype to the main Stx1 or Stx2 type. A lack of specificity or consistency in toxin nomenclature has led to much confusion in the characterization of STEC strains. Because serious outcomes of infection have been attributed to certain Stx subtypes and less so with others, we sought to better define the toxin subtypes within the main Stx1 and Stx2 types. We compared the levels of relatedness of 285 valid sequence variants of Stx1 and Stx2 and identified common sequences characteristic of each of three Stx/Stx1 and seven Stx2 subtypes. A novel, simple PCR subtyping method was developed, independently tested on a battery of 48 prototypic STEC strains, and improved at six clinical and research centers to test the reproducibility, sensitivity, and specificity of the PCR. Using a consistent schema for nomenclature of the Stx toxins and stx genes by phylogenetic sequence-based relatedness of the holotoxin proteins, we developed a typing approach that should obviate the need to bioassay each newly described toxin and that predicts important biological characteristics.