Sample records for application protocol initial

  1. Comparing Usual Care With a Warfarin Initiation Protocol After Mechanical Heart Valve Replacement.

    PubMed

    Roberts, Gregory; Razooqi, Rasha; Quinn, Stephen

    2017-03-01

    The immediate postoperative warfarin sensitivity for patients receiving heart valve prostheses is increased. Established warfarin initiation protocols may lack clinical applicability, resulting in dosing based on clinical judgment. To compare current practice for warfarin initiation with a known warfarin initiation protocol, with doses proportionally reduced to account for the increased postoperative sensitivity. We compared the Mechanical Heart Valve Warfarin Initiation Protocol (Protocol group) with current practice (clinical judgment-Empirical group) for patients receiving mechanical heart valves in an observational before-and-after format. End points were the time to achieve a stable therapeutic international normalized ratio (INR), doses held in the first 6 days, and overanticoagulation in the first 6 days. The Protocol group (n = 37) achieved a stable INR more rapidly than the Empirical group (n = 77; median times 5.1 and 8.7 days, respectively; P = 0.002). Multivariable analysis indicated that the Protocol group (hazard ratio [HR] = 2.22; P = 0.005) and men (HR = 1.76; P = 0.043) more rapidly achieved a stable therapeutic INR. Age, serum albumin, amiodarone, presence of severe heart failure, and surgery type had no impact. Protocol patients had fewer doses held (1.1% vs 10.1%, P < 0.001) and no difference in overanticoagulation (2.7% vs 9.1%, P = 0.27). The Mechanical Heart Valve Warfarin Initiation Protocol provided a reliable approach to initiating warfarin in patients receiving mechanical aortic or mitral valves.

  2. Integration and Analysis of Neighbor Discovery and Link Quality Estimation in Wireless Sensor Networks

    PubMed Central

    Radi, Marjan; Dezfouli, Behnam; Abu Bakar, Kamalrulnizam; Abd Razak, Shukor

    2014-01-01

    Network connectivity and link quality information are the fundamental requirements of wireless sensor network protocols to perform their desired functionality. Most of the existing discovery protocols have only focused on the neighbor discovery problem, while a few number of them provide an integrated neighbor search and link estimation. As these protocols require a careful parameter adjustment before network deployment, they cannot provide scalable and accurate network initialization in large-scale dense wireless sensor networks with random topology. Furthermore, performance of these protocols has not entirely been evaluated yet. In this paper, we perform a comprehensive simulation study on the efficiency of employing adaptive protocols compared to the existing nonadaptive protocols for initializing sensor networks with random topology. In this regard, we propose adaptive network initialization protocols which integrate the initial neighbor discovery with link quality estimation process to initialize large-scale dense wireless sensor networks without requiring any parameter adjustment before network deployment. To the best of our knowledge, this work is the first attempt to provide a detailed simulation study on the performance of integrated neighbor discovery and link quality estimation protocols for initializing sensor networks. This study can help system designers to determine the most appropriate approach for different applications. PMID:24678277

  3. Application Transparent HTTP Over a Disruption Tolerant Smartnet

    DTIC Science & Technology

    2014-09-01

    American Standard Code for Information Interchange BP Bundle Protocol BPA bundle protocol agent CLA convergence layer adapters CPU central processing...forwarding them through the plugin pipeline. The initial version of the DTNInput plugin uses the BBN Spindle bundle protocol agent ( BPA ) implementation

  4. Exploitation of Existing Voice Over Internet Protocol Technology for Department of the Navy Application

    DTIC Science & Technology

    2002-09-01

    Protocol LAN Local Area Network LDAP Lightweight Directory Access Protocol LLQ Low Latency Queuing MAC Media Access Control MarCorSysCom Marine...Description Protocol SIP Session Initiation Protocol SMTP Simple Mail Transfer Protocol SPAWAR Space and Naval Warfare Systems Center SS7 ...PSTN infrastructure previously required to carry the conversation. The cost of accessing the PSTN is thereby eliminated. In cases where Internet

  5. A software defined RTU multi-protocol automatic adaptation data transmission method

    NASA Astrophysics Data System (ADS)

    Jin, Huiying; Xu, Xingwu; Wang, Zhanfeng; Ma, Weijun; Li, Sheng; Su, Yong; Pan, Yunpeng

    2018-02-01

    Remote terminal unit (RTU) is the core device of the monitor system in hydrology and water resources. Different devices often have different communication protocols in the application layer, which results in the difficulty in information analysis and communication networking. Therefore, we introduced the idea of software defined hardware, and abstracted the common feature of mainstream communication protocols of RTU application layer, and proposed a uniformed common protocol model. Then, various communication protocol algorithms of application layer are modularized according to the model. The executable codes of these algorithms are labeled by the virtual functions and stored in the flash chips of embedded CPU to form the protocol stack. According to the configuration commands to initialize the RTU communication systems, it is able to achieve dynamic assembling and loading of various application layer communication protocols of RTU and complete the efficient transport of sensor data from RTU to central station when the data acquisition protocol of sensors and various external communication terminals remain unchanged.

  6. Protocols for the Initial Treatment of Moderately Severe Juvenile Dermatomyositis: Results of a Children's Arthritis and Rheumatology Research Alliance Consensus Conference

    PubMed Central

    Huber, Adam M.; Giannini, Edward H.; Bowyer, Suzanne L.; Kim, Susan; Lang, Bianca; Lindsley, Carol B.; Pachman, Lauren M.; Pilkington, Clarissa; Reed, Ann M.; Rennebohm, Robert M.; Rider, Lisa G.; Wallace, Carol A.; Feldman, Brian M.

    2010-01-01

    Objective To use juvenile dermatomyositis (JDM) survey data and expert opinion to develop a small number of consensus treatment protocols which reflect current initial treatment of moderately severe JDM. Methods A consensus meeting was held in Toronto, Ontario, Canada on December 1-2, 2007. Nominal group technique was used to achieve consensus on treatment protocols which represented typical management of moderately severe JDM. Consensus was also reached on which patients these protocols would be applicable to (inclusion and exclusion criteria), initial investigations which should be done prior to initiating one of these protocols, data which should be collected to evaluate these protocols, concomitant interventions that would be required or recommended. Results Three protocols were developed which described the first 2 months of treatment. All protocols included corticosteroids and methotrexate. One protocol also included intravenous gammaglobulin. Consensus was achieved for all issues that were addressed by conference participants, although there were some areas of controversy Conclusions This study shows that it is possible to achieve consensus on the initial treatment of JDM, despite considerable variation in clinical practice. Once these protocols are extended beyond 2 months, these protocols will be available for clinical use. By using methods which account for differences between patients (confounding by indication), the comparative effectiveness of the protocols will be evaluated. In the future, the goal will be to identify the optimal treatment of moderately severe JDM. PMID:20191521

  7. Unified Protocol for the Transdiagnostic Treatment of Emotional Disorders: Protocol Development and Initial Outcome Data

    ERIC Educational Resources Information Center

    Ellard, Kristen K.; Fairholme, Christopher P.; Boisseau, Christina L.; Farchione, Todd J.; Barlow, David H.

    2010-01-01

    The Unified Protocol (UP) is a transdiagnostic, emotion-focused cognitive-behavioral treatment developed to be applicable across the emotional disorders. The UP consists of 4 core modules: increasing emotional awareness, facilitating flexibility in appraisals, identifying and preventing behavioral and emotional avoidance, and situational and…

  8. Application Protocol, Initial Graphics Exchange Specification (IGES), Layered Electrical Product

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    O`Connell, L.J.

    1994-12-01

    An application protocol is an information systems engineering view of a specific product The view represents an agreement on the generic activities needed to design and fabricate the product the agreement on the information needed to support those activities, and the specific constructs of a product data standard for use in transferring some or all of the information required. This application protocol describes the data for electrical and electronic products in terms of a product description standard called the Initial Graphics Exchange Specification (IGES). More specifically, the Layered Electrical Product IGES Application Protocol (AP) specifies the mechanisms for defining andmore » exchanging computer-models and their associated data for those products which have been designed in two dimensional geometry so as to be produced as a series of layers in IGES format The AP defines the appropriateness of the data items for describing the geometry of the various parts of a product (shape and location), the connectivity, and the processing and material characteristics. Excluded is the behavioral requirements which the product was intended to satisfy, except as those requirements have been recorded as design rules or product testing requirements.« less

  9. Layered Electrical Product Application Protocol (AP). Draft: Initial Graphics Exchange Specification (IGES)

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Not Available

    1994-09-01

    An application protocol is an information systems engineering view of a specific product. The view represents an agreement on the generic activities needed to design and fabricate the product, the agreement on the information needed to support those activities, and the specific constructs of a product data standard for use in transfering some or all of the information required. This applications protocol describes the data for electrical and electronic products in terms of a product description standard called the Initial Graphics Exchange Specification (IGES). More specifically, the Layered Electrical Product IGES Application Protocol (AP) specifies the mechanisms for defining andmore » exchanging computer-models and their associated data for those products which have been designed in two dimensional geometry so as to be produced as a series of layers in IGES format. The AP defines the appropriateness of the data items for describing the geometry of the various parts of a product (shape and location), the connectivity, and the processing and material characteristics. Excluded is the behavioral requirements which the product was intended to satisfy, except as those requirements have been recorded as design rules or product testing requirements.« less

  10. Exponential Sensitivity and its Cost in Quantum Physics

    PubMed Central

    Gilyén, András; Kiss, Tamás; Jex, Igor

    2016-01-01

    State selective protocols, like entanglement purification, lead to an essentially non-linear quantum evolution, unusual in naturally occurring quantum processes. Sensitivity to initial states in quantum systems, stemming from such non-linear dynamics, is a promising perspective for applications. Here we demonstrate that chaotic behaviour is a rather generic feature in state selective protocols: exponential sensitivity can exist for all initial states in an experimentally realisable optical scheme. Moreover, any complex rational polynomial map, including the example of the Mandelbrot set, can be directly realised. In state selective protocols, one needs an ensemble of initial states, the size of which decreases with each iteration. We prove that exponential sensitivity to initial states in any quantum system has to be related to downsizing the initial ensemble also exponentially. Our results show that magnifying initial differences of quantum states (a Schrödinger microscope) is possible; however, there is a strict bound on the number of copies needed. PMID:26861076

  11. Exponential Sensitivity and its Cost in Quantum Physics.

    PubMed

    Gilyén, András; Kiss, Tamás; Jex, Igor

    2016-02-10

    State selective protocols, like entanglement purification, lead to an essentially non-linear quantum evolution, unusual in naturally occurring quantum processes. Sensitivity to initial states in quantum systems, stemming from such non-linear dynamics, is a promising perspective for applications. Here we demonstrate that chaotic behaviour is a rather generic feature in state selective protocols: exponential sensitivity can exist for all initial states in an experimentally realisable optical scheme. Moreover, any complex rational polynomial map, including the example of the Mandelbrot set, can be directly realised. In state selective protocols, one needs an ensemble of initial states, the size of which decreases with each iteration. We prove that exponential sensitivity to initial states in any quantum system has to be related to downsizing the initial ensemble also exponentially. Our results show that magnifying initial differences of quantum states (a Schrödinger microscope) is possible; however, there is a strict bound on the number of copies needed.

  12. Can legality verification enhace local rights to forest resources? Piloting the policy learning protocol in the Peruvian forest context

    Treesearch

    B. Cashore; I. Visseren-Hamakers; P. Caro Torres; W. de Jong; A. Denvir; D. Humphreys; Kathleen McGinley; G. Auld; S. Lupberger; C. McDermott; S. Sax; D. Yin

    2016-01-01

    This report, “Can Legality Verification Enhance Local Rights to Forest Resources? Piloting the policy learning protocol in the Peruvian forest context,” reports on the testing of the application of the 11-step Policy Learning Protocol in Peru in 2015-16. The Protocol (Cashore et al. 2014) enables actors to draw from international policy initiatives in order to improve...

  13. Electronic Entanglement Concentration for the Concatenated Greenberger-Horne-Zeilinger State

    NASA Astrophysics Data System (ADS)

    Ding, Shang-Ping; Zhou, Lan; Gu, Shi-Pu; Wang, Xing-Fu; Sheng, Yu-Bo

    2017-06-01

    Concatenated Greenberger-Horne-Zeilinger (C-GHZ) state, which encodes many physical qubits in a logic qubit will have important applications in both quantum communication and computation. In this paper, we will describe an entanglement concentration protocol (ECP) for electronic C-GHZ state, by exploiting the electronic polarization beam splitters (PBSs) and charge detection. This protocol has several advantages. First, the parties do not need to know the exact coefficients of the initial less-entangled C-GHZ state, which makes this protocol feasible. Second, with the help of charge detection, the distilled maximally entangled C-GHZ state can be remained for future application. Third, this protocol can be repeated to obtain a higher success probability. We hope that this protocol can be useful in future quantum computation based on electrons.

  14. An enhanced password authentication scheme for session initiation protocol with perfect forward secrecy.

    PubMed

    Qiu, Shuming; Xu, Guoai; Ahmad, Haseeb; Guo, Yanhui

    2018-01-01

    The Session Initiation Protocol (SIP) is an extensive and esteemed communication protocol employed to regulate signaling as well as for controlling multimedia communication sessions. Recently, Kumari et al. proposed an improved smart card based authentication scheme for SIP based on Farash's scheme. Farash claimed that his protocol is resistant against various known attacks. But, we observe some accountable flaws in Farash's protocol. We point out that Farash's protocol is prone to key-compromise impersonation attack and is unable to provide pre-verification in the smart card, efficient password change and perfect forward secrecy. To overcome these limitations, in this paper we present an enhanced authentication mechanism based on Kumari et al.'s scheme. We prove that the proposed protocol not only overcomes the issues in Farash's scheme, but it can also resist against all known attacks. We also provide the security analysis of the proposed scheme with the help of widespread AVISPA (Automated Validation of Internet Security Protocols and Applications) software. At last, comparing with the earlier proposals in terms of security and efficiency, we conclude that the proposed protocol is efficient and more secure.

  15. Application of QC_DR software for acceptance testing and routine quality control of direct digital radiography systems: initial experiences using the Italian Association of Physicist in Medicine quality control protocol.

    PubMed

    Nitrosi, Andrea; Bertolini, Marco; Borasi, Giovanni; Botti, Andrea; Barani, Adriana; Rivetti, Stefano; Pierotti, Luisa

    2009-12-01

    Ideally, medical x-ray imaging systems should be designed to deliver maximum image quality at an acceptable radiation risk to the patient. Quality assurance procedures are employed to ensure that these standards are maintained. A quality control protocol for direct digital radiography (DDR) systems is described and discussed. Software to automatically process and analyze the required images was developed. In this paper, the initial results obtained on equipment of different DDR manufacturers were reported. The protocol was developed to highlight even small discrepancies in standard operating performance.

  16. Electrical Stimulation of Coleopteran Muscle for Initiating Flight.

    PubMed

    Choo, Hao Yu; Li, Yao; Cao, Feng; Sato, Hirotaka

    2016-01-01

    Some researchers have long been interested in reconstructing natural insects into steerable robots or vehicles. However, until recently, these so-called cyborg insects, biobots, or living machines existed only in science fiction. Owing to recent advances in nano/micro manufacturing, data processing, and anatomical and physiological biology, we can now stimulate living insects to induce user-desired motor actions and behaviors. To improve the practicality and applicability of airborne cyborg insects, a reliable and controllable flight initiation protocol is required. This study demonstrates an electrical stimulation protocol that initiates flight in a beetle (Mecynorrhina torquata, Coleoptera). A reliable stimulation protocol was determined by analyzing a pair of dorsal longitudinal muscles (DLMs), flight muscles that oscillate the wings. DLM stimulation has achieved with a high success rate (> 90%), rapid response time (< 1.0 s), and small variation (< 0.33 s; indicating little habituation). Notably, the stimulation of DLMs caused no crucial damage to the free flight ability. In contrast, stimulation of optic lobes, which was earlier demonstrated as a successful flight initiation protocol, destabilized the beetle in flight. Thus, DLM stimulation is a promising secure protocol for inducing flight in cyborg insects or biobots.

  17. Electrical Stimulation of Coleopteran Muscle for Initiating Flight

    PubMed Central

    Choo, Hao Yu; Li, Yao; Cao, Feng; Sato, Hirotaka

    2016-01-01

    Some researchers have long been interested in reconstructing natural insects into steerable robots or vehicles. However, until recently, these so-called cyborg insects, biobots, or living machines existed only in science fiction. Owing to recent advances in nano/micro manufacturing, data processing, and anatomical and physiological biology, we can now stimulate living insects to induce user-desired motor actions and behaviors. To improve the practicality and applicability of airborne cyborg insects, a reliable and controllable flight initiation protocol is required. This study demonstrates an electrical stimulation protocol that initiates flight in a beetle (Mecynorrhina torquata, Coleoptera). A reliable stimulation protocol was determined by analyzing a pair of dorsal longitudinal muscles (DLMs), flight muscles that oscillate the wings. DLM stimulation has achieved with a high success rate (> 90%), rapid response time (< 1.0 s), and small variation (< 0.33 s; indicating little habituation). Notably, the stimulation of DLMs caused no crucial damage to the free flight ability. In contrast, stimulation of optic lobes, which was earlier demonstrated as a successful flight initiation protocol, destabilized the beetle in flight. Thus, DLM stimulation is a promising secure protocol for inducing flight in cyborg insects or biobots. PMID:27050093

  18. Security analysis of standards-driven communication protocols for healthcare scenarios.

    PubMed

    Masi, Massimiliano; Pugliese, Rosario; Tiezzi, Francesco

    2012-12-01

    The importance of the Electronic Health Record (EHR), that stores all healthcare-related data belonging to a patient, has been recognised in recent years by governments, institutions and industry. Initiatives like the Integrating the Healthcare Enterprise (IHE) have been developed for the definition of standard methodologies for secure and interoperable EHR exchanges among clinics and hospitals. Using the requisites specified by these initiatives, many large scale projects have been set up for enabling healthcare professionals to handle patients' EHRs. The success of applications developed in these contexts crucially depends on ensuring such security properties as confidentiality, authentication, and authorization. In this paper, we first propose a communication protocol, based on the IHE specifications, for authenticating healthcare professionals and assuring patients' safety. By means of a formal analysis carried out by using the specification language COWS and the model checker CMC, we reveal a security flaw in the protocol thus demonstrating that to simply adopt the international standards does not guarantee the absence of such type of flaws. We then propose how to emend the IHE specifications and modify the protocol accordingly. Finally, we show how to tailor our protocol for application to more critical scenarios with no assumptions on the communication channels. To demonstrate feasibility and effectiveness of our protocols we have fully implemented them.

  19. Protocol for Uniformly Measuring and Expressing the Performance of Energy Storage Systems

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Conover, David R.; Crawford, Aladsair J.; Fuller, Jason C.

    The Protocol for Uniformly Measuring and Expressing the Performance of Energy Storage Systems (PNNL-22010) was first issued in November 2012 as a first step toward providing a foundational basis for developing an initial standard for the uniform measurement and expression of energy storage system (ESS) performance. Based on experiences with the application and use of that document, and to include additional ESS applications and associated duty cycles, test procedures and performance metrics, a first revision of the November 2012 Protocol was issued in June 2014 (PNNL 22010 Rev. 1). As an update of the 2014 revision 1 to the Protocol,more » this document (the March 2016 revision 2 to the Protocol) is intended to supersede the June 2014 revision 1 to the Protocol and provide a more user-friendly yet more robust and comprehensive basis for measuring and expressing ESS performance.« less

  20. 5 CFR 5502.107 - Supplemental disclosure of financial interests in substantially affected organizations applicable...

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... clinical study involving human subjects under a clinical research protocol approved by an institutional review board. (2) Clinical research has the meaning set forth in 42 U.S.C. 284d(b). (3) Institutional... review a clinical research protocol and approve the initiation of biomedical research involving human...

  1. A robust ECC based mutual authentication protocol with anonymity for session initiation protocol.

    PubMed

    Mehmood, Zahid; Chen, Gongliang; Li, Jianhua; Li, Linsen; Alzahrani, Bander

    2017-01-01

    Over the past few years, Session Initiation Protocol (SIP) is found as a substantial application-layer protocol for the multimedia services. It is extensively used for managing, altering, terminating and distributing the multimedia sessions. Authentication plays a pivotal role in SIP environment. Currently, Lu et al. presented an authentication protocol for SIP and profess that newly proposed protocol is protected against all the familiar attacks. However, the detailed analysis describes that the Lu et al.'s protocol is exposed against server masquerading attack and user's masquerading attack. Moreover, it also fails to protect the user's identity as well as it possesses incorrect login and authentication phase. In order to establish a suitable and efficient protocol, having ability to overcome all these discrepancies, a robust ECC-based novel mutual authentication mechanism with anonymity for SIP is presented in this manuscript. The improved protocol contains an explicit parameter for user to cope the issues of security and correctness and is found to be more secure and relatively effective to protect the user's privacy, user's masquerading and server masquerading as it is verified through the comprehensive formal and informal security analysis.

  2. An enhanced password authentication scheme for session initiation protocol with perfect forward secrecy

    PubMed Central

    2018-01-01

    The Session Initiation Protocol (SIP) is an extensive and esteemed communication protocol employed to regulate signaling as well as for controlling multimedia communication sessions. Recently, Kumari et al. proposed an improved smart card based authentication scheme for SIP based on Farash’s scheme. Farash claimed that his protocol is resistant against various known attacks. But, we observe some accountable flaws in Farash’s protocol. We point out that Farash’s protocol is prone to key-compromise impersonation attack and is unable to provide pre-verification in the smart card, efficient password change and perfect forward secrecy. To overcome these limitations, in this paper we present an enhanced authentication mechanism based on Kumari et al.’s scheme. We prove that the proposed protocol not only overcomes the issues in Farash’s scheme, but it can also resist against all known attacks. We also provide the security analysis of the proposed scheme with the help of widespread AVISPA (Automated Validation of Internet Security Protocols and Applications) software. At last, comparing with the earlier proposals in terms of security and efficiency, we conclude that the proposed protocol is efficient and more secure. PMID:29547619

  3. The Ontological Perspectives of the Semantic Web and the Metadata Harvesting Protocol: Applications of Metadata for Improving Web Search.

    ERIC Educational Resources Information Center

    Fast, Karl V.; Campbell, D. Grant

    2001-01-01

    Compares the implied ontological frameworks of the Open Archives Initiative Protocol for Metadata Harvesting and the World Wide Web Consortium's Semantic Web. Discusses current search engine technology, semantic markup, indexing principles of special libraries and online databases, and componentization and the distinction between data and…

  4. A network architecture for precision formation flying using the IEEE 802.11 MAC Protocol

    NASA Technical Reports Server (NTRS)

    Clare, Loren P.; Gao, Jay L.; Jennings, Esther H.; Okino, Clayton

    2005-01-01

    Precision Formation Flying missions involve the tracking and maintenance of spacecraft in a desired geometric formation. The strong coupling of spacecraft in formation flying control requires inter-spacecraft communication to exchange information. In this paper, we present a network architecture that supports PFF control, from the initial random deployment phase to the final formation. We show that a suitable MAC layer for the application protocol is IEEE's 802.11 MAC protocol. IEEE 802.11 MAC has two modes of operations: DCF and PCF. We show that DCF is suitable for the initial deployment phase while switching to PCF when the spacecraft are in formation improves jitter and throughput. We also consider the effect of routing on protocol performance and suggest when it is profitable to turn off route discovery to achieve better network performance.

  5. MDCT of acute pancreatitis: Intraindividual comparison of single-phase versus dual-phase MDCT for initial assessment of acute pancreatitis using different CT scoring systems.

    PubMed

    Avanesov, Maxim; Weinrich, Julius M; Kraus, Thomas; Derlin, Thorsten; Adam, Gerhard; Yamamura, Jin; Karul, Murat

    2016-11-01

    The purpose of the retrospective study was to evaluate the additional value of dual-phase multidetector computed tomography (MDCT) protocols over a single-phase protocol on initial MDCT in patients with acute pancreatitis using three CT-based pancreatitis severity scores with regard to radiation dose. In this retrospective, IRB approved study MDCT was performed in 102 consecutive patients (73 males; 55years, IQR48-64) with acute pancreatitis. Inclusion criteria were CT findings of interstitial edematous pancreatitis (IP) or necrotizing pancreatitis (NP) and a contrast-enhanced dual-phase (arterial phase and portal-venous phase) abdominal CT performed at ≥72h after onset of symptoms. The severity of pancreatic and extrapancreatic changes was independently assessed by 2 observers using 3 validated CT-based scoring systems (CTSI, mCTSI, EPIC). All scores were applied to arterial phase and portal venous phase scans and compared to score results of portal venous phase scans, assessed ≥14days after initial evaluation. For effective dose estimation, volume CT dose index (CTDIvol) and dose length product (DLP) were recorded in all examinations. In neither of the CT severity scores a significant difference was observed after application of a dual-phase protocol compared with a single-phase protocol (IP: CTSI: 2.7 vs. 2.5, p=0.25; mCTSI: 4.0 vs. 4.0, p=0.10; EPIC: 2.0 vs. 2.0, p=0.41; NP: CTSI: 8.0 vs. 7.0, p=0.64; mCTSI: 8.0 vs. 8.0, p=0.10; EPIC: 3.0 vs. 3.0, p=0.06). The application of a single-phase CT protocol was associated with a median effective dose reduction of 36% (mean dose reduction 31%) compared to a dual-phase CT scan. An initial dual-phase abdominal CT after ≥72h after onset of symptoms of acute pancreatitis was not superior to a single-phase protocol for evaluation of the severity of pancreatic and extrapancreatic changes. However, the effective radiation dose may be reduced by 36% using a single-phase protocol. Copyright © 2016. Published by Elsevier Ireland Ltd.

  6. MACROINVERTEBRATE ASSEMBLAGES OF THE ST. CROIX AND WISCONSIN RIVERS: AN INITIAL APPLICATION OF THE LARGE RIVER BIOASSESSMENT PROTOCOL (LR-BP) IN THE MIDWESTERN UNITED STATES

    EPA Science Inventory

    Since passage of the Clean Water Act, government agencies have made extensive use of biomonitoring protocols to report on the quality of wadeable streams and rivers. Non-wadeable systems have been largely overlooked because of sampling difficulties and a lack of appropriate metho...

  7. Instructional and Career Guidance in STEM: An Improvement Initiative to Create Opportunities for Female High School Students

    NASA Astrophysics Data System (ADS)

    Belcher, Aaron Heath

    The purpose of this disquisition is to disseminate an improvement initiative in a public high school that addressed female Science, Technology, Engineering and Math (STEM) disparity in STEM classes. In this high school current instructional and career guidance practices were inadequate in providing female STEM students opportunities to experience relevant instruction in STEM through the application of real world practices. The improvement initiative identified four interventions using qualitative research that addressed the question, how do instructional and career guidance practices that emphasize the real world application of STEM impact the academic choices and career aspirations of female STEM students? The interventions include (1) instructional feedback (2) instructional resources, (3) career coaching, and (4) community college partnership. These interventions were chosen as a result of insider research methods that followed a scan, focus, summarize framework for understanding the problem. The aim of the improvement initiative was to develop structured protocols that impact STEM classroom and career guidance practices. An intervention team intended to identify opportunities for female STEM students to experience the real world application of STEM. First, the research context is explained. Then, a review of the literature explains foundation knowledge that led to the conceptual and leadership framework. Next, the research methodology is outlined including design and participants, survey instruments, procedures, timeline, and measures. The research methodology is followed by an analysis of data for instructional and career guidance practice efficacy. Finally, a discussion of the initiative and its outcome are illustrated through the stories of three female STEM students. As a result of these stories, the intervention team developed STEM classroom observation protocols. These protocols can be used by school leaders as a structure for STEM instruction and career guidance.

  8. Protocol standards and implementation within the digital engineering laboratory computer network (DELNET) using the universal network interface device (UNID). Part 2

    NASA Astrophysics Data System (ADS)

    Phister, P. W., Jr.

    1983-12-01

    Development of the Air Force Institute of Technology's Digital Engineering Laboratory Network (DELNET) was continued with the development of an initial draft of a protocol standard for all seven layers as specified by the International Standards Organization's (ISO) Reference Model for Open Systems Interconnections. This effort centered on the restructuring of the Network Layer to perform Datagram routing and to conform to the developed protocol standards and actual software module development of the upper four protocol layers residing within the DELNET Monitor (Zilog MCZ 1/25 Computer System). Within the guidelines of the ISO Reference Model the Transport Layer was developed utilizing the Internet Header Format (IHF) combined with the Transport Control Protocol (TCP) to create a 128-byte Datagram. Also a limited Application Layer was created to pass the Gettysburg Address through the DELNET. This study formulated a first draft for the DELNET Protocol Standard and designed, implemented, and tested the Network, Transport, and Application Layers to conform to these protocol standards.

  9. A Byzantine-Fault Tolerant Self-Stabilizing Protocol for Distributed Clock Synchronization Systems

    NASA Technical Reports Server (NTRS)

    Malekpour, Mahyar R.

    2006-01-01

    Embedded distributed systems have become an integral part of safety-critical computing applications, necessitating system designs that incorporate fault tolerant clock synchronization in order to achieve ultra-reliable assurance levels. Many efficient clock synchronization protocols do not, however, address Byzantine failures, and most protocols that do tolerate Byzantine failures do not self-stabilize. Of the Byzantine self-stabilizing clock synchronization algorithms that exist in the literature, they are based on either unjustifiably strong assumptions about initial synchrony of the nodes or on the existence of a common pulse at the nodes. The Byzantine self-stabilizing clock synchronization protocol presented here does not rely on any assumptions about the initial state of the clocks. Furthermore, there is neither a central clock nor an externally generated pulse system. The proposed protocol converges deterministically, is scalable, and self-stabilizes in a short amount of time. The convergence time is linear with respect to the self-stabilization period. Proofs of the correctness of the protocol as well as the results of formal verification efforts are reported.

  10. A Secured Authentication Protocol for SIP Using Elliptic Curves Cryptography

    NASA Astrophysics Data System (ADS)

    Chen, Tien-Ho; Yeh, Hsiu-Lien; Liu, Pin-Chuan; Hsiang, Han-Chen; Shih, Wei-Kuan

    Session initiation protocol (SIP) is a technology regularly performed in Internet Telephony, and Hyper Text Transport Protocol (HTTP) as digest authentication is one of the major methods for SIP authentication mechanism. In 2005, Yang et al. pointed out that HTTP could not resist server spoofing attack and off-line guessing attack and proposed a secret authentication with Diffie-Hellman concept. In 2009, Tsai proposed a nonce based authentication protocol for SIP. In this paper, we demonstrate that their protocol could not resist the password guessing attack and insider attack. Furthermore, we propose an ECC-based authentication mechanism to solve their issues and present security analysis of our protocol to show that ours is suitable for applications with higher security requirement.

  11. ReSTful OSGi Web Applications Tutorial

    NASA Technical Reports Server (NTRS)

    Shams, Khawaja; Norris, Jeff

    2008-01-01

    This slide presentation accompanies a tutorial on the ReSTful (Representational State Transfer) web application. Using Open Services Gateway Initiative (OSGi), ReST uses HTTP protocol to enable developers to offer services to a diverse variety of clients: from shell scripts to sophisticated Java application suites. It also uses Eclipse for the rapid development, the Eclipse debugger, the test application, and the ease of export to production servers.

  12. Protocols using Anonymous Connections: Mobile Applications

    DTIC Science & Technology

    1997-01-01

    call from a cell phone ; the phone never receives a call in the ordinary sense of `receive’. We will return to discuss paging brie y below. The principals...speci ed in our protocol are the caller’s cell phone P , the central switch S, and the callee intended to receive the call R. We now present our...protocol for initiating a call from a cell phone . 1. P )P S : Payment info., N 2. S )P P : Ack or Nack 3. P ,P S $ R : Conversation To make a call from a

  13. Biomechanical Comparison of Robotically Applied Pure Moment, Ideal Follower Load, and Novel Trunk Weight Loading Protocols on L4-L5 Cadaveric Segments during Flexion-Extension.

    PubMed

    Bennett, Charles R; DiAngelo, Denis J; Kelly, Brian P

    2015-01-01

    Extremely few in-vitro biomechanical studies have incorporated shear loads leaving a gap for investigation, especially when applied in combination with compression and bending under dynamic conditions. The objective of this study was to biomechanically compare sagittal plane application of two standard protocols, pure moment (PM) and follower load (FL), with a novel trunk weight (TW) loading protocol designed to induce shear in combination with compression and dynamic bending in a neutrally potted human cadaveric L4-L5 motion segment unit (MSU) model. A secondary objective and novelty of the current study was the application of all three protocols within the same testing system serving to reduce artifacts due to testing system variability. Six L4-L5 segments were tested in a Cartesian load controlled system in flexion-extension to 8Nm under PM, simulated ideal 400N FL, and vertically oriented 400N TW loading protocols. Comparison metrics used were rotational range of motion (RROM), flexibility, neutral zone (NZ) range of motion, and L4 vertebral body displacements. Significant differences in vertebral body translations were observed with different initial force applications but not with subsequent bending moment application. Significant reductions were observed in combined flexion-extension RROM, in flexibility during extension, and in NZ region flexibility with the TW loading protocol as compared to PM loading. Neutral zone ranges of motion were not different between all protocols. The combined compression and shear forces applied across the spinal joint in the trunk weight protocol may have a small but significantly increased stabilizing effect on segment flexibility and kinematics during sagittal plane flexion and extension.

  14. Biomechanical Comparison of Robotically Applied Pure Moment, Ideal Follower Load, and Novel Trunk Weight Loading Protocols on L4-L5 Cadaveric Segments during Flexion-Extension

    PubMed Central

    Bennett, Charles R.; DiAngelo, Denis J.

    2015-01-01

    Background Extremely few in-vitro biomechanical studies have incorporated shear loads leaving a gap for investigation, especially when applied in combination with compression and bending under dynamic conditions. The objective of this study was to biomechanically compare sagittal plane application of two standard protocols, pure moment (PM) and follower load (FL), with a novel trunk weight (TW) loading protocol designed to induce shear in combination with compression and dynamic bending in a neutrally potted human cadaveric L4-L5 motion segment unit (MSU) model. A secondary objective and novelty of the current study was the application of all three protocols within the same testing system serving to reduce artifacts due to testing system variability. Methods Six L4-L5 segments were tested in a Cartesian load controlled system in flexion-extension to 8Nm under PM, simulated ideal 400N FL, and vertically oriented 400N TW loading protocols. Comparison metrics used were rotational range of motion (RROM), flexibility, neutral zone (NZ) range of motion, and L4 vertebral body displacements. Results Significant differences in vertebral body translations were observed with different initial force applications but not with subsequent bending moment application. Significant reductions were observed in combined flexion-extension RROM, in flexibility during extension, and in NZ region flexibility with the TW loading protocol as compared to PM loading. Neutral zone ranges of motion were not different between all protocols. Conclusions The combined compression and shear forces applied across the spinal joint in the trunk weight protocol may have a small but significantly increased stabilizing effect on segment flexibility and kinematics during sagittal plane flexion and extension. PMID:26273551

  15. Private randomness expansion with untrusted devices

    NASA Astrophysics Data System (ADS)

    Colbeck, Roger; Kent, Adrian

    2011-03-01

    Randomness is an important resource for many applications, from gambling to secure communication. However, guaranteeing that the output from a candidate random source could not have been predicted by an outside party is a challenging task, and many supposedly random sources used today provide no such guarantee. Quantum solutions to this problem exist, for example a device which internally sends a photon through a beamsplitter and observes on which side it emerges, but, presently, such solutions require the user to trust the internal workings of the device. Here, we seek to go beyond this limitation by asking whether randomness can be generated using untrusted devices—even ones created by an adversarial agent—while providing a guarantee that no outside party (including the agent) can predict it. Since this is easily seen to be impossible unless the user has an initially private random string, the task we investigate here is private randomness expansion. We introduce a protocol for private randomness expansion with untrusted devices which is designed to take as input an initially private random string and produce as output a longer private random string. We point out that private randomness expansion protocols are generally vulnerable to attacks that can render the initial string partially insecure, even though that string is used only inside a secure laboratory; our protocol is designed to remove this previously unconsidered vulnerability by privacy amplification. We also discuss extensions of our protocol designed to generate an arbitrarily long random string from a finite initially private random string. The security of these protocols against the most general attacks is left as an open question.

  16. Stationary average consensus protocol for a class of heterogeneous high-order multi-agent systems with application for aircraft

    NASA Astrophysics Data System (ADS)

    Rezaei, Mohammad Hadi; Menhaj, Mohammad Bagher

    2018-01-01

    This paper investigates the stationary average consensus problem for a class of heterogeneous-order multi-agent systems. The goal is to bring the positions of agents to the average of their initial positions while letting the other states converge to zero. To this end, three different consensus protocols are proposed. First, based on the auxiliary variables information among the agents under switching directed networks and state-feedback control, a protocol is proposed whereby all the agents achieve stationary average consensus. In the second and third protocols, by resorting to only measurements of relative positions of neighbouring agents under fixed balanced directed networks, two control frameworks are presented with two strategies based on state-feedback and output-feedback control. Finally, simulation results are given to illustrate the effectiveness of the proposed protocols.

  17. Development of a cross-disciplinary continuous insulin infusion protocol for non-critically ill patients in a French university hospital.

    PubMed

    Bernard, Lise; Roche, Béatrice; Batisse, Marie; Maqdasy, Salwan; Terral, Daniel; Sautou, Valérie; Tauveron, Igor

    2016-10-01

    In non-critically ill patients, the use of an insulin syringe pump allows the management of temporary situations during which other therapies cannot be used (failure of subcutaneous injections, awaiting advice from the diabetes team, emergency situations, prolonged corticosteroid therapy, initiation of an artificial nutrition, need for a fasting status, etc.). To manage the risks related to this «never event», the use of a standard validated protocol for insulin administration and monitoring is an essential prerequisite. To this end, a multidisciplinary approach is recommended. With the support of our subcommission «Endocrinology-Diabetology», we proceeded with a «step-by-step process» to create such a standardized protocol: (1) review of all existing protocols in our hospital; (2) overview of the literature data concerning insulin infusion protocols developed by multidisciplinary teams in France and abroad; (3) development of a standardized protocol for non-intensive care unit patients, respecting the current recommendations and adapting it to the working habits of health teams; and (4) validation of the protocol Two protocols based on the same structure but adapted to the health status of the patient have been developed. The protocols are divided in to three parts: (1) golden rules to make the use of the protocol appropriate and safe; (2) the algorithm (a double entry table) corresponding to a dynamic adaptation of insulin doses, clearly defining the target and the 'at risk situations'; and (3) practical aspects of the protocol: preparation of the syringe, treatment initiation and traceability. The protocols have been validated by the institution. Our standardized insulin infusion protocol is simple, easy to implement, safe and is likely to be applicable in diverse care units. However, the efficiency, safety and the workability of our protocols have to be clinically evaluated. © 2016 John Wiley & Sons, Ltd.

  18. Noninvasive measurement of dynamic correlation functions

    NASA Astrophysics Data System (ADS)

    Uhrich, Philipp; Castrignano, Salvatore; Uys, Hermann; Kastner, Michael

    2017-08-01

    The measurement of dynamic correlation functions of quantum systems is complicated by measurement backaction. To facilitate such measurements we introduce a protocol, based on weak ancilla-system couplings, that is applicable to arbitrary (pseudo)spin systems and arbitrary equilibrium or nonequilibrium initial states. Different choices of the coupling operator give access to the real and imaginary parts of the dynamic correlation function. This protocol reduces disturbances due to the early-time measurements to a minimum, and we quantify the deviation of the measured correlation functions from the theoretical, unitarily evolved ones. Implementations of the protocol in trapped ions and other experimental platforms are discussed. For spin-1 /2 models and single-site observables we prove that measurement backaction can be avoided altogether, allowing for the use of ancilla-free protocols.

  19. Fault-tolerant quantum blind signature protocols against collective noise

    NASA Astrophysics Data System (ADS)

    Zhang, Ming-Hui; Li, Hui-Fang

    2016-10-01

    This work proposes two fault-tolerant quantum blind signature protocols based on the entanglement swapping of logical Bell states, which are robust against two kinds of collective noises: the collective-dephasing noise and the collective-rotation noise, respectively. Both of the quantum blind signature protocols are constructed from four-qubit decoherence-free (DF) states, i.e., logical Bell qubits. The initial message is encoded on the logical Bell qubits with logical unitary operations, which will not destroy the anti-noise trait of the logical Bell qubits. Based on the fundamental property of quantum entanglement swapping, the receiver simply performs two Bell-state measurements (rather than four-qubit joint measurements) on the logical Bell qubits to verify the signature, which makes the protocols more convenient in a practical application. Different from the existing quantum signature protocols, our protocols can offer the high fidelity of quantum communication with the employment of logical qubits. Moreover, we hereinafter prove the security of the protocols against some individual eavesdropping attacks, and we show that our protocols have the characteristics of unforgeability, undeniability and blindness.

  20. SACFIR: SDN-Based Application-Aware Centralized Adaptive Flow Iterative Reconfiguring Routing Protocol for WSNs.

    PubMed

    Aslam, Muhammad; Hu, Xiaopeng; Wang, Fan

    2017-12-13

    Smart reconfiguration of a dynamic networking environment is offered by the central control of Software-Defined Networking (SDN). Centralized SDN-based management architectures are capable of retrieving global topology intelligence and decoupling the forwarding plane from the control plane. Routing protocols developed for conventional Wireless Sensor Networks (WSNs) utilize limited iterative reconfiguration methods to optimize environmental reporting. However, the challenging networking scenarios of WSNs involve a performance overhead due to constant periodic iterative reconfigurations. In this paper, we propose the SDN-based Application-aware Centralized adaptive Flow Iterative Reconfiguring (SACFIR) routing protocol with the centralized SDN iterative solver controller to maintain the load-balancing between flow reconfigurations and flow allocation cost. The proposed SACFIR's routing protocol offers a unique iterative path-selection algorithm, which initially computes suitable clustering based on residual resources at the control layer and then implements application-aware threshold-based multi-hop report transmissions on the forwarding plane. The operation of the SACFIR algorithm is centrally supervised by the SDN controller residing at the Base Station (BS). This paper extends SACFIR to SDN-based Application-aware Main-value Centralized adaptive Flow Iterative Reconfiguring (SAMCFIR) to establish both proactive and reactive reporting. The SAMCFIR transmission phase enables sensor nodes to trigger direct transmissions for main-value reports, while in the case of SACFIR, all reports follow computed routes. Our SDN-enabled proposed models adjust the reconfiguration period according to the traffic burden on sensor nodes, which results in heterogeneity awareness, load-balancing and application-specific reconfigurations of WSNs. Extensive experimental simulation-based results show that SACFIR and SAMCFIR yield the maximum scalability, network lifetime and stability period when compared to existing routing protocols.

  1. SACFIR: SDN-Based Application-Aware Centralized Adaptive Flow Iterative Reconfiguring Routing Protocol for WSNs

    PubMed Central

    Hu, Xiaopeng; Wang, Fan

    2017-01-01

    Smart reconfiguration of a dynamic networking environment is offered by the central control of Software-Defined Networking (SDN). Centralized SDN-based management architectures are capable of retrieving global topology intelligence and decoupling the forwarding plane from the control plane. Routing protocols developed for conventional Wireless Sensor Networks (WSNs) utilize limited iterative reconfiguration methods to optimize environmental reporting. However, the challenging networking scenarios of WSNs involve a performance overhead due to constant periodic iterative reconfigurations. In this paper, we propose the SDN-based Application-aware Centralized adaptive Flow Iterative Reconfiguring (SACFIR) routing protocol with the centralized SDN iterative solver controller to maintain the load-balancing between flow reconfigurations and flow allocation cost. The proposed SACFIR’s routing protocol offers a unique iterative path-selection algorithm, which initially computes suitable clustering based on residual resources at the control layer and then implements application-aware threshold-based multi-hop report transmissions on the forwarding plane. The operation of the SACFIR algorithm is centrally supervised by the SDN controller residing at the Base Station (BS). This paper extends SACFIR to SDN-based Application-aware Main-value Centralized adaptive Flow Iterative Reconfiguring (SAMCFIR) to establish both proactive and reactive reporting. The SAMCFIR transmission phase enables sensor nodes to trigger direct transmissions for main-value reports, while in the case of SACFIR, all reports follow computed routes. Our SDN-enabled proposed models adjust the reconfiguration period according to the traffic burden on sensor nodes, which results in heterogeneity awareness, load-balancing and application-specific reconfigurations of WSNs. Extensive experimental simulation-based results show that SACFIR and SAMCFIR yield the maximum scalability, network lifetime and stability period when compared to existing routing protocols. PMID:29236031

  2. STATIC AND KINETIC SITE-SPECIFIC PROTEIN-DNA PHOTOCROSSLINKING: ANALYSIS OF BACTERIAL TRANSCRIPTION INITIATION COMPLEXES

    PubMed Central

    Naryshkin, Nikolai; Druzhinin, Sergei; Revyakin, Andrei; Kim, Younggyu; Mekler, Vladimir; Ebright, Richard H.

    2009-01-01

    Static site-specific protein-DNA photocrosslinking permits identification of protein-DNA interactions within multiprotein-DNA complexes. Kinetic site-specific protein-DNA photocrosslinking--involving rapid-quench-flow mixing and pulsed-laser irradiation--permits elucidation of pathways and kinetics of formation of protein-DNA interactions within multiprotein-DNA complexes. We present detailed protocols for application of static and kinetic site-specific protein-DNA photocrosslinking to bacterial transcription initiation complexes. PMID:19378179

  3. The SHIP: A SIP to HTTP Interaction Protocol

    NASA Astrophysics Data System (ADS)

    Zeiß, Joachim; Gabner, Rene; Bessler, Sandford; Happenhofer, Marco

    IMS is capable of providing a wide range of services. As a result, terminal software becomes more and more complex to deliver network intelligence to user applications. Currently mobile terminal software needs to be permanently updated so that the latest network services and functionality can be delivered to the user. In the Internet, browser based user interfaces assure that an interface is made available to the user which offers the latest services in the net immediately. Our approach combines the benefits of the Session Initiation Protocol (SIP) and those of the HTTP protocol to bring the same type of user interfacing to IMS. SIP (IMS) realizes authentication, session management, charging and Quality of Service (QoS), HTTP provides access to Internet services and allows the user interface of an application to run on a mobile terminal while processing and orchestration is done on the server. A SHIP enabled IMS client only needs to handle data transport and session management via SIP, HTTP and RTP and render streaming media, HTML and Javascript. SHIP allows new kinds of applications, which combine audio, video and data within a single multimedia session.

  4. Predicting Silk Fiber Mechanical Properties through Multiscale Simulation and Protein Design.

    PubMed

    Rim, Nae-Gyune; Roberts, Erin G; Ebrahimi, Davoud; Dinjaski, Nina; Jacobsen, Matthew M; Martín-Moldes, Zaira; Buehler, Markus J; Kaplan, David L; Wong, Joyce Y

    2017-08-14

    Silk is a promising material for biomedical applications, and much research is focused on how application-specific, mechanical properties of silk can be designed synthetically through proper amino acid sequences and processing parameters. This protocol describes an iterative process between research disciplines that combines simulation, genetic synthesis, and fiber analysis to better design silk fibers with specific mechanical properties. Computational methods are used to assess the protein polymer structure as it forms an interconnected fiber network through shearing and how this process affects fiber mechanical properties. Model outcomes are validated experimentally with the genetic design of protein polymers that match the simulation structures, fiber fabrication from these polymers, and mechanical testing of these fibers. Through iterative feedback between computation, genetic synthesis, and fiber mechanical testing, this protocol will enable a priori prediction capability of recombinant material mechanical properties via insights from the resulting molecular architecture of the fiber network based entirely on the initial protein monomer composition. This style of protocol may be applied to other fields where a research team seeks to design a biomaterial with biomedical application-specific properties. This protocol highlights when and how the three research groups (simulation, synthesis, and engineering) should be interacting to arrive at the most effective method for predictive design of their material.

  5. Successful implementation of a perioperative glycemic control protocol in cardiac surgery: barrier analysis and intervention using lean six sigma.

    PubMed

    Martinez, Elizabeth A; Chavez-Valdez, Raul; Holt, Natalie F; Grogan, Kelly L; Khalifeh, Katherine W; Slater, Tammy; Winner, Laura E; Moyer, Jennifer; Lehmann, Christoph U

    2011-01-01

    Although the evidence strongly supports perioperative glycemic control among cardiac surgical patients, there is scant literature to describe the practical application of such a protocol in the complex ICU environment. This paper describes the use of the Lean Six Sigma methodology to implement a perioperative insulin protocol in a cardiac surgical intensive care unit (CSICU) in a large academic hospital. A preintervention chart audit revealed that fewer than 10% of patients were admitted to the CSICU with glucose <200 mg/dL, prompting the initiation of the quality improvement project. Following protocol implementation, more than 90% of patients were admitted with a glucose <200 mg/dL. Key elements to success include barrier analysis and intervention, provider education, and broadening the project scope to address the intraoperative period.

  6. Successful Implementation of a Perioperative Glycemic Control Protocol in Cardiac Surgery: Barrier Analysis and Intervention Using Lean Six Sigma

    PubMed Central

    Martinez, Elizabeth A.; Chavez-Valdez, Raul; Holt, Natalie F.; Grogan, Kelly L.; Khalifeh, Katherine W.; Slater, Tammy; Winner, Laura E.; Moyer, Jennifer; Lehmann, Christoph U.

    2011-01-01

    Although the evidence strongly supports perioperative glycemic control among cardiac surgical patients, there is scant literature to describe the practical application of such a protocol in the complex ICU environment. This paper describes the use of the Lean Six Sigma methodology to implement a perioperative insulin protocol in a cardiac surgical intensive care unit (CSICU) in a large academic hospital. A preintervention chart audit revealed that fewer than 10% of patients were admitted to the CSICU with glucose <200 mg/dL, prompting the initiation of the quality improvement project. Following protocol implementation, more than 90% of patients were admitted with a glucose <200 mg/dL. Key elements to success include barrier analysis and intervention, provider education, and broadening the project scope to address the intraoperative period. PMID:22091218

  7. Echocardiographic evaluation after pediatric heart transplant in Chile: initial application of a functional protocol with global longitudinal strain.

    PubMed

    Trincado, Claudia; Molina, Víctor; Urcelay, Gonzalo; Dellepiane, Paulina

    2018-02-01

    The echocardiographic evaluation of patients after heart transplantation is a useful tool. However, it is still necessary to define an optimal follow-up protocol. To describe the results of the application of a functional echocardiographic protocol in patients being followed after pediatric heart transplantation. Alls patients being followed at our institution after pediatric heart transplantation underwent an echocardiographic examination with a functional protocol that included global longitudinal strain. Contemporaneous endomyocardial biopsy results and hemodynamic data were recorded. 9 patients were evaluated with our echocardiographic functional protocol. Of these patients, only 1 showed systolic left ventricular dysfunction according to classic parameters. However, almost all patients had an abnormal global longitudinal strain. Right ventricular systolic dysfunction was observed in all patients. No epidodes of moderate to severe rejectiom were recorded. No correlation was observed between these parameters and pulmonary artery pressure. Subclinical biventricular systolic dysfunction was observed in the majority of the patients in this study. No association with rejection episodes or pulmonary hypertension was observed, which may be related to the absence of moderate or severe rejection episodes during the study period, and to the small sample size. Long term follow-up of these patients may better define the clinical relevance of our findings.

  8. WEB Services Networks and Technological Hybrids — The Integration Challenges of WAN Distributed Computing for ASP Providers

    NASA Astrophysics Data System (ADS)

    Mroczkiewicz, Pawel

    A necessity of integration of both information systems and office software existing in organizations has had a long history. The beginning of this kind of solutions reaches back to the old generation of network protocols called EDI (Electronic Data Interchange) and EDIFACT standard, which was initiated in 1988 and has dynamically evolved ever since (S. Michalski, M. Suskiewicz, 1995). The mentioned protocol was usually used for converting documents into natural formats processed by applications. It caused problems with binary files and, furthermore, the communication mechanisms had to be modified each time new documents or applications were added. When we compare EDI with the previously used communication mechanisms, EDI was a great step forward as it was the first, big scale attempt to define standards of data interchange between the applications in business transactions (V. Leyland, 1995, p. 47).

  9. The Art of a Deal: A Kyoto Protocol Simulation

    ERIC Educational Resources Information Center

    Cowlishaw, Richard; Hunter, Charles; Coy, Jason; Tessmer, Michael

    2007-01-01

    In this case study, groups of students represent countries as they negotiate an agreement to limit greenhouse-gas emissions. While initially developed for and used in an environmental-science course for first-year college students, the case could be applicable to other courses dealing with conflict resolution such as public policy, international…

  10. Establishment of a rapid, inexpensive protocol for extraction of high quality RNA from small amounts of strawberry plant tissues and other recalcitrant fruit crops.

    PubMed

    Christou, Anastasis; Georgiadou, Egli C; Filippou, Panagiota; Manganaris, George A; Fotopoulos, Vasileios

    2014-03-01

    Strawberry plant tissues and particularly fruit material are rich in polysaccharides and polyphenolic compounds, thus rendering the isolation of nucleic acids a difficult task. This work describes the successful modification of a total RNA extraction protocol, which enables the isolation of high quantity and quality of total RNA from small amounts of strawberry leaf, root and fruit tissues. Reverse-transcription polymerase chain reaction (RT-PCR) amplification of GAPDH housekeeping gene from isolated RNA further supports the proposed protocol efficiency and its use for downstream molecular applications. This novel procedure was also successfully followed using other fruit tissues, such as olive and kiwifruit. In addition, optional treatment with RNase A following initial nucleic acid extraction can provide sufficient quality and quality of genomic DNA for subsequent PCR analyses, as evidenced from PCR amplification of housekeeping genes using extracted genomic DNA as template. Overall, this optimized protocol allows easy, rapid and economic isolation of high quality RNA from small amounts of an important fruit crop, such as strawberry, with extended applicability to other recalcitrant fruit crops. Copyright © 2013 Elsevier B.V. All rights reserved.

  11. Protocol for Communication Networking for Formation Flying

    NASA Technical Reports Server (NTRS)

    Jennings, Esther; Okino, Clayton; Gao, Jay; Clare, Loren

    2009-01-01

    An application-layer protocol and a network architecture have been proposed for data communications among multiple autonomous spacecraft that are required to fly in a precise formation in order to perform scientific observations. The protocol could also be applied to other autonomous vehicles operating in formation, including robotic aircraft, robotic land vehicles, and robotic underwater vehicles. A group of spacecraft or other vehicles to which the protocol applies could be characterized as a precision-formation- flying (PFF) network, and each vehicle could be characterized as a node in the PFF network. In order to support precise formation flying, it would be necessary to establish a corresponding communication network, through which the vehicles could exchange position and orientation data and formation-control commands. The communication network must enable communication during early phases of a mission, when little positional knowledge is available. Particularly during early mission phases, the distances among vehicles may be so large that communication could be achieved only by relaying across multiple links. The large distances and need for omnidirectional coverage would limit communication links to operation at low bandwidth during these mission phases. Once the vehicles were in formation and distances were shorter, the communication network would be required to provide high-bandwidth, low-jitter service to support tight formation-control loops. The proposed protocol and architecture, intended to satisfy the aforementioned and other requirements, are based on a standard layered-reference-model concept. The proposed application protocol would be used in conjunction with conventional network, data-link, and physical-layer protocols. The proposed protocol includes the ubiquitous Institute of Electrical and Electronics Engineers (IEEE) 802.11 medium access control (MAC) protocol to be used in the datalink layer. In addition to its widespread and proven use in diverse local-area networks, this protocol offers both (1) a random- access mode needed for the early PFF deployment phase and (2) a time-bounded-services mode needed during PFF-maintenance operations. Switching between these two modes could be controlled by upper-layer entities using standard link-management mechanisms. Because the early deployment phase of a PFF mission can be expected to involve multihop relaying to achieve network connectivity (see figure), the proposed protocol includes the open shortest path first (OSPF) network protocol that is commonly used in the Internet. Each spacecraft in a PFF network would be in one of seven distinct states as the mission evolved from initial deployment, through coarse formation, and into precise formation. Reconfiguration of the formation to perform different scientific observations would also cause state changes among the network nodes. The application protocol provides for recognition and tracking of the seven states for each node and for protocol changes under specified conditions to adapt the network and satisfy communication requirements associated with the current PFF mission phase. Except during early deployment, when peer-to-peer random access discovery methods would be used, the application protocol provides for operation in a centralized manner.

  12. Optical protocols for terabit networks

    NASA Technical Reports Server (NTRS)

    Chua, P. L.; Lambert, J. L.; Morookian, J. M.; Bergman, L. A.

    1991-01-01

    This paper describes a new fiber-optic local area network technology providing 100X improvement over current technology, has full crossbar funtionality, and inherent data security. Based on optical code-division multiple access (CDMA), using spectral phase encoding/decoding of optical pulses, networking protocols are implemented entirely in the optical domain and thus conventional networking bottlenecks are avoided. Component and system issues for a proof-of-concept demonstration are discussed, as well as issues for a more practical and commercially exploitable system. Possible terrestrial and aerospace applications of this technology, and its impact on other technologies are explored. Some initial results toward realization of this concept are also included.

  13. Common Operating Picture: UAV Security Study

    NASA Technical Reports Server (NTRS)

    2004-01-01

    This initial communication security study is a top-level assessment of basic security issues related to the operation of Unmanned Aerial Vehicles (UAVs) in the National Airspace System (NAS). Security considerations will include information relating to the use of International Civil Aviation Organization (ICAO) Aeronautical Telecommunications Network (ATN) protocols and applications identifying their maturity, as well as the use of IPV4 and a version of mobile IPV6. The purpose of this assessment is to provide an initial analysis of the security implications of introducing UAVs into the NAS.

  14. Sharing Service Resource Information for Application Integration in a Virtual Enterprise - Modeling the Communication Protocol for Exchanging Service Resource Information

    NASA Astrophysics Data System (ADS)

    Yamada, Hiroshi; Kawaguchi, Akira

    Grid computing and web service technologies enable us to use networked resources in a coordinated manner. An integrated service is made of individual services running on coordinated resources. In order to achieve such coordinated services autonomously, the initiator of a coordinated service needs to know detailed service resource information. This information ranges from static attributes like the IP address of the application server to highly dynamic ones like the CPU load. The most famous wide-area service discovery mechanism based on names is DNS. Its hierarchical tree organization and caching methods take advantage of the static information managed. However, in order to integrate business applications in a virtual enterprise, we need a discovery mechanism to search for the optimal resources based on the given a set of criteria (search keys). In this paper, we propose a communication protocol for exchanging service resource information among wide-area systems. We introduce the concept of the service domain that consists of service providers managed under the same management policy. This concept of the service domain is similar to that for autonomous systems (ASs). In each service domain, the service information provider manages the service resource information of service providers that exist in this service domain. The service resource information provider exchanges this information with other service resource information providers that belong to the different service domains. We also verified the protocol's behavior and effectiveness using a simulation model developed for proposed protocol.

  15. A Self-Stabilizing Byzantine-Fault-Tolerant Clock Synchronization Protocol

    NASA Technical Reports Server (NTRS)

    Malekpour, Mahyar R.

    2009-01-01

    This report presents a rapid Byzantine-fault-tolerant self-stabilizing clock synchronization protocol that is independent of application-specific requirements. It is focused on clock synchronization of a system in the presence of Byzantine faults after the cause of any transient faults has dissipated. A model of this protocol is mechanically verified using the Symbolic Model Verifier (SMV) [SMV] where the entire state space is examined and proven to self-stabilize in the presence of one arbitrary faulty node. Instances of the protocol are proven to tolerate bursts of transient failures and deterministically converge with a linear convergence time with respect to the synchronization period. This protocol does not rely on assumptions about the initial state of the system other than the presence of sufficient number of good nodes. All timing measures of variables are based on the node s local clock, and no central clock or externally generated pulse is used. The Byzantine faulty behavior modeled here is a node with arbitrarily malicious behavior that is allowed to influence other nodes at every clock tick. The only constraint is that the interactions are restricted to defined interfaces.

  16. Efficient production of erythroid, megakaryocytic and myeloid cells, using single cell-derived iPSC colony differentiation.

    PubMed

    Hansen, Marten; Varga, Eszter; Aarts, Cathelijn; Wust, Tatjana; Kuijpers, Taco; von Lindern, Marieke; van den Akker, Emile

    2018-04-28

    Hematopoietic differentiation of human induced pluripotent stem cells (iPSCs) provide opportunities not only for fundamental research and disease modelling/drug testing but also for large-scale production of blood effector cells for future clinical application. Although there are multiple ways to differentiate human iPSCs towards hematopoietic lineages, there is a need to develop reproducible and robust protocols. Here we introduce an efficient way to produce three major blood cell types using a standardized differentiation protocol that starts with a single hematopoietic initiation step. This system is feeder-free, avoids EB-formation, starts with a hematopoietic initiation step based on a novel single cell-derived iPSC colony differentiation and produces multi-potential progenitors within 8-10 days. Followed by lineage-specific growth factor supplementation these cells can be matured into well characterized erythroid, megakaryocytic and myeloid cells with high-purity, without transcription factor overexpression or any kind of pre-purification step. This standardized differentiation system provides a simple platform to produce specific blood cells in a reproducible manner for hematopoietic development studies, disease modelling, drug testing and the potential for future therapeutic applications. Copyright © 2018. Published by Elsevier B.V.

  17. WDM Network and Multicasting Protocol Strategies

    PubMed Central

    Zaim, Abdul Halim

    2014-01-01

    Optical technology gains extensive attention and ever increasing improvement because of the huge amount of network traffic caused by the growing number of internet users and their rising demands. However, with wavelength division multiplexing (WDM), it is easier to take the advantage of optical networks and optical burst switching (OBS) and to construct WDM networks with low delay rates and better data transparency these technologies are the best choices. Furthermore, multicasting in WDM is an urgent solution for bandwidth-intensive applications. In the paper, a new multicasting protocol with OBS is proposed. The protocol depends on a leaf initiated structure. The network is composed of source, ingress switches, intermediate switches, edge switches, and client nodes. The performance of the protocol is examined with Just Enough Time (JET) and Just In Time (JIT) reservation protocols. Also, the paper involves most of the recent advances about WDM multicasting in optical networks. WDM multicasting in optical networks is given as three common subtitles: Broadcast and-select networks, wavelength-routed networks, and OBS networks. Also, in the paper, multicast routing protocols are briefly summarized and optical burst switched WDM networks are investigated with the proposed multicast schemes. PMID:24744683

  18. Biometrics based authentication scheme for session initiation protocol.

    PubMed

    Xie, Qi; Tang, Zhixiong

    2016-01-01

    Many two-factor challenge-response based session initiation protocol (SIP) has been proposed, but most of them are vulnerable to smart card stolen attacks and password guessing attacks. In this paper, we propose a novel three-factor SIP authentication scheme using biometrics, password and smart card, and utilize the pi calculus-based formal verification tool ProVerif to prove that the proposed protocol achieves security and authentication. Furthermore, our protocol is highly efficient when compared to other related protocols.

  19. Protocol Coordinator | Center for Cancer Research

    Cancer.gov

    PROGRAM DESCRIPTION Within the Leidos Biomedical Research Inc.’s Clinical Research Directorate, the Clinical Monitoring Research Program (CMRP) provides high-quality comprehensive and strategic operational support to the high-profile domestic and international clinical research initiatives of the National Cancer Institute (NCI), National Institute of Allergy and Infectious Diseases (NIAID), Clinical Center (CC), National Heart, Lung and Blood Institute (NHLBI), National Institute of Arthritis and Musculoskeletal and Skin Diseases (NIAMS), National Center for Advancing Translational Sciences (NCATS), National Institute of Neurological Disorders and Stroke (NINDS), and the National Institute of Mental Health (NIMH). Since its inception in 2001, CMRP’s ability to provide rapid responses, high-quality solutions, and to recruit and retain experts with a variety of backgrounds to meet the growing research portfolios of NCI, NIAID, CC, NHLBI, NIAMS, NCATS, NINDS, and NIMH has led to the considerable expansion of the program and its repertoire of support services. CMRP’s support services are strategically aligned with the program’s mission to provide comprehensive, dedicated support to assist National Institutes of Health researchers in providing the highest quality of clinical research in compliance with applicable regulations and guidelines, maintaining data integrity, and protecting human subjects. For the scientific advancement of clinical research, CMRP services include comprehensive clinical trials, regulatory, pharmacovigilance, protocol navigation and development, and programmatic and project management support for facilitating the conduct of 400+ Phase I, II, and III domestic and international trials on a yearly basis. These trials investigate the prevention, diagnosis, treatment of, and therapies for cancer, influenza, HIV, and other infectious diseases and viruses such as hepatitis C, tuberculosis, malaria, and Ebola virus; heart, lung, and blood diseases and conditions; parasitic infections; rheumatic and inflammatory diseases; and rare and neglected diseases. CMRP’s collaborative approach to clinical research and the expertise and dedication of staff to the continuation and success of the program’s mission has contributed to improving the overall standards of public health on a global scale. KEY ROLES/RESPONSIBILITIES The Protocol Coordinator II: Provides comprehensive clinical and administrative support to the Brain Tumor Trial Collaborative, Neuro-Oncology Branch, NCI, National Institutes of Health Serves as a liaison with Principal Investigators (PIs), the associated study teams and a variety of offices associated with protocol development and approvals Orchestrates meetings with investigators and other key medical staff to identify required support Coordinates the writing and regulatory review processes that occur in tandem, facilitates the bi-directional dialogue and feedback between various teams, and assists investigators and medical writers on the production/revision of clinical research protocols Assists research staff in coordinating/navigating requirements for special circumstances and facilitates access to necessary services Facilitates initiation of intramural research by providing assistance in obtaining required approvals Coordinates with investigators and medical writers to ensure Institutional Review Board (IRB) and Food and Drug Administration (FDA) stipulations are appropriately addressed in a timely manner Provides consultation and assistance for all aspects of the protocol lifecycle including initial Investigational New Drug (IND) submission, IRB submission, continuing review applications, protocol amendments, annual reports, and protocol inactivation with IRB and FDA Tracks a portfolio of protocols through each lifecycle step; processes and tracks appropriate approvals (e.g., IRB, Data and Safety Monitoring Board, Radiation Safety, Office of Protocol Services, etc.) Provides administrative support to Scientific Review Committees (SRC), reviews proposed protocol documents to ensure they are complete, distributes to reviewers, documents meeting minutes, enters data into the IRIS database, facilitates processes to obtain approval to initiate and continue clinical research Creates, maintains and queries an IRB database of approved amendment descriptions Maintains records of the current protocol(s) version, current Informed Consent document(s), FDA Safe to Proceed designation, etc. for each IND Provides expertise in data management including data collection and analysis Develops procedural manuals for clinical trials protocols Participates in quality improvement and assurance involving International Conference on Harmonization (ICH) Good Clinical Practice (GCP) guidelines This position is located at the National Institutes of Health (NIH) in Bethesda, Maryland.

  20. Application of a topical vapocoolant spray decreases pain at the site of initial intradermal anaesthetic injection during ultrasound-guided breast needle biopsy.

    PubMed

    Collado-Mesa, F; Net, J M; Arheart, K; Klevos, G A; Yepes, M M

    2015-09-01

    To assess whether the application of a topical vapocoolant spray immediately prior to initial intradermal anaesthetic injection during ultrasound-guided breast biopsy decreases pain at the site of the initial injection. In this institutional review board-approved, Health Insurance Portability and Accountability Act (HIPAA)-compliant study, 50 women aged 49.1 ± 1.6 years (mean ± standard error) were recruited and provided written informed consent. Participants served as their own controls and were blinded as to whether a topical vapocoolant spray or a placebo was used immediately prior to the initial local anaesthetic injection at two separate biopsy sites. With the exception of the application of vapocoolant or placebo, the entire ultrasound-guided procedure was performed according to a routine protocol. Participants recorded pain at initial injection site on a visual analogue scale. General linear mixed models for repeated measures analysis of variance and a 0.05 significance level were used. Application of topical vapocoolant spray was shown to significantly decrease pain at the site of initial intradermal anaesthetic injection as compared to placebo (p<0.001). Treatment effect was independent of age of the subject, race/ethnicity, operator, type of biopsy device, and histopathology result. No complications from vapocoolant spray use were reported. Application of a topical vapocoolant spray immediately prior to initial intradermal anaesthetic injection during ultrasound-guided breast biopsy significantly decreases pain at the site of the initial injection and could contribute to improve the patient's overall procedural experience. Copyright © 2015 The Royal College of Radiologists. Published by Elsevier Ltd. All rights reserved.

  1. Mapping Evidence-Based Treatments for Children and Adolescents: Application of the Distillation and Matching Model to 615 Treatments from 322 Randomized Trials

    ERIC Educational Resources Information Center

    Chorpita, Bruce F.; Daleiden, Eric L.

    2009-01-01

    This study applied the distillation and matching model to 322 randomized clinical trials for child mental health treatments. The model involved initial data reduction of 615 treatment protocol descriptions by means of a set of codes describing discrete clinical strategies, referred to as practice elements. Practice elements were then summarized in…

  2. Defense Simulation Internet: next generation information highway.

    PubMed

    Lilienthal, M G

    1995-06-01

    The Department of Defense has been engaged in the Defense Modeling and Simulation Initiative (DMSI) to provide advanced distributed simulation warfighters in geographically distributed localities. Lessons learned from the Defense Simulation Internet (DSI) concerning architecture, standards, protocols, interoperability, information sharing, and distributed data bases are equally applicable to telemedicine. Much of the vision and objectives of the DMSI are easily translated into the vision for world wide telemedicine.

  3. Application of Mobile-ip to Space and Aeronautical Networks

    NASA Technical Reports Server (NTRS)

    Leung, Kent; Shell, Dan; Ivancic, William D.; Stewart, David H.; Bell, Terry L.; Kachmar, Brian A.

    2001-01-01

    The National Aeronautics and Space Administration (NASA) is interested in applying mobile Internet protocol (mobile-ip) technologies to its space and aeronautics programs. In particular, mobile-ip will play a major role in the Advanced Aeronautic Transportation Technology (AAT-F), the Weather Information Communication (WINCOMM), and the Small Aircraft Transportation System (SATS) aeronautics programs. This paper describes mobile-ip and mobile routers--in particular, the features, capabilities, and initial performance of the mobile router are presented. The application of mobile-router technology to NASA's space and aeronautics programs is also discussed.

  4. A Simple XML Producer-Consumer Protocol

    NASA Technical Reports Server (NTRS)

    Smith, Warren; Gunter, Dan; Quesnel, Darcy

    2000-01-01

    This document describes a simple XML-based protocol that can be used for producers of events to communicate with consumers of events. The protocol described here is not meant to be the most efficient protocol, the most logical protocol, or the best protocol in any way. This protocol was defined quickly and it's intent is to give us a reasonable protocol that we can implement relatively easily and then use to gain experience in distributed event services. This experience will help us evaluate proposals for event representations, XML-based encoding of information, and communication protocols. The next section of this document describes how we represent events in this protocol and then defines the two events that we choose to use for our initial experiments. These definitions are made by example so that they are informal and easy to understand. The following section then proceeds to define the producer-consumer protocol we have agreed upon for our initial experiments.

  5. Nd:YAG photovaporization of residual equine guttural-pouch mycotic lesions after internal carotid occlusion

    NASA Astrophysics Data System (ADS)

    Tate, Lloyd P.; Tudor, R. A.; Little, Edwina D. E.

    1998-07-01

    Hospital records reviewed over a 12-year period determined that 6 horses had been presented for guttural pouch mycosis. All had a history of epistaxis and several had accompanying neurologic signs, including dysphagia. Initially, conformation of the disease was obtained by radiographic and endoscopic examinations. Surgical treatment was directed at controlling and preventing additional hemorrhage by occluding the arterial source of the hemorrhage. Direct treatment of the mycotic plaque present within the guttural pouch was conducted using transendoscopic technique to direct irradiation from the Nd:YAG laser. The protocol described for the laser application was successful in resolving the lesions and was less complicated and stressful than previously reported topically applied chemical protocols.

  6. IRB Process Improvements: A Machine Learning Analysis.

    PubMed

    Shoenbill, Kimberly; Song, Yiqiang; Cobb, Nichelle L; Drezner, Marc K; Mendonca, Eneida A

    2017-06-01

    Clinical research involving humans is critically important, but it is a lengthy and expensive process. Most studies require institutional review board (IRB) approval. Our objective is to identify predictors of delays or accelerations in the IRB review process and apply this knowledge to inform process change in an effort to improve IRB efficiency, transparency, consistency and communication. We analyzed timelines of protocol submissions to determine protocol or IRB characteristics associated with different processing times. Our evaluation included single variable analysis to identify significant predictors of IRB processing time and machine learning methods to predict processing times through the IRB review system. Based on initial identified predictors, changes to IRB workflow and staffing procedures were instituted and we repeated our analysis. Our analysis identified several predictors of delays in the IRB review process including type of IRB review to be conducted, whether a protocol falls under Veteran's Administration purview and specific staff in charge of a protocol's review. We have identified several predictors of delays in IRB protocol review processing times using statistical and machine learning methods. Application of this knowledge to process improvement efforts in two IRBs has led to increased efficiency in protocol review. The workflow and system enhancements that are being made support our four-part goal of improving IRB efficiency, consistency, transparency, and communication.

  7. Treat-to-target trials in diabetes.

    PubMed

    Wangnoo, Subhash K; Sethi, Bipin; Sahay, Rakesh K; John, Mathew; Ghosal, Samit; Sharma, Surendra K

    2014-03-01

    Treat-to-target is a therapeutic concept that considers well defined and specific physiologic targets as aims in controlling the pathophysiology of the disease. It has been widely used in diseases that pathophysiology includes, chronic metabolic and physiological disturbances, namely rheumatic conditions, vascular medicine and diabetes. In diabetes, the availability of "gold-standard" quantitative measures like fasting plasma glucose and glycated hemoglobin make the application of treat-to-target trials especially pertinent. Treatment modalities which have used single therapeutic agents or combinations or in combination with a variety of titration algorithms and implementation protocols have broadened our understanding of diabetes management with specific reference to insulin initiation and maintenance. Treat-to-target trials have been used to investigate a wide variety of questions including efficacy, safety, effect of treatment on comorbidities and patient satisfaction, ideal mechanisms to implement insulin initiation etc. A more generalized acceptance and implementation of treat-to-target trials may finally revolutionize diabetes management by combining aspects of individual care with standard treatment protocols.

  8. Object Management Group object transaction service based on an X/Open and International Organization for Standardization open systems interconnection transaction processing kernel

    NASA Astrophysics Data System (ADS)

    Liang, J.; Sédillot, S.; Traverson, B.

    1997-09-01

    This paper addresses federation of a transactional object standard - Object Management Group (OMG) object transaction service (OTS) - with the X/Open distributed transaction processing (DTP) model and International Organization for Standardization (ISO) open systems interconnection (OSI) transaction processing (TP) communication protocol. The two-phase commit propagation rules within a distributed transaction tree are similar in the X/Open, ISO and OMG models. Building an OTS on an OSI TP protocol machine is possible because the two specifications are somewhat complementary. OTS defines a set of external interfaces without specific internal protocol machine, while OSI TP specifies an internal protocol machine without any application programming interface. Given these observations, and having already implemented an X/Open two-phase commit transaction toolkit based on an OSI TP protocol machine, we analyse the feasibility of using this implementation as a transaction service provider for OMG interfaces. Based on the favourable result of this feasibility study, we are implementing an OTS compliant system, which, by initiating the extensibility and openness strengths of OSI TP, is able to provide interoperability between X/Open DTP and OMG OTS models.

  9. An approach to verification and validation of a reliable multicasting protocol: Extended Abstract

    NASA Technical Reports Server (NTRS)

    Callahan, John R.; Montgomery, Todd L.

    1995-01-01

    This paper describes the process of implementing a complex communications protocol that provides reliable delivery of data in multicast-capable, packet-switching telecommunication networks. The protocol, called the Reliable Multicasting Protocol (RMP), was developed incrementally using a combination of formal and informal techniques in an attempt to ensure the correctness of its implementation. Our development process involved three concurrent activities: (1) the initial construction and incremental enhancement of a formal state model of the protocol machine; (2) the initial coding and incremental enhancement of the implementation; and (3) model-based testing of iterative implementations of the protocol. These activities were carried out by two separate teams: a design team and a V&V team. The design team built the first version of RMP with limited functionality to handle only nominal requirements of data delivery. This initial version did not handle off-nominal cases such as network partitions or site failures. Meanwhile, the V&V team concurrently developed a formal model of the requirements using a variant of SCR-based state tables. Based on these requirements tables, the V&V team developed test cases to exercise the implementation. In a series of iterative steps, the design team added new functionality to the implementation while the V&V team kept the state model in fidelity with the implementation. This was done by generating test cases based on suspected errant or off-nominal behaviors predicted by the current model. If the execution of a test in the model and implementation agreed, then the test either found a potential problem or verified a required behavior. However, if the execution of a test was different in the model and implementation, then the differences helped identify inconsistencies between the model and implementation. In either case, the dialogue between both teams drove the co-evolution of the model and implementation. We have found that this interactive, iterative approach to development allows software designers to focus on delivery of nominal functionality while the V&V team can focus on analysis of off nominal cases. Testing serves as the vehicle for keeping the model and implementation in fidelity with each other. This paper describes (1) our experiences in developing our process model; and (2) three example problems found during the development of RMP. Although RMP has provided our research effort with a rich set of test cases, it also has practical applications within NASA. For example, RMP is being considered for use in the NASA EOSDIS project due to its significant performance benefits in applications that need to replicate large amounts of data to many network sites.

  10. Direct Measurement of Intracellular Pressure

    PubMed Central

    Petrie, Ryan J.; Koo, Hyun

    2014-01-01

    A method to directly measure the intracellular pressure of adherent, migrating cells is described in the Basic Protocol. This approach is based on the servo-null method where a microelectrode is introduced into the cell to directly measure the physical pressure of the cytoplasm. We also describe the initial calibration of the microelectrode as well as the application of the method to cells migrating inside three-dimensional (3D) extracellular matrix (ECM). PMID:24894836

  11. Sebastien Philippe Discusses the Zero-Knowledge Protocol

    ScienceCinema

    Philippe, Sebastien

    2018-06-12

    A system that can compare physical objects while potentially protecting sensitive information about the objects themselves has been demonstrated experimentally at the U.S. Department of Energy’s (DOE) Princeton Plasma Physics Laboratory (PPPL). This work, by researchers at Princeton University and PPPL, marks an initial confirmation of the application of a powerful cryptographic technique in the physical world. Graduate student Sébastien Philippe discusses the experiment.

  12. Using of WHO guidelines for the management of severe malnutrition to cases of marasmus and kwashiorkor in a Colombia children's hospital.

    PubMed

    Ramírez Prada, D; Delgado, G; Hidalgo Patiño, C A; Pérez-Navero, J; Gil Campos, M

    2011-01-01

    In 2007, the Hospital Infantil Los Ángeles (HILA) in Colombia implemented a slightly-modified version of the WHO guidelines for the diagnosis and management of malnutrition during childhood. To evaluate the efficacy of the WHO-HILA protocol in children hospitalized with severe, chronic marasmus and kwashiorkor malnutrition (MS-KWK) in 2007 and 2008. In this descriptive retrospective study the records of 100 children hospitalized with MSKWK were initially evaluated. Of these, 30 fulfilled the inclusion criteria: children of both sexes with a primary diagnosis of MS-KWK. Patients with any chronic disease liable to cause malnutrition were excluded. Anthropometric parameters, clinical signs and biochemical indicators of malnutrition were assessed upon admission and again at discharge following application of the WHO guidelines. Univariate analysis was performed for each study variable; serum hemoglobin and albumin levels on admission and at discharge were compared, and data were subjected to bivariate analysis. Marasmus was diagnosed in 23.3% of children, kwashiorkor in 73.3% and marasmic kwashiorkor in 3.3%. The major clinical findings were: edema (70%), emaciation (40%), "flag sign" hair (42.86%), low serum albumin (93%) and anemia (80%). Thirteen children following the WHO-HILA protocol showed a significant nutritional status improvement (p<0.05), whereas no improvement was noted in the 17 children not treated according to the protocol. Application of the WHO-HILA protocol was associated with reduced morbimortality in children with marasmus-kwashiorkor malnutrition. Implementation of this protocol should therefore be considered in all children´s hospitals in countries where this disease is prevalent.

  13. Efficient and universal quantum key distribution based on chaos and middleware

    NASA Astrophysics Data System (ADS)

    Jiang, Dong; Chen, Yuanyuan; Gu, Xuemei; Xie, Ling; Chen, Lijun

    2017-01-01

    Quantum key distribution (QKD) promises unconditionally secure communications, however, the low bit rate of QKD cannot meet the requirements of high-speed applications. Despite the many solutions that have been proposed in recent years, they are neither efficient to generate the secret keys nor compatible with other QKD systems. This paper, based on chaotic cryptography and middleware technology, proposes an efficient and universal QKD protocol that can be directly deployed on top of any existing QKD system without modifying the underlying QKD protocol and optical platform. It initially takes the bit string generated by the QKD system as input, periodically updates the chaotic system, and efficiently outputs the bit sequences. Theoretical analysis and simulation results demonstrate that our protocol can efficiently increase the bit rate of the QKD system as well as securely generate bit sequences with perfect statistical properties. Compared with the existing methods, our protocol is more efficient and universal, it can be rapidly deployed on the QKD system to increase the bit rate when the QKD system becomes the bottleneck of its communication system.

  14. The politics of Golden Rice

    PubMed Central

    Dubock, Adrian

    2014-01-01

    Genetic knowledge applicable to crop improvement has erupted over the past 60 years, and the techniques of introducing genes from one organism to another have enabled new varieties of crops not achievable by previously available methodologies of crop breeding. Research and particularly development of these GMO-crops to a point where they are useful for growers and consumers in most countries is subject to complex national and international rules arising out of the UN's Cartagena Protocol on Biosafety to the Convention on Biological Diversity, with 167 country signatories. (The USA and Canada are not signatories.) The Protocol was developed based on concerns initially expressed in the 1970's that such technology presented unusual risks to man and the environment. Those ideas have comprehensively and authoritatively been proven to be wrong. The Protocol has nevertheless spawned significant regulatory obstacles to the development of GMO-crop technology at great cost to global society and in conflict with many other UN objectives. The suspicion induced by the Protocol is also widely used, overtly or covertly, for political purposes. These points are illustrated by reference to the not-for-profit Golden Rice project. PMID:25437240

  15. The politics of Golden Rice.

    PubMed

    Dubock, Adrian

    2014-07-03

    Genetic knowledge applicable to crop improvement has erupted over the past 60 years, and the techniques of introducing genes from one organism to another have enabled new varieties of crops not achievable by previously available methodologies of crop breeding. Research and particularly development of these GMO-crops to a point where they are useful for growers and consumers in most countries is subject to complex national and international rules arising out of the UN's Cartagena Protocol on Biosafety to the Convention on Biological Diversity, with 167 country signatories. (The USA and Canada are not signatories.) The Protocol was developed based on concerns initially expressed in the 1970's that such technology presented unusual risks to man and the environment. Those ideas have comprehensively and authoritatively been proven to be wrong. The Protocol has nevertheless spawned significant regulatory obstacles to the development of GMO-crop technology at great cost to global society and in conflict with many other UN objectives. The suspicion induced by the Protocol is also widely used, overtly or covertly, for political purposes. These points are illustrated by reference to the not-for-profit Golden Rice project.

  16. Implementation Intention for Initiating Intuitive Eating and Active Embodiment in Obese Patients Using a Smartphone Application.

    PubMed

    Brevers, Damien; Rogiers, Anne; Defontaine, Alexis; Cheron, Guy; Clarinval, Anne-Marie; Foucart, Jennifer; Bouchez, Anne; Bolly, Véronique; Tsartsafloudakis, Laura; Jottrand, Pénélope; Minner, Pierre; Bechara, Antoine; Kornreich, Charles; Verbanck, Paul

    2017-01-01

    This article describes a study protocol, which aims to explore and describe the feasibility of a mobile-phone application for initiating intuitive eating and intuitive exercising in patients who are following an ambulatory treatment for obesity. Intuitive eating refers to one's ability to make food choices based on one's awareness of his/her body's response. Intuitive exercising encourages people in finding enjoyable ways of being physically active. These two components will be trained using an implementation intention procedure, that is, behavioral plans that aim at creating a strong link between a specified situation and a response. We aim to recruit up to 80 overweight and obese patients over a period of 2 years. The smartphone application will be assessed on the basis of (i) data obtained through a 4-week use period, (ii) self-report measures taken before and after the use of the mobile application, and (iii) feedbacks from participants after the use of the mobile application. This pilot study will allow us to better understand the applicability of the use of mobile application within ambulatory treatment settings, and to adapt the design of the app necessary for building cross-sectional studies investigating its efficacy.

  17. The reliable multicast protocol application programming interface

    NASA Technical Reports Server (NTRS)

    Montgomery , Todd; Whetten, Brian

    1995-01-01

    The Application Programming Interface for the Berkeley/WVU implementation of the Reliable Multicast Protocol is described. This transport layer protocol is implemented as a user library that applications and software buses link against.

  18. Evaluating the performance of vehicular platoon control under different network topologies of initial states

    NASA Astrophysics Data System (ADS)

    Li, Yongfu; Li, Kezhi; Zheng, Taixiong; Hu, Xiangdong; Feng, Huizong; Li, Yinguo

    2016-05-01

    This study proposes a feedback-based platoon control protocol for connected autonomous vehicles (CAVs) under different network topologies of initial states. In particularly, algebraic graph theory is used to describe the network topology. Then, the leader-follower approach is used to model the interactions between CAVs. In addition, feedback-based protocol is designed to control the platoon considering the longitudinal and lateral gaps simultaneously as well as different network topologies. The stability and consensus of the vehicular platoon is analyzed using the Lyapunov technique. Effects of different network topologies of initial states on convergence time and robustness of platoon control are investigated. Results from numerical experiments demonstrate the effectiveness of the proposed protocol with respect to the position and velocity consensus in terms of the convergence time and robustness. Also, the findings of this study illustrate the convergence time of the control protocol is associated with the initial states, while the robustness is not affected by the initial states significantly.

  19. Proteomic approaches and their application to plant gravitropism.

    PubMed

    Basu, Proma; Luesse, Darron R; Wyatt, Sarah E

    2015-01-01

    Proteomics is a powerful technique that allows researchers a window into how an organism responds to a mutation, a specific environment, or at a distinct point during development by quantifying relative protein abundance and posttranslational modifications. Here, we describe methods for the proteomic analysis of Arabidopsis thaliana tissue. Extraction protocols are provided for isolation of soluble, plasma membrane, and tonoplast proteins. In addition, basic analysis and quality metrics for MS/MS data are discussed. The protocols outlined have the potential to unlock new avenues of research that are not possible through basic genetics or transcriptomic approaches. By combining proteomic information with known gene regulatory patterns, researchers can gain a complete picture of how molecular pathways, such as those required for gravitropism, are initiated, regulated, and terminated.

  20. Automatic spectral imaging protocol selection and iterative reconstruction in abdominal CT with reduced contrast agent dose: initial experience.

    PubMed

    Lv, Peijie; Liu, Jie; Chai, Yaru; Yan, Xiaopeng; Gao, Jianbo; Dong, Junqiang

    2017-01-01

    To evaluate the feasibility, image quality, and radiation dose of automatic spectral imaging protocol selection (ASIS) and adaptive statistical iterative reconstruction (ASIR) with reduced contrast agent dose in abdominal multiphase CT. One hundred and sixty patients were randomly divided into two scan protocols (n = 80 each; protocol A, 120 kVp/450 mgI/kg, filtered back projection algorithm (FBP); protocol B, spectral CT imaging with ASIS and 40 to 70 keV monochromatic images generated per 300 mgI/kg, ASIR algorithm. Quantitative parameters (image noise and contrast-to-noise ratios [CNRs]) and qualitative visual parameters (image noise, small structures, organ enhancement, and overall image quality) were compared. Monochromatic images at 50 keV and 60 keV provided similar or lower image noise, but higher contrast and overall image quality as compared with 120-kVp images. Despite the higher image noise, 40-keV images showed similar overall image quality compared to 120-kVp images. Radiation dose did not differ between the two protocols, while contrast agent dose in protocol B was reduced by 33 %. Application of ASIR and ASIS to monochromatic imaging from 40 to 60 keV allowed contrast agent dose reduction with adequate image quality and without increasing radiation dose compared to 120 kVp with FBP. • Automatic spectral imaging protocol selection provides appropriate scan protocols. • Abdominal CT is feasible using spectral imaging and 300 mgI/kg contrast agent. • 50-keV monochromatic images with 50 % ASIR provide optimal image quality.

  1. OSI Upper Layers Support for Applications.

    ERIC Educational Resources Information Center

    Davison, Wayne

    1990-01-01

    Discusses how various Open Systems Interconnection (OSI) application layer protocols can be used together, along with the Presentation and Session protocols, to support the interconnection requirements of applications. Application layer protocol standards that are currently available or under development are reviewed, and the File, Transfer,…

  2. A data acquisition and control system for high-speed gamma-ray tomography

    NASA Astrophysics Data System (ADS)

    Hjertaker, B. T.; Maad, R.; Schuster, E.; Almås, O. A.; Johansen, G. A.

    2008-09-01

    A data acquisition and control system (DACS) for high-speed gamma-ray tomography based on the USB (Universal Serial Bus) and Ethernet communication protocols has been designed and implemented. The high-speed gamma-ray tomograph comprises five 500 mCi 241Am gamma-ray sources, each at a principal energy of 59.5 keV, which corresponds to five detector modules, each consisting of 17 CdZnTe detectors. The DACS design is based on Microchip's PIC18F4550 and PIC18F4620 microcontrollers, which facilitates an USB 2.0 interface protocol and an Ethernet (IEEE 802.3) interface protocol, respectively. By implementing the USB- and Ethernet-based DACS, a sufficiently high data acquisition rate is obtained and no dedicated hardware installation is required for the data acquisition computer, assuming that it is already equipped with a standard USB and/or Ethernet port. The API (Application Programming Interface) for the DACS is founded on the National Instrument's LabVIEW® graphical development tool, which provides a simple and robust foundation for further application software developments for the tomograph. The data acquisition interval, i.e. the integration time, of the high-speed gamma-ray tomograph is user selectable and is a function of the statistical measurement accuracy required for the specific application. The bandwidth of the DACS is 85 kBytes s-1 for the USB communication protocol and 28 kBytes s-1 for the Ethernet protocol. When using the iterative least square technique reconstruction algorithm with a 1 ms integration time, the USB-based DACS provides an online image update rate of 38 Hz, i.e. 38 frames per second, whereas 31 Hz for the Ethernet-based DACS. The off-line image update rate (storage to disk) for the USB-based DACS is 278 Hz using a 1 ms integration time. Initial characterization of the high-speed gamma-ray tomograph using the DACS on polypropylene phantoms is presented in the paper.

  3. Detecting in situ copepod diet diversity using molecular technique: development of a copepod/symbiotic ciliate-excluding eukaryote-inclusive PCR protocol.

    PubMed

    Hu, Simin; Guo, Zhiling; Li, Tao; Carpenter, Edward J; Liu, Sheng; Lin, Senjie

    2014-01-01

    Knowledge of in situ copepod diet diversity is crucial for accurately describing pelagic food web structure but is challenging to achieve due to lack of an easily applicable methodology. To enable analysis with whole copepod-derived DNAs, we developed a copepod-excluding 18S rDNA-based PCR protocol. Although it is effective in depressing amplification of copepod 18S rDNA, its applicability to detect diverse eukaryotes in both mono- and mixed-species has not been demonstrated. Besides, the protocol suffers from the problem that sequences from symbiotic ciliates are overrepresented in the retrieved 18S rDNA libraries. In this study, we designed a blocking primer to make a combined primer set (copepod/symbiotic ciliate-excluding eukaryote-common: CEEC) to depress PCR amplification of symbiotic ciliate sequences while maximizing the range of eukaryotes amplified. We firstly examined the specificity and efficacy of CEEC by PCR-amplifying DNAs from 16 copepod species, 37 representative organisms that are potential prey of copepods and a natural microplankton sample, and then evaluated the efficiency in reconstructing diet composition by detecting the food of both lab-reared and field-collected copepods. Our results showed that the CEEC primer set can successfully amplify 18S rDNA from a wide range of isolated species and mixed-species samples while depressing amplification of that from copepod and targeted symbiotic ciliate, indicating the universality of CEEC in specifically detecting prey of copepods. All the predetermined food offered to copepods in the laboratory were successfully retrieved, suggesting that the CEEC-based protocol can accurately reconstruct the diets of copepods without interference of copepods and their associated ciliates present in the DNA samples. Our initial application to analyzing the food composition of field-collected copepods uncovered diverse prey species, including those currently known, and those that are unsuspected, as copepod prey. While testing is required, this protocol provides a useful strategy for depicting in situ dietary composition of copepods.

  4. Use of Flowchart for Automation of Clinical Protocols in mHealth.

    PubMed

    Dias, Karine Nóra; Welfer, Daniel; Cordeiro d'Ornellas, Marcos; Pereira Haygert, Carlos Jesus; Dotto, Gustavo Nogara

    2017-01-01

    For healthcare professionals to use mobile applications we need someone who knows software development, provide them. In healthcare institutions, health professionals use clinical protocols to govern care, and sometimes these documents are computerized through mobile applications to assist them. This work aims to present a proposal of an application of flow as a way of describing clinical protocols for automatic generation of mobile applications to assist health professionals. The purpose of this research is to enable health professionals to develop applications from the description of their own clinical protocols. As a result, we developed a web system that automates clinical protocols for an Android platform, and we validated with two clinical protocols used in a Brazilian hospital. Preliminary results of the developed architecture demonstrate the feasibility of this study.

  5. Excessive distribution of quantum entanglement

    NASA Astrophysics Data System (ADS)

    Zuppardo, Margherita; Krisnanda, Tanjung; Paterek, Tomasz; Bandyopadhyay, Somshubhro; Banerjee, Anindita; Deb, Prasenjit; Halder, Saronath; Modi, Kavan; Paternostro, Mauro

    2016-01-01

    We classify entanglement distribution protocols based on whether or not entanglement gain is observed with respect to communicated and initial entanglement. We call a protocol nonexcessive if the gain of entanglement is bounded by the communicated entanglement and excessive if it violates this bound. We present examples of excessive protocols that achieve significant gain, independently of the presence of the initial and (or) communicated entanglement. We show that, for certain entanglement measures, excessive entanglement distribution is possible even with pure states, which sheds light on the possibility of formulating a unifying approach to quantifiers of quantum correlations. We point out a "catalytic" effect, where a protocol is turned into an excessive one by sending an intermediate particle (which does not change the initial entanglement) in advance of the designated carrier. Finally, we analyze the protocols in noisy scenarios and show that, under suitable conditions, excessive distribution may be the only way to achieve entanglement gain.

  6. Automated Planning and Scheduling for Space Mission Operations

    NASA Technical Reports Server (NTRS)

    Chien, Steve; Jonsson, Ari; Knight, Russell

    2005-01-01

    Research Trends: a) Finite-capacity scheduling under more complex constraints and increased problem dimensionality (subcontracting, overtime, lot splitting, inventory, etc.) b) Integrated planning and scheduling. c) Mixed-initiative frameworks. d) Management of uncertainty (proactive and reactive). e) Autonomous agent architectures and distributed production management. e) Integration of machine learning capabilities. f) Wider scope of applications: 1) analysis of supplier/buyer protocols & tradeoffs; 2) integration of strategic & tactical decision-making; and 3) enterprise integration.

  7. Nasal Irrigation for Chronic Rhinosinusitis and Fatigue in Patients with Gulf War Syndrome

    DTIC Science & Technology

    2014-07-01

    xylitol has continued to provide daily use packets at no cost as indicated in the protocol and letter of support in the initial grant application...Pharmaceutical Research Center (PRC) which will be housing and dispensing all study medications ( Xylitol and Saline). We have final approval on all...recruitment strategies  Procurement of xylitol  Recruitment and enrollment of subjects 6 REPORTABLE OUTCOMES:  UW HS IRB continuing review

  8. Microcurrent Point Stimulation Applied to Lower Back Acupuncture Points for the Treatment of Nonspecific Neck Pain.

    PubMed

    Armstrong, Kelly; Gokal, Raman; Chevalier, Antoine; Todorsky, William; Lim, Mike

    2017-04-01

    Although acupuncture and microcurrent are widely used for chronic pain, there remains considerable controversy as to their therapeutic value for neck pain. We aimed to determine the effect size of microcurrent applied to lower back acupuncture points to assess the impact on the neck pain. This was a cohort analysis of treatment outcomes pre- and postmicrocurrent stimulation, involving 34 patients with a history of nonspecific chronic neck pain. Consenting patients were enrolled from a group of therapists attending educational seminars and were asked to report pain levels pre-post and 48 hours after a single MPS application. Direct current microcurrent point stimulation (MPS) applied to standardized lower back acupuncture protocol points was used. Evaluations entailed a baseline visual analog scale (VAS) pain scale assessment, using a VAS, which was repeated twice after therapy, once immediately postelectrotherapy and again after a 48-h follow-up period. All 34 patients received a single MPS session. Results were analyzed using paired t tests. Results and Outcomes: Pain intensity showed an initial statistically significant reduction of 68% [3.9050 points; 95% CI (2.9480, 3.9050); p = 0.0001], in mean neck pain levels after standard protocol treatment, when compared to initial pain levels. There was a further statistically significant reduction of 35% in mean neck pain levels at 48 h when compared to pain levels immediately after standard protocol treatment [0.5588 points; 95% CI (0.2001, 0.9176); p = 0.03], for a total average pain relief of 80%. The positive results in this study could have applications for those patients impacted by chronic neck pain.

  9. Initial Characterization of Optical Communications with Disruption-Tolerant Network Protocols

    NASA Technical Reports Server (NTRS)

    Schoolcraft, Joshua; Wilson, Keith

    2011-01-01

    Disruption-tolerant networks (DTNs) are groups of network assets connected with a suite of communication protocol technologies designed to mitigate the effects of link delay and disruption. Application of DTN protocols to diverse groups of network resources in multiple sub-networks results in an overlay network-of-networks with autonomous data routing capability. In space environments where delay or disruption is expected, performance of this type of architecture (such as an interplanetary internet) can increase with the inclusion of new communications mediums and techniques. Space-based optical communication links are therefore an excellent building block of space DTN architectures. When compared to traditional radio frequency (RF) communications, optical systems can provide extremely power-efficient and high bandwidth links bridging sub-networks. Because optical links are more susceptible to link disruption and experience the same light-speed delays as RF, optical-enabled DTN architectures can lessen potential drawbacks and maintain the benefits of autonomous optical communications over deep space distances. These environment-driven expectations - link delay and interruption, along with asymmetric data rates - are the purpose of the proof-of-concept experiment outlined herein. In recognizing the potential of these two technologies, we report an initial experiment and characterization of the performance of a DTN-enabled space optical link. The experiment design employs a point-to-point free-space optical link configured to have asymmetric bandwidth. This link connects two networked systems running a DTN protocol implementation designed and written at JPL for use on spacecraft, and further configured for higher bandwidth performance. Comparing baseline data transmission metrics with and without periodic optical link interruptions, the experiment confirmed the DTN protocols' ability to handle real-world unexpected link outages while maintaining capability of reliably delivering data at relatively high rates. Finally, performance characterizations from this data suggest performance optimizations to configuration and protocols for future optical-specific DTN space link scenarios.

  10. In silico toxicology protocols.

    PubMed

    Myatt, Glenn J; Ahlberg, Ernst; Akahori, Yumi; Allen, David; Amberg, Alexander; Anger, Lennart T; Aptula, Aynur; Auerbach, Scott; Beilke, Lisa; Bellion, Phillip; Benigni, Romualdo; Bercu, Joel; Booth, Ewan D; Bower, Dave; Brigo, Alessandro; Burden, Natalie; Cammerer, Zoryana; Cronin, Mark T D; Cross, Kevin P; Custer, Laura; Dettwiler, Magdalena; Dobo, Krista; Ford, Kevin A; Fortin, Marie C; Gad-McDonald, Samantha E; Gellatly, Nichola; Gervais, Véronique; Glover, Kyle P; Glowienke, Susanne; Van Gompel, Jacky; Gutsell, Steve; Hardy, Barry; Harvey, James S; Hillegass, Jedd; Honma, Masamitsu; Hsieh, Jui-Hua; Hsu, Chia-Wen; Hughes, Kathy; Johnson, Candice; Jolly, Robert; Jones, David; Kemper, Ray; Kenyon, Michelle O; Kim, Marlene T; Kruhlak, Naomi L; Kulkarni, Sunil A; Kümmerer, Klaus; Leavitt, Penny; Majer, Bernhard; Masten, Scott; Miller, Scott; Moser, Janet; Mumtaz, Moiz; Muster, Wolfgang; Neilson, Louise; Oprea, Tudor I; Patlewicz, Grace; Paulino, Alexandre; Lo Piparo, Elena; Powley, Mark; Quigley, Donald P; Reddy, M Vijayaraj; Richarz, Andrea-Nicole; Ruiz, Patricia; Schilter, Benoit; Serafimova, Rositsa; Simpson, Wendy; Stavitskaya, Lidiya; Stidl, Reinhard; Suarez-Rodriguez, Diana; Szabo, David T; Teasdale, Andrew; Trejo-Martin, Alejandra; Valentin, Jean-Pierre; Vuorinen, Anna; Wall, Brian A; Watts, Pete; White, Angela T; Wichard, Joerg; Witt, Kristine L; Woolley, Adam; Woolley, David; Zwickl, Craig; Hasselgren, Catrin

    2018-07-01

    The present publication surveys several applications of in silico (i.e., computational) toxicology approaches across different industries and institutions. It highlights the need to develop standardized protocols when conducting toxicity-related predictions. This contribution articulates the information needed for protocols to support in silico predictions for major toxicological endpoints of concern (e.g., genetic toxicity, carcinogenicity, acute toxicity, reproductive toxicity, developmental toxicity) across several industries and regulatory bodies. Such novel in silico toxicology (IST) protocols, when fully developed and implemented, will ensure in silico toxicological assessments are performed and evaluated in a consistent, reproducible, and well-documented manner across industries and regulatory bodies to support wider uptake and acceptance of the approaches. The development of IST protocols is an initiative developed through a collaboration among an international consortium to reflect the state-of-the-art in in silico toxicology for hazard identification and characterization. A general outline for describing the development of such protocols is included and it is based on in silico predictions and/or available experimental data for a defined series of relevant toxicological effects or mechanisms. The publication presents a novel approach for determining the reliability of in silico predictions alongside experimental data. In addition, we discuss how to determine the level of confidence in the assessment based on the relevance and reliability of the information. Copyright © 2018 The Authors. Published by Elsevier Inc. All rights reserved.

  11. [Constraints on publication rights in industry-initiated clinical trials--secondary publication].

    PubMed

    Gøtzsche, Peter C; Hróbjartsson, Asbjørn; Johansen, Helle Krogh; Haahr, Mette T; Altman, Douglas G; Chan, An-Wen

    2006-06-19

    In 22 of 44 industry-initiated clinical trial protocols from 1994-95, it was noted that the sponsor either owned the data or needed to approve the manuscript; another 18 protocols had other constraints. Furthermore, in 16 trials, the sponsor had access to accumulating data, and in an additional 16 trials the sponsor could stop the trial at any time, for any reason. These facts were not noted in any of the trial reports. We found similar constraints on publication rights in 44 protocols from 2004. This tight sponsor control over industry-initiated trials should be changed.

  12. Decoding the Role of Water Dynamics in Ligand-Protein Unbinding: CRF1R as a Test Case.

    PubMed

    Bortolato, Andrea; Deflorian, Francesca; Weiss, Dahlia R; Mason, Jonathan S

    2015-09-28

    The residence time of a ligand-protein complex is a crucial aspect in determining biological effect in vivo. Despite its importance, the prediction of ligand koff still remains challenging for modern computational chemistry. We have developed aMetaD, a fast and generally applicable computational protocol to predict ligand-protein unbinding events using a molecular dynamics (MD) method based on adiabatic-bias MD and metadynamics. This physics-based, fully flexible, and pose-dependent ligand scoring function evaluates the maximum energy (RTscore) required to move the ligand from the bound-state energy basin to the next. Unbinding trajectories are automatically analyzed and translated into atomic solvation factor (SF) values representing the water dynamics during the unbinding event. This novel computational protocol was initially tested on two M3 muscarinic receptor and two adenosine A2A receptor antagonists and then evaluated on a test set of 12 CRF1R ligands. The resulting RTscores were used successfully to classify ligands with different residence times. Additionally, the SF analysis was used to detect key differences in the degree of accessibility to water molecules during the predicted ligand unbinding events. The protocol provides actionable working hypotheses that are applicable in a drug discovery program for the rational optimization of ligand binding kinetics.

  13. Evaluation of factors associated with second remission in dogs with lymphoma undergoing retreatment with a cyclophosphamide, doxorubicin, vincristine, and prednisone chemotherapy protocol: 95 cases (2000-2007).

    PubMed

    Flory, Andrea B; Rassnick, Kenneth M; Erb, Hollis N; Garrett, Laura D; Northrup, Nicole C; Selting, Kim A; Phillips, Brenda S; Locke, Jennifer E; Chretin, John D

    2011-02-15

    To evaluate factors associated with second remission in dogs with lymphoma retreated with a cyclophosphamide, doxorubicin, vincristine, and prednisone (CHOP) protocol after relapse following initial treatment with a first-line 6-month CHOP protocol. Retrospective case series. 95 dogs with lymphoma. Medical records were reviewed. Remission duration was estimated by use of the Kaplan-Meier method. Factors potentially associated with prognosis were examined. Median remission duration after the first-line CHOP protocol was 289 days (range, 150 to 1,457 days). Overall, 78% (95% confidence interval [CI], 69% to 86%) of dogs achieved a complete remission following retreatment, with a median second remission duration of 159 days (95% CI, 126 to 212 days). Duration of time off chemotherapy was associated with likelihood of response to retreatment; median time off chemotherapy was 140 days for dogs that achieved a complete remission after retreatment and 84 days for dogs that failed to respond to retreatment. Second remission duration was associated with remission duration after initial chemotherapy; median second remission duration for dogs with initial remission duration ≥ 289 days was 214 days (95% CI, 168 to 491 days), compared with 98 days (95% CI, 70 to 144 days) for dogs with initial remission duration < 289 days. Findings suggested that retreatment with the CHOP protocol can be effective in dogs with lymphoma that successfully complete an initial 6-month CHOP protocol.

  14. Evaluation and development the routing protocol of a fully functional simulation environment for VANETs

    NASA Astrophysics Data System (ADS)

    Ali, Azhar Tareq; Warip, Mohd Nazri Mohd; Yaakob, Naimah; Abduljabbar, Waleed Khalid; Atta, Abdu Mohammed Ali

    2017-11-01

    Vehicular Ad-hoc Networks (VANETs) is an area of wireless technologies that is attracting a great deal of interest. There are still several areas of VANETS, such as security and routing protocols, medium access control, that lack large amounts of research. There is also a lack of freely available simulators that can quickly and accurately simulate VANETs. The main goal of this paper is to develop a freely available VANETS simulator and to evaluate popular mobile ad-hoc network routing protocols in several VANETS scenarios. The VANETS simulator consisted of a network simulator, traffic (mobility simulator) and used a client-server application to keep the two simulators in sync. The VANETS simulator also models buildings to create a more realistic wireless network environment. Ad-Hoc Distance Vector routing (AODV), Dynamic Source Routing (DSR) and Dynamic MANET On-demand (DYMO) were initially simulated in a city, country, and highway environment to provide an overall evaluation.

  15. MatMRI and MatHIFU: software toolboxes for real-time monitoring and control of MR-guided HIFU

    PubMed Central

    2013-01-01

    Background The availability of open and versatile software tools is a key feature to facilitate pre-clinical research for magnetic resonance imaging (MRI) and magnetic resonance-guided high-intensity focused ultrasound (MR-HIFU) and expedite clinical translation of diagnostic and therapeutic medical applications. In the present study, two customizable software tools that were developed at the Thunder Bay Regional Research Institute are presented for use with both MRI and MR-HIFU. Both tools operate in a MATLAB®; environment. The first tool is named MatMRI and enables real-time, dynamic acquisition of MR images with a Philips MRI scanner. The second tool is named MatHIFU and enables the execution and dynamic modification of user-defined treatment protocols with the Philips Sonalleve MR-HIFU therapy system to perform ultrasound exposures in MR-HIFU therapy applications. Methods MatMRI requires four basic steps: initiate communication, subscribe to MRI data, query for new images, and unsubscribe. MatMRI can also pause/resume the imaging and perform real-time updates of the location and orientation of images. MatHIFU requires four basic steps: initiate communication, prepare treatment protocol, and execute treatment protocol. MatHIFU can monitor the state of execution and, if required, modify the protocol in real time. Results Four applications were developed to showcase the capabilities of MatMRI and MatHIFU to perform pre-clinical research. Firstly, MatMRI was integrated with an existing small animal MR-HIFU system (FUS Instruments, Toronto, Ontario, Canada) to provide real-time temperature measurements. Secondly, MatMRI was used to perform T2-based MR thermometry in the bone marrow. Thirdly, MatHIFU was used to automate acoustic hydrophone measurements on a per-element basis of the 256-element transducer of the Sonalleve system. Finally, MatMRI and MatHIFU were combined to produce and image a heating pattern that recreates the word ‘HIFU’ in a tissue-mimicking heating phantom. Conclusions MatMRI and MatHIFU leverage existing MRI and MR-HIFU clinical platforms to facilitate pre-clinical research. MatMRI substantially simplifies the real-time acquisition and processing of MR data. MatHIFU facilitates the testing and characterization of new therapy applications using the Philips Sonalleve clinical MR-HIFU system. Under coordination with Philips Healthcare, both MatMRI and MatHIFU are intended to be freely available as open-source software packages to other research groups. PMID:25512856

  16. Interoperability through standardization: Electronic mail, and X Window systems

    NASA Technical Reports Server (NTRS)

    Amin, Ashok T.

    1993-01-01

    Since the introduction of computing machines, there has been continual advances in computer and communication technologies and approaching limits. The user interface has evolved from a row of switches, character based interface using teletype terminals and then video terminals, to present day graphical user interface. It is expected that next significant advances will come in the availability of services, such as electronic mail and directory services, as the standards for applications are developed and in the 'easy to use' interfaces, such as Graphical User Interface for example Window and X Window, which are being standardized. Various proprietary electronic mail (email) systems are in use within organizations at each center of NASA. Each system provides email services to users within an organization, however the support for email services across organizations and across centers exists at centers to a varying degree and is often easy to use. A recent NASA email initiative is intended 'to provide a simple way to send email across organizational boundaries without disruption of installed base.' The initiative calls for integration of existing organizational email systems through gateways connected by a message switch, supporting X.400 and SMTP protocols, to create a NASA wide email system and for implementation of NASA wide email directory services based on OSI standard X.500. A brief overview of MSFC efforts as a part of this initiative are described. Window based graphical user interfaces make computers easy to use. X window protocol has been developed at Massachusetts Institute of Technology in 1984/1985 to provide uniform window based interface in a distributed computing environment with heterogenous computers. It has since become a standard supported by a number of major manufacturers. Z Windows systems, terminals and workstations, and X Window applications are becoming available. However impact of its use in the Local Area Network environment on the network traffic are not well understood. It is expected that the use of X Windows systems will increase at MSFC especially for Unix based systems. An overview of X Window protocol is presented and its impact on the network traffic is examined. It is proposed that an analytical model of X Window systems in the network environment be developed and validated through the use of measurements to generate application and user profiles.

  17. Satellite Communications Using Commercial Protocols

    NASA Technical Reports Server (NTRS)

    Ivancic, William D.; Griner, James H.; Dimond, Robert; Frantz, Brian D.; Kachmar, Brian; Shell, Dan

    2000-01-01

    NASA Glenn Research Center has been working with industry, academia, and other government agencies in assessing commercial communications protocols for satellite and space-based applications. In addition, NASA Glenn has been developing and advocating new satellite-friendly modifications to existing communications protocol standards. This paper summarizes recent research into the applicability of various commercial standard protocols for use over satellite and space- based communications networks as well as expectations for future protocol development. It serves as a reference point from which the detailed work can be readily accessed. Areas that will be addressed include asynchronous-transfer-mode quality of service; completed and ongoing work of the Internet Engineering Task Force; data-link-layer protocol development for unidirectional link routing; and protocols for aeronautical applications, including mobile Internet protocol routing for wireless/mobile hosts and the aeronautical telecommunications network protocol.

  18. The general theory of three-party quantum secret sharing protocols over phase-damping channels

    NASA Astrophysics Data System (ADS)

    Song, Ting-Ting; Wen, Qiao-Yan; Qin, Su-Juan; Zhang, Wei-Wei; Sun, Ying

    2013-10-01

    The general theory of three-party QSS protocols with the noisy quantum channels is discussed. When the particles are transmitted through the noisy quantum channels, the initial pure three-qubit tripartite entangled states would be changed into mixed states. We analyze the security of QSS protocols with the different kinds of three-qubit tripartite entangled states under phase-damping channels and figure out, for different kinds of initial states, the successful probabilities that Alice's secret can be recovered by legal agents are different. Comparing with one recent QSS protocol based on GHZ states, our scheme is secure, and has a little smaller key rate than that of the recent protocol.

  19. Wireless access to a pharmaceutical database: a demonstrator for data driven Wireless Application Protocol (WAP) applications in medical information processing.

    PubMed

    Schacht Hansen, M; Dørup, J

    2001-01-01

    The Wireless Application Protocol technology implemented in newer mobile phones has built-in facilities for handling much of the information processing needed in clinical work. To test a practical approach we ported a relational database of the Danish pharmaceutical catalogue to Wireless Application Protocol using open source freeware at all steps. We used Apache 1.3 web software on a Linux server. Data containing the Danish pharmaceutical catalogue were imported from an ASCII file into a MySQL 3.22.32 database using a Practical Extraction and Report Language script for easy update of the database. Data were distributed in 35 interrelated tables. Each pharmaceutical brand name was given its own card with links to general information about the drug, active substances, contraindications etc. Access was available through 1) browsing therapeutic groups and 2) searching for a brand name. The database interface was programmed in the server-side scripting language PHP3. A free, open source Wireless Application Protocol gateway to a pharmaceutical catalogue was established to allow dial-in access independent of commercial Wireless Application Protocol service providers. The application was tested on the Nokia 7110 and Ericsson R320s cellular phones. We have demonstrated that Wireless Application Protocol-based access to a dynamic clinical database can be established using open source freeware. The project opens perspectives for a further integration of Wireless Application Protocol phone functions in clinical information processing: Global System for Mobile communication telephony for bilateral communication, asynchronous unilateral communication via e-mail and Short Message Service, built-in calculator, calendar, personal organizer, phone number catalogue and Dictaphone function via answering machine technology. An independent Wireless Application Protocol gateway may be placed within hospital firewalls, which may be an advantage with respect to security. However, if Wireless Application Protocol phones are to become effective tools for physicians, special attention must be paid to the limitations of the devices. Input tools of Wireless Application Protocol phones should be improved, for instance by increased use of speech control.

  20. Wireless access to a pharmaceutical database: A demonstrator for data driven Wireless Application Protocol applications in medical information processing

    PubMed Central

    Hansen, Michael Schacht

    2001-01-01

    Background The Wireless Application Protocol technology implemented in newer mobile phones has built-in facilities for handling much of the information processing needed in clinical work. Objectives To test a practical approach we ported a relational database of the Danish pharmaceutical catalogue to Wireless Application Protocol using open source freeware at all steps. Methods We used Apache 1.3 web software on a Linux server. Data containing the Danish pharmaceutical catalogue were imported from an ASCII file into a MySQL 3.22.32 database using a Practical Extraction and Report Language script for easy update of the database. Data were distributed in 35 interrelated tables. Each pharmaceutical brand name was given its own card with links to general information about the drug, active substances, contraindications etc. Access was available through 1) browsing therapeutic groups and 2) searching for a brand name. The database interface was programmed in the server-side scripting language PHP3. Results A free, open source Wireless Application Protocol gateway to a pharmaceutical catalogue was established to allow dial-in access independent of commercial Wireless Application Protocol service providers. The application was tested on the Nokia 7110 and Ericsson R320s cellular phones. Conclusions We have demonstrated that Wireless Application Protocol-based access to a dynamic clinical database can be established using open source freeware. The project opens perspectives for a further integration of Wireless Application Protocol phone functions in clinical information processing: Global System for Mobile communication telephony for bilateral communication, asynchronous unilateral communication via e-mail and Short Message Service, built-in calculator, calendar, personal organizer, phone number catalogue and Dictaphone function via answering machine technology. An independent Wireless Application Protocol gateway may be placed within hospital firewalls, which may be an advantage with respect to security. However, if Wireless Application Protocol phones are to become effective tools for physicians, special attention must be paid to the limitations of the devices. Input tools of Wireless Application Protocol phones should be improved, for instance by increased use of speech control. PMID:11720946

  1. A research-based child welfare employee selection protocol: strengthening retention of the workforce.

    PubMed

    Ellett, Alberta J; Ellett, Chad D; Ellis, Jacquelyn; Lerner, Betsy

    2009-01-01

    This article describes the development and initial implementation of a new employee selection protocol (ESP) for child welfare grounded in the results of recent large-scale employee retention studies and a set of research-based, minimally essential knowledge, skills, abilities, and values. The complete ESP consists of a sequenced set of Web- and site-based assessment processes and procedures for potential applicants. Using the ESP, applicants and employers make informed decisions about the goodness of fit between the applicant and the demands of a career in child welfare. To date, the new ESP has been piloted in three Georgia Division of Family and Children Services (DFCS) regions and implemented by all nine colleges and universities participating in IV-E child welfare education programs. Evaluation data collected from students and new employees in one DFCS region strongly support the value of the ESP Web-based activities to make a more informed decision about whether to apply for the IV-E stipends and child welfare positions. Feedback from trained ESP assessors supports the value of various ESP activities. A major goal of implementing the ESP is to select more professionally committed and highly qualified applicants to strengthen employee retention and outcomes for children and families.

  2. Variability and Comprehensiveness of North American Online Available Physical Therapy Protocols Following Hip Arthroscopy for Femoroacetabular Impingement and Labral Repair.

    PubMed

    Cvetanovich, Gregory L; Lizzio, Vincent; Meta, Fabien; Chan, Derek; Zaltz, Ira; Nho, Shane J; Makhni, Eric C

    2017-11-01

    To assess comprehensiveness and variability of postoperative physical therapy protocols published online following hip arthroscopy for femoroacetabular impingement (FAI) and/or labral repair. Surgeons were identified by the International Society for Hip Arthroscopy "Find a Surgeon" feature in North America (http://www.isha.net/members/, search August 10, 2016). Exclusion criteria included nonsurgeons and protocols for conditions other than hip arthroscopy for FAI and/or labral tear. Protocols were identified by review of surgeons' personal and departmental websites and evaluated for postoperative restrictions, rehabilitation components, and the time points for ending restrictions and initiating activities. Of 111 surgeons available online, 31 (27.9%) had postoperative hip arthroscopy physical therapy protocols available online. Bracing was used in 54.8% (17/31) of protocols for median 2-week duration (range, 1-6 weeks). Most protocols specified the initial postoperative weight-bearing status (29/31, 93.5%), most frequently partial weight-bearing with 20 pounds foot flat (20/29, 69.0%). The duration of weight-bearing restriction was median 3 weeks (range, 2-6) for FAI and median 6 weeks (range, 3-8) for microfracture. The majority of protocols specified initial range of motion limitations (26/31, 83.9%) for median 3 weeks (range, 1.5-12). There was substantial variation in the rehabilitation activities and time points for initiating activities. Time to return to running was specified by 20/31 (64.5%) protocols at median 12 weeks (range, 6-19), and return to sport timing was specified by 13/31 (41.9%) protocols at median 15.5 weeks (range, 9-23). There is considerable variability in postoperative physical therapy protocols available online following hip arthroscopy for FAI, including postoperative restrictions, rehabilitation activities, and time points for activities. This information offers residents, fellows, and established hip arthroscopists a centralized comparison of publicly available physical therapy protocols following hip arthroscopy. Practicing arthroscopists might find this analysis useful to compare various therapy strategies to their own recommendations. The variability we report can also provide inspiration for future efficacy research toward a more standard rehabilitation. Copyright © 2017. Published by Elsevier Inc.

  3. The Alzheimer's Disease Neuroimaging Initiative (ADNI): MRI Methods

    PubMed Central

    Jack, Clifford R.; Bernstein, Matt A.; Fox, Nick C.; Thompson, Paul; Alexander, Gene; Harvey, Danielle; Borowski, Bret; Britson, Paula J.; Whitwell, Jennifer L.; Ward, Chadwick; Dale, Anders M.; Felmlee, Joel P.; Gunter, Jeffrey L.; Hill, Derek L.G.; Killiany, Ron; Schuff, Norbert; Fox-Bosetti, Sabrina; Lin, Chen; Studholme, Colin; DeCarli, Charles S.; Krueger, Gunnar; Ward, Heidi A.; Metzger, Gregory J.; Scott, Katherine T.; Mallozzi, Richard; Blezek, Daniel; Levy, Joshua; Debbins, Josef P.; Fleisher, Adam S.; Albert, Marilyn; Green, Robert; Bartzokis, George; Glover, Gary; Mugler, John; Weiner, Michael W.

    2008-01-01

    The Alzheimer's Disease Neuroimaging Initiative (ADNI) is a longitudinal multisite observational study of healthy elders, mild cognitive impairment (MCI), and Alzheimer's disease. Magnetic resonance imaging (MRI), (18F)-fluorode-oxyglucose positron emission tomography (FDG PET), urine serum, and cerebrospinal fluid (CSF) biomarkers, as well as clinical/psychometric assessments are acquiredat multiple time points. All data will be cross-linked and made available to the general scientific community. The purpose of this report is to describe the MRI methods employed in ADNI. The ADNI MRI core established specifications thatguided protocol development. A major effort was devoted toevaluating 3D T1-weighted sequences for morphometric analyses. Several options for this sequence were optimized for the relevant manufacturer platforms and then compared in a reduced-scale clinical trial. The protocol selected for the ADNI study includes: back-to-back 3D magnetization prepared rapid gradient echo (MP-RAGE) scans; B1-calibration scans when applicable; and an axial proton density-T2 dual contrast (i.e., echo) fast spin echo/turbo spin echo (FSE/TSE) for pathology detection. ADNI MRI methods seek to maximize scientific utility while minimizing the burden placed on participants. The approach taken in ADNI to standardization across sites and platforms of the MRI protocol, postacquisition corrections, and phantom-based monitoring of all scanners could be used as a model for other multisite trials. PMID:18302232

  4. The introduction of a protocol for the use of biobrane for facial burns in children.

    PubMed

    Rogers, A D; Adams, S; Rode, H

    2011-01-01

    BIOBRANE HAS BECOME AN INDISPENSIBLE DRESSING WITH THREE ESTABLISHED INDICATIONS IN ACUTE BURNS CARE AT OUR INSTITUTION: (1) as the definitive dressing of superficial partial thickness facial burns, (2) after tangential excision of deep burns when autograft or cadaver skin is unavailable, and (3) for graft reduction. This paper details our initial experience of Biobrane for the management of superficial partial thickness facial burns in children and the protocol that was compiled for its optimal use. A retrospective analysis of theatre records, case notes and photographs was performed to evaluate our experience with Biobrane over a one-year period. Endpoints included length of stay, analgesic requirements, time to application of Biobrane, healing times, and aesthetic results. Historical controls were used to compare the results with our previous standard of care. 87 patients with superficial partial thickness burns of the face had Biobrane applied during this period. By adhering to the protocol we were able to demonstrate significant reductions in hospital stay, healing time, analgesic requirements, nursing care, with excellent cosmetic results. The protocol is widely accepted by all involved in the optimal management of these patients, including parents, anaesthetists, and nursing staff.

  5. Safety of a DVT chemoprophylaxis protocol following traumatic brain injury: a single center quality improvement initiative.

    PubMed

    Nickele, Christopher M; Kamps, Timothy K; Medow, Joshua E

    2013-04-01

    Venous thromboembolism (VTE) is a complication that affects approximately 30 % of moderate and severe traumatic brain injury (TBI) patients when pharmacologic prophylaxis is not used. Following TBI, specifically in the case of contusions, the safety and efficacy of pharmacologic thromboembolism prophylaxis (PTP) has been studied only in small sample sizes. In this study, we attempt to assess the safety and efficacy of a PTP protocol for TBI patients, as a quality improvement (QI) initiative, in the neuroscience intensive care unit (NSICU). Between January 1st and December 31st, 2009, consecutive patients discharged from the University of Wisconsin NSICU after >a 48 h minimum stay were evaluated as part of a QI project. A protocol for the initiation of PTP was designed and implemented for NSICU patients. The protocol did not vary based on type of intracranial injury. The rate of VTE was reported as was heparin-induced thrombocytopenia and PTP-related expansion of intracranial hemorrhage (IH) requiring reoperation. The number of patients receiving PTP and the timing of therapy were tracked. Patients were excluded for persistent coagulopathy, other organ system bleeding (such as the gastrointestinal tract), or pregnancy. Faculty could opt out of the protocol without reason. Using the same criteria, patients discharged during the preceding 6 months, from July 1st to December 31st, 2008, were evaluated as controls as the PTP protocol was not in effect during this time. During the control period, there were 48 head trauma admissions who met the inclusion criteria. In 22 patients (45.8 %), PTP was initiated at an average of 4.9 ± 5.4 days after admission. During the protocol period, there were 87 head trauma admissions taken from 1,143 total NSICU stays who met criteria. In 63 patients (72.4 %), the care team in the NSICU successfully initiated PTP, at an average of 3.4 ± 2.8 days after admission. All 87 trauma patients were analyzed, and the rate of clinically significant deep venous thrombosis (DVT) was 6.9 % (6 of 87). Three protocol patients (3.45 %) went to the operating room for surgery after the initiation of PTP; none of these patients had a measurable change in hemorrhage size on head CT. The change in percentage of patients receiving PTP was significantly increased by the protocol (p < 0.0001); while the average days to first PTP dose trended down with institution of the protocol, this change was not statistically significant. A PTP protocol in the NSICU is useful in controlling the number of complications from DVT and pulmonary embolism while avoiding additional IH. This protocol, based on a published body of literature, allowed for VTE rates similar to published rates, while having no PTP-related hemorrhage expansion. The protocol significantly changed physician behavior, increasing the percentage of patients receiving PTP during their hospitalization; whether long-term patient outcomes are affected is a potential goal for future study.

  6. Persistence of initial conditions in continental scale air quality ...

    EPA Pesticide Factsheets

    This study investigates the effect of initial conditions (IC) for pollutant concentrations in the atmosphere and soil on simulated air quality for two continental-scale Community Multiscale Air Quality (CMAQ) model applications. One of these applications was performed for springtime and the second for summertime. Results show that a spin-up period of ten days commonly used in regional-scale applications may not be sufficient to reduce the effects of initial conditions to less than 1% of seasonally-averaged surface ozone concentrations everywhere while 20 days were found to be sufficient for the entire domain for the spring case and almost the entire domain for the summer case. For the summer case, differences were found to persist longer aloft due to circulation of air masses and even a spin-up period of 30 days was not sufficient to reduce the effects of ICs to less than 1% of seasonally-averaged layer 34 ozone concentrations over the southwestern portion of the modeling domain. Analysis of the effect of soil initial conditions for the CMAQ bidirectional NH3 exchange model shows that during springtime they can have an important effect on simulated inorganic aerosols concentrations for time periods of one month or longer. The effects are less pronounced during other seasons. The results, while specific to the modeling domain and time periods simulated here, suggest that modeling protocols need to be scrutinized for a given application and that it cannot be assum

  7. Robust Sub-nanomolar Library Preparation for High Throughput Next Generation Sequencing.

    PubMed

    Wu, Wells W; Phue, Je-Nie; Lee, Chun-Ting; Lin, Changyi; Xu, Lai; Wang, Rong; Zhang, Yaqin; Shen, Rong-Fong

    2018-05-04

    Current library preparation protocols for Illumina HiSeq and MiSeq DNA sequencers require ≥2 nM initial library for subsequent loading of denatured cDNA onto flow cells. Such amounts are not always attainable from samples having a relatively low DNA or RNA input; or those for which a limited number of PCR amplification cycles is preferred (less PCR bias and/or more even coverage). A well-tested sub-nanomolar library preparation protocol for Illumina sequencers has however not been reported. The aim of this study is to provide a much needed working protocol for sub-nanomolar libraries to achieve outcomes as informative as those obtained with the higher library input (≥ 2 nM) recommended by Illumina's protocols. Extensive studies were conducted to validate a robust sub-nanomolar (initial library of 100 pM) protocol using PhiX DNA (as a control), genomic DNA (Bordetella bronchiseptica and microbial mock community B for 16S rRNA gene sequencing), messenger RNA, microRNA, and other small noncoding RNA samples. The utility of our protocol was further explored for PhiX library concentrations as low as 25 pM, which generated only slightly fewer than 50% of the reads achieved under the standard Illumina protocol starting with > 2 nM. A sub-nanomolar library preparation protocol (100 pM) could generate next generation sequencing (NGS) results as robust as the standard Illumina protocol. Following the sub-nanomolar protocol, libraries with initial concentrations as low as 25 pM could also be sequenced to yield satisfactory and reproducible sequencing results.

  8. Matching initial torque with different stimulation parameters influences skeletal muscle fatigue.

    PubMed

    Bickel, C Scott; Gregory, Chris M; Azuero, Andres

    2012-01-01

    A fundamental barrier to using electrical stimulation in the clinical setting is an inability to maintain torque production secondary to muscle fatigue. Electrical stimulation parameters are manipulated to influence muscle torque production, and they may also influence fatigability during repetitive stimulation. Our purpose was to determine the response of the quadriceps femoris to three different fatigue protocols using the same initial torque obtained by altering stimulator parameter settings. Participants underwent fatigue protocols in which either pulse frequency (lowHz), pulse duration (lowPD), or voltage (lowV) was manipulated to obtain an initial torque that equaled 25% of maximum voluntary isometric contraction. Muscle soreness was reported on a visual analog scale 48 h after each fatigue test. The lowHz protocol resulted in the least fatigue (25% +/- 14%); the lowPD (50% +/- 13%) and lowV (48% +/- 14%) protocols had similar levels of fatigue. The lowHz protocol resulted in significantly less muscle soreness than the higher frequency protocols. Stimulation protocols that use a lower frequency coupled with long pulse durations and high voltages result in lesser amounts of muscle fatigue and perceived soreness. The identification of optimal stimulation patterns to maximize muscle performance will reduce the effect of muscle fatigue and potentially improve clinical efficacy.

  9. A Receiver-Initiated Collision-Avoidance Protocol for Multi-Channel Networks

    DTIC Science & Technology

    2001-01-01

    00-00-2001 to 00-00-2001 4. TITLE AND SUBTITLE A Receiver-Initiated Collision-Avoidance Protocol for Multi-Channel Netowrks 5a. CONTRACT NUMBER...images. 14. ABSTRACT 15. SUBJECT TERMS 16. SECURITY CLASSIFICATION OF: 17. LIMITATION OF ABSTRACT 18. NUMBER OF PAGES 10 19a. NAME OF RESPONSIBLE

  10. Closed Conference Signalling Using the Session Initiation Protocol.

    ERIC Educational Resources Information Center

    Miladinovic, Igor; Stadler, Johannes

    2003-01-01

    Introduces an extension of the Session Initiation Protocol (SIP) for closed multiparty conferences; the extension expands SIP for discovery of participant identities in a conference, and ensures that each participant is notified before a new participant joins. Verifies this extension by applying it to two SIP conference models. Concludes with an…

  11. Model based verification of the Secure Socket Layer (SSL) Protocol for NASA systems

    NASA Technical Reports Server (NTRS)

    Powell, John D.; Gilliam, David

    2004-01-01

    The National Aeronautics and Space Administration (NASA) has tens of thousands of networked computer systems and applications. Software Security vulnerabilities present risks such as lost or corrupted data, information theft, and unavailability of critical systems. These risks represent potentially enormous costs to NASA. The NASA Code Q research initiative 'Reducing Software Security Risk (RSSR) Trough an Integrated Approach' offers formal verification of information technology (IT), through the creation of a Software Security Assessment Instrument (SSAI), to address software security risks.

  12. Gossip algorithms in quantum networks

    NASA Astrophysics Data System (ADS)

    Siomau, Michael

    2017-01-01

    Gossip algorithms is a common term to describe protocols for unreliable information dissemination in natural networks, which are not optimally designed for efficient communication between network entities. We consider application of gossip algorithms to quantum networks and show that any quantum network can be updated to optimal configuration with local operations and classical communication. This allows to speed-up - in the best case exponentially - the quantum information dissemination. Irrespective of the initial configuration of the quantum network, the update requiters at most polynomial number of local operations and classical communication.

  13. Ultrasmall iron oxide nanoparticles for biomedical applications: improving the colloidal and magnetic properties.

    PubMed

    Costo, Rocio; Bello, Valentina; Robic, Caroline; Port, Marc; Marco, Jose F; Puerto Morales, M; Veintemillas-Verdaguer, Sabino

    2012-01-10

    A considerable increase in the saturation magnetization, M(s) (40%), and initial susceptibility of ultrasmall (<5 nm) iron oxide nanoparticles prepared by laser pyrolysis was obtained through an optimized acid treatment. Moreover, a significant enhancement in the colloidal properties, such as smaller aggregate sizes in aqueous media and increased surface charge densities, was found after this chemical protocol. The results are consistent with a reduction in nanoparticle surface disorder induced by a dissolution-recrystallization mechanism.

  14. Continuous Subcutaneous Insulin Infusion in Children: A Pilot Study Validating a Protocol to Avoid Hypoglycemia at Initiation.

    PubMed

    Manousaki, Despoina; Deladoëy, Johnny; Geoffroy, Louis; Olivier, Patricia

    2017-01-01

    The occurrence of hypoglycemia and hyperglycemia during the first days after transition to continuous subcutaneous insulin infusion (CSII) in patients with type 1 diabetes has not been systematically studied in children. The aim of this prospective study was to demonstrate that the protocol applied in our diabetes clinic is safe at CSII initiation in children. We assessed 22 pediatric patients with type 1 diabetes, using continuous glucose monitoring (CGM) before and after CSII initiation (±3 days). After CSII initiation, there was no difference in the rates of hypoglycemic events expressed as relative rates (RRs) per person-reading (RR = 0.85, p  = 0.52, 95% CI 0.52-1.39), as well as in the number of prolonged hypoglycemic events (>1 h) per day (RR = 1.12, p  = 0.56, 95% CI 0.75-1.68). We observed only a trend toward prolonged episodes of hyperglycemia after pump initiation (RR = 1.52, p  = 0.06, 95% CI 0.97-2.35). Our study is the first to assess, through CGM and in a prospective way, the impact of a CSII initiation protocol on glycemic values. Our protocol provides a safe model to avoid hypoglycemia at CSII initiation in children. www.ClinicalTrials.gov, identifier NCT01840358.

  15. An Enhanced LoRaWAN Security Protocol for Privacy Preservation in IoT with a Case Study on a Smart Factory-Enabled Parking System.

    PubMed

    You, Ilsun; Kwon, Soonhyun; Choudhary, Gaurav; Sharma, Vishal; Seo, Jung Taek

    2018-06-08

    The Internet of Things (IoT) utilizes algorithms to facilitate intelligent applications across cities in the form of smart-urban projects. As the majority of devices in IoT are battery operated, their applications should be facilitated with a low-power communication setup. Such facility is possible through the Low-Power Wide-Area Network (LPWAN), but at a constrained bit rate. For long-range communication over LPWAN, several approaches and protocols are adopted. One such protocol is the Long-Range Wide Area Network (LoRaWAN), which is a media access layer protocol for long-range communication between the devices and the application servers via LPWAN gateways. However, LoRaWAN comes with fewer security features as a much-secured protocol consumes more battery because of the exorbitant computational overheads. The standard protocol fails to support end-to-end security and perfect forward secrecy while being vulnerable to the replay attack that makes LoRaWAN limited in supporting applications where security (especially end-to-end security) is important. Motivated by this, an enhanced LoRaWAN security protocol is proposed, which not only provides the basic functions of connectivity between the application server and the end device, but additionally averts these listed security issues. The proposed protocol is developed with two options, the Default Option (DO) and the Security-Enhanced Option (SEO). The protocol is validated through Burrows⁻Abadi⁻Needham (BAN) logic and the Automated Validation of Internet Security Protocols and Applications (AVISPA) tool. The proposed protocol is also analyzed for overheads through system-based and low-power device-based evaluations. Further, a case study on a smart factory-enabled parking system is considered for its practical application. The results, in terms of network latency with reliability fitting and signaling overheads, show paramount improvements and better performance for the proposed protocol compared with the two handshake options, Pre-Shared Key (PSK) and Elliptic Curve Cryptography (ECC), of Datagram Transport Layer Security (DTLS).

  16. Update on the magnetic resonance imaging core of the Alzheimer's disease neuroimaging initiative.

    PubMed

    Jack, Clifford R; Bernstein, Matt A; Borowski, Bret J; Gunter, Jeffrey L; Fox, Nick C; Thompson, Paul M; Schuff, Norbert; Krueger, Gunnar; Killiany, Ronald J; Decarli, Charles S; Dale, Anders M; Carmichael, Owen W; Tosun, Duygu; Weiner, Michael W

    2010-05-01

    Functions of the Alzheimer's Disease Neuroimaging Initiative (ADNI) magnetic resonance imaging (MRI) core fall into three categories: (1) those of the central MRI core laboratory at Mayo Clinic, Rochester, Minnesota, needed to generate high quality MRI data in all subjects at each time point; (2) those of the funded ADNI MRI core imaging analysis groups responsible for analyzing the MRI data; and (3) the joint function of the entire MRI core in designing and problem solving MR image acquisition, pre-processing, and analyses methods. The primary objective of ADNI was and continues to be improving methods for clinical trials in Alzheimer's disease. Our approach to the present ("ADNI-GO") and future ("ADNI-2," if funded) MRI protocol will be to maintain MRI methodological consistency in the previously enrolled "ADNI-1" subjects who are followed up longitudinally in ADNI-GO and ADNI-2. We will modernize and expand the MRI protocol for all newly enrolled ADNI-GO and ADNI-2 subjects. All newly enrolled subjects will be scanned at 3T with a core set of three sequence types: 3D T1-weighted volume, FLAIR, and a long TE gradient echo volumetric acquisition for micro hemorrhage detection. In addition to this core ADNI-GO and ADNI-2 protocol, we will perform vendor-specific pilot sub-studies of arterial spin-labeling perfusion, resting state functional connectivity, and diffusion tensor imaging. One of these sequences will be added to the core protocol on systems from each MRI vendor. These experimental sub-studies are designed to demonstrate the feasibility of acquiring useful data in a multicenter (but single vendor) setting for these three emerging MRI applications. Copyright 2010 The Alzheimer

  17. Standardizing data exchange for clinical research protocols and case report forms: An assessment of the suitability of the Clinical Data Interchange Standards Consortium (CDISC) Operational Data Model (ODM).

    PubMed

    Huser, Vojtech; Sastry, Chandan; Breymaier, Matthew; Idriss, Asma; Cimino, James J

    2015-10-01

    Efficient communication of a clinical study protocol and case report forms during all stages of a human clinical study is important for many stakeholders. An electronic and structured study representation format that can be used throughout the whole study life-span can improve such communication and potentially lower total study costs. The most relevant standard for representing clinical study data, applicable to unregulated as well as regulated studies, is the Operational Data Model (ODM) in development since 1999 by the Clinical Data Interchange Standards Consortium (CDISC). ODM's initial objective was exchange of case report forms data but it is increasingly utilized in other contexts. An ODM extension called Study Design Model, introduced in 2011, provides additional protocol representation elements. Using a case study approach, we evaluated ODM's ability to capture all necessary protocol elements during a complete clinical study lifecycle in the Intramural Research Program of the National Institutes of Health. ODM offers the advantage of a single format for institutions that deal with hundreds or thousands of concurrent clinical studies and maintain a data warehouse for these studies. For each study stage, we present a list of gaps in the ODM standard and identify necessary vendor or institutional extensions that can compensate for such gaps. The current version of ODM (1.3.2) has only partial support for study protocol and study registration data mainly because it is outside the original development goal. ODM provides comprehensive support for representation of case report forms (in both the design stage and with patient level data). Inclusion of requirements of observational, non-regulated or investigator-initiated studies (outside Food and Drug Administration (FDA) regulation) can further improve future revisions of the standard. Published by Elsevier Inc.

  18. Strategies for Achieving High Sequencing Accuracy for Low Diversity Samples and Avoiding Sample Bleeding Using Illumina Platform

    PubMed Central

    Mitra, Abhishek; Skrzypczak, Magdalena; Ginalski, Krzysztof; Rowicka, Maga

    2015-01-01

    Sequencing microRNA, reduced representation sequencing, Hi-C technology and any method requiring the use of in-house barcodes result in sequencing libraries with low initial sequence diversity. Sequencing such data on the Illumina platform typically produces low quality data due to the limitations of the Illumina cluster calling algorithm. Moreover, even in the case of diverse samples, these limitations are causing substantial inaccuracies in multiplexed sample assignment (sample bleeding). Such inaccuracies are unacceptable in clinical applications, and in some other fields (e.g. detection of rare variants). Here, we discuss how both problems with quality of low-diversity samples and sample bleeding are caused by incorrect detection of clusters on the flowcell during initial sequencing cycles. We propose simple software modifications (Long Template Protocol) that overcome this problem. We present experimental results showing that our Long Template Protocol remarkably increases data quality for low diversity samples, as compared with the standard analysis protocol; it also substantially reduces sample bleeding for all samples. For comprehensiveness, we also discuss and compare experimental results from alternative approaches to sequencing low diversity samples. First, we discuss how the low diversity problem, if caused by barcodes, can be avoided altogether at the barcode design stage. Second and third, we present modified guidelines, which are more stringent than the manufacturer’s, for mixing low diversity samples with diverse samples and lowering cluster density, which in our experience consistently produces high quality data from low diversity samples. Fourth and fifth, we present rescue strategies that can be applied when sequencing results in low quality data and when there is no more biological material available. In such cases, we propose that the flowcell be re-hybridized and sequenced again using our Long Template Protocol. Alternatively, we discuss how analysis can be repeated from saved sequencing images using the Long Template Protocol to increase accuracy. PMID:25860802

  19. New Generation Sensor Web Enablement

    PubMed Central

    Bröring, Arne; Echterhoff, Johannes; Jirka, Simon; Simonis, Ingo; Everding, Thomas; Stasch, Christoph; Liang, Steve; Lemmens, Rob

    2011-01-01

    Many sensor networks have been deployed to monitor Earth’s environment, and more will follow in the future. Environmental sensors have improved continuously by becoming smaller, cheaper, and more intelligent. Due to the large number of sensor manufacturers and differing accompanying protocols, integrating diverse sensors into observation systems is not straightforward. A coherent infrastructure is needed to treat sensors in an interoperable, platform-independent and uniform way. The concept of the Sensor Web reflects such a kind of infrastructure for sharing, finding, and accessing sensors and their data across different applications. It hides the heterogeneous sensor hardware and communication protocols from the applications built on top of it. The Sensor Web Enablement initiative of the Open Geospatial Consortium standardizes web service interfaces and data encodings which can be used as building blocks for a Sensor Web. This article illustrates and analyzes the recent developments of the new generation of the Sensor Web Enablement specification framework. Further, we relate the Sensor Web to other emerging concepts such as the Web of Things and point out challenges and resulting future work topics for research on Sensor Web Enablement. PMID:22163760

  20. An application protocol for CAD to CAD transfer of electronic information

    NASA Technical Reports Server (NTRS)

    Azu, Charles C., Jr.

    1993-01-01

    The exchange of Computer Aided Design (CAD) information between dissimilar CAD systems is a problem. This is especially true for transferring electronics CAD information such as multi-chip module (MCM), hybrid microcircuit assembly (HMA), and printed circuit board (PCB) designs. Currently, there exists several neutral data formats for transferring electronics CAD information. These include IGES, EDIF, and DXF formats. All these formats have limitations for use in exchanging electronic data. In an attempt to overcome these limitations, the Navy's MicroCIM program implemented a project to transfer hybrid microcircuit design information between dissimilar CAD systems. The IGES (Initial Graphics Exchange Specification) format is used since it is well established within the CAD industry. The goal of the project is to have a complete transfer of microelectronic CAD information, using IGES, without any data loss. An Application Protocol (AP) is being developed to specify how hybrid microcircuit CAD information will be represented by IGES entity constructs. The AP defines which IGES data items are appropriate for describing HMA geometry, connectivity, and processing as well as HMA material characteristics.

  1. Minimizing variance in pediatric gastrostomy: does standardized perioperative feeding plan decrease cost and improve outcomes?

    PubMed

    Sunstrom, Rachel; Hamilton, Nicholas; Fialkowski, Elizabeth; Lofberg, Katrine; McKee, Julie; Sims, Thomas; Krishnaswami, Sanjay; Azarow, Kenneth

    2016-05-01

    A protocol for laparoscopic gastrostomy placement was implemented which specified perioperative antibiotics, feeding regimens, and discharge criteria. Our hypothesis was that hospital cost could be decreased, whereas at the same time improving or maintaining patient outcomes. Data were collected on consecutive patients beginning 6 months after implementation of our protocol. We recorded surgeon compliance, patient outcomes (as defined by 30-day NSQIP complication rates), and cost of initial hospitalization, which was then compare to a 6-month historical control period. Our control group n = 26 and protocol group n = 39. Length of stay was shorter in the protocol group (P ≤ .05 by nonparametric analysis). The complication rate was similar in both groups (23% control vs 15% protocol, P = .43). Initial hospital costs were not different. Surgeon compliance to protocol was 82%. A standard protocol is achievable for gastrostomy tube management. After implementation of our protocol, we were able to show a significant decrease in length of stay, whereas maintaining quality. Copyright © 2016 Elsevier Inc. All rights reserved.

  2. An evaluation plan of bus architectures and protocols using the NASA Ames intelligent redundant actuation system

    NASA Technical Reports Server (NTRS)

    Defeo, P.; Chen, M.

    1987-01-01

    Means for evaluating data bus architectures and protocols for highly integrated flight control system applications are needed. Described are the criteria and plans to do this by using the NASA/Ames Intelligent Redundant Actuation System (IRAS) experimental set-up. Candidate bus architectures differ from one another in terms of: topology, access control, message transfer schemes, message characteristics, initialization. data flow control, transmission rates, fault tolerance, and time synchronization. The evaluation criteria are developed relative to these features. A preliminary, analytical evaluation of four candidate busses (MIL-STD-1553B, DATAC, Ethernet, and HSIS) is described. A bus must be exercised in a real-time environment to evaluate its dynamic characteristics. A plan for real-time evaluation of these four busses using a combination of hardware and simulation techniques is presented.

  3. Asynchronous Messaging and Data Transfer in a Spacecraft: An Implementation

    NASA Technical Reports Server (NTRS)

    Moholt, Joseph M.

    2005-01-01

    Data transfer and messaging is an important part of a spacecraft. Creating a standard protocol for messaging that can be used for a variety of applications is an extremely beneficial project at the Jet Propulsion Laboratory (JPL). The Asynchronous Messaging Service (AMS) is a protocol outlining how subsystems initialize and conduct communication between each other. There are currently two implementations of AMS in the works. At JPL, my task is to get a working implementation of AMS onto vxWorks as a proof of concept. An Autocoder, a program used to convert visually created state chart diagrams to C++, has also been created to accomplish a part of the implementation. I was assigned to make the program portable on any Unix type environment. Lastly, I was to develop a program to demonstrate messaging between two FireWire cards running vxworks.

  4. Persistence of initial conditions in continental scale air quality simulations

    NASA Astrophysics Data System (ADS)

    Hogrefe, Christian; Roselle, Shawn J.; Bash, Jesse O.

    2017-07-01

    This study investigates the effect of initial conditions (IC) for pollutant concentrations in the atmosphere and soil on simulated air quality for two continental-scale Community Multiscale Air Quality (CMAQ) model applications. One of these applications was performed for springtime and the second for summertime. Results show that a spin-up period of ten days commonly used in regional-scale applications may not be sufficient to reduce the effects of initial conditions to less than 1% of seasonally-averaged surface ozone concentrations everywhere while 20 days were found to be sufficient for the entire domain for the spring case and almost the entire domain for the summer case. For the summer case, differences were found to persist longer aloft due to circulation of air masses and even a spin-up period of 30 days was not sufficient to reduce the effects of ICs to less than 1% of seasonally-averaged layer 34 ozone concentrations over the southwestern portion of the modeling domain. Analysis of the effect of soil initial conditions for the CMAQ bidirectional NH3 exchange model shows that during springtime they can have an important effect on simulated inorganic aerosols concentrations for time periods of one month or longer. The effects are less pronounced during other seasons. The results, while specific to the modeling domain and time periods simulated here, suggest that modeling protocols need to be scrutinized for a given application and that it cannot be assumed that commonly-used spin-up periods are necessarily sufficient to reduce the effects of initial conditions on model results to an acceptable level. What constitutes an acceptable level of difference cannot be generalized and will depend on the particular application, time period and species of interest. Moreover, as the application of air quality models is being expanded to cover larger geographical domains and as these models are increasingly being coupled with other modeling systems to better represent air-surface-water exchanges, the effects of model initialization in such applications needs to be studied in future work.

  5. Electronic Thesis Initiative: Pilot Project of McGill University, Montreal

    ERIC Educational Resources Information Center

    Park, Eun G.; Zou, Qing; McKnight, David

    2007-01-01

    Purpose: To set up a protocol for electronic thesis and dissertation (ETD) submission for the electronic thesis initiative pilot project at McGill University in Montreal, Canada. Design/methodology/approach: An electronic thesis and dissertation submission protocol was implemented and tested. To test authoring tools, we had 50 students submit…

  6. SPOT: Optimization Tool for Network Adaptable Security

    NASA Astrophysics Data System (ADS)

    Ksiezopolski, Bogdan; Szalachowski, Pawel; Kotulski, Zbigniew

    Recently we have observed the growth of the intelligent application especially with its mobile character, called e-anything. The implementation of these applications provides guarantee of security requirements of the cryptographic protocols which are used in the application. Traditionally the protocols have been configured with the strongest possible security mechanisms. Unfortunately, when the application is used by means of the mobile devices, the strongest protection can lead to the denial of services for them. The solution of this problem is introducing the quality of protection models which will scale the protection level depending on the actual threat level. In this article we would like to introduce the application which manages the protection level of the processes in the mobile environment. The Security Protocol Optimizing Tool (SPOT) optimizes the cryptographic protocol and defines the protocol version appropriate to the actual threat level. In this article the architecture of the SPOT is presented with a detailed description of the included modules.

  7. Test Protocols for Advanced Inverter Interoperability Functions – Main Document

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Johnson, Jay Dean; Gonzalez, Sigifredo; Ralph, Mark E.

    2013-11-01

    Distributed energy resources (DER) such as photovoltaic (PV) systems, when deployed in a large scale, are capable of influencing significantly the operation of power systems. Looking to the future, stakeholders are working on standards to make it possible to manage the potentially complex interactions between DER and the power system. In 2009, the Electric Power Research Institute (EPRI), Sandia National Laboratories (SNL) with the U.S. Department of Energy (DOE), and the Solar Electric Power Association (SEPA) initiated a large industry collaborative to identify and standardize definitions for a set of DER grid support functions. While the initial effort concentrated onmore » grid-tied PV inverters and energy storage systems, the concepts have applicability to all DER. A partial product of this on-going effort is a reference definitions document (IEC TR 61850-90-7, Object models for power converters in distributed energy resources (DER) systems) that has become a basis for expansion of related International Electrotechnical Commission (IEC) standards, and is supported by US National Institute of Standards and Technology (NIST) Smart Grid Interoperability Panel (SGIP). Some industry-led organizations advancing communications protocols have also embraced this work. As standards continue to evolve, it is necessary to develop test protocols to independently verify that the inverters are properly executing the advanced functions. Interoperability is assured by establishing common definitions for the functions and a method to test compliance with operational requirements. This document describes test protocols developed by SNL to evaluate the electrical performance and operational capabilities of PV inverters and energy storage, as described in IEC TR 61850-90-7. While many of these functions are not currently required by existing grid codes or may not be widely available commercially, the industry is rapidly moving in that direction. Interoperability issues are already apparent as some of these inverter capabilities are being incorporated in large demonstration and commercial projects. The test protocols are intended to be used to verify acceptable performance of inverters within the standard framework described in IEC TR 61850-90-7. These test protocols, as they are refined and validated over time, can become precursors for future certification test procedures for DER advanced grid support functions.« less

  8. Test Protocols for Advanced Inverter Interoperability Functions - Appendices

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Johnson, Jay Dean; Gonzalez, Sigifredo; Ralph, Mark E.

    2013-11-01

    Distributed energy resources (DER) such as photovoltaic (PV) systems, when deployed in a large scale, are capable of influencing significantly the operation of power systems. Looking to the future, stakeholders are working on standards to make it possible to manage the potentially complex interactions between DER and the power system. In 2009, the Electric Power Research Institute (EPRI), Sandia National Laboratories (SNL) with the U.S. Department of Energy (DOE), and the Solar Electric Power Association (SEPA) initiated a large industry collaborative to identify and standardize definitions for a set of DER grid support functions. While the initial effort concentrated onmore » grid-tied PV inverters and energy storage systems, the concepts have applicability to all DER. A partial product of this on-going effort is a reference definitions document (IEC TR 61850-90-7, Object models for power converters in distributed energy resources (DER) systems) that has become a basis for expansion of related International Electrotechnical Commission (IEC) standards, and is supported by US National Institute of Standards and Technology (NIST) Smart Grid Interoperability Panel (SGIP). Some industry-led organizations advancing communications protocols have also embraced this work. As standards continue to evolve, it is necessary to develop test protocols to independently verify that the inverters are properly executing the advanced functions. Interoperability is assured by establishing common definitions for the functions and a method to test compliance with operational requirements. This document describes test protocols developed by SNL to evaluate the electrical performance and operational capabilities of PV inverters and energy storage, as described in IEC TR 61850-90-7. While many of these functions are not now required by existing grid codes or may not be widely available commercially, the industry is rapidly moving in that direction. Interoperability issues are already apparent as some of these inverter capabilities are being incorporated in large demonstration and commercial projects. The test protocols are intended to be used to verify acceptable performance of inverters within the standard framework described in IEC TR 61850-90-7. These test protocols, as they are refined and validated over time, can become precursors for future certification test procedures for DER advanced grid support functions.« less

  9. Application Level Protocol Development for Library and Information Science Applications. Volume 1: Service Definition. Volume 2: Protocol Specification. Report No. TG.1.5; TG.50.

    ERIC Educational Resources Information Center

    Aagaard, James S.; And Others

    This two-volume document specifies a protocol that was developed using the Reference Model for Open Systems Interconnection (OSI), which provides a framework for communications within a heterogeneous network environment. The protocol implements the features necessary for bibliographic searching, record maintenance, and mail transfer between…

  10. A universal data access and protocol integration mechanism for smart home

    NASA Astrophysics Data System (ADS)

    Shao, Pengfei; Yang, Qi; Zhang, Xuan

    2013-03-01

    With the lack of standardized or completely missing communication interfaces in home electronics, there is no perfect solution to address every aspect in smart homes based on existing protocols and technologies. In addition, the central control unit (CCU) of smart home system working point-to-point between the multiple application interfaces and the underlying hardware interfaces leads to its complicated architecture and unpleasant performance. A flexible data access and protocol integration mechanism is required. The current paper offers a universal, comprehensive data access and protocol integration mechanism for a smart home. The universal mechanism works as a middleware adapter with unified agreements of the communication interfaces and protocols, offers an abstraction of the application level from the hardware specific and decoupling the hardware interface modules from the application level. Further abstraction for the application interfaces and the underlying hardware interfaces are executed based on adaption layer to provide unified interfaces for more flexible user applications and hardware protocol integration. This new universal mechanism fundamentally changes the architecture of the smart home and in some way meets the practical requirement of smart homes more flexible and desirable.

  11. A study of the effectiveness of particulate cleaning protocols on intentionally contaminated niobium surfaces

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Reece, Charles E.; Ciancio, Elizabeth J.; Keyes, Katharine A.

    2009-11-01

    Particulate contamination on the surface of SRF cavities limits their performance via the enhanced generation of field-emitted electrons. Considerable efforts are expended to actively clean and avoid such contamination on niobium surfaces. The protocols in active use have been developed via feedback from cavity testing. This approach has the risk of over-conservatively ratcheting an ever increasing complexity of methods tied to particular circumstances. A complementary and perhaps helpful approach is to quantitatively assess the effectiveness of candidate methods at removing intentional representative particulate contamination. Toward this end, we developed a standardized contamination protocol using water suspensions of Nb{sub 2}O{sub 5}more » and SS 316 powders applied to BCP’d surfaces of standardized niobium samples yielding particle densities of order 200 particles/mm{sup 2}. From these starting conditions, controlled application of high pressure water rinse, ultrasonic cleaning, or CO{sub 2} snow jet cleaning was applied and the resulting surfaces examined via SEM/scanning EDS with particle recognition software. Results of initial parametric variations of each will be reported.« less

  12. Effectiveness of Serious Games for Leap Motion on the Functionality of the Upper Limb in Parkinson's Disease: A Feasibility Study.

    PubMed

    Oña, Edwin Daniel; Balaguer, Carlos; Cano-de la Cuerda, Roberto; Collado-Vázquez, Susana; Jardón, Alberto

    2018-01-01

    The design and application of Serious Games (SG) based on the Leap Motion sensor are presented as a tool to support the rehabilitation therapies for upper limbs. Initially, the design principles and their implementation are described, focusing on improving both unilateral and bilateral manual dexterity and coordination. The design of the games has been supervised by specialized therapists. To assess the therapeutic effectiveness of the proposed system, a protocol of trials with Parkinson's patients has been defined. Evaluations of the physical condition of the participants in the study, at the beginning and at the end of the treatment, are carried out using standard tests. The specific measurements of each game give the therapist more detailed information about the patients' evolution after finishing the planned protocol. The obtained results support the fact that the set of developed video games can be combined to define different therapy protocols and that the information obtained is richer than the one obtained through current clinical metrics, serving as method of motor function assessment.

  13. Effectiveness of Serious Games for Leap Motion on the Functionality of the Upper Limb in Parkinson's Disease: A Feasibility Study

    PubMed Central

    Balaguer, Carlos; Collado-Vázquez, Susana; Jardón, Alberto

    2018-01-01

    The design and application of Serious Games (SG) based on the Leap Motion sensor are presented as a tool to support the rehabilitation therapies for upper limbs. Initially, the design principles and their implementation are described, focusing on improving both unilateral and bilateral manual dexterity and coordination. The design of the games has been supervised by specialized therapists. To assess the therapeutic effectiveness of the proposed system, a protocol of trials with Parkinson's patients has been defined. Evaluations of the physical condition of the participants in the study, at the beginning and at the end of the treatment, are carried out using standard tests. The specific measurements of each game give the therapist more detailed information about the patients' evolution after finishing the planned protocol. The obtained results support the fact that the set of developed video games can be combined to define different therapy protocols and that the information obtained is richer than the one obtained through current clinical metrics, serving as method of motor function assessment. PMID:29849550

  14. Secure Communications

    NASA Astrophysics Data System (ADS)

    Bellac, Michel Le

    2014-11-01

    The first practical application of quantum physics examined in this book is quantum cryptography. Quantum cryptography is a relatively recent invention (it dates back from the mid 1980s) but I chose it because it allows me to illustrate the fundamental principles with a minimum number of intermediate steps. I shall begin with a short summary of classical cryptography, reviewing briefly the two systems which are currently used today: the secret key system and the public key system. Quantum cryptography is not a new method for dissimulating the meaning of a message, but it allows one to be certain that no spy has accessed it. There exist many quantum cryptography protocols and various experimental devices have been proposed for implementing them. The simplest device is based on polarization, a concept which will be introduced first in the case of of light polarization, and then in that of photon polarization. The use of photon polarization gives the simplest implementation of the protocol proposed in 1984 by Bennett and Brassard, which is known by the acronym formed with their initials, the BB84 protocol.

  15. Applying Pose Clustering and MD Simulations To Eliminate False Positives in Molecular Docking.

    PubMed

    Makeneni, Spandana; Thieker, David F; Woods, Robert J

    2018-03-26

    In this work, we developed a computational protocol that employs multiple molecular docking experiments, followed by pose clustering, molecular dynamic simulations (10 ns), and energy rescoring to produce reliable 3D models of antibody-carbohydrate complexes. The protocol was applied to 10 antibody-carbohydrate co-complexes and three unliganded (apo) antibodies. Pose clustering significantly reduced the number of potential poses. For each system, 15 or fewer clusters out of 100 initial poses were generated and chosen for further analysis. Molecular dynamics (MD) simulations allowed the docked poses to either converge or disperse, and rescoring increased the likelihood that the best-ranked pose was an acceptable pose. This approach is amenable to automation and can be a valuable aid in determining the structure of antibody-carbohydrate complexes provided there is no major side chain rearrangement or backbone conformational change in the H3 loop of the CDR regions. Further, the basic protocol of docking a small ligand to a known binding site, clustering the results, and performing MD with a suitable force field is applicable to any protein ligand system.

  16. Evaluation of the Effectiveness of Two Morphine Protocols to Treat Neonatal Abstinence Syndrome in a Level II Nursery in a Community Hospital.

    PubMed

    DeAtley, Heather N; Burton, Amanda; Fraley, Michelle DeLuca; Haltom, Joan

    2017-07-01

    The authors sought to evaluate the impact on length of hospital stay and treatment duration of morphine after implementation of a change in the institutional protocol for managing neonatal abstinence syndrome (NAS) in an effort to improve patient outcomes. A single-center, retrospective chart review was conducted at a Level II nursery in a community hospital in Kentucky. Fifty-nine neonates born between January 1, 2014, and December 31, 2015, who were diagnosed with NAS and received morphine for treatment were included. The protocol 1 group consisted of 33 neonates who received an initial dose of morphine 0.04 mg/kg/dose administered orally every 4 hours (January 1-December 31, 2014), and the protocol 2 group consisted of 26 neonates who received an initial dose of morphine 0.06 mg/kg/dose administered orally every 3 hours (January 1-November 30, 2015), after a change in the protocol for managing NAS was implemented on January 1, 2015. Data were reviewed and compared between the two protocol groups to determine the impact that the dosage change had on length of hospital stay and morphine treatment duration. The average length of stay decreased by 7 days in the protocol 2 group compared with the protocol 1 group (21 vs 28.65 days). The average duration of treatment decreased by 7 days in the protocol 2 group compared with the protocol 1 group (18.3 vs 25.4 days). These differences between groups were not statistically significant, however, because the population size was not large enough to achieve adequate power. These results indicate that protocol 2 displayed the potential to decrease length of stay and duration of treatment compared with protocol 1 at this facility; however, balancing higher starting doses with the risk of oversedation will continue to challenge the health care team. Concern for oversedation when using the higher starting dose in protocol 2 has prompted further research (e.g., protocol 3, initial morphine 0.05 mg/kg/dose every 3 hrs). Continued research is also necessary with larger patient populations to enable generalizability to other institutions. © 2017 Pharmacotherapy Publications, Inc.

  17. Developing the protocol for the evaluation of the health foundation's 'engaging with quality initiative' – an emergent approach

    PubMed Central

    Soper, Bryony; Buxton, Martin; Hanney, Stephen; Oortwijn, Wija; Scoggins, Amanda; Steel, Nick; Ling, Tom

    2008-01-01

    In 2004 a UK charity, The Health Foundation, established the 'Engaging with Quality Initiative' to explore and evaluate the benefits of engaging clinicians in quality improvement in healthcare. Eight projects run by professional bodies or specialist societies were commissioned in various areas of acute care. A developmental approach to the initiative was adopted, accompanied by a two level evaluation: eight project self-evaluations and a related external evaluation. This paper describes how the protocol for the external evaluation was developed. The challenges faced included large variation between and within the projects (in approach, scope and context, and in understanding of quality improvement), the need to support the project teams in their self-evaluations while retaining a necessary objectivity, and the difficulty of evaluating the moving target created by the developmental approach adopted in the initiative. An initial period to develop the evaluation protocol proved invaluable in helping us to explore these issues. PMID:18973650

  18. Differences in Writers' Initial Task Representations. Technical Report No. 35.

    ERIC Educational Resources Information Center

    Carey, Linda; And Others

    An exploratory study investigated how writers represent their task to themselves before beginning to write. Using data from verbal protocols, the initial plans of 12 writers (5 experts and 7 student writers) who were working on an expository writing task were examined. The protocols were coded for types of planning. Independent measures of the…

  19. Taking the Politics Out of Satellite and Space-Based Communications Protocols

    NASA Technical Reports Server (NTRS)

    Ivancic, William D.

    2006-01-01

    After many years of studies, experimentation, and deployment, large amounts of misinformation and misconceptions remain regarding applicability of various communications protocols for use in satellite and space-based networks. This paper attempts to remove much of the politics, misconceptions, and misinformation that have plagued spacebased communications protocol development and deployment. This paper provides a common vocabulary for communications; a general discussion of the requirements for various communication environments; an evaluation of tradeoffs between circuit and packet-switching technologies, and the pros and cons of various link, network, transport, application, and security protocols. Included is the applicability of protocol enhancing proxies to NASA, Department of Defense (DOD), and commercial space communication systems.

  20. [Long-term destiny of adolescents and young adults with de novo acute lymphoblastic leukemia treated with a pediatric protocol type].

    PubMed

    López-Hernández, Manuel Antonio; Alvarado-Ibarra, Martha; Álvarez-Veral, José Luis; Ortiz-Zepeda, Maricela; Guajardo-Leal, Martha Lilia; Cota-Range, Xochitl

    The prognosis, in the long term, of adolescents and young adults with acute de novo lymphoblastic leukemia, treated with a pediatric type protocol. To analyze the efficacy and tolerability of a chemotherapy regimen of pediatric type on patients 15-35 years old with de novo acute lymphoblastic leukemia, Ph(-). A retrospective study of patients received from 2001 to 2013, without initial infiltration of the central nervous system. They received the regimen called LALÍN. Terminal goals: frequency of initial remission, probability of survival free of leukemia and event-free survival for five years. We included 101 patients; there were 29 relapses and 19 deaths. There was initial remission in 97% of the cases; survival free of leukemia of 0.58 and event-free survival 0.44. No difference in patients aged 16-21 years vs. 22-35 (p > 0.55). Negative prognostic factors: abnormal karyotypes, except hyperdiploids (p = 0.001); > 5% of blasts, on 14 day induction (p = 0. 0001); delay in the punctuality of the courses of the chemotherapy regimen (p = 0.0001). A pediatric type regimen is applicable to patients aged from 16 to 35 years with acute lymphoblastic leukemia, without greater toxicity and a best survival free of leukemia. The count of > 5% of blasts and the delay in the execution of the stages of the chemotherapy regimen are the stronger negative prognostic factors.

  1. Advanced Test Reactor Core Modeling Update Project Annual Report for Fiscal Year 2011

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    David W. Nigg; Devin A. Steuhm

    2011-09-01

    Legacy computational reactor physics software tools and protocols currently used for support of Advanced Test Reactor (ATR) core fuel management and safety assurance and, to some extent, experiment management are obsolete, inconsistent with the state of modern nuclear engineering practice, and are becoming increasingly difficult to properly verify and validate (V&V). Furthermore, the legacy staff knowledge required for application of these tools and protocols from the 1960s and 1970s is rapidly being lost due to staff turnover and retirements. In 2009 the Idaho National Laboratory (INL) initiated a focused effort to address this situation through the introduction of modern high-fidelitymore » computational software and protocols, with appropriate V&V, within the next 3-4 years via the ATR Core Modeling and Simulation and V&V Update (or 'Core Modeling Update') Project. This aggressive computational and experimental campaign will have a broad strategic impact on the operation of the ATR, both in terms of improved computational efficiency and accuracy for support of ongoing DOE programs as well as in terms of national and international recognition of the ATR National Scientific User Facility (NSUF). The ATR Core Modeling Update Project, targeted for full implementation in phase with the anticipated ATR Core Internals Changeout (CIC) in the 2014 time frame, began during the last quarter of Fiscal Year 2009, and has just completed its first full year. Key accomplishments so far have encompassed both computational as well as experimental work. A new suite of stochastic and deterministic transport theory based reactor physics codes and their supporting nuclear data libraries (SCALE, KENO-6, HELIOS, NEWT, and ATTILA) have been installed at the INL under various permanent sitewide license agreements and corresponding baseline models of the ATR and ATRC are now operational, demonstrating the basic feasibility of these code packages for their intended purpose. Furthermore, a capability for rigorous sensitivity analysis and uncertainty quantification based on the TSUNAMI system is being implemented and initial computational results have been obtained. This capability will have many applications in 2011 and beyond as a tool for understanding the margins of uncertainty in the new models as well as for validation experiment design and interpretation. Finally we note that although full implementation of the new computational models and protocols will extend over a period 3-4 years as noted above, interim applications in the much nearer term have already been demonstrated. In particular, these demonstrations included an analysis that was useful for understanding the cause of some issues in December 2009 that were triggered by a larger than acceptable discrepancy between the measured excess core reactivity and a calculated value that was based on the legacy computational methods. As the Modeling Update project proceeds we anticipate further such interim, informal, applications in parallel with formal qualification of the system under the applicable INL Quality Assurance procedures and standards.« less

  2. Experimental parameter identification of a multi-scale musculoskeletal model controlled by electrical stimulation: application to patients with spinal cord injury.

    PubMed

    Benoussaad, Mourad; Poignet, Philippe; Hayashibe, Mitsuhiro; Azevedo-Coste, Christine; Fattal, Charles; Guiraud, David

    2013-06-01

    We investigated the parameter identification of a multi-scale physiological model of skeletal muscle, based on Huxley's formulation. We focused particularly on the knee joint controlled by quadriceps muscles under electrical stimulation (ES) in subjects with a complete spinal cord injury. A noninvasive and in vivo identification protocol was thus applied through surface stimulation in nine subjects and through neural stimulation in one ES-implanted subject. The identification protocol included initial identification steps, which are adaptations of existing identification techniques to estimate most of the parameters of our model. Then we applied an original and safer identification protocol in dynamic conditions, which required resolution of a nonlinear programming (NLP) problem to identify the serial element stiffness of quadriceps. Each identification step and cross validation of the estimated model in dynamic condition were evaluated through a quadratic error criterion. The results highlighted good accuracy, the efficiency of the identification protocol and the ability of the estimated model to predict the subject-specific behavior of the musculoskeletal system. From the comparison of parameter values between subjects, we discussed and explored the inter-subject variability of parameters in order to select parameters that have to be identified in each patient.

  3. Disaster management mobile protocols: a technology that will save lives.

    PubMed

    Williamson, Hope M

    2011-01-01

    Although training and education have long been accepted as integral to disaster preparedness, many currently taught practices are neither evidence based nor standardized. The need for effective evidence-based disaster education for healthcare workers at all levels in the multidisciplinary medical response to major events has been designated by the disaster response community as a high priority. This article describes a disaster management mobile application of systematic evidence-based practice. The application is interactive and comprises portable principles, algorithms, and emergency protocols that are agile, concise, comprehensive, and response relevant to all healthcare workers. Early recognition through clinical assessment versus laboratory and diagnostic procedures in chemical, biological, radiological, and nuclear (CBRNE) exposures grounded in an evidence-based skill set is especially important. During the immediate threat, the clinical diagnosis can get frustrating because CBRNE casualties can mimic everyday healthcare illnesses and initially present with nonspecific respiratory or flu-like symptoms. As there is minimal time in a catastrophic event for the medical provider to make accurate decisions, access to accurate, timely, and comprehensive information in these situations is critical. The CBRNE mobile application is intended to provide a credible source for treatment and management of numerous patients in an often intimidating environment with scarce resources and overwhelming tasks.

  4. Recruitment Strategies of Methamphetamine-Using Men Who Have Sex with Men into an Online Survey

    PubMed Central

    Wilkerson, J. Michael; Shenk, Jared E.; Grey, Jeremy A.; Simon Rosser, B. R.; Noor, Syed W.

    2014-01-01

    Recruiting hidden populations into online research remains challenging. In this manuscript, we report lessons learned from our efforts to recruit methamphetamine-using men who have sex with men. Between July and October 2012, we implemented a four-phase recruitment strategy to enroll a total of 343 methamphetamine-using MSM into an online survey about recent substance use, sexual behavior, and various psychosocial measures. The four phases were implemented sequentially. During phase one, we placed advertisements on mobile applications, and during phase two, we placed advertisements on traditional websites formatted for browsers. During phase three, we used e-mail to initiate snowball recruitment, and during phase four, we used social media for snowball recruitment. Advertisements on mobile devices and websites formatted for browsers proved to be expensive options and resulted in few eligible participants. Our attempts to initiate a snowball through e-mail also proved unsuccessful. The majority (n=320) of observations in our final dataset came from our use of social media. However, participant fraud was a concern, requiring us to implement a strong participant verification protocol. For maximum recruitment and cost-effectiveness, researchers should use social media for recruitment provided they employ strong participant verification protocols. PMID:25642143

  5. Recruitment Strategies of Methamphetamine-Using Men Who Have Sex with Men into an Online Survey.

    PubMed

    Wilkerson, J Michael; Shenk, Jared E; Grey, Jeremy A; Simon Rosser, B R; Noor, Syed W

    Recruiting hidden populations into online research remains challenging. In this manuscript, we report lessons learned from our efforts to recruit methamphetamine-using men who have sex with men. Between July and October 2012, we implemented a four-phase recruitment strategy to enroll a total of 343 methamphetamine-using MSM into an online survey about recent substance use, sexual behavior, and various psychosocial measures. The four phases were implemented sequentially. During phase one, we placed advertisements on mobile applications, and during phase two, we placed advertisements on traditional websites formatted for browsers. During phase three, we used e-mail to initiate snowball recruitment, and during phase four, we used social media for snowball recruitment. Advertisements on mobile devices and websites formatted for browsers proved to be expensive options and resulted in few eligible participants. Our attempts to initiate a snowball through e-mail also proved unsuccessful. The majority (n=320) of observations in our final dataset came from our use of social media. However, participant fraud was a concern, requiring us to implement a strong participant verification protocol. For maximum recruitment and cost-effectiveness, researchers should use social media for recruitment provided they employ strong participant verification protocols.

  6. Randomized trial for answers to clinical questions: evaluating a pre-appraised versus a MEDLINE search protocol.

    PubMed

    Patel, Manesh R; Schardt, Connie M; Sanders, Linda L; Keitz, Sheri A

    2006-10-01

    The paper compares the speed, validity, and applicability of two different protocols for searching the primary medical literature. A randomized trial involving medicine residents was performed. An inpatient general medicine rotation was used. Thirty-two internal medicine residents were block randomized into four groups of eight. Success rate of each search protocol was measured by perceived search time, number of questions answered, and proportion of articles that were applicable and valid. Residents randomized to the MEDLINE-first (protocol A) group searched 120 questions, and residents randomized to the MEDLINE-last (protocol B) searched 133 questions. In protocol A, 104 answers (86.7%) and, in protocol B, 117 answers (88%) were found to clinical questions. In protocol A, residents reported that 26 (25.2%) of the answers were obtained quickly or rated as "fast" (<5 minutes) as opposed to 55 (51.9%) in protocol B, (P = 0.0004). A subset of questions and articles (n = 79) were reviewed by faculty who found that both protocols identified similar numbers of answer articles that addressed the questions and were felt to be valid using critical appraisal criteria. For resident-generated clinical questions, both protocols produced a similarly high percentage of applicable and valid articles. The MEDLINE-last search protocol was perceived to be faster. However, in the MEDLINE-last protocol, a significant portion of questions (23%) still required searching MEDLINE to find an answer.

  7. Who needs inpatient detox? Development and implementation of a hospitalist protocol for the evaluation of patients for alcohol detoxification.

    PubMed

    Stephens, John R; Liles, E Allen; Dancel, Ria; Gilchrist, Michael; Kirsch, Jonathan; DeWalt, Darren A

    2014-04-01

    Clinicians caring for patients seeking alcohol detoxification face many challenges, including lack of evidence-based guidelines for treatment and high recidivism rates. To develop a standardized protocol for determining which alcohol dependent patients seeking detoxification need inpatient versus outpatient treatment, and to study the protocol's implementation. Review of best evidence by ad hoc task force and subsequent creation of standardized protocol. Prospective observational evaluation of initial protocol implementation. Patients presenting for alcohol detoxification. Development and implementation of a protocol for evaluation and treatment of patients requesting alcohol detoxification. Number of admissions per month with primary alcohol related diagnosis (DRG), 30-day readmission rate, and length of stay, all measured before and after protocol implementation. We identified one randomized clinical trial and three cohort studies to inform the choice of inpatient versus outpatient detoxification, along with one prior protocol in this population, and combined that data with clinical experience to create an institutional protocol. After implementation, the average number of alcohol related admissions was 15.9 per month, compared with 18.9 per month before implementation (p = 0.037). There was no difference in readmission rate or length of stay. Creation and utilization of a protocol led to standardization of care for patients requesting detoxification from alcohol. Initial evaluation of protocol implementation showed a decrease in number of admissions.

  8. A Web Resource for Standardized Benchmark Datasets, Metrics, and Rosetta Protocols for Macromolecular Modeling and Design.

    PubMed

    Ó Conchúir, Shane; Barlow, Kyle A; Pache, Roland A; Ollikainen, Noah; Kundert, Kale; O'Meara, Matthew J; Smith, Colin A; Kortemme, Tanja

    2015-01-01

    The development and validation of computational macromolecular modeling and design methods depend on suitable benchmark datasets and informative metrics for comparing protocols. In addition, if a method is intended to be adopted broadly in diverse biological applications, there needs to be information on appropriate parameters for each protocol, as well as metrics describing the expected accuracy compared to experimental data. In certain disciplines, there exist established benchmarks and public resources where experts in a particular methodology are encouraged to supply their most efficient implementation of each particular benchmark. We aim to provide such a resource for protocols in macromolecular modeling and design. We present a freely accessible web resource (https://kortemmelab.ucsf.edu/benchmarks) to guide the development of protocols for protein modeling and design. The site provides benchmark datasets and metrics to compare the performance of a variety of modeling protocols using different computational sampling methods and energy functions, providing a "best practice" set of parameters for each method. Each benchmark has an associated downloadable benchmark capture archive containing the input files, analysis scripts, and tutorials for running the benchmark. The captures may be run with any suitable modeling method; we supply command lines for running the benchmarks using the Rosetta software suite. We have compiled initial benchmarks for the resource spanning three key areas: prediction of energetic effects of mutations, protein design, and protein structure prediction, each with associated state-of-the-art modeling protocols. With the help of the wider macromolecular modeling community, we hope to expand the variety of benchmarks included on the website and continue to evaluate new iterations of current methods as they become available.

  9. Network protocols for real-time applications

    NASA Technical Reports Server (NTRS)

    Johnson, Marjory J.

    1987-01-01

    The Fiber Distributed Data Interface (FDDI) and the SAE AE-9B High Speed Ring Bus (HSRB) are emerging standards for high-performance token ring local area networks. FDDI was designed to be a general-purpose high-performance network. HSRB was designed specifically for military real-time applications. A workshop was conducted at NASA Ames Research Center in January, 1987 to compare and contrast these protocols with respect to their ability to support real-time applications. This report summarizes workshop presentations and includes an independent comparison of the two protocols. A conclusion reached at the workshop was that current protocols for the upper layers of the Open Systems Interconnection (OSI) network model are inadequate for real-time applications.

  10. Quality and Variability of Online Available Physical Therapy Protocols From Academic Orthopaedic Surgery Programs for Anterior Cruciate Ligament Reconstruction.

    PubMed

    Makhni, Eric C; Crump, Erica K; Steinhaus, Michael E; Verma, Nikhil N; Ahmad, Christopher S; Cole, Brian J; Bach, Bernard R

    2016-08-01

    To assess the quality and variability found across anterior cruciate ligament (ACL) rehabilitation protocols published online by academic orthopaedic programs. Web-based ACL physical therapy protocols from United States academic orthopaedic programs available online were included for review. Main exclusion criteria included concomitant meniscus repair, protocols aimed at pediatric patients, and failure to provide time points for the commencement or recommended completion of any protocol components. A comprehensive, custom scoring rubric was created that was used to assess each protocol for the presence or absence of various rehabilitation components, as well as when those activities were allowed to be initiated in each protocol. Forty-two protocols were included for review from 155 U.S. academic orthopaedic programs. Only 13 protocols (31%) recommended a prehabilitation program. Five protocols (12%) recommended continuous passive motion postoperatively. Eleven protocols (26%) recommended routine partial or non-weight bearing immediately postoperatively. Ten protocols (24%) mentioned utilization of a secondary/functional brace. There was considerable variation in range of desired full-weight-bearing initiation (9 weeks), as well as in the types of strength and proprioception exercises specifically recommended. Only 8 different protocols (19%) recommended return to sport after achieving certain strength and activity criteria. Many ACL rehabilitation protocols recommend treatment modalities not supported by current reports. Moreover, high variability in the composition and time ranges of rehabilitation components may lead to confusion among patients and therapists. Level II. Copyright © 2016 Arthroscopy Association of North America. Published by Elsevier Inc. All rights reserved.

  11. Building Capacity for a Long-Term, in-Situ, National-Scale Phenology Monitoring Network: Successes, Challenges and Lessons Learned

    NASA Astrophysics Data System (ADS)

    Weltzin, J. F.; Browning, D. M.

    2014-12-01

    The USA National Phenology Network (USA-NPN; www.usanpn.org) is a national-scale science and monitoring initiative focused on phenology - the study of seasonal life-cycle events such as leafing, flowering, reproduction, and migration - as a tool to understand the response of biodiversity to environmental variation and change. USA-NPN provides a hierarchical, national monitoring framework that enables other organizations to leverage the capacity of the Network for their own applications - minimizing investment and duplication of effort - while promoting interoperability. Network participants can leverage: (1) Standardized monitoring protocols that have been broadly vetted, tested and published; (2) A centralized National Phenology Database (NPDb) for maintaining, archiving and replicating data, with standard metadata, terms-of-use, web-services, and documentation of QA/QC, plus tools for discovery, visualization and download of raw data and derived data products; and/or (3) A national in-situ, multi-taxa phenological monitoring system, Nature's Notebook, which enables participants to observe and record phenology of plants and animals - based on the protocols and information management system (IMS) described above - via either web or mobile applications. The protocols, NPDb and IMS, and Nature's Notebook represent a hierarchy of opportunities for involvement by a broad range of interested stakeholders, from individuals to agencies. For example, some organizations have adopted (e.g., the National Ecological Observatory Network or NEON) -- or are considering adopting (e.g., the Long-Term Agroecosystems Network or LTAR) -- the USA-NPN standardized protocols, but will develop their own database and IMS with web services to promote sharing of data with the NPDb. Other organizations (e.g., the Inventory and Monitoring Programs of the National Wildlife Refuge System and the National Park Service) have elected to use Nature's Notebook to support their phenological monitoring programs. We highlight the challenges and benefits of integrating phenology monitoring within existing and emerging national monitoring networks, and showcase opportunities that exist when standardized protocols are adopted and implemented to promote data interoperability and sharing.

  12. Influence of different anaesthetic protocols over the sperm quality on the fresh, chilled (4°C) and frozen-thawed epididymal sperm samples in domestic dogs.

    PubMed

    Batista, M; Vilar, J; Rosario, I; Terradas, E

    2016-10-01

    This study assessed the influence of three different anaesthetic protocols on semen quality obtained from the epididymis. Sixty male dogs undergoing to routine sterilization were assigned to three anaesthetic protocols: thiopental group (TG, n = 20), propofol group (PG, n = 20) and ketamine-dexmedetomidine group (KDG, n = 20). Immediately after orchidectomy, the cauda epididymides and vas deferent ducts were isolated and then a retrograde flushing was performed to collect spermatozoa. In experiment 1, after the initial evaluation of the semen (sperm concentration, sperm motility and the percentages of live spermatozoa, abnormal spermatozoa and acrosome membrane integrity), semen samples were diluted in Tris-glucose-egg yolk extender and chilled for 48 hr, and the sperm motility was assessed at 6, 24 and 48 hr. In experiment 2, semen samples were diluted in Tris-glucose-egg yolk extender and chilled for 24 hr, and then samples were frozen in two extenders with different glycerol concentrations, to reach a final concentration of 50-100 × 10(6) spermatozoa ml(-1) , 20% egg yolk, 0.5% Equex and 4% and 5% glycerol, respectively. Mean values of total sperm concentration, sperm viability and the percentages of intact acrosome and abnormal spermatozoa were not significantly different between experimental groups, and therefore, the anaesthetic protocols assessed did not affect sperm parameters mentioned above. However, our study confirmed a detrimental effect of the use of thiopental (TG) over the total sperm motility (p < 0.05) and progressive sperm motility (p < 0.05) of the fresh and chilled epididymal sperm samples. The anaesthetic protocols including the application of propofol or ketamine-dexmedetomidine can be used to recover sperm in domestic canids without significant changes in sperm quality compared when semen is collected routinely and these techniques could be applicable to endangered wild canids. © 2016 Blackwell Verlag GmbH.

  13. Software-defined Quantum Networking Ecosystem

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Humble, Travis S.; Sadlier, Ronald

    The software enables a user to perform modeling and simulation of software-defined quantum networks. The software addresses the problem of how to synchronize transmission of quantum and classical signals through multi-node networks and to demonstrate quantum information protocols such as quantum teleportation. The software approaches this problem by generating a graphical model of the underlying network and attributing properties to each node and link in the graph. The graphical model is then simulated using a combination of discrete-event simulators to calculate the expected state of each node and link in the graph at a future time. A user interacts withmore » the software by providing an initial network model and instantiating methods for the nodes to transmit information with each other. This includes writing application scripts in python that make use of the software library interfaces. A user then initiates the application scripts, which invokes the software simulation. The user then uses the built-in diagnostic tools to query the state of the simulation and to collect statistics on synchronization.« less

  14. Case Study: The Application of ISO 9001:2000 to a Government Organization: A Study of the Benefits, Drawbacks and Effectiveness of ISO 9001:2000 for Navy Undersea Range Programs

    DTIC Science & Technology

    2004-09-01

    the organization: “understanding” is a nebulous term to measure without applying some form of academic rigor, which in this case would be complex...to the RSDBU ISO 9001:2000 certification initiative was based on the work of University of Rhode Island Professor Quentin C. Turtle . His book...commensurate inspection protocol during design and production phases.84 The major difference in the Turtle approach compared to ISO 9000 is that Turtle

  15. Non-local classical optical correlation and implementing analogy of quantum teleportation

    PubMed Central

    Sun, Yifan; Song, Xinbing; Qin, Hongwei; Zhang, Xiong; Yang, Zhenwei; Zhang, Xiangdong

    2015-01-01

    This study reports an experimental realization of non-local classical optical correlation from the Bell's measurement used in tests of quantum non-locality. Based on such a classical Einstein–Podolsky–Rosen optical correlation, a classical analogy has been implemented to the true meaning of quantum teleportation. In the experimental teleportation protocol, the initial teleported information can be unknown to anyone and the information transfer can happen over arbitrary distances. The obtained results give novel insight into quantum physics and may open a new field of applications in quantum information. PMID:25779977

  16. CAD/CAM guided surgery in implant dentistry. A review of software packages and step-by-step protocols for planning surgical guides.

    PubMed

    Scherer, Michael D; Kattadiyil, Mathew T; Parciak, Ewa; Puri, Shweta

    2014-01-01

    Three-dimensional radiographic imaging for dental implant treatment planning is gaining widespread interest and popularity. However, application of the data from 30 imaging can be a complex and daunting process initially. The purpose of this article is to describe features of three software packages and the respective computerized guided surgical templates (GST) fabricated from them. A step-by-step method of interpreting and ordering a GST to simplify the process of the surgical planning and implant placement is discussed.

  17. Attitude determination for small satellites using GPS signal-to-noise ratio

    NASA Astrophysics Data System (ADS)

    Peters, Daniel

    An embedded system for GPS-based attitude determination (AD) using signal-to-noise (SNR) measurements was developed for CubeSat applications. The design serves as an evaluation testbed for conducting ground based experiments using various computational methods and antenna types to determine the optimum AD accuracy. Raw GPS data is also stored to non-volatile memory for downloading and post analysis. Two low-power microcontrollers are used for processing and to display information on a graphic screen for real-time performance evaluations. A new parallel inter-processor communication protocol was developed that is faster and uses less power than existing standard protocols. A shorted annular patch (SAP) antenna was fabricated for the initial ground-based AD experiments with the testbed. Static AD estimations with RMS errors in the range of 2.5° to 4.8° were achieved over a range of off-zenith attitudes.

  18. Recent Innovations in Collagen Corneal Cross-linking; a Mini Review.

    PubMed

    Vastardis, Iraklis; Pajic-Eggspuehler, Brigitte; Nichorlis, Charis; Mueller, Jörg; Pajic, Bojan

    2017-01-01

    The introduction of corneal cross-linking (CXL) with ultraviolet-A (UVA) and Riboflavin photosensitizer (Vit B 2 ) from Seiler et al. , revolutionized the treatment of Keratoconus and other corneal ectatic diseases. Today, the commonly known epithelium off Dresden protocol is in clinical use for the last 15 years with great success and regarded by many as the golden standard. With several studies demonstrating its simplicity, efficacy and safety this revolutionary method, paved the way for new therapies and strategies in the treatment of corneal ectatic diseases and changed our understanding in corneal biomechanics. Recent scientific and technological advances enabled the creation of various modifications of the initial CXL protocol and the formation of new ones. This work highlights the recent advances of CXL, such as the role of oxygen, higher fluence and shorter irradiation times as well as the various clinical applications and updates of this method.

  19. Preliminary Results from a Model-Driven Architecture Methodology for Development of an Event-Driven Space Communications Service Concept

    NASA Technical Reports Server (NTRS)

    Roberts, Christopher J.; Morgenstern, Robert M.; Israel, David J.; Borky, John M.; Bradley, Thomas H.

    2017-01-01

    NASA's next generation space communications network will involve dynamic and autonomous services analogous to services provided by current terrestrial wireless networks. This architecture concept, known as the Space Mobile Network (SMN), is enabled by several technologies now in development. A pillar of the SMN architecture is the establishment and utilization of a continuous bidirectional control plane space link channel and a new User Initiated Service (UIS) protocol to enable more dynamic and autonomous mission operations concepts, reduced user space communications planning burden, and more efficient and effective provider network resource utilization. This paper provides preliminary results from the application of model driven architecture methodology to develop UIS. Such an approach is necessary to ensure systematic investigation of several open questions concerning the efficiency, robustness, interoperability, scalability and security of the control plane space link and UIS protocol.

  20. Rapid and reliable high-throughput methods of DNA extraction for use in barcoding and molecular systematics of mushrooms.

    PubMed

    Dentinger, Bryn T M; Margaritescu, Simona; Moncalvo, Jean-Marc

    2010-07-01

    We present two methods for DNA extraction from fresh and dried mushrooms that are adaptable to high-throughput sequencing initiatives, such as DNA barcoding. Our results show that these protocols yield ∼85% sequencing success from recently collected materials. Tests with both recent (<2 year) and older (>100 years) specimens reveal that older collections have low success rates and may be an inefficient resource for populating a barcode database. However, our method of extracting DNA from herbarium samples using small amount of tissue is reliable and could be used for important historical specimens. The application of these protocols greatly reduces time, and therefore cost, of generating DNA sequences from mushrooms and other fungi vs. traditional extraction methods. The efficiency of these methods illustrates that standardization and streamlining of sample processing should be shifted from the laboratory to the field. © 2009 Blackwell Publishing Ltd.

  1. Cancer imaging using Surface-Enhanced Resonance Raman Scattering (SERRS) nanoparticles

    PubMed Central

    Harmsen, Stefan; Wall, Matthew A.; Huang, Ruimin

    2017-01-01

    The unique spectral signatures and biologically inert compositions of surface-enhanced (resonance) Raman scattering (SE(R)RS) nanoparticles make them promising contrast agents for in vivo cancer imaging. Subtle aspects of their preparation can shift their limit of detection by orders of magnitude. In this protocol, we present the optimized, step-by-step procedure for generating reproducible SERRS nanoparticles with femtomolar (10−15 M) limits of detection. We introduce several applications of these nanoprobes for biomedical research, with a focus on intraoperative cancer imaging via Raman imaging. A detailed account is provided for successful intravenous administration of SERRS nanoparticles such that delineation of cancerous lesions may be achieved without the need for specific biomarker targeting. The time estimate for this straightforward, yet comprehensive protocol from initial de novo gold nanoparticle synthesis to SE(R)RS nanoparticle contrast-enhanced preclinical Raman imaging in animal models is ~96 h. PMID:28686581

  2. Temporal Precedence Checking for Switched Models and its Application to a Parallel Landing Protocol

    NASA Technical Reports Server (NTRS)

    Duggirala, Parasara Sridhar; Wang, Le; Mitra, Sayan; Viswanathan, Mahesh; Munoz, Cesar A.

    2014-01-01

    This paper presents an algorithm for checking temporal precedence properties of nonlinear switched systems. This class of properties subsume bounded safety and capture requirements about visiting a sequence of predicates within given time intervals. The algorithm handles nonlinear predicates that arise from dynamics-based predictions used in alerting protocols for state-of-the-art transportation systems. It is sound and complete for nonlinear switch systems that robustly satisfy the given property. The algorithm is implemented in the Compare Execute Check Engine (C2E2) using validated simulations. As a case study, a simplified model of an alerting system for closely spaced parallel runways is considered. The proposed approach is applied to this model to check safety properties of the alerting logic for different operating conditions such as initial velocities, bank angles, aircraft longitudinal separation, and runway separation.

  3. A protocol describing the use of a recombinant protein-based, animal product-free medium (APEL) for human embryonic stem cell differentiation as spin embryoid bodies.

    PubMed

    Ng, Elizabeth S; Davis, Richard; Stanley, Edouard G; Elefanty, Andrew G

    2008-01-01

    In order to promote the uniform and reproducible differentiation of human embryonic stem cells (HESCs) in response to exogenously added growth factors, we have developed a method (spin embryoid bodies (EBs)) that uses a recombinant protein-based, animal product-free medium in which HESCs are aggregated by centrifugation to form EBs. In this protocol we describe the formulation of this medium, denoted APEL (Albumin Polyvinylalcohol Essential Lipids), and its use in spin EB differentiation of HESCs. We also describe a more economical variant, BPEL (Bovine Serum Albumin (BSA) Polyvinylalchohol Essential Lipids), in which BSA replaces the recombinant human albumin. The integration of a medium that includes only defined and recombinant components with a defined number of cells to initiate EB formation results in a generally applicable, robust platform for growth factor-directed HESC differentiation.

  4. [Perinatal bioethics: euthanasia or end-of-life decisions? Analysis of the Groningen Protocol].

    PubMed

    Halac, Jacobo; Halac, Eduardo; Moya, Martín P; Olmas, José M; Dopazo, Silvina L; Dolagaray, Nora

    2009-12-01

    The so called "Groningen Protocol" was conceived as a framework to discuss the euthanasia in neonates. Originally, it presents three groups of babies who might be candidates to this option. We analyzed the protocol in its original context and that of the Dutch society in which it was created. The analysis started with a careful reading of the protocol in both English and Dutch versions, translated later into Spanish. The medical and nursing staff participated in discussing it. A final consensus was reached. The Institutional Ethics Committee at our hospital discussed it freely and made recommendations for its application as a guideline to honestly discuss with parents the clinical condition of their babies, without permitting the option included literally in the word euthanasia. We selected four extremely ill infants. Their parents were interviewed at least twice daily: three stages were identified: the initial one of promoting all possible treatments; a second one of guarded and cautious request for the staff to evaluate "suffering", and a last one where requests were made to reduce therapeutic efforts to provide dignified death. A week after the death of their infants, they were presented with the facts of the protocol and the limits of our legal system. In all four cases the parents suggested that they would have chosen ending the life of their infants, in order to avoid them undue suffering. They clearly pointed out that this option emerged as a viable one to them once the ultimate outcome was evident. The protocol must not be viewed as a guideline for euthanasia in newborns, but rather as a mean to discuss the critical condition of an infant with the parents. Its direct implementation in our setting remains difficult. As a clear limitation for its overall application remains the definition of what is considered "unbearable suffering" in newborns, and how to certify when the infant has "no prospect". We emphasize the benefits of securing the help of the Ethics Committee and of "second opinions" from authorized physicians.

  5. Micro X-ray Fluorescence Study of Late Pre-Hispanic Ceramics from the Western Slopes of the South Central Andes Region in the Arica y Parinacota Region, Chile: A New Methodological Approach

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Flewett, S.; Saintenoy, T.; Sepulveda, M.

    Archeological ceramic paste material typically consists of a mix of a clay matrix and various millimeter and sub-millimeter sized mineral inclusions. Micro X-ray Fluorescence (μXRF) is a standard compositional classification tool, and in this work we propose and demonstrate an improved fluorescence map processing protocol where the mineral inclusions are automatically separated from the clay matrix to allow independent statistical analysis of the two parts. Application of this protocol allowed us to improve enhance the differentiation discrimination between different ceramic shards compared with the standard procedure of comparing working with only the spatially averaged elemental concentrations. Using the new protocol,more » we performed an initial compositional classification of a set of 83 ceramic shards from the western slopes of the south central Andean region in the Arica y Parinacota region of present-day far northern Chile. Comparing the classifications obtained using the new versus the old (average concentrations only) protocols, we found that some samples were erroneously classified with the old protocol. From an archaeological perspective, a very broad and heterogeneous sample set was used in this study due to the fact that this was the first such study to be performed on ceramics from this region. This allowed a general overview to be obtained, however further work on more specific sample sets will be necessary to extract concrete archaeological conclusions.« less

  6. Protocol for determining bull trout presence

    Treesearch

    James Peterson; Jason B. Dunham; Philip Howell; Russell Thurow; Scott Bonar

    2002-01-01

    The Western Division of the American Fisheries Society was requested to develop protocols for determining presence/absence and potential habitat suitability for bull trout. The general approach adopted is similar to the process for the marbled murrelet, whereby interim guidelines are initially used, and the protocols are subsequently refined as data are collected....

  7. 77 FR 5492 - Magnuson-Stevens Act Provisions; General Provisions for Domestic Fisheries; Application for...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-02-03

    ... assess the performance of an approved sampling protocol and to allow for continued sample collection and... developmental sampling protocol. While this application was being reviewed and was available for public comment, the sampling protocol being tested was adopted into the National Shellfish Sanitation Program by the...

  8. Low-control and robust quantum refrigerator and applications with electronic spins in diamond

    NASA Astrophysics Data System (ADS)

    Mohammady, M. Hamed; Choi, Hyeongrak; Trusheim, Matthew E.; Bayat, Abolfazl; Englund, Dirk; Omar, Yasser

    2018-04-01

    We propose a general protocol for low-control refrigeration and thermometry of thermal qubits, which can be implemented using electronic spins in diamond. The refrigeration is implemented by a probe, consisting of a network of interacting spins. The protocol involves two operations: (i) free evolution of the probe; and (ii) a swap gate between one spin in the probe and the thermal qubit we wish to cool. We show that if the initial state of the probe falls within a suitable range, and the free evolution of the probe is both unital and conserves the excitation in the z direction, then the cooling protocol will always succeed, with an efficiency that depends on the rate of spin dephasing and the swap-gate fidelity. Furthermore, measuring the probe after it has cooled many qubits provides an estimate of their temperature. We provide a specific example where the probe is a Heisenberg spin chain, and suggest a physical implementation using electronic spins in diamond. Here, the probe is constituted of nitrogen vacancy (NV) centers, while the thermal qubits are dark spins. By using a novel pulse sequence, a chain of NV centers can be made to evolve according to a Heisenberg Hamiltonian. This proposal allows for a range of applications, such as NV-based nuclear magnetic resonance of photosensitive molecules kept in a dark spot on a sample, and it opens up possibilities for the study of quantum thermodynamics, environment-assisted sensing, and many-body physics.

  9. Using the "Knowledge Quartet" to Quantify Mathematical Knowledge in Teaching: The Development of a Protocol for Initial Teacher Education

    ERIC Educational Resources Information Center

    Weston, Tracy L.

    2013-01-01

    This study examined trainee teachers' mathematical knowledge in teaching (MKiT) over their final year in a US Initial Teacher Education (ITE) programme. This paper reports on an exploratory methodological approach taken to use the "Knowledge Quartet" to quantify MKiT through the development of a new protocol to code trainees' teaching of…

  10. Evaluation of an imaging protocol using ultrasound as the primary diagnostic modality in pediatric patients with superficial soft tissue infections of the face and neck.

    PubMed

    Sethia, Rishabh; Mahida, Justin B; Subbarayan, Rahul A; Deans, Katherine J; Minneci, Peter C; Elmaraghy, Charles A; Essig, Garth F

    2017-05-01

    To determine the clinical impact of an initiative to use ultrasound (US) as the primary diagnostic modality for children with superficial face and neck infections versus use of computed tomography (CT). Children with a diagnosis of lymphadenitis, face or neck abscess, or face and neck cellulitis were retrospectively evaluated by the otolaryngology service. Patients were separated into two groups based on implementation of a departmental initiative to use US as the primary diagnostic modality. The pre-implementation cohort consisted of patients treated prior to the initiative (2006-2009) and the current protocol cohort consisted of patients treated after the initiative was started (2010-2013). Demographics, use of US or CT, necessity of surgical intervention, and failure of medical management were compared. Three hundred seventy three children were evaluated; 114 patients were included in the pre-implementation cohort and 259 patients were included in the current protocol cohort for comparison. Patients presenting during the current protocol period were more likely to undergo US (pre-implementation vs. current protocol, p-value) (12% vs. 49%, p < 0.0001) and less likely to undergo CT (66% vs. 41%, p < 0.0001) for their initial evaluation. There were no differences in the percentage of children who underwent prompt surgical drainage, prompt discharge without surgery, or trial inpatient observation. There were also no differences in the rate of treatment failure for patients undergoing prompt surgery or prompt discharge on antibiotics. For those patients who underwent repeat evaluation following trial medical management, US was used more frequently in the current protocol period (4% vs. 20%, p = 0.002) with no difference in CT use, selected treatment strategy, or treatment failure rates. Increased use of US on initial evaluation of children with superficial face and neck infections resulted in decreased CT utilization, without negatively impacting outcome. Decreasing pediatric radiation exposure and potential long-term effects is of primary importance. Copyright © 2017. Published by Elsevier B.V.

  11. Conducting drug abuse investigations in natural environments: potential directions for medical toxicology research.

    PubMed

    Boyer, Edward W; Fay, Richard J; Cook, Aaron; Buckosh, Martin; Hibberd, Patricia L; Case, Patricia

    2010-03-01

    Physician-scientists, in the eyes of the National Institutes of Health (NIH), are crucial to the biomedical research enterprise since the development of evidence-based practice based on cutting-edge research. At the same time, NIH has heightened the importance of research mentorship by permitting investigators to revise an application a single time. The current NIH approach, therefore, narrows the margin of error allowable in a proposal and requires that investigators fully develop research protocols for initial submission. The purpose of this manuscript, therefore, is to provide medical toxicologists with a proven research methodology that can be applied to substance abuse investigations. A secondary aim is to provide successful grant language that can be used in subsequent applications for research funding.

  12. At-Home Transcranial Direct Current Stimulation (tDCS) With Telehealth Support for Symptom Control in Chronically-Ill Patients With Multiple Symptoms.

    PubMed

    Riggs, Alexa; Patel, Vaishali; Paneri, Bhaskar; Portenoy, Russell K; Bikson, Marom; Knotkova, Helena

    2018-01-01

    Transcranial direct current stimulation (tDCS) delivered in multiple sessions can reduce symptom burden, but access of chronically ill patients to tDCS studies is constrained by the burden of office-based tDCS administration. Expanded access to this therapy can be accomplished through the development of interventions that allow at-home tDCS applications. Objective: We describe the development and initial feasibility assessment of a novel intervention for the chronically ill that combines at-home tDCS with telehealth support. Methods: In the developmental phase, the tDCS procedure was adjusted for easy application by patients or their informal caregivers at home, and a tDCS protocol with specific elements for enhanced safety and remote adherence monitoring was created. Lay language instructional materials were written and revised based on expert feedback. The materials were loaded onto a tablet allowing for secure video-conferencing. The telehealth tablet was paired with an at-home tDCS device that allowed for remote dose control via electronic codes dispensed to patients prior to each session. tDCS was delivered in two phases: once daily on 10 consecutive days, followed by an as needed regimen for 20 days. Initial feasibility of this tDCS-telehealth system was evaluated in four patients with advanced chronic illness and multiple symptoms. Change in symptom burden and patient satisfaction were assessed with the Condensed Memorial Symptom Assessment Scale (CMSAS) and a tDCS user survey. Results: The telehealth-tDCS protocol includes one home visit and has seven patient-tailored elements and six elements enhancing safety monitoring. Replicable electrode placement at home without 10-20 EEG measurement is achieved via a headband that holds electrodes in a pre-determined position. There were no difficulties with patients' training, protocol adherence, or tolerability. A total of 60 tDCS sessions were applied. No session required discontinuation, and there were no adverse events. Data collection was feasible and there were no missing data. Satisfaction with the tDCS-telehealth procedure was high and the patients were comfortable using the system. Conclusion: At-home tDCS with telehealth support appears to be a feasible approach for the management of symptom burden in patients with chronic illness. Further studies to evaluate and optimize the protocol effectiveness for symptom-control outcomes are warranted.

  13. At-Home Transcranial Direct Current Stimulation (tDCS) With Telehealth Support for Symptom Control in Chronically-Ill Patients With Multiple Symptoms

    PubMed Central

    Riggs, Alexa; Patel, Vaishali; Paneri, Bhaskar; Portenoy, Russell K.; Bikson, Marom; Knotkova, Helena

    2018-01-01

    Transcranial direct current stimulation (tDCS) delivered in multiple sessions can reduce symptom burden, but access of chronically ill patients to tDCS studies is constrained by the burden of office-based tDCS administration. Expanded access to this therapy can be accomplished through the development of interventions that allow at-home tDCS applications. Objective: We describe the development and initial feasibility assessment of a novel intervention for the chronically ill that combines at-home tDCS with telehealth support. Methods: In the developmental phase, the tDCS procedure was adjusted for easy application by patients or their informal caregivers at home, and a tDCS protocol with specific elements for enhanced safety and remote adherence monitoring was created. Lay language instructional materials were written and revised based on expert feedback. The materials were loaded onto a tablet allowing for secure video-conferencing. The telehealth tablet was paired with an at-home tDCS device that allowed for remote dose control via electronic codes dispensed to patients prior to each session. tDCS was delivered in two phases: once daily on 10 consecutive days, followed by an as needed regimen for 20 days. Initial feasibility of this tDCS-telehealth system was evaluated in four patients with advanced chronic illness and multiple symptoms. Change in symptom burden and patient satisfaction were assessed with the Condensed Memorial Symptom Assessment Scale (CMSAS) and a tDCS user survey. Results: The telehealth-tDCS protocol includes one home visit and has seven patient-tailored elements and six elements enhancing safety monitoring. Replicable electrode placement at home without 10–20 EEG measurement is achieved via a headband that holds electrodes in a pre-determined position. There were no difficulties with patients’ training, protocol adherence, or tolerability. A total of 60 tDCS sessions were applied. No session required discontinuation, and there were no adverse events. Data collection was feasible and there were no missing data. Satisfaction with the tDCS-telehealth procedure was high and the patients were comfortable using the system. Conclusion: At-home tDCS with telehealth support appears to be a feasible approach for the management of symptom burden in patients with chronic illness. Further studies to evaluate and optimize the protocol effectiveness for symptom-control outcomes are warranted. PMID:29872381

  14. Comparison of two progressive treadmill tests in patients with peripheral arterial disease.

    PubMed

    Riebe, D; Patterson, R B; Braun, C M

    2001-11-01

    In a vascular rehabilitation program, 28% of our frail elderly patients are unable to be tested with traditional progressive exercise protocols at program entry due to the high (2.0 miles/h or 3.2 km/h) initial treadmill speeds. The purpose of this investigation was to compare a new progressive treadmill protocol which has a reduced initial speed (1.0 mile/h or 1.6 km/h) to an established protocol performed at 2.0 miles/h (3.2 km/h) to determine the comparability and reproducibility of the new protocol. Eleven patients with arterial claudication performed three symptom-limited exercise tests in random order. Two tests used the new protocol while the remaining trial used the established protocol. Claudication pain was measured using a 5-point scale. Oxygen consumption, heart rate, minute ventilation, respiratory exchange ratio and blood pressure at peak exercise were similar among the three trials. There were strong intraclass correlations for peak oxygen consumption (r = 0.97), onset of claudication (r = 0.96) and maximum walking time (r = 0.98) between the two trials using the new protocol. There was also a significant correlation between the new protocol and the established protocol for peak oxygen consumption (r = 0.90) and maximum walking time (r = 0.89). The new progressive treadmill protocol represents a valid, reliable protocol for patients with arterial claudication. This protocol may be useful for testing patients with a low functional capacity so that clinically appropriate exercise prescriptions can be established and the efficacy of treatments can be determined.

  15. Semi-quantum Dialogue Based on Single Photons

    NASA Astrophysics Data System (ADS)

    Ye, Tian-Yu; Ye, Chong-Qiang

    2018-02-01

    In this paper, we propose two semi-quantum dialogue (SQD) protocols by using single photons as the quantum carriers, where one requires the classical party to possess the measurement capability and the other does not have this requirement. The security toward active attacks from an outside Eve in the first SQD protocol is guaranteed by the complete robustness of present semi-quantum key distribution (SQKD) protocols, the classical one-time pad encryption, the classical party's randomization operation and the decoy photon technology. The information leakage problem of the first SQD protocol is overcome by the classical party' classical basis measurements on the single photons carrying messages which makes him share their initial states with the quantum party. The security toward active attacks from Eve in the second SQD protocol is guaranteed by the classical party's randomization operation, the complete robustness of present SQKD protocol and the classical one-time pad encryption. The information leakage problem of the second SQD protocol is overcome by the quantum party' classical basis measurements on each two adjacent single photons carrying messages which makes her share their initial states with the classical party. Compared with the traditional information leakage resistant QD protocols, the advantage of the proposed SQD protocols lies in that they only require one party to have quantum capabilities. Compared with the existing SQD protocol, the advantage of the proposed SQD protocols lies in that they only employ single photons rather than two-photon entangled states as the quantum carriers. The proposed SQD protocols can be implemented with present quantum technologies.

  16. Ghost Authorship in Industry-Initiated Randomised Trials

    PubMed Central

    Gøtzsche, Peter C; Hróbjartsson, Asbjørn; Johansen, Helle Krogh; Haahr, Mette T; Altman, Douglas G; Chan, An-Wen

    2007-01-01

    Background Ghost authorship, the failure to name, as an author, an individual who has made substantial contributions to an article, may result in lack of accountability. The prevalence and nature of ghost authorship in industry-initiated randomised trials is not known. Methods and Findings We conducted a cohort study comparing protocols and corresponding publications for industry-initiated trials approved by the Scientific-Ethical Committees for Copenhagen and Frederiksberg in 1994–1995. We defined ghost authorship as present if individuals who wrote the trial protocol, performed the statistical analyses, or wrote the manuscript, were not listed as authors of the publication, or as members of a study group or writing committee, or in an acknowledgment. We identified 44 industry-initiated trials. We did not find any trial protocol or publication that stated explicitly that the clinical study report or the manuscript was to be written or was written by the clinical investigators, and none of the protocols stated that clinical investigators were to be involved with data analysis. We found evidence of ghost authorship for 33 trials (75%; 95% confidence interval 60%–87%). The prevalence of ghost authorship was increased to 91% (40 of 44 articles; 95% confidence interval 78%–98%) when we included cases where a person qualifying for authorship was acknowledged rather than appearing as an author. In 31 trials, the ghost authors we identified were statisticians. It is likely that we have overlooked some ghost authors, as we had very limited information to identify the possible omission of other individuals who would have qualified as authors. Conclusions Ghost authorship in industry-initiated trials is very common. Its prevalence could be considerably reduced, and transparency improved, if existing guidelines were followed, and if protocols were publicly available. PMID:17227134

  17. Hospital protocols for targeted glycemic control: Development, implementation, and models for cost justification.

    PubMed

    Magee, Michelle F

    2007-05-15

    Evolving elements of best practices for providing targeted glycemic control in the hospital setting, clinical performance measurement, basal-bolus plus correction-dose insulin regimens, components of standardized subcutaneous (s.c.) insulin order sets, and strategies for implementation and cost justification of glycemic control initiatives are discussed. Best practices for targeted glycemic control should address accurate documentation of hyperglycemia, initial patient assessment, management plan, target blood glucose range, blood glucose monitoring frequency, maintenance of glycemic control, criteria for glucose management consultations, and standardized insulin order sets and protocols. Establishing clinical performance measures, including desirable processes and outcomes, can help ensure the success of targeted hospital glycemic control initiatives. The basal-bolus plus correction-dose regimen for insulin administration will be used to mimic the normal physiologic pattern of endogenous insulin secretion. Standardized insulin order sets and protocols are being used to minimize the risk of error in insulin therapy. Components of standardized s.c. insulin order sets include specification of the hyperglycemia diagnosis, finger stick blood glucose monitoring frequency and timing, target blood glucose concentration range, cutoff values for excessively high or low blood glucose concentrations that warrant alerting the physician, basal and prandial or nutritional (i.e., bolus) insulin, correction doses, hypoglycemia treatment, and perioperative or procedural dosage adjustments. The endorsement of hospital administrators and key physician and nursing leaders is needed for glycemic control initiatives. Initiatives may be cost justified on the basis of the billings for clinical diabetes management services and/or the return- on-investment accrued to reductions in hospital length of stay, readmissions, and accurate documentation and coding of unrecognized or uncontrolled diabetes, and diabetes complications. Standardized insulin order sets and protocols may minimize risk of insulin errors. The endorsement of these protocols by administrators, physicians, nurses, and pharmacists is also needed for success.

  18. Ghost authorship in industry-initiated randomised trials.

    PubMed

    Gøtzsche, Peter C; Hróbjartsson, Asbjørn; Johansen, Helle Krogh; Haahr, Mette T; Altman, Douglas G; Chan, An-Wen

    2007-01-01

    Ghost authorship, the failure to name, as an author, an individual who has made substantial contributions to an article, may result in lack of accountability. The prevalence and nature of ghost authorship in industry-initiated randomised trials is not known. We conducted a cohort study comparing protocols and corresponding publications for industry-initiated trials approved by the Scientific-Ethical Committees for Copenhagen and Frederiksberg in 1994-1995. We defined ghost authorship as present if individuals who wrote the trial protocol, performed the statistical analyses, or wrote the manuscript, were not listed as authors of the publication, or as members of a study group or writing committee, or in an acknowledgment. We identified 44 industry-initiated trials. We did not find any trial protocol or publication that stated explicitly that the clinical study report or the manuscript was to be written or was written by the clinical investigators, and none of the protocols stated that clinical investigators were to be involved with data analysis. We found evidence of ghost authorship for 33 trials (75%; 95% confidence interval 60%-87%). The prevalence of ghost authorship was increased to 91% (40 of 44 articles; 95% confidence interval 78%-98%) when we included cases where a person qualifying for authorship was acknowledged rather than appearing as an author. In 31 trials, the ghost authors we identified were statisticians. It is likely that we have overlooked some ghost authors, as we had very limited information to identify the possible omission of other individuals who would have qualified as authors. Ghost authorship in industry-initiated trials is very common. Its prevalence could be considerably reduced, and transparency improved, if existing guidelines were followed, and if protocols were publicly available.

  19. Dual-color Proteomic Profiling of Complex Samples with a Microarray of 810 Cancer-related Antibodies*

    PubMed Central

    Schröder, Christoph; Jacob, Anette; Tonack, Sarah; Radon, Tomasz P.; Sill, Martin; Zucknick, Manuela; Rüffer, Sven; Costello, Eithne; Neoptolemos, John P.; Crnogorac-Jurcevic, Tatjana; Bauer, Andrea; Fellenberg, Kurt; Hoheisel, Jörg D.

    2010-01-01

    Antibody microarrays have the potential to enable comprehensive proteomic analysis of small amounts of sample material. Here, protocols are presented for the production, quality assessment, and reproducible application of antibody microarrays in a two-color mode with an array of 1,800 features, representing 810 antibodies that were directed at 741 cancer-related proteins. In addition to measures of array quality, we implemented indicators for the accuracy and significance of dual-color detection. Dual-color measurements outperform a single-color approach concerning assay reproducibility and discriminative power. In the analysis of serum samples, depletion of high-abundance proteins did not improve technical assay quality. On the contrary, depletion introduced a strong bias in protein representation. In an initial study, we demonstrated the applicability of the protocols to proteins derived from urine samples. We identified differences between urine samples from pancreatic cancer patients and healthy subjects and between sexes. This study demonstrates that biomedically relevant data can be produced. As demonstrated by the thorough quality analysis, the dual-color antibody array approach proved to be competitive with other proteomic techniques and comparable in performance to transcriptional microarray analyses. PMID:20164060

  20. A Framework for Integration of Heterogeneous Medical Imaging Networks

    PubMed Central

    Viana-Ferreira, Carlos; Ribeiro, Luís S; Costa, Carlos

    2014-01-01

    Medical imaging is increasing its importance in matters of medical diagnosis and in treatment support. Much is due to computers that have revolutionized medical imaging not only in acquisition process but also in the way it is visualized, stored, exchanged and managed. Picture Archiving and Communication Systems (PACS) is an example of how medical imaging takes advantage of computers. To solve problems of interoperability of PACS and medical imaging equipment, the Digital Imaging and Communications in Medicine (DICOM) standard was defined and widely implemented in current solutions. More recently, the need to exchange medical data between distinct institutions resulted in Integrating the Healthcare Enterprise (IHE) initiative that contains a content profile especially conceived for medical imaging exchange: Cross Enterprise Document Sharing for imaging (XDS-i). Moreover, due to application requirements, many solutions developed private networks to support their services. For instance, some applications support enhanced query and retrieve over DICOM objects metadata. This paper proposes anintegration framework to medical imaging networks that provides protocols interoperability and data federation services. It is an extensible plugin system that supports standard approaches (DICOM and XDS-I), but is also capable of supporting private protocols. The framework is being used in the Dicoogle Open Source PACS. PMID:25279021

  1. Highball: A high speed, reserved-access, wide area network

    NASA Technical Reports Server (NTRS)

    Mills, David L.; Boncelet, Charles G.; Elias, John G.; Schragger, Paul A.; Jackson, Alden W.

    1990-01-01

    A network architecture called Highball and a preliminary design for a prototype, wide-area data network designed to operate at speeds of 1 Gbps and beyond are described. It is intended for applications requiring high speed burst transmissions where some latency between requesting a transmission and granting the request can be anticipated and tolerated. Examples include real-time video and disk-disk transfers, national filestore access, remote sensing, and similar applications. The network nodes include an intelligent crossbar switch, but have no buffering capabilities; thus, data must be queued at the end nodes. There are no restrictions on the network topology, link speeds, or end-end protocols. The end system, nodes, and links can operate at any speed up to the limits imposed by the physical facilities. An overview of an initial design approach is presented and is intended as a benchmark upon which a detailed design can be developed. It describes the network architecture and proposed access protocols, as well as functional descriptions of the hardware and software components that could be used in a prototype implementation. It concludes with a discussion of additional issues to be resolved in continuing stages of this project.

  2. A framework for integration of heterogeneous medical imaging networks.

    PubMed

    Viana-Ferreira, Carlos; Ribeiro, Luís S; Costa, Carlos

    2014-01-01

    Medical imaging is increasing its importance in matters of medical diagnosis and in treatment support. Much is due to computers that have revolutionized medical imaging not only in acquisition process but also in the way it is visualized, stored, exchanged and managed. Picture Archiving and Communication Systems (PACS) is an example of how medical imaging takes advantage of computers. To solve problems of interoperability of PACS and medical imaging equipment, the Digital Imaging and Communications in Medicine (DICOM) standard was defined and widely implemented in current solutions. More recently, the need to exchange medical data between distinct institutions resulted in Integrating the Healthcare Enterprise (IHE) initiative that contains a content profile especially conceived for medical imaging exchange: Cross Enterprise Document Sharing for imaging (XDS-i). Moreover, due to application requirements, many solutions developed private networks to support their services. For instance, some applications support enhanced query and retrieve over DICOM objects metadata. This paper proposes anintegration framework to medical imaging networks that provides protocols interoperability and data federation services. It is an extensible plugin system that supports standard approaches (DICOM and XDS-I), but is also capable of supporting private protocols. The framework is being used in the Dicoogle Open Source PACS.

  3. Effect of prophylactic polishing protocols on the surface roughness of esthetic restorative materials.

    PubMed

    Neme, A L; Frazier, K B; Roeder, L B; Debner, T L

    2002-01-01

    Many polishing protocols have been evaluated in vitro for their effect on the surface roughness of restorative materials. These results have been useful in establishing protocols for in vivo application. However, limited research has focused on the subsequent care and maintenance of esthetic restorations following their placement. This investigation evaluated the effect of five polishing protocols that could be implemented at recall on the surface roughness of five direct esthetic restorative materials. Specimens (n=25) measuring 8 mm diameter x 3 mm thick were fabricated in an acrylic mold using five light-cured resin-based materials (hybrid composite, microfilled composite, packable composite, compomer and resin-modified glass ionomer). After photopolymerization, all specimens were polished with Sof-Lex Disks to produce an initial (baseline) surface finish. All specimens were then polished with one of five prophylactic protocols (Butler medium paste, Butler coarse paste, OneGloss, SuperBuff or OneGloss & SuperBuff). The average surface roughness of each treated specimen was determined from three measurements with a profilometer (Surface 1). Next, all specimens were brushed 60,000 times at 1.5 Hz using a brush-head force of 2 N on a Manly V-8 cross-brushing machine in a 50:50 (w/w) slurry of toothpaste and water. The surface roughness of each specimen was measured after brushing (Surface 2) followed by re-polishing with one of five protocols, then final surface roughness values were determined (Surface 3). The data were analyzed using repeated measures ANOVA. Significant differences (p=0.05) in surface roughness were observed among restorative materials and polishing protocols. The microfilled and hybrid resin composite yielded significantly rougher surfaces than the other three materials following tooth brushing. Prophylactic polishing protocols can be used to restore a smooth surface on resin-based esthetic restorative materials following simulated tooth brushing.

  4. SU-F-R-06: Traumatic Brachial Plexus Injury Imaging, Developing a Coherent Clinical Protocol From Literature Review Through Practice

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Wu, D; France, E; Lambert, J

    Purpose: Medical Physics teams can now play a critical role to help plan and provide studied approaches for traumatic brachial plexus MR imaging (tbpMRI). This is especially important for coordination with uncommon applications, since it is challenging to select the right modality, parameters, and train technologists on the essential components. For this work, we started with a review of the medical literature, performed crossover/volunteer studies to bring tbpMRI to practice with greater image QC and protocol management. Methods: To the best of our knowledge, we reviewed the known searchable domain for tbpMRI. We found 69 total articles since 2000. Articlesmore » were evaluated with our published protocol for literature management (LIMES3). Two physicists and two radiologists condensed the information from all articles into a knowledgebase. Results: The initial literature demonstrated great heterogeneity, which was a sign that this area needed greater consistency. Despite inconsistency and imprecision, we extracted the most relevant targets using our long-term experience with protocol development in MSK. We ran volunteers on six different magnets of various field strengths with multiple receiver coils, and rebuilt a coherent protocol for tbpMRI. Our radiologists rated LIMES3 work as superior. We have received referrals from the ER and have conducted four patient evaluations. Conclusion: Traumatic brachial plexus MRI has great possible benefits for patients. This work supports the complexity of tbpMRI scanning. As this is rarely performed, it requires a more diligent protocol workflow, coordination of caregivers, and education within multiple clinical departments. Choosing the correct imaging exam can be critical, as patients can have significant neuropathy and/or paralysis. The LIMES3 protocol is well liked at our institution, and forms the cornerstone of understanding for our work. Our literature management led to a better clinical protocol creation despite the diffuse and inconclusive information presented in the existing medical literature.« less

  5. An Efficient and QoS Supported Multichannel MAC Protocol for Vehicular Ad Hoc Networks

    PubMed Central

    Tan, Guozhen; Yu, Chao

    2017-01-01

    Vehicular Ad Hoc Networks (VANETs) employ multichannel to provide a variety of safety and non-safety (transport efficiency and infotainment) applications, based on the IEEE 802.11p and IEEE 1609.4 protocols. Different types of applications require different levels Quality-of-Service (QoS) support. Recently, transport efficiency and infotainment applications (e.g., electronic map download and Internet access) have received more and more attention, and this kind of applications is expected to become a big market driver in a near future. In this paper, we propose an Efficient and QoS supported Multichannel Medium Access Control (EQM-MAC) protocol for VANETs in a highway environment. The EQM-MAC protocol utilizes the service channel resources for non-safety message transmissions during the whole synchronization interval, and it dynamically adjusts minimum contention window size for different non-safety services according to the traffic conditions. Theoretical model analysis and extensive simulation results show that the EQM-MAC protocol can support QoS services, while ensuring the high saturation throughput and low transmission delay for non-safety applications. PMID:28991217

  6. [Prevention of accidental needle sticks before the Directive 2010/32/EU in a sample of Italian hospitals].

    PubMed

    Di Bari, Virginia; De Carli, Gabriella; Puro, Vincenzo

    2015-05-04

    Needlesticks and cuts are the most common occupational injuries in healthcare workers (HCWs). Directive 2010/32/EU defines principles and preventive interventions. To assess, in hospitals participating in the Italian Study on Occupational Risk of HIV (SIROH) project, which are very active in prevention, the degree of application of the measures provided for by the Directive, prior to its incorporation into Italian law. An open questionnaire covering the 9 focal points of the Directive, as a guide for a presentation at the SIROH meeting in 2013. Of 100 SIROH hospitals, 97% and 96% respectively provide specific information and education initiatives (54% and 73% of which expressly for new employees). All centres reinforce the ban on recapping, and 30 monitor its application by inspecting sharps containers; all hospitals place containers on mobile trolleys and 78 provide operating procedures for their replacement; all introduced at least one needlestick-prevention device (NPD; 4 on average, range 1-11), most frequently intravenous catheters (91%) and winged needles (87%), but 39% only in selected units; 14 centres implemented initiatives to eliminate unnecessary needles. Regarding hepatitis B, all centres screen and vaccinate HCWs but only 78% monitor their response: 89% of HCWs were immunized. Post-exposure management protocols, although based on the same rationale, differ significantly causing considerable differences in  costs. Most of the preventive interventions covered by the Directive were implemented in SIROH hospitals. It is necessary to invest in NPD availability and dissemination, elimination of unnecessary needles, and streamline post-exposure protocols. The situation in the remaining Italian facilities should be investigated.

  7. 21 CFR 58.120 - Protocol.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... FOR NONCLINICAL LABORATORY STUDIES Protocol for and Conduct of a Nonclinical Laboratory Study § 58.120 Protocol. (a) Each study shall have an approved written protocol that clearly indicates the objectives and all methods for the conduct of the study. The protocol shall contain, as applicable, the following...

  8. The Use of Protocols as Educational Tools for House Officers.

    ERIC Educational Resources Information Center

    Dworin, Aaron M.; Stross, Jeoffrey K.

    1979-01-01

    A project was initiated to determine whether protocols for the management of dysuria would be accepted by clinic house officers and whether these protocols could influence the care given to patients. Positive results were obtained in both areas. Significant improvement in documentation of patient history and diagnostic accuracy were noted. (JMD)

  9. Structure-Based Virtual Screening for Drug Discovery: Principles, Applications and Recent Advances

    PubMed Central

    Lionta, Evanthia; Spyrou, George; Vassilatis, Demetrios K.; Cournia, Zoe

    2014-01-01

    Structure-based drug discovery (SBDD) is becoming an essential tool in assisting fast and cost-efficient lead discovery and optimization. The application of rational, structure-based drug design is proven to be more efficient than the traditional way of drug discovery since it aims to understand the molecular basis of a disease and utilizes the knowledge of the three-dimensional structure of the biological target in the process. In this review, we focus on the principles and applications of Virtual Screening (VS) within the context of SBDD and examine different procedures ranging from the initial stages of the process that include receptor and library pre-processing, to docking, scoring and post-processing of topscoring hits. Recent improvements in structure-based virtual screening (SBVS) efficiency through ensemble docking, induced fit and consensus docking are also discussed. The review highlights advances in the field within the framework of several success studies that have led to nM inhibition directly from VS and provides recent trends in library design as well as discusses limitations of the method. Applications of SBVS in the design of substrates for engineered proteins that enable the discovery of new metabolic and signal transduction pathways and the design of inhibitors of multifunctional proteins are also reviewed. Finally, we contribute two promising VS protocols recently developed by us that aim to increase inhibitor selectivity. In the first protocol, we describe the discovery of micromolar inhibitors through SBVS designed to inhibit the mutant H1047R PI3Kα kinase. Second, we discuss a strategy for the identification of selective binders for the RXRα nuclear receptor. In this protocol, a set of target structures is constructed for ensemble docking based on binding site shape characterization and clustering, aiming to enhance the hit rate of selective inhibitors for the desired protein target through the SBVS process. PMID:25262799

  10. Medical management of ectopic pregnancy with single-dose and 2-dose methotrexate protocols: human chorionic gonadotropin trends and patient outcomes.

    PubMed

    Mergenthal, Michelle C; Senapati, Suneeta; Zee, Jarcy; Allen-Taylor, Lynne; Whittaker, Paul G; Takacs, Peter; Sammel, Mary D; Barnhart, Kurt T

    2016-11-01

    Ectopic pregnancy, although rare, is an important cause of female morbidity and mortality and early, effective treatment is critical. Systemic methotrexate has become widely accepted as a safe and effective alternative to surgery in the stable patient. As the number and timing of methotrexate doses differ in the 3 main medical treatment regimens, one might expect trends in serum human chorionic gonadotropin and time to resolution to vary depending on protocol. Furthermore, human chorionic gonadotropin trends and time to resolution may predict ultimate treatment success. This study hypothesized that the 2-dose methotrexate protocol would be associated with a faster initial decline in serum human chorionic gonadotropin levels and a shorter time to resolution compared to the single-dose protocol. A prospective multicenter cohort study included clinical data from women who received medical management for ectopic pregnancy. Rates of human chorionic gonadotropin change and successful pregnancy resolution were assessed. Propensity score modeling addressed confounding by indication, the potential for differential assignment of patients with better prognosis to the single-dose methotrexate protocol. In all, 162 ectopic pregnancies were in the final analysis; 114 (70%) were treated with the single-dose methotrexate and 48 (30%) with the 2-dose protocol. Site, race, ethnicity, and reported pain level were associated with differential protocol allocation (P < .001, P = .011, P < .001, and P = .035, respectively). Women had similar initial human chorionic gonadotropin levels in either protocol but the mean rate of decline of human chorionic gonadotropin from day 0 (day of administration of first dose of methotrexate) to day 7 was significantly more rapid in women who received the single-dose protocol compared to those treated with the 2-dose protocol (mean change -31.3% vs -10.4%, P = .037, adjusted for propensity score and site). The 2 protocols had no significant differences in success rate or time to resolution. In a racially and geographically diverse group of women, the single- and double-dose methotrexate protocols had comparable outcomes. The more rapid human chorionic gonadotropin initial decline in the single-dose group suggested these patients were probably at lower risk for ectopic rupture than those getting the 2-dose protocol. A prospective randomized controlled design is needed to remove confounding by indication. Copyright © 2016 Elsevier Inc. All rights reserved.

  11. [A security protocol for the exchange of personal medical data via Internet: monitoring treatment and drug effects].

    PubMed

    Viviani, R; Fischer, J; Spitzer, M; Freudenmann, R W

    2004-04-01

    We present a security protocol for the exchange of medical data via the Internet, based on the type/domain model. We discuss two applications of the protocol: in a system for the exchange of data for quality assurance, and in an on-line database of adverse reactions to drug use. We state that a type/domain security protocol can successfully comply with the complex requirements for data privacy and accessibility typical of such applications.

  12. Administration of medicines by emergency nurse practitioners according to protocols in an accident and emergency department.

    PubMed Central

    Marshall, J; Edwards, C; Lambert, M

    1997-01-01

    OBJECTIVE: To present the legal and professional issues related to nurse administration of drugs according to protocols, and describe the implementation and initial audit findings of such a scheme. SETTING: Accident and emergency (A&E) department of a district general hospital. METHODS: Analysis of legal and professional opinion. Protocols acceptable to the medical, nursing, and pharmacy professions were developed across a wide range of drugs appropriate for administration by accident and emergency nurse practitioners (ENPs). The first six months of the scheme were audited. Audit initially addressed general compliance with protocols and later the specific areas of tetanus immunisation and emergency contraception. RESULTS: ENPs assessed 2925 patients in six months (10.9% of all new patients); 455 patients (15.5% of the ENP patients) were given drugs according to protocols. There were no breaches of the protocols. Subsequent audit of tetanus immunisation showed 94-100% compliance with protocol standards and 71-100% compliance for emergency contraception. CONCLUSIONS: There are no legal or professional obstacles to the development of protocols for the administration of drugs to patients by nurses without reference to a doctor, providing the protocols meet all the requirements of the UKCC and have the support of consultant medical staff. Such a system must be subject to regular audit to promote a dynamic approach to protocols and training. The system safely enhanced the quality of care of patients treated by ENPs in A&E. Images Figure 1 PMID:9248912

  13. Considerations in establishing a post-mortem brain and tissue bank for the study of myalgic encephalomyelitis/chronic fatigue syndrome: a proposed protocol.

    PubMed

    Nacul, Luis; O'Donovan, Dominic G; Lacerda, Eliana M; Gveric, Djordje; Goldring, Kirstin; Hall, Alison; Bowman, Erinna; Pheby, Derek

    2014-06-18

    Our aim, having previously investigated through a qualitative study involving extensive discussions with experts and patients the issues involved in establishing and maintaining a disease specific brain and tissue bank for myalgic encephalomyelitis/chronic fatigue syndrome (ME/CFS), was to develop a protocol for a UK ME/CFS repository of high quality human tissue from well characterised subjects with ME/CFS and controls suitable for a broad range of research applications. This would involve a specific donor program coupled with rapid tissue collection and processing, supplemented by comprehensive prospectively collected clinical, laboratory and self-assessment data from cases and controls. We reviewed the operations of existing tissue banks from published literature and from their internal protocols and standard operating procedures (SOPs). On this basis, we developed the protocol presented here, which was designed to meet high technical and ethical standards and legal requirements and was based on recommendations of the MRC UK Brain Banks Network. The facility would be most efficient and cost-effective if incorporated into an existing tissue bank. Tissue collection would be rapid and follow robust protocols to ensure preservation sufficient for a wide range of research uses. A central tissue bank would have resources both for wide-scale donor recruitment and rapid response to donor death for prompt harvesting and processing of tissue. An ME/CFS brain and tissue bank could be established using this protocol. Success would depend on careful consideration of logistic, technical, legal and ethical issues, continuous consultation with patients and the donor population, and a sustainable model of funding ideally involving research councils, health services, and patient charities. This initiative could revolutionise the understanding of this still poorly-understood disease and enhance development of diagnostic biomarkers and treatments.

  14. Developing an evidence-based nursing protocol on wound drain management for total joint arthroplasty.

    PubMed

    Tsang, Lap Fung

    2015-05-01

    Although various drains have long been used for many years in total joint replacement, there is a paucity of evidence for the benefit of drain applications. Evidence suggests inconsistent practice in the use of drainage systems, whether intermittently applying suction or free of suction in the application of drainage systems, as well as the optimal timing for wound drain removal. It aimed to perform a systematic review to develop an evidence-based nursing protocol to manage wound drainage following total joint arthroplasty. A comprehensive systematic review of available evidence up to 2013. Searches of the EMBASE, Cochrane library, CINAHL, Medline electronic databases and an internet search by Yahoo and Google engine returned 2840 records, of which 11 met the inclusion criteria for this review. A further two papers were obtained through scanning the reference lists of those articles included from the initial literature search. Different clamping times were retrieved from the literature. A protocol was adapted for clinical application according to the summary of the retrieved information. It is suggested that clamping is performed 1 h after the insertion of suction drains post-operatively in the operating theatre. Wound drains should be clamped for 1 h if blood loss is more than 600 ml in 6 h in first 24 h. Wound drains should be clamped for 1 h if blood loss is more than 800 ml in 8 h thereafter. It is suggested that the drainage reservoir bottle should be mark and findings recorded in line with the principle of drain clamping. This means that the amount of drainage is measured and recorded every 6 h in first 24 h and every 8 h thereafter. It is suggested that wound drains should be remove before 48 h after TJR. If blood loss is less than 50 ml in past 6 h or less than 70 ml in past 8 h, the drain should be remove and the wound site should be monitored closely. This paper has guided nurses to develop an evidence-based protocol to improve patient care on wound drain management. Further study is necessary to evaluate the effectiveness of the protocol. Copyright © 2014 Elsevier Ltd. All rights reserved.

  15. Design of a Channel Error Simulator using Virtual Instrument Techniques for the Initial Testing of TCP/IP and SCPS Protocols

    NASA Technical Reports Server (NTRS)

    Horan, Stephen; Wang, Ru-Hai

    1999-01-01

    There exists a need for designers and developers to have a method to conveniently test a variety of communications parameters for an overall system design. This is no different when testing network protocols as when testing modulation formats. In this report, we discuss a means of providing a networking test device specifically designed to be used for space communications. This test device is a PC-based Virtual Instrument (VI) programmed using the LabVIEW(TM) version 5 software suite developed by National Instruments(TM)TM. This instrument was designed to be portable and usable by others without special, additional equipment. The programming was designed to replicate a VME-based hardware module developed earlier at New Mexico State University (NMSU) and to provide expanded capabilities exceeding the baseline configuration existing in that module. This report describes the design goals for the VI module in the next section and follows that with a description of the design of the VI instrument. This is followed with a description of the validation tests run on the VI. An application of the error-generating VI to networking protocols is then given.

  16. Is reducing variability of blood glucose the real but hidden target of intensive insulin therapy?

    PubMed

    Egi, Moritoki; Bellomo, Rinaldo; Reade, Michael C

    2009-01-01

    Since the first report that intensive insulin therapy reduced mortality in selected surgical critically ill patients, lowering of blood glucose levels has been recommended as a means of improving patient outcomes. In this initial Leuven trial, blood glucose control by protocol using insulin was applied to 98.7% of patients in the intensive group but to only 39.2% (P < 0.0001) of patients in the control group. If appropriately applied, such protocols should decrease both the mean blood glucose concentration and its variability (variation of blood glucose concentration). Thus, it is logically possible that the benefit of intensive insulin therapy in the first Leuven trial was due to a decrease in mean glucose levels, a decrease in their variability, or both. Several recent studies have confirmed significant associations between variability of blood glucose levels and patient outcomes. Decreasing the variability of blood glucose levels might be an important dimension of glucose management, a possible mechanism by which an intensive insulin protocol exerts its putative beneficial effects, and an important goal of glucose management in the intensive care unit. Clinicians need to be aware of this controversy when considering the application of intensive insulin therapy and interpreting future trials.

  17. Dysphonia risk screening protocol

    PubMed Central

    Nemr, Katia; Simões-Zenari, Marcia; da Trindade Duarte, João Marcos; Lobrigate, Karen Elena; Bagatini, Flavia Alves

    2016-01-01

    OBJECTIVE: To propose and test the applicability of a dysphonia risk screening protocol with score calculation in individuals with and without dysphonia. METHOD: This descriptive cross-sectional study included 365 individuals (41 children, 142 adult women, 91 adult men and 91 seniors) divided into a dysphonic group and a non-dysphonic group. The protocol consisted of 18 questions and a score was calculated using a 10-cm visual analog scale. The measured value on the visual analog scale was added to the overall score, along with other partial scores. Speech samples allowed for analysis/assessment of the overall degree of vocal deviation and initial definition of the respective groups and after six months, the separation of the groups was confirmed using an acoustic analysis. RESULTS: The mean total scores were different between the groups in all samples. Values ranged between 37.0 and 57.85 in the dysphonic group and between 12.95 and 19.28 in the non-dysphonic group, with overall means of 46.09 and 15.55, respectively. High sensitivity and specificity were demonstrated when discriminating between the groups with the following cut-off points: 22.50 (children), 29.25 (adult women), 22.75 (adult men), and 27.10 (seniors). CONCLUSION: The protocol demonstrated high sensitivity and specificity in differentiating groups of individuals with and without dysphonia in different sample groups and is thus an effective instrument for use in voice clinics. PMID:27074171

  18. An energy-aware routing protocol for query-based applications in wireless sensor networks.

    PubMed

    Ahvar, Ehsan; Ahvar, Shohreh; Lee, Gyu Myoung; Crespi, Noel

    2014-01-01

    Wireless sensor network (WSN) typically has energy consumption restriction. Designing energy-aware routing protocol can significantly reduce energy consumption in WSNs. Energy-aware routing protocols can be classified into two categories, energy savers and energy balancers. Energy saving protocols are used to minimize the overall energy consumed by a WSN, while energy balancing protocols attempt to efficiently distribute the consumption of energy throughout the network. In general terms, energy saving protocols are not necessarily good at balancing energy consumption and energy balancing protocols are not always good at reducing energy consumption. In this paper, we propose an energy-aware routing protocol (ERP) for query-based applications in WSNs, which offers a good trade-off between traditional energy balancing and energy saving objectives and supports a soft real time packet delivery. This is achieved by means of fuzzy sets and learning automata techniques along with zonal broadcasting to decrease total energy consumption.

  19. An Energy-Aware Routing Protocol for Query-Based Applications in Wireless Sensor Networks

    PubMed Central

    Crespi, Noel

    2014-01-01

    Wireless sensor network (WSN) typically has energy consumption restriction. Designing energy-aware routing protocol can significantly reduce energy consumption in WSNs. Energy-aware routing protocols can be classified into two categories, energy savers and energy balancers. Energy saving protocols are used to minimize the overall energy consumed by a WSN, while energy balancing protocols attempt to efficiently distribute the consumption of energy throughout the network. In general terms, energy saving protocols are not necessarily good at balancing energy consumption and energy balancing protocols are not always good at reducing energy consumption. In this paper, we propose an energy-aware routing protocol (ERP) for query-based applications in WSNs, which offers a good trade-off between traditional energy balancing and energy saving objectives and supports a soft real time packet delivery. This is achieved by means of fuzzy sets and learning automata techniques along with zonal broadcasting to decrease total energy consumption. PMID:24696640

  20. Grid Application Meta-Repository System: Repository Interconnectivity and Cross-domain Application Usage in Distributed Computing Environments

    NASA Astrophysics Data System (ADS)

    Tudose, Alexandru; Terstyansky, Gabor; Kacsuk, Peter; Winter, Stephen

    Grid Application Repositories vary greatly in terms of access interface, security system, implementation technology, communication protocols and repository model. This diversity has become a significant limitation in terms of interoperability and inter-repository access. This paper presents the Grid Application Meta-Repository System (GAMRS) as a solution that offers better options for the management of Grid applications. GAMRS proposes a generic repository architecture, which allows any Grid Application Repository (GAR) to be connected to the system independent of their underlying technology. It also presents applications in a uniform manner and makes applications from all connected repositories visible to web search engines, OGSI/WSRF Grid Services and other OAI (Open Archive Initiative)-compliant repositories. GAMRS can also function as a repository in its own right and can store applications under a new repository model. With the help of this model, applications can be presented as embedded in virtual machines (VM) and therefore they can be run in their native environments and can easily be deployed on virtualized infrastructures allowing interoperability with new generation technologies such as cloud computing, application-on-demand, automatic service/application deployments and automatic VM generation.

  1. PNNI Performance Validation Test Report

    NASA Technical Reports Server (NTRS)

    Dimond, Robert P.

    1999-01-01

    Two Private Network-Network Interface (PNNI) neighboring peers were monitored with a protocol analyzer to understand and document how PNNI works with regards to initialization and recovery processes. With the processes documented, pertinent events were found and measured to determine the protocols behavior in several environments, which consisted of congestion and/or delay. Subsequent testing of the protocol in these environments was conducted to determine the protocol's suitability for use in satellite-terrestrial network architectures.

  2. Research into alternative network approaches for space operations

    NASA Technical Reports Server (NTRS)

    Kusmanoff, Antone L.; Barton, Timothy J.

    1990-01-01

    The main goal is to resolve the interoperability problem of applications employing DOD TCP/IP (Department of Defence Transmission Control Protocol/Internet Protocol) family of protocols on a CCITT/ISO based network. The objective is to allow them to communicate over the CCITT/ISO protocol GPLAN (General Purpose Local Area Network) network without modification to the user's application programs. There were two primary assumptions associated with the solution that was actually realized. The first is that the solution had to allow for future movement to the exclusive use of the CCITT/ISO standards. The second is that the solution had to be software transparent to the currently installed TCP/IP and CCITT/ISO user application programs.

  3. Comparative Study on Various Authentication Protocols in Wireless Sensor Networks.

    PubMed

    Rajeswari, S Raja; Seenivasagam, V

    2016-01-01

    Wireless sensor networks (WSNs) consist of lightweight devices with low cost, low power, and short-ranged wireless communication. The sensors can communicate with each other to form a network. In WSNs, broadcast transmission is widely used along with the maximum usage of wireless networks and their applications. Hence, it has become crucial to authenticate broadcast messages. Key management is also an active research topic in WSNs. Several key management schemes have been introduced, and their benefits are not recognized in a specific WSN application. Security services are vital for ensuring the integrity, authenticity, and confidentiality of the critical information. Therefore, the authentication mechanisms are required to support these security services and to be resilient to distinct attacks. Various authentication protocols such as key management protocols, lightweight authentication protocols, and broadcast authentication protocols are compared and analyzed for all secure transmission applications. The major goal of this survey is to compare and find out the appropriate protocol for further research. Moreover, the comparisons between various authentication techniques are also illustrated.

  4. Comparative Study on Various Authentication Protocols in Wireless Sensor Networks

    PubMed Central

    Rajeswari, S. Raja; Seenivasagam, V.

    2016-01-01

    Wireless sensor networks (WSNs) consist of lightweight devices with low cost, low power, and short-ranged wireless communication. The sensors can communicate with each other to form a network. In WSNs, broadcast transmission is widely used along with the maximum usage of wireless networks and their applications. Hence, it has become crucial to authenticate broadcast messages. Key management is also an active research topic in WSNs. Several key management schemes have been introduced, and their benefits are not recognized in a specific WSN application. Security services are vital for ensuring the integrity, authenticity, and confidentiality of the critical information. Therefore, the authentication mechanisms are required to support these security services and to be resilient to distinct attacks. Various authentication protocols such as key management protocols, lightweight authentication protocols, and broadcast authentication protocols are compared and analyzed for all secure transmission applications. The major goal of this survey is to compare and find out the appropriate protocol for further research. Moreover, the comparisons between various authentication techniques are also illustrated. PMID:26881272

  5. Evaluation of American Board of Orthodontics certification protocols in postgraduate orthodontic programs in the United States and Canada.

    PubMed

    Park, Jae Hyun; Putrus, Raphael R; Pruzansky, Dawn P; Grubb, John

    2017-03-01

    The objective of this study was to identify the board certification protocols that hospital and university-based postgraduate orthodontic programs have in place to prepare residents for the American Board of Orthodontics (ABO) certification examination. An electronic survey was sent to the program directors of each of the 72 postgraduate orthodontic programs in the United States and Canada. The survey consisted of 49 questions about demographics, resident case assignment protocols, and ABO examination preparation methods. The response rate was 81%. Most programs were 30 to 36 months in length (72.7%). Many residents had a case load of 51 to 75 during their first year (50.9%), with an average maximum case load of 70 to 109. There was a positive correlation with both the number of cases that first-year residents start and the length of the program (Spearman correlation coefficient = 0.379; P <0.01) when compared with maximum case load. Approximately 72% of the programs do not offer a written mock board examination; however, 72% reported offering a clinical mock board examination. ABO cases are identified within the first 6 months of most programs. About 88% of respondents believe that residents take advantage of the banking system, and that over the past 5 years ABO Initial Certification Examination applications have increased. Most program directors (89.1%) believe that their program length is sufficient for board preparation. Subjects tested in the written examination are integrated into the didactic curriculum and strengthened with ongoing literature reviews, with a passing rate over 90%. Clinical examination preparation varies, with most programs requiring a mock board examination for graduation. Total participation in both the Initial Certification Examination and banking has increased since 2010; better follow-up protocols are needed to track residents after graduation. Copyright © 2017 American Association of Orthodontists. Published by Elsevier Inc. All rights reserved.

  6. Cool Apps: Building Cryospheric Data Applications With Standards-Based Service Oriented Architecture

    NASA Astrophysics Data System (ADS)

    Collins, J. A.; Truslove, I.; Billingsley, B. W.; Oldenburg, J.; Brodzik, M.; Lewis, S.; Liu, M.

    2012-12-01

    The National Snow and Ice Data Center (NSIDC) holds a large collection of cryospheric data, and is involved in a number of informatics research and development projects aimed at improving the discoverability and accessibility of these data. To develop high-quality software in a timely manner, we have adopted a Service-Oriented Architecture (SOA) approach for our core technical infrastructure development. Data services at NSIDC are internally exposed to other tools and applications through standards-based service interfaces. These standards include OAI-PMH (Open Archives Initiative Protocol for Metadata Harvesting), various OGC (Open Geospatial Consortium) standards including WMS (Web Map Service) and WFS (Web Feature Service), ESIP (Federation of Earth Sciences Information Partners) OpenSearch, and NSIDC-specific RESTful services. By taking a standards-based approach, we are able to use off-the-shelf tools and libraries to consume, translate and broker these data services, and thus develop applications faster. Additionally, by exposing public interfaces to these services we provide valuable data services to technical collaborators; for example, NASA Reverb (http://reverb.echo.nasa.gov) uses NSIDC's WMS services. Our latest generation of web applications consume these data services directly. The most complete example of this is the Operation IceBridge Data Portal (http://nsidc.org/icebridge/portal) which depends on many of the aforementioned services, and clearly exhibits many of the advantages of building applications atop a service-oriented architecture. This presentation outlines the architectural approach and components and open standards and protocols adopted at NSIDC, demonstrates the interactions and uses of public and internal service interfaces currently powering applications including the IceBridge Data Portal, and outlines the benefits and challenges of this approach.

  7. SAMP, the Simple Application Messaging Protocol: Letting applications talk to each other

    NASA Astrophysics Data System (ADS)

    Taylor, M. B.; Boch, T.; Taylor, J.

    2015-06-01

    SAMP, the Simple Application Messaging Protocol, is a hub-based communication standard for the exchange of data and control between participating client applications. It has been developed within the context of the Virtual Observatory with the aim of enabling specialised data analysis tools to cooperate as a loosely integrated suite, and is now in use by many and varied desktop and web-based applications dealing with astronomical data. This paper reviews the requirements and design principles that led to SAMP's specification, provides a high-level description of the protocol, and discusses some of its common and possible future usage patterns, with particular attention to those factors that have aided its success in practice.

  8. Progeria 101/FAQ

    MedlinePlus

    ... Culture Protocols Immortalized Cell Culture Protocols Induced Pluripotent Stem Cells PRF Cell and Tissue Bank Publications Research Funding Opportunities Grant Application Application Deadlines Grants Funded Close Meet The Kids Meet The Kids Our Ambassadors Find The Other ...

  9. Protocols for second-generation business satellites systems

    NASA Astrophysics Data System (ADS)

    Evans, B. G.; Coakley, F. P.; El Amin, M. H. M.

    The paper discusses the nature and mix of traffic in business satellite systems and describes the limitations on the protocol imposed by the differing impairments of speech, video, and data. A simple TDMA system protocol is presented which meets the requirements of mixed-service operation. The efficiency of the protocol together with implications for allocation, scheduling and synchronisation are discussed. Future-generation satellites will probably use on-board processing. Some initial work on protocols that make use of on-board processing and the implications for satellite and earth-station equipment are presented.

  10. Biophysical Approaches for Oral Wound Healing: Emphasis on Photobiomodulation

    PubMed Central

    Khan, Imran; Arany, Praveen

    2015-01-01

    Significance: Oral wounds can lead to significant pain and discomfort as well as affect overall general health due to poor diet and inadequate nutrition. Besides many biological and pharmaceutical methods being investigated, there is growing interest in exploring various biophysical devices that utilize electric, magnetic, ultrasound, pressure, and light energy. Recent Advances: Significant insight into mechanisms of these biophysical devices could provide a clear rationale for their clinical use. Preclinical studies are essential precursors in determining physiological mechanisms and elucidation of causal pathways. This will lead to development of safe and effective therapeutic protocols for clinical wound management. Critical Issues: Identification of precise events initiated by biophysical devices, specifically photobiomodulation—the major focus of this review, offers promising avenues in improving oral wound management. The primary phase responses initiated by the interventions that distinctly contribute to the therapeutic response must be clearly delineated from secondary phase responses. The latter events are a consequence of the wound healing process and must not be confused with causal mechanisms. Future Direction: Clinical adoption of these biophysical devices needs robust and efficacious protocols that can be developed by well-designed preclinical and clinical studies. Elucidation of the precise molecular mechanisms of these biophysical approaches could determine optimization of their applications for predictive oral wound care. PMID:26634185

  11. Optimizing the Protocol for Pulmonary Cryoablation: A Comparison of a Dual- and Triple-Freeze Protocol

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Hinshaw, J. Louis, E-mail: jhinshaw@uwhealth.or; Littrup, Peter J.; Durick, Nathan

    2010-12-15

    The purpose of this study was to compare a double freeze-thaw protocol to a triple freeze-thaw protocol for pulmonary cryoablation utilizing an in vivo porcine lung model. A total of 18 cryoablations were performed in normal porcine lung utilizing percutaneous technique with 9 each in a double- (10-5-10) and triple-freeze (3-3-7-7-5) protocol. Serial noncontrast CT images were obtained during the ablation. CT imaging findings and pathology were reviewed. No imaging changes were identified during the initial freeze cycle with either protocol. However, during the first thaw cycle, a region of ground glass opacity developed around the probe with both protocols.more » Because the initial freeze was shorter with the triple freeze-thaw protocol, the imaging findings were apparent sooner with this protocol (6 vs. 13 min). Also, despite a shorter total freeze time (15 vs. 20 min), the ablation zone identified with the triple freeze-thaw protocol was not significantly different from the double freeze-thaw protocol (mean diameter: 1.67 {+-} 0.41 cm vs. 1.66 {+-} 0.21 cm, P = 0.77; area: 2.1 {+-} 0.48 cm{sup 2} vs. 1.99 {+-} 0.62 cm{sup 2}, P = 0.7; and circularity: 0.95 {+-} 0.04 vs. 0.96 {+-} 0.03, P = 0.62, respectively). This study suggests that there may be several advantages of a triple freeze-thaw protocol for pulmonary cryoablation, including earlier identification of the imaging findings associated with the ablation, the promise of a shorter procedure time or larger zones of ablation, and theoretically, more effective cytotoxicity related to the additional freeze-thaw cycle.« less

  12. Legal and ethical obligations to conduct a clinical drug trial in Australia as an investigator initiated and sponsored study for an overseas pharmaceutical company.

    PubMed

    Beran, Roy G

    2004-01-01

    Most multi-centre trials are both financed and sponsored by the pharmaceutical company involved. What follows will map the path adopted for an investigator initiated and sponsored study for a new indication of an established medication. The chief investigators of a company-sponsored, investigator-initiated, multi-centre, placebo-controlled study of an established medication, Pharmaceutical Benefit Scheme (PBS) listed for treatment of one condition but trialled in the management of another condition (trial of off-label use), were approached to submit a protocol to repeat the type of study with a different compound. The new study would test a different agent, also PBS listed, for the same condition as in the initial study and with the same off-licence application. The company would finance the study, provide the medication and matched placebo but only review the investigator-initiated protocol which would be sponsored by the principal investigator. This required the investigator to implement the trial, as would normally be done by the pharmaceutical company, yet also act as its principal investigator. The principal investigator, with colleagues and a Clinical Research Organisation (CRO), developed a protocol, adapted for the new agent, and submitted it for approval. Upon acceptance a contract was negotiated with the pharmaceutical company which had to overcome jurisdictional conflicts between common law and civil law legal systems. A CRO was contracted to undertake administrative functions which dictated special contractual agreements to overcome possible conflicts of interest for a sponsor/investigator to protect patient interests. There was need to find indemnification insurance with jurisdictional problems, co-investigators, ethics committee approvals and finance management as just some of the difficulties encountered. The paper will outline how these obstacles were overcome and how ethical and legal issues were respected through compromise. The ethical and legal obligations were addressed in a fashion which allowed the conduct of a trial adopting a proven methodology but novel infrastructure such that it was a totally independent study with regards conduct and reporting of final data, irrespective of the results being either positive or negative. This may represent a more acceptable way to ensure that future clinical trials are devoid of undue influence from the pharmaceutical industry which may still fund the study.

  13. Development of a cloud-based application for the Fracture Liaison Service model of care.

    PubMed

    Holzmueller, C G; Karp, S; Zeldow, D; Lee, D B; Thompson, D A

    2016-02-01

    The aims of this study are to develop a cloud-based application of the Fracture Liaison Service for practitioners to coordinate the care of osteoporotic patients after suffering primary fractures and provide a performance feedback portal for practitioners to determine quality of care. The application provides continuity of care, improved patient outcomes, and reduced medical costs. The purpose of this study is to describe the content development and functionality of a cloud-based application to broadly deploy the Fracture Liaison Service (FLS) to coordinate post-fracture care for osteoporotic patients. The Bone Health Collaborative developed the FLS application in 2013 to support practitioners' access to information and management of patients and provide a feedback portal for practitioners to track their performance in providing quality care. A five-step protocol (identify, inform, initiate, investigate, and iterate) organized osteoporotic post-fracture care-related tasks and timelines for the application. A range of descriptive data about the patient, their medical condition, therapies and care, and current providers can be collected. Seven quality of care measures from the National Quality Forum, The Joint Commission, and the Centers for Medicare and Medicaid Services can be tracked through the application. There are five functional areas including home, tasks, measures, improvement, and data. The home, tasks, and data pages are used to enter patient information and coordinate care using the five-step protocol. Measures and improvement pages are used to enter quality measures and provide practitioners with continuous performance feedback. The application resides within a portal, running on a multitenant, private cloud-based Avedis enterprise registry platform. All data are encrypted in transit and users access the application using a password from any common web browser. The application could spread the FLS model of care across the US health care system, provide continuity of care, effectively manage osteoporotic patients, improve outcomes, and reduce medical costs.

  14. Personalized medicine for targeted and platinum-based chemotherapy of lung and bladder cancer

    PubMed Central

    Cimino, George D; Pan, Chong-xian; Henderson, Paul T

    2013-01-01

    The personalized medicine revolution is occurring for cancer chemotherapy. Biomarkers are increasingly capable of distinguishing genotypic or phenotypic traits of individual tumors, and are being linked to the selection of treatment protocols. This review covers the molecular basis for biomarkers of response to targeted and cytotoxic lung and bladder cancer treatment with an emphasis on platinum-based chemotherapy. Platinum derivatives are a class of drugs commonly employed against solid tumors that kill cells by covalent attachment to DNA. Platinum–DNA adduct levels in patient tissues have been correlated to response and survival. The sensitivity and precision of adduct detection has increased to the point of enabling subtherapeutic dosing for diagnostics applications, termed diagnostic microdosing, prior to the initiation of full-dose therapy. The clinical status of this unique phenotypic marker for lung and bladder cancer applications is detailed along with discussion of future applications. PMID:23394702

  15. Providing end-to-end QoS for multimedia applications in 3G wireless networks

    NASA Astrophysics Data System (ADS)

    Guo, Katherine; Rangarajan, Samapth; Siddiqui, M. A.; Paul, Sanjoy

    2003-11-01

    As the usage of wireless packet data services increases, wireless carriers today are faced with the challenge of offering multimedia applications with QoS requirements within current 3G data networks. End-to-end QoS requires support at the application, network, link and medium access control (MAC) layers. We discuss existing CDMA2000 network architecture and show its shortcomings that prevent supporting multiple classes of traffic at the Radio Access Network (RAN). We then propose changes in RAN within the standards framework that enable support for multiple traffic classes. In addition, we discuss how Session Initiation Protocol (SIP) can be augmented with QoS signaling for supporting end-to-end QoS. We also review state of the art scheduling algorithms at the base station and provide possible extensions to these algorithms to support different classes of traffic as well as different classes of users.

  16. Telerobotic system performance measurement - Motivation and methods

    NASA Technical Reports Server (NTRS)

    Kondraske, George V.; Khoury, George J.

    1992-01-01

    A systems performance-based strategy for modeling and conducting experiments relevant to the design and performance characterization of telerobotic systems is described. A developmental testbed consisting of a distributed telerobotics network and initial efforts to implement the strategy described is presented. Consideration is given to the general systems performance theory (GSPT) to tackle human performance problems as a basis for: measurement of overall telerobotic system (TRS) performance; task decomposition; development of a generic TRS model; and the characterization of performance of subsystems comprising the generic model. GSPT employs a resource construct to model performance and resource economic principles to govern the interface of systems to tasks. It provides a comprehensive modeling/measurement strategy applicable to complex systems including both human and artificial components. Application is presented within the framework of a distributed telerobotics network as a testbed. Insight into the design of test protocols which elicit application-independent data is described.

  17. Performance bounds on parallel self-initiating discrete-event

    NASA Technical Reports Server (NTRS)

    Nicol, David M.

    1990-01-01

    The use is considered of massively parallel architectures to execute discrete-event simulations of what is termed self-initiating models. A logical process in a self-initiating model schedules its own state re-evaluation times, independently of any other logical process, and sends its new state to other logical processes following the re-evaluation. The interest is in the effects of that communication on synchronization. The performance is considered of various synchronization protocols by deriving upper and lower bounds on optimal performance, upper bounds on Time Warp's performance, and lower bounds on the performance of a new conservative protocol. The analysis of Time Warp includes the overhead costs of state-saving and rollback. The analysis points out sufficient conditions for the conservative protocol to outperform Time Warp. The analysis also quantifies the sensitivity of performance to message fan-out, lookahead ability, and the probability distributions underlying the simulation.

  18. Construction and Testing of Coin Cells of Lithium Ion Batteries

    PubMed Central

    Kayyar, Archana; Huang, Jiajia; Samiee, Mojtaba; Luo, Jian

    2012-01-01

    Rechargeable lithium ion batteries have wide applications in electronics, where customers always demand more capacity and longer lifetime. Lithium ion batteries have also been considered to be used in electric and hybrid vehicles1 or even electrical grid stabilization systems2. All these applications simulate a dramatic increase in the research and development of battery materials3-7, including new materials3,8, doping9, nanostructuring10-13, coatings or surface modifications14-17 and novel binders18. Consequently, an increasing number of physicists, chemists and materials scientists have recently ventured into this area. Coin cells are widely used in research laboratories to test new battery materials; even for the research and development that target large-scale and high-power applications, small coin cells are often used to test the capacities and rate capabilities of new materials in the initial stage. In 2010, we started a National Science Foundation (NSF) sponsored research project to investigate the surface adsorption and disordering in battery materials (grant no. DMR-1006515). In the initial stage of this project, we have struggled to learn the techniques of assembling and testing coin cells, which cannot be achieved without numerous help of other researchers in other universities (through frequent calls, email exchanges and two site visits). Thus, we feel that it is beneficial to document, by both text and video, a protocol of assembling and testing a coin cell, which will help other new researchers in this field. This effort represents the "Broader Impact" activities of our NSF project, and it will also help to educate and inspire students. In this video article, we document a protocol to assemble a CR2032 coin cell with a LiCoO2 working electrode, a Li counter electrode, and (the mostly commonly used) polyvinylidene fluoride (PVDF) binder. To ensure new learners to readily repeat the protocol, we keep the protocol as specific and explicit as we can. However, it is important to note that in specific research and development work, many parameters adopted here can be varied. First, one can make coin cells of different sizes and test the working electrode against a counter electrode other than Li. Second, the amounts of C black and binder added into the working electrodes are often varied to suit the particular purpose of research; for example, large amounts of C black or even inert powder were added to the working electrode to test the "intrinsic" performance of cathode materials14. Third, better binders (other than PVDF) have also developed and used18. Finally, other types of electrolytes (instead of LiPF6) can also be used; in fact, certain high-voltage electrode materials will require the uses of special electrolytes7. PMID:22895280

  19. Construction and testing of coin cells of lithium ion batteries.

    PubMed

    Kayyar, Archana; Huang, Jiajia; Samiee, Mojtaba; Luo, Jian

    2012-08-02

    Rechargeable lithium ion batteries have wide applications in electronics, where customers always demand more capacity and longer lifetime. Lithium ion batteries have also been considered to be used in electric and hybrid vehicles or even electrical grid stabilization systems. All these applications simulate a dramatic increase in the research and development of battery materials, including new materials, doping, nanostructuring, coatings or surface modifications and novel binders. Consequently, an increasing number of physicists, chemists and materials scientists have recently ventured into this area. Coin cells are widely used in research laboratories to test new battery materials; even for the research and development that target large-scale and high-power applications, small coin cells are often used to test the capacities and rate capabilities of new materials in the initial stage. In 2010, we started a National Science Foundation (NSF) sponsored research project to investigate the surface adsorption and disordering in battery materials (grant no. DMR-1006515). In the initial stage of this project, we have struggled to learn the techniques of assembling and testing coin cells, which cannot be achieved without numerous help of other researchers in other universities (through frequent calls, email exchanges and two site visits). Thus, we feel that it is beneficial to document, by both text and video, a protocol of assembling and testing a coin cell, which will help other new researchers in this field. This effort represents the "Broader Impact" activities of our NSF project, and it will also help to educate and inspire students. In this video article, we document a protocol to assemble a CR2032 coin cell with a LiCoO2 working electrode, a Li counter electrode, and (the mostly commonly used) polyvinylidene fluoride (PVDF) binder. To ensure new learners to readily repeat the protocol, we keep the protocol as specific and explicit as we can. However, it is important to note that in specific research and development work, many parameters adopted here can be varied. First, one can make coin cells of different sizes and test the working electrode against a counter electrode other than Li. Second, the amounts of C black and binder added into the working electrodes are often varied to suit the particular purpose of research; for example, large amounts of C black or even inert powder were added to the working electrode to test the "intrinsic" performance of cathode materials. Third, better binders (other than PVDF) have also developed and used. Finally, other types of electrolytes (instead of LiPF6) can also be used; in fact, certain high-voltage electrode materials will require the uses of special electrolytes.

  20. (CF3CO)2O/CF3SO3H-mediated synthesis of 1,3-diketones from carboxylic acids and aromatic ketones

    PubMed Central

    Kim, JungKeun; Shokova, Elvira; Tafeenko, Victor

    2014-01-01

    Summary A very simple and convenient reaction for 1,3-diketone preparation from carboxylic acids and aromatic ketones in TFAA/TfOH system is described. When the β-phenylpropionic acids were used as starting materials, they initially gave 1-indanones and then underwent further acylation with the formation of 2-(β-phenylpropionyl)-1-indanones as the main reaction products. In addition, the application of the proposed protocol allowed for the synthesis of selected polysubstituted pyrazoles in a one-pot procedure directly from acids and ketones. PMID:25298794

  1. CREATION OF THE MODEL ADDITIONAL PROTOCOL

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Houck, F.; Rosenthal, M.; Wulf, N.

    In 1991, the international nuclear nonproliferation community was dismayed to discover that the implementation of safeguards by the International Atomic Energy Agency (IAEA) under its NPT INFCIRC/153 safeguards agreement with Iraq had failed to detect Iraq's nuclear weapon program. It was now clear that ensuring that states were fulfilling their obligations under the NPT would require not just detecting diversion but also the ability to detect undeclared materials and activities. To achieve this, the IAEA initiated what would turn out to be a five-year effort to reappraise the NPT safeguards system. The effort engaged the IAEA and its Member Statesmore » and led to agreement in 1997 on a new safeguards agreement, the Model Protocol Additional to the Agreement(s) between States and the International Atomic Energy Agency for the Application of Safeguards. The Model Protocol makes explicit that one IAEA goal is to provide assurance of the absence of undeclared nuclear material and activities. The Model Protocol requires an expanded declaration that identifies a State's nuclear potential, empowers the IAEA to raise questions about the correctness and completeness of the State's declaration, and, if needed, allows IAEA access to locations. The information required and the locations available for access are much broader than those provided for under INFCIRC/153. The negotiation was completed in quite a short time because it started with a relatively complete draft of an agreement prepared by the IAEA Secretariat. This paper describes how the Model Protocol was constructed and reviews key decisions that were made both during the five-year period and in the actual negotiation.« less

  2. Extracorporeal membrane oxygenation (ECMO) assisted cardiopulmonary resuscitation or uncontrolled donation after the circulatory determination of death following out-of-hospital refractory cardiac arrest-An ethical analysis of an unresolved clinical dilemma.

    PubMed

    Dalle Ave, Anne L; Shaw, David M; Gardiner, Dale

    2016-11-01

    The availability of extracorporeal membrane oxygenation (ECMO) assisted cardiopulmonary resuscitation (E-CPR), for use in refractory out-of hospital cardiac arrest (OHCA), is increasing. In parallel, some countries have developed uncontrolled donation after circulatory determination of death (uDCDD) programs using ECMO to preserve organs for transplantation purposes. When facing a refractory OHCA, how does the medical team choose between initiating ECMO as part of an E-CPR protocol or ECMO as part of a uDCDD protocol? To answer these questions we conducted a literature review on E-CPR compared to uDCDD protocols using ECMO and analyzed the raised ethical issues. Our analysis reveals that the inclusion criteria in E-CPR and uDCDD protocols are similar. There may be a non-negligible risk of including patients in a uDCDD protocol, when the patient might have been saved by the use of E-CPR. In order to avoid the fatal error of letting a saveable patient die, safeguards are necessary. We recommend: (1) the development of internationally accepted termination of resuscitation guidelines that would have to be satisfied prior to inclusion of patients in any uDCDD protocol, (2) the choice regarding modalities of ongoing resuscitation during transfer should be focused on the primary priority of attempting to save the life of patients, (3) only centers of excellence in life-saving resuscitation should initiate or maintain uDCDD programs, (4) E-CPR should be clinically considered first before the initiation of any uDCDD protocol, and (5) there should be no discrimination in the availability of access to E-CPR. Copyright © 2016 Elsevier Ireland Ltd. All rights reserved.

  3. Evaluating and improving recruitment and retention in an mHealth clinical trial: an example of iterating methods during a trial.

    PubMed

    Pfammatter, Angela Fidler; Mitsos, Alexa; Wang, Shirlene; Hood, Susan Hammett; Spring, Bonnie

    2017-01-01

    Recruitment and retention strategy investigations in mHealth clinical trials are rare. Technology presents an opportunity to intensely and remotely evaluate recruitment, use of mobile apps, and retention, leading to new insights for continuous improvement of mHealth trials. The objective of this paper is to present a case study in which a trial evaluated and changed strategies during a clinical trial to improve recruitment, adherence to study protocols, and retention in the mHealth trial. In Fall 2015, the NUYou trial enrolled 150 college freshmen in an mHealth protocol. Three months after study initiation, NUYou struggled to meet recruitment goals and maintain anticipated usage levels of the study smartphone application. Two sets of data were collected to improve recruitment and retention: a survey about recruitment was sent to the target population and surveys regarding usability of the app was sent to the study sample. Survey results informed improvements in recruitment strategies, the study retention protocol, and the smartphone application. Survey results revealed several insights including misunderstanding components of the trial by potential participants, low perceived usefulness of the app, and little recall or impact of the incentive structure. After implementation of user-centered improvements, the second cohort of NUYou recruitment in the fall of 2016 produced an equal sample size in 4 weeks less time. Winter quarter of 2016 compared to 2017 demonstrated an improvement in retention via app use and completion of weekly in-app surveys. Recruitment and retention in clinical trials continues to be a critical challenge and mHealth trials may present both unique challenges and opportunities. To our knowledge, this is the first study to describe a systematic evaluation followed by changes and further evaluation to recruitment, use of the mHealth application, adherence to study protocol, and retention during an mHealth clinical trial. Future work should adopt and explicitly study these processes to optimize both enrollment and retention in these types of trials to preserve validity and reliability of research results.

  4. Modifying the ECC-based grouping-proof RFID system to increase inpatient medication safety.

    PubMed

    Ko, Wen-Tsai; Chiou, Shin-Yan; Lu, Erl-Huei; Chang, Henry Ker-Chang

    2014-09-01

    RFID technology is increasingly used in applications that require tracking, identification, and authentication. It attaches RFID-readable tags to objects for identification and execution of specific RFID-enabled applications. Recently, research has focused on the use of grouping-proofs for preserving privacy in RFID applications, wherein a proof of two or more tags must be simultaneously scanned. In 2010, a privacy-preserving grouping proof protocol for RFID based on ECC in public-key cryptosystem was proposed but was shown to be vulnerable to tracking attacks. A proposed enhancement protocol was also shown to have defects which prevented proper execution. In 2012, Lin et al. proposed a more efficient RFID ECC-based grouping proof protocol to promote inpatient medication safety. However, we found this protocol is also vulnerable to tracking and impersonation attacks. We then propose a secure privacy-preserving RFID grouping proof protocol for inpatient medication safety and demonstrate its resistance to such attacks.

  5. Cell engineering: spearheading the next generation in healthcare.

    PubMed

    Jayasinghe, Suwan N

    2008-09-01

    Manipulating living mammalian cells present fascinating possibilities for a plethora of applications within our healthcare. These imply several possibilities in tissue engineering and regenerative medicine, to those of a therapeutic nature. The physical sciences are increasingly playing a pivotal role in this endeavour by both advancing existing cell engineering technology and pioneering new protocols for the creation of biologically viable structures. In this paper, the author introduces several direct needle/channel/orifice-based cell engineering protocols, currently undergoing intense investigation for a whole host of bio-applications. Hence, each protocol's advantages and disadvantages are clearly identified, whilst recognizing their future biological and engineering challenges. In conclusion, a few selected biotechnological applications present possibilities where these protocols could undergo focused exploration. Successful development of these bio-protocols sees the emergence of unique future strategies within a clinical environment having far-reaching consequences for our healthcare.

  6. Rationale, Scenarios, and Profiles for the Application of the Internet Protocol Suite (IPS) in Space Operations

    NASA Technical Reports Server (NTRS)

    Benbenek, Daniel B.; Walsh, William

    2010-01-01

    This greenbook captures some of the current, planned and possible future uses of the Internet Protocol (IP) as part of Space Operations. It attempts to describe how the Internet Protocol is used in specific scenarios. Of primary focus is low-earth-orbit space operations, which is referred to here as the design reference mission (DRM). This is because most of the program experience drawn upon derives from this type of mission. Application profiles are provided. This includes parameter settings programs have proposed for sending IP datagrams over CCSDS links, the minimal subsets and features of the IP protocol suite and applications expected for interoperability between projects, and the configuration, operations and maintenance of these IP functions. Of special interest is capturing the lessons learned from the Constellation Program in this area, since that program included a fairly ambitious use of the Internet Protocol.

  7. Progeria Research Foundation Diagnostic Testing Program

    MedlinePlus

    ... Culture Protocols Immortalized Cell Culture Protocols Induced Pluripotent Stem Cells PRF Cell and Tissue Bank Publications Research Funding Opportunities Grant Application Application Deadlines Grants Funded Close Meet The Kids Meet The Kids Our Ambassadors Find The Other ...

  8. A Secure Region-Based Geographic Routing Protocol (SRBGR) for Wireless Sensor Networks

    PubMed Central

    Adnan, Ali Idarous; Hanapi, Zurina Mohd; Othman, Mohamed; Zukarnain, Zuriati Ahmad

    2017-01-01

    Due to the lack of dependency for routing initiation and an inadequate allocated sextant on responding messages, the secure geographic routing protocols for Wireless Sensor Networks (WSNs) have attracted considerable attention. However, the existing protocols are more likely to drop packets when legitimate nodes fail to respond to the routing initiation messages while attackers in the allocated sextant manage to respond. Furthermore, these protocols are designed with inefficient collection window and inadequate verification criteria which may lead to a high number of attacker selections. To prevent the failure to find an appropriate relay node and undesirable packet retransmission, this paper presents Secure Region-Based Geographic Routing Protocol (SRBGR) to increase the probability of selecting the appropriate relay node. By extending the allocated sextant and applying different message contention priorities more legitimate nodes can be admitted in the routing process. Moreover, the paper also proposed the bound collection window for a sufficient collection time and verification cost for both attacker identification and isolation. Extensive simulation experiments have been performed to evaluate the performance of the proposed protocol in comparison with other existing protocols. The results demonstrate that SRBGR increases network performance in terms of the packet delivery ratio and isolates attacks such as Sybil and Black hole. PMID:28121992

  9. A Secure Region-Based Geographic Routing Protocol (SRBGR) for Wireless Sensor Networks.

    PubMed

    Adnan, Ali Idarous; Hanapi, Zurina Mohd; Othman, Mohamed; Zukarnain, Zuriati Ahmad

    2017-01-01

    Due to the lack of dependency for routing initiation and an inadequate allocated sextant on responding messages, the secure geographic routing protocols for Wireless Sensor Networks (WSNs) have attracted considerable attention. However, the existing protocols are more likely to drop packets when legitimate nodes fail to respond to the routing initiation messages while attackers in the allocated sextant manage to respond. Furthermore, these protocols are designed with inefficient collection window and inadequate verification criteria which may lead to a high number of attacker selections. To prevent the failure to find an appropriate relay node and undesirable packet retransmission, this paper presents Secure Region-Based Geographic Routing Protocol (SRBGR) to increase the probability of selecting the appropriate relay node. By extending the allocated sextant and applying different message contention priorities more legitimate nodes can be admitted in the routing process. Moreover, the paper also proposed the bound collection window for a sufficient collection time and verification cost for both attacker identification and isolation. Extensive simulation experiments have been performed to evaluate the performance of the proposed protocol in comparison with other existing protocols. The results demonstrate that SRBGR increases network performance in terms of the packet delivery ratio and isolates attacks such as Sybil and Black hole.

  10. A physics based method for combining multiple anatomy models with application to medical simulation.

    PubMed

    Zhu, Yanong; Magee, Derek; Ratnalingam, Rishya; Kessel, David

    2009-01-01

    We present a physics based approach to the construction of anatomy models by combining components from different sources; different image modalities, protocols, and patients. Given an initial anatomy, a mass-spring model is generated which mimics the physical properties of the solid anatomy components. This helps maintain valid spatial relationships between the components, as well as the validity of their shapes. Combination can be either replacing/modifying an existing component, or inserting a new component. The external forces that deform the model components to fit the new shape are estimated from Gradient Vector Flow and Distance Transform maps. We demonstrate the applicability and validity of the described approach in the area of medical simulation, by showing the processes of non-rigid surface alignment, component replacement, and component insertion.

  11. Radiation safety protocol using real-time dose reporting reduces patient exposure in pediatric electrophysiology procedures.

    PubMed

    Patel, Akash R; Ganley, Jamie; Zhu, Xiaowei; Rome, Jonathan J; Shah, Maully; Glatz, Andrew C

    2014-10-01

    Radiation exposure during pediatric catheterization is significant. We sought to describe radiation exposure and the effectiveness of radiation safety protocols in reducing exposure during catheter ablations with electrophysiology studies in children and patients with congenital heart disease. We additionally sought to identify at-risk patients. We retrospectively reviewed all interventional electrophysiology procedures performed from April 2009 to September 2011 (6 months preceding intervention, 12 months following implementation of initial radiation safety protocol, and 8 months following implementation of modified protocol). The protocols consisted of low pulse rate fluoroscopy settings, operator notification of skin entrance dose every 1,000 mGy, adjusting cameras by >5 at every 1,000 mGy, and appropriate collimation. The cohort consisted of 291 patients (70 pre-intervention, 137 after initial protocol implementation, 84 after modified protocol implementation) at a median age of 14.9 years with congenital heart disease present in 11 %. Diagnoses included atrioventricular nodal reentrant tachycardia (25 %), atrioventricular reentrant tachycardia (61 %), atrial tachycardias (12 %), and ventricular tachycardia (2 %). There were no differences between groups based on patient, arrhythmia, and procedural characteristics. Following implementation of the protocols, there were significant reductions in all measures of radiation exposure: fluoroscopy time (17.8 %), dose area product (80.2 %), skin entry dose (81.0 %), and effective dose (76.9 %), p = 0.0001. Independent predictors of increased radiation exposure included larger patient weight, longer fluoroscopy time, and lack of radiation safety protocol. Implementation of a radiation safety protocol for pediatric and congenital catheter ablations can drastically reduce radiation exposure to patients without affecting procedural success.

  12. Starting Ovsynch protocol on day 6 of first postpartum estrous cycle increased fertility in dairy cows by affecting ovarian response during heat stress.

    PubMed

    Dirandeh, E

    2014-10-01

    The objective was to compare fertility in cows using an Ovsynch protocol starting on day 6 of first postpartum estrous cycle with an Ovsynch protocol initiated at random stages of the estrous cycle during heat stress (temperature-humidity index (THI)=77-83). Cows (n=459) at the beginning of the lactation period were randomly assigned to time-of-ovulation synchronization treatments: (1) control, Ovsynch (first GnRH treatment, PGF2α treatment 7 days later, second GnRH treatment 56 h later, and TAI 16 h later), initiated at random stages of the estrous cycle (40 ± 2 days postpartum, n=224) and (2) Ovsynch initiated on day 6 of first postpartum estrous cycle (estrus=day 0) based on detection of the first estrus after day 30 postpartum (O6, 35 ± 2 postpartum, n=235). Statistical analyses were conducted using SAS. The percentage of cows responding to the initial GnRH injection using the Ovsynch protocol was greater with the O6 treatment compared to the control treatment (60.4% compared with 52.6%). The percentage of cows having a corpus luteum (CL) on the day of the PGF2α injection was not different among treatments (control=87.0% and O6=90.2%, respectively). Also more cows in the O6 treatment group responded to the second GnRH injection of the Ovsynch protocol compared with control treatments (82.5% compared with 75.8%). Treatment affected the percentage of cows diagnosed pregnant at 32 ± 0.7 days and 60 ± 3 days after the resynchronized timing of AI but pregnancy losses (5.3% compared with 6.8%) did not differ between treatment groups. It is concluded that initiating the Ovsynch protocol 6 days after estrus during the first 40 days postpartum resulted in a greater pregnancy rate at the synchronized estrus and increased fertility compared with control cows during heat stress. Copyright © 2014 Elsevier B.V. All rights reserved.

  13. Incidence and rates of visual field progression after longitudinally measured optic disc change in glaucoma.

    PubMed

    Chauhan, Balwantray C; Nicolela, Marcelo T; Artes, Paul H

    2009-11-01

    To determine whether glaucoma patients with progressive optic disc change have subsequent visual field progression earlier and at a faster rate compared with those without disc change. Prospective, longitudinal, cohort study. Eighty-one patients with open-angle glaucoma. Patients underwent confocal scanning laser tomography and standard automated perimetry every 6 months. The complete follow-up was divided into initial and subsequent periods. Two initial periods-first 3 years (Protocol A) and first half of the total follow-up (Protocol B)-were used, with the respective remainder being the subsequent follow-up. Disc change during the initial follow-up was determined with liberal, moderate, or conservative criteria of the Topographic Change Analysis. Subsequent field progression was determined with significant pattern deviation change in >or=3 locations (criterion used in the Early Manifest Glaucoma Trial). As a control analysis, field change during the initial follow-up was determined with significant pattern deviation change in >or=1, >or=2, or >or=3 locations. Survival time to subsequent field progression, rates of mean deviation (MD) change, and positive and negative likelihood ratios. The median (interquartile range) total follow-up was 11.0 (8.0-12.0) years with 22 (18-24) examinations. More patients had disc changes during the initial follow-up compared with field changes. The mean time to field progression was consistently shorter (protocol A, 0.8-1.7 years; protocol B, 0.3-0.7 years) in patients with prior disc change. In the control analysis, patients with prior field change had statistically earlier subsequent field progression (protocol A, 2.9-3.0 years; protocol B, 0.7-0.9). Similarly, patients with either prior disc or field change always had worse mean rates of subsequent MD change, although the distributions overlapped widely. Patients with subsequent field progression were up to 3 times more likely to have prior disc change compared with those without, and up to 5 times more likely to have prior field change compared with those without. Longitudinally measured optic disc change is predictive of subsequent visual field progression and may be an efficacious end point for functional outcomes in clinical studies and trials in glaucoma.

  14. The acute effects of manipulating volume and load of back squats on countermovement vertical jump performance.

    PubMed

    Moir, Gavin L; Mergy, David; Witmer, Ca; Davis, Shala E

    2011-06-01

    The acute effects of manipulating the volume and load of back squats on subsequent countermovement vertical jump performance were investigated in the present study. Eleven National Collegiate Athletic Association division II female volleyball players performed 10 countermovement vertical jumps (CMJs) on a force platform 2 minutes after the last squat repetition of a high-load (HL) or high-volume (HV) squat protocol. Two minutes of rest was provided between each CMJ. The HL protocol culminated in the subjects having to perform 3 repetitions with a load equivalent to 90% 1 repetition maximum (1RM) back squat, whereas 12 repetitions with a load equivalent to 37% 1RM were performed in the HV protocol. During an initial familiarization session, knee angles were recorded during a series of CMJs, and these angles were used to control the depth of descent during all subsequent back squats. Jump height (JH) and vertical stiffness (VStiff) were calculated during each of the 10 CMJ, and the change in these variables after the 2 squat protocols was assessed using an analysis of variance model with repeated measures on 2 factors (Protocol [2-levels]; Time [2-levels]). There was no significant difference in JH after the HL and HV protocols (p > 0.05). A significant Protocol × Time interaction for VStiff resulted from the increase after the HL protocol being greater than that after the HV protocol (p = 0.03). The knee angles before the HL and HV protocols were significantly greater than those measured during the initial familiarization session (p = 0.001). Although neither squat protocol provided any benefit in improving JH, the heavy squat protocol produced greater increases in VStiff during the CMJ. Because of the increased VStiff caused by the HL protocol, volleyball coaches may consider using such protocols with their players to improve performance in jumps performed from a run such as the spike and on-court agility.

  15. QUALITY CONTROL - VARIABILITY IN PROTOCOLS

    EPA Science Inventory

    The EPA Risk Reduction Engineering Laboratory’s Quality Assurance Office, which published the popular pocket guide Preparing Perfect Project Plans, is now introducing another quality assurance reference aid. The document Variability in Protocols (VIP) was initially designed as a ...

  16. 21 CFR 320.30 - Inquiries regarding bioavailability and bioequivalence requirements and review of protocols by...

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ... bioequivalence requirements and review of protocols by the Food and Drug Administration. 320.30 Section 320.30... requirements and review of protocols by the Food and Drug Administration. (a) The Commissioner of Food and... for the study to FDA for review prior to the initiation of the study. (b) FDA may review a proposed...

  17. 21 CFR 320.30 - Inquiries regarding bioavailability and bioequivalence requirements and review of protocols by...

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ... bioequivalence requirements and review of protocols by the Food and Drug Administration. 320.30 Section 320.30... requirements and review of protocols by the Food and Drug Administration. (a) The Commissioner of Food and... for the study to FDA for review prior to the initiation of the study. (b) FDA may review a proposed...

  18. 21 CFR 320.30 - Inquiries regarding bioavailability and bioequivalence requirements and review of protocols by...

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ... bioequivalence requirements and review of protocols by the Food and Drug Administration. 320.30 Section 320.30... requirements and review of protocols by the Food and Drug Administration. (a) The Commissioner of Food and... for the study to FDA for review prior to the initiation of the study. (b) FDA may review a proposed...

  19. A standard protocol for describing individual-based and agent-based models

    USGS Publications Warehouse

    Grimm, Volker; Berger, Uta; Bastiansen, Finn; Eliassen, Sigrunn; Ginot, Vincent; Giske, Jarl; Goss-Custard, John; Grand, Tamara; Heinz, Simone K.; Huse, Geir; Huth, Andreas; Jepsen, Jane U.; Jorgensen, Christian; Mooij, Wolf M.; Muller, Birgit; Pe'er, Guy; Piou, Cyril; Railsback, Steven F.; Robbins, Andrew M.; Robbins, Martha M.; Rossmanith, Eva; Ruger, Nadja; Strand, Espen; Souissi, Sami; Stillman, Richard A.; Vabo, Rune; Visser, Ute; DeAngelis, Donald L.

    2006-01-01

    Simulation models that describe autonomous individual organisms (individual based models, IBM) or agents (agent-based models, ABM) have become a widely used tool, not only in ecology, but also in many other disciplines dealing with complex systems made up of autonomous entities. However, there is no standard protocol for describing such simulation models, which can make them difficult to understand and to duplicate. This paper presents a proposed standard protocol, ODD, for describing IBMs and ABMs, developed and tested by 28 modellers who cover a wide range of fields within ecology. This protocol consists of three blocks (Overview, Design concepts, and Details), which are subdivided into seven elements: Purpose, State variables and scales, Process overview and scheduling, Design concepts, Initialization, Input, and Submodels. We explain which aspects of a model should be described in each element, and we present an example to illustrate the protocol in use. In addition, 19 examples are available in an Online Appendix. We consider ODD as a first step for establishing a more detailed common format of the description of IBMs and ABMs. Once initiated, the protocol will hopefully evolve as it becomes used by a sufficiently large proportion of modellers.

  20. A real time ECG signal processing application for arrhythmia detection on portable devices

    NASA Astrophysics Data System (ADS)

    Georganis, A.; Doulgeraki, N.; Asvestas, P.

    2017-11-01

    Arrhythmia describes the disorders of normal heart rate, which, depending on the case, can even be fatal for a patient with severe history of heart disease. The purpose of this work is to develop an application for heart signal visualization, processing and analysis in Android portable devices e.g. Mobile phones, tablets, etc. The application is able to retrieve the signal initially from a file and at a later stage this signal is processed and analysed within the device so that it can be classified according to the features of the arrhythmia. In the processing and analysing stage, different algorithms are included among them the Moving Average and Pan Tompkins algorithm as well as the use of wavelets, in order to extract features and characteristics. At the final stage, testing is performed by simulating our application in real-time records, using the TCP network protocol for communicating the mobile with a simulated signal source. The classification of ECG beat to be processed is performed by neural networks.

  1. Thick tissue diffusion model with binding to optimize topical staining in fluorescence breast cancer margin imaging

    NASA Astrophysics Data System (ADS)

    Xu, Xiaochun; Kang, Soyoung; Navarro-Comes, Eric; Wang, Yu; Liu, Jonathan T. C.; Tichauer, Kenneth M.

    2018-03-01

    Intraoperative tumor/surgical margin assessment is required to achieve higher tumor resection rate in breast-conserving surgery. Though current histology provides incomparable accuracy in margin assessment, thin tissue sectioning and the limited field of view of microscopy makes histology too time-consuming for intraoperative applications. If thick tissue, wide-field imaging can provide an acceptable assessment of tumor cells at the surface of resected tissues, an intraoperative protocol can be developed to guide the surgery and provide immediate feedback for surgeons. Topical staining of margins with cancer-targeted molecular imaging agents has the potential to provide the sensitivity needed to see microscopic cancer on a wide-field image; however, diffusion and nonspecific retention of imaging agents in thick tissue can significantly diminish tumor contrast with conventional methods. Here, we present a mathematical model to accurately simulate nonspecific retention, binding, and diffusion of imaging agents in thick tissue topical staining to guide and optimize future thick tissue staining and imaging protocol. In order to verify the accuracy and applicability of the model, diffusion profiles of cancer targeted and untargeted (control) nanoparticles at different staining times in A431 tumor xenografts were acquired for model comparison and tuning. The initial findings suggest the existence of nonspecific retention in the tissue, especially at the tissue surface. The simulator can be used to compare the effect of nonspecific retention, receptor binding and diffusion under various conditions (tissue type, imaging agent) and provides optimal staining and imaging protocols for targeted and control imaging agent.

  2. Evaluation of Quality Assessment Protocols for High Throughput Genome Resequencing Data

    PubMed Central

    Chiara, Matteo; Pavesi, Giulio

    2017-01-01

    Large-scale initiatives aiming to recover the complete sequence of thousands of human genomes are currently being undertaken worldwide, concurring to the generation of a comprehensive catalog of human genetic variation. The ultimate and most ambitious goal of human population scale genomics is the characterization of the so-called human “variome,” through the identification of causal mutations or haplotypes. Several research institutions worldwide currently use genotyping assays based on Next-Generation Sequencing (NGS) for diagnostics and clinical screenings, and the widespread application of such technologies promises major revolutions in medical science. Bioinformatic analysis of human resequencing data is one of the main factors limiting the effectiveness and general applicability of NGS for clinical studies. The requirement for multiple tools, to be combined in dedicated protocols in order to accommodate different types of data (gene panels, exomes, or whole genomes) and the high variability of the data makes difficult the establishment of a ultimate strategy of general use. While there already exist several studies comparing sensitivity and accuracy of bioinformatic pipelines for the identification of single nucleotide variants from resequencing data, little is known about the impact of quality assessment and reads pre-processing strategies. In this work we discuss major strengths and limitations of the various genome resequencing protocols are currently used in molecular diagnostics and for the discovery of novel disease-causing mutations. By taking advantage of publicly available data we devise and suggest a series of best practices for the pre-processing of the data that consistently improve the outcome of genotyping with minimal impacts on computational costs. PMID:28736571

  3. Toward a High-Stability Coherent Population Trapping Cs Vapor-Cell Atomic Clock Using Autobalanced Ramsey Spectroscopy

    NASA Astrophysics Data System (ADS)

    Abdel Hafiz, Moustafa; Coget, Grégoire; Petersen, Michael; Rocher, Cyrus; Guérandel, Stéphane; Zanon-Willette, Thomas; de Clercq, Emeric; Boudot, Rodolphe

    2018-06-01

    Vapor-cell atomic clocks are widely appreciated for their excellent short-term fractional frequency stability and their compactness. However, they are known to suffer on medium and long time scales from significant frequency instabilities, generally attributed to light-induced frequency-shift effects. In order to tackle this limitation, we investigate the application of the recently proposed autobalanced Ramsey (ABR) interrogation protocol onto a pulsed hot-vapor Cs vapor-cell clock based on coherent population trapping (CPT). We demonstrate that the ABR protocol, developed initially to probe the one-photon resonance of quantum optical clocks, can be successfully applied to a two-photon CPT resonance. The applied method, based on the alternation of two successive Ramsey-CPT sequences with unequal free-evolution times and the subsequent management of two interconnected phase and frequency servo loops, is found to allow a relevant reduction of the clock-frequency sensitivity to laser-power variations. This original ABR-CPT approach, combined with the implementation of advanced electronics laser-power stabilization systems, yields the demonstration of a CPT-based Cs vapor-cell clock with a short-term fractional frequency stability at the level of 3.1×10 -13τ-1 /2 , averaging down to the level of 6 ×10-15 at 2000-s integration time. These encouraging performances demonstrate that the use of the ABR interrogation protocol is a promising option towards the development of high-stability CPT-based frequency standards. Such clocks could be attractive candidates in numerous applications including next-generation satellite-based navigation systems, secure communications, instrumentation, or defense systems.

  4. Impact of a Noninvasive Ventilation Protocol in Hospitalized Children With Acute Respiratory Failure.

    PubMed

    Jalil, Yorschua; Damiani, Felipe; Astudillo, Claudia; Villarroel, Gregory; Barañao, Patricio; Bustos, Edson; Silva, Alejandra; Mendez, Mireya

    2017-12-01

    Noninvasive ventilation (NIV) has proven to be useful in the management of children with acute respiratory failure as a result of acute lower respiratory infection. Despite this, evidence addressing the initiation and/or discontinuation criteria of NIV in children remains limited. The objective of this study was to evaluate the usefulness and clinical impact of an NIV protocol in hospitalized children with acute respiratory failure because of acute lower respiratory infection. A randomized controlled clinical trial was carried out among subjects admitted during the winter season at Hospital Josefina Martinez between May and October of 2013. Inclusion criteria were age 3 months to 2 y, diagnosis of acute lower respiratory infection and requiring NIV according to a Modified Wood Scale score of ≥ 4 points. Subjects were randomized to NIV management according to medical criteria (control group) or to protocolized management of NIV (protocol group). Hours of NIV, hospital stay, and supplemental oxygen use after discontinuation of NIV, severity changes after NIV initiation, respiratory symptoms, and proportion of intubations were considered as events of interest. A total of 23 subjects were analyzed in the control group and 24 were analyzed in the protocol group. Hours of hospital stay, NIV, and supplemental oxygen post-NIV were not significantly different between groups ( P = .70, .69, and .68, respectively). There were also no differences in intubation rate (3 of 29 for the control group and 2 of 31 for the protocol group). For the total sample there was a statistically significant decrease in the Modified Wood Scale score after 1 h of NIV ( P < .001). A similar result was observed when performing a stratified intragroup analysis. We observed that the implementation of an NIV management protocol that integrates initiation and discontinuation criteria for NIV is feasible. However, its use showed no advantages over a non-protocolized strategy. Copyright © 2017 by Daedalus Enterprises.

  5. The GLOBE Contrail Protocol: Initial Analysis of Results

    NASA Technical Reports Server (NTRS)

    Chambers, Lin; Duda, David

    2004-01-01

    The GLOBE contrail protocol was launched in March 2003 to obtain surface observer reports of contrail occurrence to complement satellite and model studies underway at NASA Langley, among others. During the first year, more than 30,000 ground observations of contrails were submitted to GLOBE. An initial analysis comparing the GLOBE observations to weather prediction model results for relative humidity at flight altitudes is in progress. This paper reports on the findings to date from this effort.

  6. A comparison of sennosides-based bowel protocols with and without docusate in hospitalized patients with cancer.

    PubMed

    Hawley, Philippa Helen; Byeon, Jai Jun

    2008-05-01

    Constipation is a common and distressing condition in patients with cancer, especially those taking opioid analgesics. Many institutions prevent and treat constipation with titrated laxatives, which is known as a bowel protocol. An effective and well-tolerated bowel protocol is a very important component of cancer care, and there is little evidence on which to base selection of the most appropriate agents. This study compares a protocol of the stimulant laxative sennosides alone with a protocol of sennosides plus the stool softener docusate, in hospitalized patients at an oncology center. The docusate-containing protocol had an initial docusate-only step for patients not taking opioids, and four to six 100-mg capsules of docusate sodium in addition to the sennosides for the rest of the protocol. Thirty patients received the sennosides-only (S) protocol and 30 the sennosides plus docusate (DS) protocol. The efficacy and adverse effects of the protocols were monitored for 5-12 days. The two protocols were used sequentially, creating two cohorts, one on each protocol. Eighty percent of patients were taking oral opioids and 72% were admitted for symptom control/supportive care. Over a total of 488 days of observation it was found that the S protocol produced more bowel movements than the DS protocol, and in the symptom control/supportive care patients this difference was statistically significant (p < 0.05). In the S group admitted for symptom control/supportive care 62.5% had a bowel movement more than 50% of days, as compared with 32% in those receiving the DS protocol. Fifty-seven percent of the DS group required additional interventions (lactulose, suppositories or enemas) compared to 40% in the S group. Cramps were reported equally by 3 (10%) patients in each group. Eight patients (27%) experienced diarrhea in the S group compared to 4 (13%) in the DS group. The addition of the initial docusate-only step and adding docusate 400-600 mg/d to the sennosides did not reduce bowel cramps, and was less effective in inducing laxation than the sennosides-only protocol. Further research into the appropriate use of docusate and into the details of bowel protocol design are required.

  7. An evaluation of safety culture initiatives at BNSF Railway

    DOT National Transportation Integrated Search

    2015-04-01

    Major safety culture (SC) initiatives initiated in the FRA Office of Research, Technology and Development (RT&D), such as Clear Signal for Action (CSA), the Investigation of Safety Related Occurrences Protocol (ISROP), the Participative Safety Rules ...

  8. Molecular Dynamics Simulation and Analysis of the Antimicrobial Peptide-Lipid Bilayer Interactions.

    PubMed

    Arasteh, Shima; Bagheri, Mojtaba

    2017-01-01

    A great deal of research has been undertaken in order to discover antimicrobial peptides (AMPs) with unexploited mechanisms of action to counteract the health-threatening issues associated with bacterial resistance. The intrinsic effectiveness of AMPs is strongly influenced by their initial interactions with the bacterial cell membrane. Understanding these interactions in the atomistic details is important for the design of the less prone bacteria-resistant peptides. However, these studies always require labor-intensive and difficult steps. With this regard, modeling studies of the AMPs binding to simple lipid membrane systems, e.g., lipid bilayers, is of great advantage. In this chapter, we present an applicable step-by-step protocol to run the molecular dynamics (MD) simulation of the interaction between cyclo-RRWFWR (c-WFW) (a small cyclic AMP) and 1-palmitoyl-2-oleoyl-sn-glycero-3-phosphocholine (POPC) lipid bilayer using the Groningen machine for chemical simulations (GROMACS) package. The protocol as described here may simply be optimized for other peptide-lipid systems of interest.

  9. Adapting End Host Congestion Control for Mobility

    NASA Technical Reports Server (NTRS)

    Eddy, Wesley M.; Swami, Yogesh P.

    2005-01-01

    Network layer mobility allows transport protocols to maintain connection state, despite changes in a node's physical location and point of network connectivity. However, some congestion-controlled transport protocols are not designed to deal with these rapid and potentially significant path changes. In this paper we demonstrate several distinct problems that mobility-induced path changes can create for TCP performance. Our premise is that mobility events indicate path changes that require re-initialization of congestion control state at both connection end points. We present the application of this idea to TCP in the form of a simple solution (the Lightweight Mobility Detection and Response algorithm, that has been proposed in the IETF), and examine its effectiveness. In general, we find that the deficiencies presented are both relatively easily and painlessly fixed using this solution. We also find that this solution has the counter-intuitive property of being both more friendly to competing traffic, and simultaneously more aggressive in utilizing newly available capacity than unmodified TCP.

  10. A quality improvement initiative to reduce necrotizing enterocolitis across hospital systems.

    PubMed

    Nathan, Amy T; Ward, Laura; Schibler, Kurt; Moyer, Laurel; South, Andrew; Kaplan, Heather C

    2018-04-20

    Necrotizing enterocolitis (NEC) is a devastating intestinal disease in premature infants. Local rates of NEC were unacceptably high. We hypothesized that utilizing quality improvement methodology to standardize care and apply evidence-based practices would reduce our rate of NEC. A multidisciplinary team used the model for improvement to prioritize interventions. Three neonatal intensive care units (NICUs) developed a standardized feeding protocol for very low birth weight (VLBW) infants, and employed strategies to increase the use of human milk, maximize intestinal perfusion, and promote a healthy microbiome. The primary outcome measure, NEC in VLBW infants, decreased from 0.17 cases/100 VLBW patient days to 0.029, an 83% reduction, while the compliance with a standardized feeding protocol improved. Through reliable implementation of evidence-based practices, this project reduced the regional rate of NEC by 83%. A key outcome and primary driver of success was standardization across multiple NICUs, resulting in consistent application of best practices and reduction in variation.

  11. Evaluation of modifications of the traditional patch test in assessing the chemical irritation potential of feminine hygiene products.

    PubMed

    Farage, Miranda A; Meyer, Sandy; Walter, Dave

    2004-05-01

    The first main objective of the work presented in this paper was to investigate ways of optimizing the current arm patch test protocol by (1) increasing the sensitivity of the test in order to evaluate more effectively the products that are inherently non-irritating, and/or (2) reducing the costs of these types of studies by shortening the protocol. The second main objective was to use the results of these studies and the results of the parallel studies conducted using the behind-the-knee method to better understand the contribution of mechanical irritation to the skin effects produced by these types of products. In addition, we were interested in continuing the evaluation of sensory effects and their relationship to objective measures of irritation. Test materials were prepared from three, currently marketed feminine protection pads. Wet and dry samples were applied to the upper arm using the standard 24-h patch test. Applications were repeated daily for 4 consecutive days. The test sites were scored for irritation prior to the first patch application, and 30-60 min after removal of each patch. Some test sites were treated by tape stripping the skin prior to the initial patch application. In addition, in one experiment, panelists were asked to keep a daily diary describing any sensory skin effects they noticed at each test site. All protocol variations ([intact skin/dry samples], [compromised skin/dry samples], [intact skin/wet samples], and [compromised skin/wet samples]) gave similar results for the products tested. When compared to the behind-the-knee test method, the standard upper arm patch test gave consistently lower levels of irritation when the test sites were scored shortly after patch removal, even though the sample application was longer (24 vs. 6 h) in the standard patch test. The higher level of irritation in the behind-the-knee method was likely due to mechanical irritation. The sensory skin effects did not appear to be related to a particular test product or a particular protocol variation. However, the mean irritation scores at those sites where a sensory effect was reported were higher than the mean irritation scores at those sites were no sensory effects were reported. All four protocol variations of the standard upper arm patch test can be used to assess the inherent chemical irritant properties of feminine protection products. For these products, which are inherently non-irritating, tape stripping and/or applying wet samples does not increase the sensitivity of the patch test method. Differences in irritation potential were apparent after one to three 24-h applications. Therefore, the standard patch test protocol can be shortened to three applications without compromising our ability to detect differences in the chemical irritation produced by the test materials. The patch test can be used to evaluate effectively the inherent chemical irritation potential of these types of products. However, this method is not suitable for testing the mechanical irritation due to friction that occurs during product use. There is no relationship between specific test conditions, i.e., compromised skin and/or testing wet samples and reports of perceived sensory reactions. However, there seems to be a clear relationship between sensory reactions and objective irritation scores.

  12. Internet Access to Spacecraft

    NASA Technical Reports Server (NTRS)

    Rash, James; Parise, Ron; Hogie, Keith; Criscuolo, Ed; Langston, Jim; Jackson, Chris; Price, Harold; Powers, Edward I. (Technical Monitor)

    2000-01-01

    The Operating Missions as Nodes on the Internet (OMNI) project at NASA's Goddard Space flight Center (GSFC), is demonstrating the use of standard Internet protocols for spacecraft communication systems. This year, demonstrations of Internet access to a flying spacecraft have been performed with the UoSAT-12 spacecraft owned and operated by Surrey Satellite Technology Ltd. (SSTL). Previously, demonstrations were performed using a ground satellite simulator and NASA's Tracking and Data Relay Satellite System (TDRSS). These activities are part of NASA's Space Operations Management Office (SOMO) Technology Program, The work is focused on defining the communication architecture for future NASA missions to support both NASA's "faster, better, cheaper" concept and to enable new types of collaborative science. The use of standard Internet communication technology for spacecraft simplifies design, supports initial integration and test across an IP based network, and enables direct communication between scientists and instruments as well as between different spacecraft, The most recent demonstrations consisted of uploading an Internet Protocol (IP) software stack to the UoSAT- 12 spacecraft, simple modifications to the SSTL ground station, and a series of tests to measure performance of various Internet applications. The spacecraft was reconfigured on orbit at very low cost. The total period between concept and the first tests was only 3 months. The tests included basic network connectivity (PING), automated clock synchronization (NTP), and reliable file transfers (FTP). Future tests are planned to include additional protocols such as Mobile IP, e-mail, and virtual private networks (VPN) to enable automated, operational spacecraft communication networks. The work performed and results of the initial phase of tests are summarized in this paper. This work is funded and directed by NASA/GSFC with technical leadership by CSC in arrangement with SSTL, and Vytek Wireless.

  13. An early shoulder repositioning program in birth-related brachial plexus injury: a pilot study of the Sup-ER protocol.

    PubMed

    Verchere, Cynthia; Durlacher, Kim; Bellows, Doria; Pike, Jeffrey; Bucevska, Marija

    2014-06-01

    Birth-related brachial plexus injury (BRBPI) occurs in 1.2/1,000 births in British Columbia. Even in children with "good" recovery, external rotation (ER) and supination (Sup) are often weaker, and permanent skeletal imbalance ensues. A preventive early infant shoulder passive repositioning program was created using primarily a novel custom splint holding the affected arm in full ER and Sup: the Sup-ER splint. The details of the splint and the shoulder repositioning program evolved with experience over several years. This study reviews the first 4 years. A retrospective review of BCCH patients managed with the Sup-ER protocol from 2008 to 2011 compared their recovery scores to matched historical controls selected from our database by two independent reviewers. The protocol was initiated in 18 children during the study period. Six were excluded due to the following: insufficient data points, non-compliance, late splint initiation, and loss to follow-up. Of the 12 matches, the Sup-ER group final score at 2 years was better than controls by 1.18 active movement scale (AMS) points (p = 0.036) in Sup and 0.96 AMS points in ER (but not statistically significant (p = 0.13)). Unexpectedly, but importantly, during the study period, zero subjects were assessed to have the active functional criteria to indicate brachial plexus reconstruction, where previously we operated on 13 %. Early application of passive shoulder repositioning into Sup and ER may improve outcomes in function of the arm in infants with BRBPI. A North American multi-site randomized control trial has been approved and has started recruitment.

  14. Utilization of Internet Protocol-Based Voice Systems in Remote Payload Operations

    NASA Technical Reports Server (NTRS)

    Chamberlain, jim; Bradford, Bob; Best, Susan; Nichols, Kelvin

    2002-01-01

    Due to limited crew availability to support science and the large number of experiments to be operated simultaneously, telescience is key to a successful International Space Station (ISS) science program. Crew, operations personnel at NASA centers, and researchers at universities and companies around the world must work closely together to per orm scientific experiments on-board ISS. The deployment of reliable high-speed Internet Protocol (IP)-based networks promises to greatly enhance telescience capabilities. These networks are now being used to cost-effectively extend the reach of remote mission support systems. They reduce the need for dedicated leased lines and travel while improving distributed workgroup collaboration capabilities. NASA has initiated use of Voice over Internet Protocol (VoIP) to supplement the existing mission voice communications system used by researchers at their remote sites. The Internet Voice Distribution System (IVoDS) connects remote researchers to mission support "loopsll or conferences via NASA networks and Internet 2. Researchers use NODS software on personal computers to talk with operations personnel at NASA centers. IVoDS also has the ;capability, if authorized, to allow researchers to communicate with the ISS crew during experiment operations. NODS was developed by Marshall Space Flight Center with contractors & Technology, First Virtual Communications, Lockheed-Martin, and VoIP Group. NODS is currently undergoing field-testing with full deployment for up to 50 simultaneous users expected in 2002. Research is being performed in parallel with IVoDS deployment for a next-generation system to qualitatively enhance communications among ISS operations personnel. In addition to the current voice capability, video and data/application-sharing capabilities are being investigated. IVoDS technology is also being considered for mission support systems for programs such as Space Launch Initiative and Homeland Defense.

  15. Influence of pH, bleaching agents, and acid etching on surface wear of bovine enamel

    PubMed Central

    Soares, Ana Flávia; Bombonatti, Juliana Fraga Soares; Alencar, Marina Studart; Consolmagno, Elaine Cristina; Honório, Heitor Marques; Mondelli, Rafael Francisco Lia

    2016-01-01

    ABSTRACT Development of new materials for tooth bleaching justifies the need for studies to evaluate the changes in the enamel surface caused by different bleaching protocols. Objective The aim of this study was to evaluate the bovine dental enamel wear in function of different bleaching gel protocols, acid etching and pH variation. Material and Methods Sixty fragments of bovine teeth were cut, obtaining a control and test areas. In the test area, one half received etching followed by a bleaching gel application, and the other half, only the bleaching gel. The fragments were randomly divided into six groups (n=10), each one received one bleaching session with five hydrogen peroxide gel applications of 8 min, activated with hybrid light, diode laser/blue LED (HL) or diode laser/violet LED (VHL) (experimental): Control (C); 35% Total Blanc Office (TBO35HL); 35% Lase Peroxide Sensy (LPS35HL); 25% Lase Peroxide Sensy II (LPS25HL); 15% Lase Peroxide Lite (LPL15HL); and 10% hydrogen peroxide (experimental) (EXP10VHL). pH values were determined by a pHmeter at the initial and final time periods. Specimens were stored, subjected to simulated brushing cycles, and the superficial wear was determined (μm). ANOVA and Tukey´s tests were applied (α=0.05). Results The pH showed a slight decrease, except for Group LPL15HL. Group LPS25HL showed the highest degree of wear, with and without etching. Conclusion There was a decrease from the initial to the final pH. Different bleaching gels were able to increase the surface wear values after simulated brushing. Acid etching before bleaching increased surface wear values in all groups. PMID:27008254

  16. Influence of pH, bleaching agents, and acid etching on surface wear of bovine enamel.

    PubMed

    Soares, Ana Flávia; Bombonatti, Juliana Fraga Soares; Alencar, Marina Studart; Consolmagno, Elaine Cristina; Honório, Heitor Marques; Mondelli, Rafael Francisco Lia

    2016-01-01

    Development of new materials for tooth bleaching justifies the need for studies to evaluate the changes in the enamel surface caused by different bleaching protocols. The aim of this study was to evaluate the bovine dental enamel wear in function of different bleaching gel protocols, acid etching and pH variation. Sixty fragments of bovine teeth were cut, obtaining a control and test areas. In the test area, one half received etching followed by a bleaching gel application, and the other half, only the bleaching gel. The fragments were randomly divided into six groups (n=10), each one received one bleaching session with five hydrogen peroxide gel applications of 8 min, activated with hybrid light, diode laser/blue LED (HL) or diode laser/violet LED (VHL) (experimental): Control (C); 35% Total Blanc Office (TBO35HL); 35% Lase Peroxide Sensy (LPS35HL); 25% Lase Peroxide Sensy II (LPS25HL); 15% Lase Peroxide Lite (LPL15HL); and 10% hydrogen peroxide (experimental) (EXP10VHL). pH values were determined by a pHmeter at the initial and final time periods. Specimens were stored, subjected to simulated brushing cycles, and the superficial wear was determined (μm). ANOVA and Tukey´s tests were applied (α=0.05). The pH showed a slight decrease, except for Group LPL15HL. Group LPS25HL showed the highest degree of wear, with and without etching. There was a decrease from the initial to the final pH. Different bleaching gels were able to increase the surface wear values after simulated brushing. Acid etching before bleaching increased surface wear values in all groups.

  17. Intervening to promote early initiation of breastfeeding in the LDR.

    PubMed

    Komara, Carol; Simpson, Diana; Teasdale, Carla; Whalen, Gaye; Bell, Shay; Giovanetto, Laurie

    2007-01-01

    To evaluate the effectiveness of an interventional protocol for the early initiation of breastfeeding that would remove barriers in the labor, delivery, recovery (LDR) unit. Descriptive design using 100 postpartum mothers who were interviewed before discharge at a large university hospital in the south-central United States. Descriptive statistics were used for analysis. The protocol was effective for initiating breastfeeding, and breastfeeding increased from 53% to 66%. When barriers to breastfeeding are reduced in the LDR setting, women will breastfeed. It is possible that reducing hospital barriers to breastfeeding in the LDR can also set the stage for sustained breastfeeding during hospitalization and for less supplementation with formula.

  18. The Effect of Participating in Suicide Research: Does Participating in a Research Protocol on Suicide and Psychiatric Symptoms Increase Suicide Ideation and Attempts?

    ERIC Educational Resources Information Center

    Smith, Phillip; Poindexter, Erin; Cukrowicz, Kelly

    2010-01-01

    The effect of engaging in an intensive research protocol that inquired extensively about psychiatric and suicide symptoms and exposed participants to a number of images, including suicide-related content was explored. Individuals experiencing a major depressive episode were called at 1 and 3 months after the initial protocol. Participants were…

  19. Ship-Shore Packet Switched Communications System.

    DTIC Science & Technology

    1986-06-01

    PERFORMING ORGANIZATION 6b OFFICE SYMBOL 7a. NAME OF MONITORING ORGANIZATION (If applicable ) Naval Postgraduate School 54 Naval Postgraduate School 6c...OFFICE SYMBOL 9 PROCUREMENT INSTRUMENT IDENTIFICATION NUMBER ORGANIZATION (If applicable ) 8c ADDRESS (City, State, and ZIPCode) 10 SOURCE OF FUNDING...level acknowledgement system. 37 Network Protocol Application P re sen tation Session ____ ____ ____ ___Internet TranportProtocol Network

  20. A Simple XML Producer-Consumer Protocol

    NASA Technical Reports Server (NTRS)

    Smith, Warren; Gunter, Dan; Quesnel, Darcy; Biegel, Bryan (Technical Monitor)

    2001-01-01

    There are many different projects from government, academia, and industry that provide services for delivering events in distributed environments. The problem with these event services is that they are not general enough to support all uses and they speak different protocols so that they cannot interoperate. We require such interoperability when we, for example, wish to analyze the performance of an application in a distributed environment. Such an analysis might require performance information from the application, computer systems, networks, and scientific instruments. In this work we propose and evaluate a standard XML-based protocol for the transmission of events in distributed systems. One recent trend in government and academic research is the development and deployment of computational grids. Computational grids are large-scale distributed systems that typically consist of high-performance compute, storage, and networking resources. Examples of such computational grids are the DOE Science Grid, the NASA Information Power Grid (IPG), and the NSF Partnerships for Advanced Computing Infrastructure (PACIs). The major effort to deploy these grids is in the area of developing the software services to allow users to execute applications on these large and diverse sets of resources. These services include security, execution of remote applications, managing remote data, access to information about resources and services, and so on. There are several toolkits for providing these services such as Globus, Legion, and Condor. As part of these efforts to develop computational grids, the Global Grid Forum is working to standardize the protocols and APIs used by various grid services. This standardization will allow interoperability between the client and server software of the toolkits that are providing the grid services. The goal of the Performance Working Group of the Grid Forum is to standardize protocols and representations related to the storage and distribution of performance data. These standard protocols and representations must support tasks such as profiling parallel applications, monitoring the status of computers and networks, and monitoring the performance of services provided by a computational grid. This paper describes a proposed protocol and data representation for the exchange of events in a distributed system. The protocol exchanges messages formatted in XML and it can be layered atop any low-level communication protocol such as TCP or UDP Further, we describe Java and C++ implementations of this protocol and discuss their performance. The next section will provide some further background information. Section 3 describes the main communication patterns of our protocol. Section 4 describes how we represent events and related information using XML. Section 5 describes our protocol and Section 6 discusses the performance of two implementations of the protocol. Finally, an appendix provides the XML Schema definition of our protocol and event information.

  1. Towards durable multistakeholder-generated solutions: The pilot application of a problem-oriented policy learning protocol to legality verification and community rights in Peru

    Treesearch

    D. Humphreys; B. Cashore; I.J. Visseren-Hamakers; W. De Jong; K. McGinley; A. Denvir; P. Caro Torres; S. Lupberger

    2017-01-01

    This paper reports and reflects on the pilot application of an 11-step policy learning protocol that was developed by Cashore and Lupberger (2015) based on several years of Cashore's multi-author collaborations. The protocol was applied for the first time in Peru in 2015 and 2016 by the IUFRO Working Party on Forest Policy Learning Architectures (hereinafter...

  2. A retrospective review of safety using a nursing driven protocol for autonomic dysreflexia in patients with spinal cord injuries.

    PubMed

    Solinsky, Ryan; Svircev, Jelena N; James, Jennifer J; Burns, Stephen P; Bunnell, Aaron E

    2016-11-01

    Autonomic dysreflexia is a potentially life-threatening condition which afflicts a significant proportion of individuals with spinal cord injuries (SCI). To date, the safety and efficacy of several commonly used interventions for this condition have not been studied. A retrospective chart review of the safety of a previously implemented nursing driven inpatient autonomic dysreflexia protocol. Seventy-eight male patients with SCI who experienced autonomic dysreflexia while inpatient at our Veterans Affairs SCI unit over a 3-1/2-year period were included. The safety of a nursing driven protocol utilizing conservative measures, nitroglycerin paste, and oral hydralazine was evaluated. Occurrence of adverse events and relative hypotensive events during all episodes treated with the protocol, and efficacy of attaining target blood pressure for all episodes with protocol adherence and for initial episode experienced by each patient. Four hundred forty-five episodes of autonomic dysreflexia were recorded in the study period, with 92% adherence to the protocol. When the protocol was followed, target blood pressure was achieved for 97.6% of all episodes. Twenty-three total adverse events occurred (5.2% of all episodes). All adverse events were due to hypotension and only 0.9% required interventions beyond clinical monitoring. Of each patient's initial autonomic dysreflexia episode, 97.3% resolved using the protocol without need for further escalation of care. This inpatient nursing driven-protocol for treating autonomic dysreflexia utilizing conservative measures, nitroglycerin paste and oral hydralazine achieved target blood pressure with a high success rate and a low incidence of adverse events.

  3. Appraisal of the sensitising potential of orally and dermally administered mercaptobenzothiazole by a biphasic protocol of the local lymph node assay.

    PubMed

    Ahuja, Varun; Wanner, Reinhard; Platzek, Thomas; Stahlmann, Ralf

    2009-10-01

    Mercaptobenzothiazole (MBT) is used while manufacturing natural rubber products. Our study deals with assessing its allergenic potential following dermal and oral routes of exposure, using a biphasic local lymph node assay (LLNA). Female Balb/c mice were treated with MBT (dermally 3, 10, 30% concentrations in DMSO; orally 1, 10, 100 mg/kg doses in corn oil) on the back (dermal study) or through oral administration (oral study) on days 1-3 followed by auricular application of 3, 10 and 30% concentrations, respectively, on days 15-17. End points determined on day 19 included ear thickness, ear punch weight, lymph node weight, lymph node cell count, and lymphocyte subpopulations (CD4+, CD8+, CD45+). After dermal application of 3% or 10% solution, a significant increase in cell count and lymph node weight along with significant decrease in CD8+ cells was observed. After initial oral administration of 1 mg/kg, we noticed a significant amplification in cell count. Following oral administration of 10 mg/kg, we observed a similar increase in cell count and lymph node weight. The results of our study show that the modified biphasic LLNA protocol can be used to study the sensitising potential of a compound also following the oral route of exposure.

  4. Approaches for controlling illicit tobacco trade--nine countries and the European Union.

    PubMed

    Ross, Hana; Husain, Muhammad Jami; Kostova, Deliana; Xu, Xin; Edwards, Sarah M; Chaloupka, Frank J; Ahluwalia, Indu B

    2015-05-29

    An estimated 11.6% of the world cigarette market is illicit, representing more than 650 billion cigarettes a year and $40.5 billion in lost revenue. Illicit tobacco trade refers to any practice related to distributing, selling, or buying tobacco products that is prohibited by law, including tax evasion (sale of tobacco products without payment of applicable taxes), counterfeiting, disguising the origin of products, and smuggling. Illicit trade undermines tobacco prevention and control initiatives by increasing the accessibility and affordability of tobacco products, and reduces government tax revenue streams. The World Health Organization (WHO) Protocol to Eliminate Illicit Trade in Tobacco Products, signed by 54 countries, provides tools for addressing illicit trade through a package of regulatory and governing principles. As of May 2015, only eight countries had ratified or acceded to the illicit trade protocol, with an additional 32 needed for it to become international law (i.e., legally binding). Data from multiple international sources were analyzed to evaluate the 10 most commonly used approaches for addressing illicit trade and to summarize differences in implementation across select countries and the European Union (EU). Although the WHO illicit trade protocol defines shared global standards for addressing illicit trade, countries are guided by their own legal and enforcement frameworks, leading to a diversity of approaches employed across countries. Continued adoption of the methods outlined in the WHO illicit trade protocol might improve the global capacity to reduce illicit trade in tobacco products.

  5. U.S. Additional Protocol Outreach Program-Tabletop Exercises to Implement the AP.

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Langner, D. C.; Thomas, K. E.; Smith, M. K.

    2005-01-01

    The Office of International Regimes and Agreement (NA-243) is the lead office in the Department of Energy (DOE) to assist DOE and National Nuclear Security Administration (NNSA) sites in the preparation of providing declarations on relevant civilian, nuclear fuel cycle-related research and development activities to the International Atomic Energy Agency (IAEA). This is in accordance to the implementation of the ''Protocol Additional to the AGreement between the United STates and the International Atomic Energy Agency for the Applications of Safeguards in the United States. In preparation for entry-into-force, NA-243 conducted two tabletop exercises under the Additional Protocol Outreach Program. Themore » first one, held in May 2004 at Los Alamos National Laboratory, focused on the factors important to protect national security assets and intellectual property. The other, held in August 2004 at the Idaho National Laboratory explored the level of detail or granularity for reporting declarable activities. Both tabletops invited participants from the national laboratories and DOE/NNSA organizations. Discussions were based around the process to identify potential declarable activities relating to the nuclear fuel cycle-related R and D projects from the Advanced Fuel Cycle Initiative program. The two tabletop exercises provided recommendations and conclusions that would be helpful to other DOE/NNSA locations for preparing for and reporting relevant and concise information to the IAEA under the Additional Protocol. This paper provides details on the events, discussions, observations, and lessons learned from both the LANL and INL tabletop exercises.« less

  6. Routing Protocols in Wireless Sensor Networks

    PubMed Central

    Villalba, Luis Javier García; Orozco, Ana Lucila Sandoval; Cabrera, Alicia Triviño; Abbas, Cláudia Jacy Barenco

    2009-01-01

    The applications of wireless sensor networks comprise a wide variety of scenarios. In most of them, the network is composed of a significant number of nodes deployed in an extensive area in which not all nodes are directly connected. Then, the data exchange is supported by multihop communications. Routing protocols are in charge of discovering and maintaining the routes in the network. However, the appropriateness of a particular routing protocol mainly depends on the capabilities of the nodes and on the application requirements. This paper presents a review of the main routing protocols proposed for wireless sensor networks. Additionally, the paper includes the efforts carried out by Spanish universities on developing optimization techniques in the area of routing protocols for wireless sensor networks. PMID:22291515

  7. Routing protocols in wireless sensor networks.

    PubMed

    Villalba, Luis Javier García; Orozco, Ana Lucila Sandoval; Cabrera, Alicia Triviño; Abbas, Cláudia Jacy Barenco

    2009-01-01

    The applications of wireless sensor networks comprise a wide variety of scenarios. In most of them, the network is composed of a significant number of nodes deployed in an extensive area in which not all nodes are directly connected. Then, the data exchange is supported by multihop communications. Routing protocols are in charge of discovering and maintaining the routes in the network. However, the appropriateness of a particular routing protocol mainly depends on the capabilities of the nodes and on the application requirements. This paper presents a review of the main routing protocols proposed for wireless sensor networks. Additionally, the paper includes the efforts carried out by Spanish universities on developing optimization techniques in the area of routing protocols for wireless sensor networks.

  8. GATEWAY - COMMUNICATIONS GATEWAY SOFTWARE FOR NETEX, DECNET, AND TCP/IP

    NASA Technical Reports Server (NTRS)

    Keith, B.

    1994-01-01

    The Communications Gateway Software, GATEWAY, provides process-to-process communication between remote applications programs in different protocol domains. Communicating peer processes may be resident on any paired combination of NETEX, DECnet, or TCP/IP hosts. The gateway provides the necessary mapping from one protocol to another and will facilitate practical intermachine communications in a cost effective manner by eliminating the need to standardize on a single protocol or the need to implement multiple protocols in the host computers. The purpose of the gateway is to support data transfers between application programs on different host computers using different protocols. The gateway computer must be physically connected to both host computers and must contain the system software needed to use the communication protocols of both host computers. The communication process between application partners can be divided into three phases: session establishment, data transfer, and session termination. The communication protocols supported by GATEWAY (DECnet, NETEX, and TCP/IP) have addressing mechanisms that allow an application to identify itself and distinguish among other applications on the network. The exact form of the address varies depending on whether an application is passively offering (awaiting the receipt of a network connection from another network application) or actively connecting to another network. When the gateway is started, GATEWAY reads a file of address pairs. One of the address pairs is used by GATEWAY for passively offering on one network while the other address in the pair is used for actively connecting on the other network establishing the session. Now the two application partners can send and receive data in a manner appropriate to their home networks. GATEWAY accommodates full duplex transmissions. Thus, if the application partners are sophisticated enough, they can send and receive simultaneously. GATEWAY also keeps track of the number of bytes contained in each ransferred data packet. If GATEWAY detects an error during the data transfer, the sessions on both networks are terminated and the passive offer on the appropriate network is reissued. After performing the desired data transfer, one of the remote applications will send a network disconnect to the gateway to close its communication link. Upon detecting this network disconnect, GATEWAY replies with its own disconnect to ensure that the network connection has been fully terminated. Then, GATEWAY terminates its session with the other application by closing the communication link. GATEWAY has been implemented on a DEC VAX under VMS 4.7. It is written in ADA and has a central memory requirement of approximately 406K bytes. The communications protocols supported by GATEWAY are Network Systems Corporation's Network Executive (NETEX), Excelan's TCP/IP, and DECnet. GATEWAY was developed in 1988.

  9. Advanced Test Reactor Core Modeling Update Project Annual Report for Fiscal Year 2012

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    David W. Nigg, Principal Investigator; Kevin A. Steuhm, Project Manager

    Legacy computational reactor physics software tools and protocols currently used for support of Advanced Test Reactor (ATR) core fuel management and safety assurance, and to some extent, experiment management, are inconsistent with the state of modern nuclear engineering practice, and are difficult, if not impossible, to properly verify and validate (V&V) according to modern standards. Furthermore, the legacy staff knowledge required for application of these tools and protocols from the 1960s and 1970s is rapidly being lost due to staff turnover and retirements. In late 2009, the Idaho National Laboratory (INL) initiated a focused effort, the ATR Core Modeling Updatemore » Project, to address this situation through the introduction of modern high-fidelity computational software and protocols. This aggressive computational and experimental campaign will have a broad strategic impact on the operation of the ATR, both in terms of improved computational efficiency and accuracy for support of ongoing DOE programs as well as in terms of national and international recognition of the ATR National Scientific User Facility (NSUF). The ATR Core Modeling Update Project, targeted for full implementation in phase with the next anticipated ATR Core Internals Changeout (CIC) in the 2014-2015 time frame, began during the last quarter of Fiscal Year 2009, and has just completed its third full year. Key accomplishments so far have encompassed both computational as well as experimental work. A new suite of stochastic and deterministic transport theory based reactor physics codes and their supporting nuclear data libraries (HELIOS, KENO6/SCALE, NEWT/SCALE, ATTILA, and an extended implementation of MCNP5) has been installed at the INL under various licensing arrangements. Corresponding models of the ATR and ATRC are now operational with all five codes, demonstrating the basic feasibility of the new code packages for their intended purpose. Of particular importance, a set of as-run core depletion HELIOS calculations for all ATR cycles since August 2009, Cycle 145A through Cycle 151B, was successfully completed during 2012. This major effort supported a decision late in the year to proceed with the phased incorporation of the HELIOS methodology into the ATR Core Safety Analysis Package (CSAP) preparation process, in parallel with the established PDQ-based methodology, beginning late in Fiscal Year 2012. Acquisition of the advanced SERPENT (VTT-Finland) and MC21 (DOE-NR) Monte Carlo stochastic neutronics simulation codes was also initiated during the year and some initial applications of SERPENT to ATRC experiment analysis were demonstrated. These two new codes will offer significant additional capability, including the possibility of full-3D Monte Carlo fuel management support capabilities for the ATR at some point in the future. Finally, a capability for rigorous sensitivity analysis and uncertainty quantification based on the TSUNAMI system has been implemented and initial computational results have been obtained. This capability will have many applications as a tool for understanding the margins of uncertainty in the new models as well as for validation experiment design and interpretation.« less

  10. The Network Protocol Analysis Technique in Snort

    NASA Astrophysics Data System (ADS)

    Wu, Qing-Xiu

    Network protocol analysis is a network sniffer to capture data for further analysis and understanding of the technical means necessary packets. Network sniffing is intercepted by packet assembly binary format of the original message content. In order to obtain the information contained. Required based on TCP / IP protocol stack protocol specification. Again to restore the data packets at protocol format and content in each protocol layer. Actual data transferred, as well as the application tier.

  11. Isolating Spermathecae and Determining Mating Status of Drosophila suzukii: A Protocol for Tissue Dissection and Its Applications

    PubMed Central

    Avanesyan, Alina; Jaffe, Benjamin D.; Guédot, Christelle

    2017-01-01

    The spotted wing drosophila, Drosophila suzukii (Diptera: Drosophilidae), is an emerging invasive pest, which attacks a wide variety of fruits and berries. Although previous studies have focused on different aspects of D. suzukii reproductive biology, there are no protocols available for determining the mating status of D. suzukii females and drosophilids in general. In this study, a step-by-step protocol for tissue dissection, isolating spermathecae, and determining the mating status of females was developed specifically for D. suzukii. This protocol is an effective and relatively quick method for determining female mating status. It has important applications from exploring reproductive output of D. suzukii females to understanding the biology of D. suzukii winter morph, which presumably plays the main role in the overwintering of this invasive species. We demonstrated applicability of this protocol for both field collected flies and flies reared in the lab, including fly specimens stored on a long-term basis. PMID:28287438

  12. Energy-efficient and fast data gathering protocols for indoor wireless sensor networks.

    PubMed

    Tümer, Abdullah Erdal; Gündüz, Mesut

    2010-01-01

    Wireless Sensor Networks have become an important technology with numerous potential applications for the interaction of computers and the physical environment in civilian and military areas. In the routing protocols that are specifically designed for the applications used by sensor networks, the limited available power of the sensor nodes has been taken into consideration in order to extend the lifetime of the networks. In this paper, two protocols based on LEACH and called R-EERP and S-EERP with base and threshold values are presented. R-EERP and S-EERP are two efficient energy aware routing protocols that can be used for some critical applications such as detecting dangerous gases (methane, ammonium, carbon monoxide, etc.) in an indoor environment. In R-EERP, sensor nodes are deployed randomly in a field similar to LEACH. In S-EERP, nodes are deployed sequentially in the rooms of the flats of a multi-story building. In both protocols, nodes forming clusters do not change during a cluster change time, only the cluster heads change. Furthermore, an XOR operation is performed on the collected data in order to prevent the sending of the same data sensed by the nodes close to each other. Simulation results show that our proposed protocols are more energy-efficient than the conventional LEACH protocol.

  13. The characteristics of national health initiatives promoting earlier cancer diagnosis among adult populations: a systematic review protocol

    PubMed Central

    Calanzani, Natalia; Weller, David; Campbell, Christine

    2017-01-01

    Introduction The increasing burden of cancer morbidity and mortality has led to the development of national health initiatives to promote earlier cancer diagnosis and improve cancer survival. This protocol describes a systematic review aiming to identify the evidence about such initiatives among the adult population. We will describe their components, stakeholders and target populations, and summarise their outcomes. Methods and analysis We will search databases and websites for peer-reviewed publications and grey literature on national health initiatives in high-income countries as defined by the World Bank. Quantitative, qualitative and mixed-methods studies will be included and assessed for their methodological quality. Study selection, quality assessment and data extraction will be carried out independently by two reviewers. Narrative synthesis will be used to analyse the findings. Ethics and dissemination This systematic review analyses secondary data and ethical approval is not required. Review findings will be helpful to researchers, policy makers, governments and other key stakeholders developing similar initiatives and assessing cancer outcomes. The results will be submitted to a peer-reviewed journal in order to reach a diverse group of healthcare professionals, researchers and policy makers. This systematic review protocol is registered at PROSPERO (CRD42016047233). PMID:28698336

  14. The ARAC-RODOS-WSPEEDI Information Exchange Project

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Sullivan, T J

    1999-09-01

    Under the auspices of a US DOE-JAPAN Memorandum of Understanding JAERI and LLNL agreed to develop and evaluate a prototype information exchange protocol for nuclear accident emergency situations. This project received some interest from the US DOS and FEMA as it fits nicely under the umbrella of the G-7's GEMINI (Global Emergency Management Information Network Initiative) project. Because of LLNL/ARAC and JAERV WSPEEDI interest in nuclear accident consequence assessment and hazard prediction on all scales, to include global, we were happy to participate. Subsequent to the Spring 1997 RODOS-ARAC Workshop a Memorandum of Agreement was developed to enhance mutual collaborationmore » on matters of emergency systems development. In the summer of 1998 the project leaders of RODOS, WSPEEDI and ARAC met at FZK and agreed to join in a triangular collaboration on the development and demonstration of an emergency information exchange protocol. JAERI and FZK are engaged in developing a formal cooperation agreement. The purpose of this project is to evaluate the prototype information protocol application for technical feasibility and mutual benefit through simulated (real) event; quick exchange of atmospheric modeling products and environmental data during emergencies, distribution of predicted results to other countries having no prediction capabilities, and utilization of the link for collaborative studies.« less

  15. A data-rich recruitment core to support translational clinical research.

    PubMed

    Kost, Rhonda G; Corregano, Lauren M; Rainer, Tyler-Lauren; Melendez, Caroline; Coller, Barry S

    2015-04-01

    Underenrollment of clinical studies wastes resources and delays assessment of research discoveries. We describe the organization and impact of a centralized recruitment core delivering comprehensive recruitment support to investigators. The Rockefeller University Center for Clinical and Translational Science supports a centralized recruitment core, call center, Research Volunteer Repository, data infrastructure, and staff who provide expert recruitment services to investigators. During protocol development, consultations aim to optimize enrollment feasibility, develop recruitment strategy, budget, and advertising. Services during study conduct include advertising placement, repository queries, call management, prescreening, referral, and visit scheduling. Utilization and recruitment outcomes are tracked using dedicated software. For protocols receiving recruitment services during 2009-2013: median time from initiation of recruitment to the first enrolled participant was 10 days; of 4,047 first-time callers to the call center, 92% (n = 3,722) enrolled in the Research Volunteer Repository, with 99% retention; 23% of Repository enrollees subsequently enrolled in ≥1 research studies, with 89% retention. Of volunteers referred by repository queries, 49% (280/537) enrolled into the study, with 92% retained. Provision of robust recruitment infrastructure including expertise, a volunteer repository, data capture and real-time analysis accelerates protocol accrual. Application of recruitment science improves the quality of clinical investigation. © 2014 Wiley Periodicals, Inc.

  16. A Data‐Rich Recruitment Core to Support Translational Clinical Research

    PubMed Central

    Corregano, Lauren M.; Rainer, Tyler‐Lauren; Melendez, Caroline; Coller, Barry S.

    2014-01-01

    Abstract Background Underenrollment of clinical studies wastes resources and delays assessment of research discoveries. We describe the organization and impact of a centralized recruitment core delivering comprehensive recruitment support to investigators. Methods The Rockefeller University Center for Clinical and Translational Science supports a centralized recruitment core, call center, Research Volunteer Repository, data infrastructure, and staff who provide expert recruitment services to investigators. During protocol development, consultations aim to optimize enrollment feasibility, develop recruitment strategy, budget, and advertising. Services during study conduct include advertising placement, repository queries, call management, prescreening, referral, and visit scheduling. Utilization and recruitment outcomes are tracked using dedicated software. Results For protocols receiving recruitment services during 2009–2013: median time from initiation of recruitment to the first enrolled participant was 10 days; of 4,047 first‐time callers to the call center, 92% (n = 3,722) enrolled in the Research Volunteer Repository, with 99% retention; 23% of Repository enrollees subsequently enrolled in ≥1 research studies, with 89% retention. Of volunteers referred by repository queries, 49% (280/537) enrolled into the study, with 92% retained. Conclusions Provision of robust recruitment infrastructure including expertise, a volunteer repository, data capture and real‐time analysis accelerates protocol accrual. Application of recruitment science improves the quality of clinical investigation. PMID:25381717

  17. Integration of GC-MSD and ER-Calux® assay into a single protocol for determining steroid estrogens in environmental samples.

    PubMed

    Avberšek, Miha; Žegura, Bojana; Filipič, Metka; Heath, Ester

    2011-11-01

    There are many published studies that use either chemical or biological methods to investigate steroid estrogens in the aquatic environment, but rarer are those that combine both. In this study, gas chromatography with mass selective detection (GC-MSD) and the ER-Calux(®) estrogenicity assay were integrated into a single protocol for simultaneous determination of natural (estrone--E1, 17β-estradiol--E2, estriol--E3) and synthetic (17α-ethinylestradiol--EE2) steroid estrogens concentrations and the total estrogenic potential of environmental samples. For integration purposes, several solvents were investigated and the commonly used dimethyl sulphoxide (DMSO) in the ER-Calux(®) assay was replaced by ethyl acetate, which is more compatible with gas chromatography and enables the same sample to be analysed by both GC-MSD and the ER-Calux(®) assay. The integrated protocol was initially tested using a standard mixture of estrogens. The results for pure standards showed that the estrogenicity calculated on the basis of GC-MSD and the ER-Calux(®) assay exhibited good correlation (r(2)=0.96; α=0.94). The result remained the same when spiked waste water extracts were tested (r(2)=0.92, α=1.02). When applied to real waste water influent and effluent samples the results proved (r(2)=0.93; α=0.99) the applicability of the protocol. The main advantages of this newly developed protocol are simple sample handling for both methods, and reduced material consumption and labour. In addition, it can be applied as either a complete or sequential analysis where the ER-Calux(®) assay is used as a pre-screening method prior to the chemical analysis. Copyright © 2011 Elsevier B.V. All rights reserved.

  18. Two Different Fatigue Protocols and Lower Extremity Motion Patterns During a Stop-Jump Task

    PubMed Central

    Quammen, David; Cortes, Nelson; Van Lunen, Bonnie L.; Lucci, Shawn; Ringleb, Stacie I.; Onate, James

    2012-01-01

    Context: Altered neuromuscular control strategies during fatigue probably contribute to the increased incidence of non-contact anterior cruciate ligament injuries in female athletes. Objective: To determine biomechanical differences between 2 fatigue protocols (slow linear oxidative fatigue protocol [SLO-FP] and functional agility short-term fatigue protocol [FAST-FP]) when performing a running-stop-jump task. Design: Controlled laboratory study. Setting: Laboratory. Patients or Other Participants: A convenience sample of 15 female soccer players (age = 19.2 ±0.8 years, height = 1.67±0.05m, mass = 61.7 + 8.1 kg) without injury participated. Intervention(s): Five successful trials of a running–stop-jump task were obtained prefatigue and postfatigue during the 2 protocols. For the SLO-FP, a peak oxygen consumption (V˙o2peak) test was conducted before the fatigue protocol. Five minutes after the conclusion of the V˙o2peak test, participants started the fatigue protocol by performing a 30-minute interval run. The FAST-FP consisted of 4 sets of a functional circuit. Repeated 2 (fatigue protocol) × 2 (time) analyses of variance were conducted to assess differences between the 2 protocols and time (prefatigue, postfatigue). Main Outcome Measure(s): Kinematic and kinetic measures of the hip and knee were obtained at different times while participants performed both protocols during prefatigue and postfatigue. Results: Internal adduction moment at initial contact (IC) was greater during FAST-FP (0.064 ±0.09 Nm/kgm) than SLO-FP (0.024±0.06 Nm/kgm) (F1,14 = 5.610, P=.03). At IC, participants had less hip flexion postfatigue (44.7°±8.1°) than prefatigue (50.1°±9.5°) (F1,14 = 16.229, P=.001). At peak vertical ground reaction force, participants had less hip flexion postfatigue (44.7°±8.4°) than prefatigue (50.4°±10.3°) (F1,14 = 17.026, P=.001). At peak vertical ground reaction force, participants had less knee flexion postfatigue (−35.9°±6.5°) than prefatigue (−38.8°±5.03°) (F1,14 = 11.537, P=.001). Conclusions: Our results demonstrated a more erect landing posture due to a decrease in hip and knee flexion angles in the postfatigue condition. The changes were similar between protocols; however, the FAST-FP was a clinically applicable 5-minute protocol, whereas the SLO-FP lasted approximately 45 minutes. PMID:22488228

  19. Automated monitoring of medical protocols: a secure and distributed architecture.

    PubMed

    Alsinet, T; Ansótegui, C; Béjar, R; Fernández, C; Manyà, F

    2003-03-01

    The control of the right application of medical protocols is a key issue in hospital environments. For the automated monitoring of medical protocols, we need a domain-independent language for their representation and a fully, or semi, autonomous system that understands the protocols and supervises their application. In this paper we describe a specification language and a multi-agent system architecture for monitoring medical protocols. We model medical services in hospital environments as specialized domain agents and interpret a medical protocol as a negotiation process between agents. A medical service can be involved in multiple medical protocols, and so specialized domain agents are independent of negotiation processes and autonomous system agents perform monitoring tasks. We present the detailed architecture of the system agents and of an important domain agent, the database broker agent, that is responsible of obtaining relevant information about the clinical history of patients. We also describe how we tackle the problems of privacy, integrity and authentication during the process of exchanging information between agents.

  20. Reliable broadcast protocols

    NASA Technical Reports Server (NTRS)

    Joseph, T. A.; Birman, Kenneth P.

    1989-01-01

    A number of broadcast protocols that are reliable subject to a variety of ordering and delivery guarantees are considered. Developing applications that are distributed over a number of sites and/or must tolerate the failures of some of them becomes a considerably simpler task when such protocols are available for communication. Without such protocols the kinds of distributed applications that can reasonably be built will have a very limited scope. As the trend towards distribution and decentralization continues, it will not be surprising if reliable broadcast protocols have the same role in distributed operating systems of the future that message passing mechanisms have in the operating systems of today. On the other hand, the problems of engineering such a system remain large. For example, deciding which protocol is the most appropriate to use in a certain situation or how to balance the latency-communication-storage costs is not an easy question.

  1. Generic Verification Protocol for Testing Pesticide Application Spray Drift Reduction Technologies for Row and Field Crops

    EPA Pesticide Factsheets

    This generic verification protocol provides a detailed method to conduct and report results from a verification test of pesticide application technologies that can be used to evaluate these technologies for their potential to reduce spray drift.

  2. Use and efficacy of a nutrition protocol for patients with burns in intensive care.

    PubMed

    Lown, D

    1991-01-01

    The University of Michigan Burn Center uses a protocol to standardize the assessment, initiation, and monitoring of nutritional support for patients with burns of greater than 30% total body surface area (TBSA). Six patients with 20% to 80% TBSA burns were followed for 3 weeks to determine the effect of the protocol on the assessment, initiation, monitoring, and adequacy of nutritional support. The protocol calls for resting energy expenditure (REE) measurement within 24 hours of injury, to be repeated 3 times per week, for assessment of caloric requirements. Patients experienced an average delay before first REE measurement of 3 days after burn injury because measurements were unavailable on weekends and surgical days. REE measurements were used to determine caloric requirements and to tailor nutritional support to fluctuating metabolic needs. In four of the six patients a Dobhoff feeding tube (Biosearch Medical Products, Inc., Somerville, N.J.) was placed in the small bowel and enteral nutrition was initiated within 24 hours of admission, as outlined in the protocol. Two patients received concurrent parenteral nutrition because of difficulty in placing the Dobhoff feeding tube when fluoroscopy was not available. The three patients receiving nutrition solely through enteral feeding had achieved 100% of their caloric requirements by day 2, 4, and greater than 7 days after injury, respectively. Overall, the six patients received enterally an average of 75% of their caloric requirements. The major reason for inadequate enteral support was interruption of tube feedings because of tube dislodgment or multiple surgical procedures. The protocol used weekly measurements of total iron-binding capacity and prealbumin level s parameters of nutritional support.(ABSTRACT TRUNCATED AT 250 WORDS)

  3. (abstract) Experimental Results From Internetworking Data Applications Over Various Wireless Networks Using a Single Flexible Error Control Protocol

    NASA Technical Reports Server (NTRS)

    Kanai, T.; Kramer, M.; McAuley, A. J.; Nowack, S.; Pinck, D. S.; Ramirez, G.; Stewart, I.; Tohme, H.; Tong, L.

    1995-01-01

    This paper describes results from several wireless field trials in New Jersey, California, and Colorado, conducted jointly by researchers at Bellcore, JPL, and US West over the course of 1993 and 1994. During these trials, applications communicated over multiple wireless networks including satellite, low power PCS, high power cellular, packet data, and the wireline Public Switched Telecommunications Network (PSTN). Key goals included 1) designing data applications and an API suited to mobile users, 2) investigating internetworking issues, 3) characterizing wireless networks under various field conditions, and 4) comparing the performance of different protocol mechanisms over the diverse networks and applications. We describe experimental results for different protocol mechanisms and parameters, such as acknowledgment schemes and packet sizes. We show the need for powerful error control mechanisms such as selective acknowledgements and combining data from multiple transmissions. We highlight the possibility of a common protocol for all wireless networks, from micro-cellular PCS to satellite networks.

  4. GLOBE Goes GO with Mosquitoes

    NASA Astrophysics Data System (ADS)

    Boger, R. A.; Low, R.

    2016-12-01

    The GLOBE Mosquito Larvae protocol and a new citizen science initiative, GLOBE Observers (GO), were both launched in Summer 2016. While the GLOBE Mosquito Larvae Protocol and associated educational materials target K-16 student inquiry and research, the GO protocol version is simplified to enable citizen scientists of all ages from all walks of life to participate. GO allows citizen scientists to collect and submit environmental data through an easy-to-use smart phone app available for both Apple and Android mobile devices. GO mosquito asks for photos of larvae mosquito genus or species, location, and type of water source (e.g., container or pond) where the larvae were found. To initiate the new mosquito GLOBE/GO opportunities, workshops have been held in Barbuda, Thailand, West Indies, US Gulf Coast, New York City, and at the GLOBE Annual Meeting in Colorado. Through these venues, the protocols have been refined and a field campaign has been initiated so that GO and GLOBE citizen scientists (K-16 students and all others) can contribute data. Quality assurance measures are taken through the online training required to participate and the validation of identification by other citizen sciences and mosquito experts. Furthermore, initial research is underway to develop optical recognition software starting with the species that carry the Zika virus (Aedes aegypti and A. albopictus). With this launch, we plan to move forward by providing opportunities throughout the world to engage people in meaningful environmental and public health data collection and to promote citizen scientists to become agents of change in their communities.

  5. Multi-registration of software library resources

    DOEpatents

    Archer, Charles J [Rochester, MN; Blocksome, Michael A [Rochester, MN; Ratterman, Joseph D [Rochester, MN; Smith, Brian E [Rochester, MN

    2011-04-05

    Data communications, including issuing, by an application program to a high level data communications library, a request for initialization of a data communications service; issuing to a low level data communications library a request for registration of data communications functions; registering the data communications functions, including instantiating a factory object for each of the one or more data communications functions; issuing by the application program an instruction to execute a designated data communications function; issuing, to the low level data communications library, an instruction to execute the designated data communications function, including passing to the low level data communications library a call parameter that identifies a factory object; creating with the identified factory object the data communications object that implements the data communications function according to the protocol; and executing by the low level data communications library the designated data communications function.

  6. In-vivo rectal dose measurements with diodes to avoid misadministrations during intracavitary high dose rate brachytherapy for carcinoma of the cervix.

    PubMed

    Alecu, R; Alecu, M

    1999-05-01

    Our purpose in this paper is to present an in vivo dosimetry program designed both for measuring the rectal dose and for avoiding misadministrations in gynecological intracavitary implants. A device containing an energy compensated diode was specially designed for these measurements. Our calibration procedure as well as the clinical protocol is described. Measurements have been performed for 50 treatments delivered with a Fletcher Suit Delclos applicator. The calculated and in vivo measured values for the "20% reading," i.e., the dose delivered to the diode by the initial 20% of the total dwell time, agreed to within 15%.

  7. Neuromuscular ultrasound of cranial nerves.

    PubMed

    Tawfik, Eman A; Walker, Francis O; Cartwright, Michael S

    2015-04-01

    Ultrasound of cranial nerves is a novel subdomain of neuromuscular ultrasound (NMUS) which may provide additional value in the assessment of cranial nerves in different neuromuscular disorders. Whilst NMUS of peripheral nerves has been studied, NMUS of cranial nerves is considered in its initial stage of research, thus, there is a need to summarize the research results achieved to date. Detailed scanning protocols, which assist in mastery of the techniques, are briefly mentioned in the few reference textbooks available in the field. This review article focuses on ultrasound scanning techniques of the 4 accessible cranial nerves: optic, facial, vagus and spinal accessory nerves. The relevant literatures and potential future applications are discussed.

  8. A hash based mutual RFID tag authentication protocol in telecare medicine information system.

    PubMed

    Srivastava, Keerti; Awasthi, Amit K; Kaul, Sonam D; Mittal, R C

    2015-01-01

    Radio Frequency Identification (RFID) is a technology which has multidimensional applications to reduce the complexity of today life. Everywhere, like access control, transportation, real-time inventory, asset management and automated payment systems etc., RFID has its enormous use. Recently, this technology is opening its wings in healthcare environments, where potential applications include patient monitoring, object traceability and drug administration systems etc. In this paper, we propose a secure RFID-based protocol for the medical sector. This protocol is based on hash operation with synchronized secret. The protocol is safe against active and passive attacks such as forgery, traceability, replay and de-synchronization attack.

  9. Applications of Multi-Channel Safety Authentication Protocols in Wireless Networks.

    PubMed

    Chen, Young-Long; Liau, Ren-Hau; Chang, Liang-Yu

    2016-01-01

    People can use their web browser or mobile devices to access web services and applications which are built into these servers. Users have to input their identity and password to login the server. The identity and password may be appropriated by hackers when the network environment is not safe. The multiple secure authentication protocol can improve the security of the network environment. Mobile devices can be used to pass the authentication messages through Wi-Fi or 3G networks to serve as a second communication channel. The content of the message number is not considered in a multiple secure authentication protocol. The more excessive transmission of messages would be easier to collect and decode by hackers. In this paper, we propose two schemes which allow the server to validate the user and reduce the number of messages using the XOR operation. Our schemes can improve the security of the authentication protocol. The experimental results show that our proposed authentication protocols are more secure and effective. In regard to applications of second authentication communication channels for a smart access control system, identity identification and E-wallet, our proposed authentication protocols can ensure the safety of person and property, and achieve more effective security management mechanisms.

  10. Refining the application of direct embryogenesis in sugarcane: Effect of the developmental phase of leaf disc explants and the timing of DNA transfer on transformation efficiency.

    PubMed

    Snyman, S J; Meyer, G M; Richards, J M; Haricharan, N; Ramgareeb, S; Huckett, B I

    2006-10-01

    A rapid in vitro protocol using direct somatic embryogenesis and microprojectile bombardment was investigated to establish the developmental phases most suitable for efficient sugarcane transformation. Immature leaf roll disc explants with and without pre-emergent inflorescence tissue were compared. It was shown that for effective transformation to occur, explants should be cultured for several days to allow initiation of embryo development prior to bombardment. Leaf roll discs with pre-emergent inflorescences showed a higher degree of embryogenic competence than non-flowering explants, and transformation efficiency was higher when explants containing floral initials were bombarded. Despite the occurrence of high numbers of phenotypically negative plants, combining the use of inflorescent leaf roll discs with direct embryogenic regeneration has the potential to improve the speed and efficiency of transgenesis in sugarcane.

  11. A sensitive mass spectrometric method for hypothesis-driven detection of peptide post-translational modifications: multiple reaction monitoring-initiated detection and sequencing (MIDAS).

    PubMed

    Unwin, Richard D; Griffiths, John R; Whetton, Anthony D

    2009-01-01

    The application of a targeted mass spectrometric workflow to the sensitive identification of post-translational modifications is described. This protocol employs multiple reaction monitoring (MRM) to search for all putative peptides specifically modified in a target protein. Positive MRMs trigger an MS/MS experiment to confirm the nature and site of the modification. This approach, termed MIDAS (MRM-initiated detection and sequencing), is more sensitive than approaches using neutral loss scanning or precursor ion scanning methodologies, due to a more efficient use of duty cycle along with a decreased background signal associated with MRM. We describe the use of MIDAS for the identification of phosphorylation, with a typical experiment taking just a couple of hours from obtaining a peptide sample. With minor modifications, the MIDAS method can be applied to other protein modifications or unmodified peptides can be used as a MIDAS target.

  12. Corrosion and mechanical performance of AZ91 exposed to simulated inflammatory conditions.

    PubMed

    Brooks, Emily K; Der, Stephanie; Ehrensberger, Mark T

    2016-03-01

    Magnesium (Mg) and its alloys, including Mg-9%Al-1%Zn (AZ91), are biodegradable metals with potential use as temporary orthopedic implants. Invasive orthopedic procedures can provoke an inflammatory response that produces hydrogen peroxide (H2O2) and an acidic environment near the implant. This study assessed the influence of inflammation on both the corrosion and mechanical properties of AZ91. The AZ91 samples in the inflammatory protocol were immersed for three days in a complex biologically relevant electrolyte (AMEM culture media) that contained serum proteins (FBS), 150 mM of H2O2, and was titrated to a pH of 5. The control protocol immersed AZ91 samples in the same biologically relevant electrolyte (AMEM & FBS) but without H2O2 and the acid titration. After 3 days all samples were switched into fresh AMEM & FBS for an additional 3-day immersion. During the initial immersion, inflammatory protocol samples showed increased corrosion rate determined by mass loss testing, increased Mg and Al ion released to solution, and a completely corroded surface morphology as compared to the control protocol. Although corrosion in both protocols slowed once the test electrolyte solution was replaced at 3 days, the samples originally exposed to the simulated inflammatory conditions continued to display enhanced corrosion rates as compared to the control protocol. These lingering effects may indicate the initial inflammatory corrosion processes modified components of the surface oxide and corrosion film or initiated aggressive localized processes that subsequently left the interface more vulnerable to continued enhanced corrosion. The electrochemical properties of the interfaces were also evaluated by EIS, which found that the corrosion characteristics of the AZ91 samples were potentially influenced by the role of intermediate adsorption layer processes. The increased corrosion observed for the inflammatory protocol did not affect the flexural mechanical properties of the AZ91 at any time point assessed. Copyright © 2015 Elsevier B.V. All rights reserved.

  13. Introducing an enhanced recovery after surgery program in colorectal surgery: A single center experience

    PubMed Central

    Bona, Stefano; Molteni, Mattia; Rosati, Riccardo; Elmore, Ugo; Bagnoli, Pietro; Monzani, Roberta; Caravaca, Monica; Montorsi, Marco

    2014-01-01

    AIM: To study the implementation of an enhanced recovery after surgery (ERAS) program at a large University Hospital from “pilot study” to “standard of care”. METHODS: The study was designed as a prospective single centre cohort study. A prospective evaluation of compliance to a protocol based on full application of all ERAS principles, through the progressive steps of its implementation, was performed. Results achieved in the initial pilot study conducted by a dedicated team (n = 47) were compared to those achieved in the shared protocol phase (n = 143) three years later. Outcomes were length of postoperative hospital stay, readmission rate, compliance to the protocol and morbidity. Primary endpoint was the description of the results and the identification of critical issues of large scale implementation of an ERAS program in colorectal surgery emerged in the experience of a single center. Secondary endpoint was the identification of interventions that have been proven to be effective for facilitating the transition from traditional care pathways to a multimodal management protocol according to ERAS principles in colorectal surgery at a single center. RESULTS: During the initial pilot study (March 2009 to December 2010; 47 patients) conducted by a dedicated multidisciplinary team, compliance to the items of ERAS protocol was 93%, with a median length of hospital stay (LOS) of 3 d. Early anastomotic fistulas were observed in 2 cases (4.2%), which required reoperation (Clavien-Dindo grade IIIb). None of the patients had been discharged before the onset of the complication, which could therefore receive prompt treatment. There were also four (8.5%) minor complications (Clavien-Dindo grade II). Thirty days readmission rate was 4%. Perioperative mortality was nil. After implementation of the protocol throughout the Hospital in unselected patients (May 2012 to December 2012; 147 patients) compliance was 74%, with a median LOS of 6 d. Early anastomotic fistulas were observed in 11 cases (7.7%), 5 (3.5%) of which required reoperation (Clavien-Dindo grade IIIb). Two early anastomotic fistulas were treated by radiologic/endoscopic manoeuvres and 4 were treated conservatively. There were also 36 (25.2%) minor complications, 21 (14.7%) of which were Clavien-Dindo grade II and 15 (10.5%) of which were Clavien-Dindo grade I. Only two patients whose course was adversely affected by the development of an anastomotic leak had been discharged before the onset of the complication itself, requiring readmission. Readmission rate within 30 d was 4%. Perioperative mortality was 1%. CONCLUSION: Our results confirm that introduction of an ERAS protocol for colorectal surgery allows quicker postoperative recovery and shortens the length of stay compared to historical series. PMID:25516673

  14. 48 CFR 1352.235-73 - Research involving human subjects-after initial contract award.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... the United States Department of Health and Human Services' Office for Human Research Protections... documentation may include: (1) Copies of the human subjects research protocol, advertisements, recruitment... human subjects research protocol, advertisements, recruitment material, and informed consent forms by...

  15. New approach to enhance and evaluate the performance of vehicle-infrastructure integration and its communication systems, final report.

    DOT National Transportation Integrated Search

    2010-09-01

    Initial research studied the use of wireless local area networks (WLAN) protocols in Inter-Vehicle Communications : (IVC) environments. The protocols performance was evaluated in terms of measuring throughput, jitter time and : delay time. This re...

  16. Statistics of work performed on a forced quantum oscillator.

    PubMed

    Talkner, Peter; Burada, P Sekhar; Hänggi, Peter

    2008-07-01

    Various aspects of the statistics of work performed by an external classical force on a quantum mechanical system are elucidated for a driven harmonic oscillator. In this special case two parameters are introduced that are sufficient to completely characterize the force protocol. Explicit results for the characteristic function of work and the corresponding probability distribution are provided and discussed for three different types of initial states of the oscillator: microcanonical, canonical, and coherent states. Depending on the choice of the initial state the probability distributions of the performed work may greatly differ. This result in particular also holds true for identical force protocols. General fluctuation and work theorems holding for microcanonical and canonical initial states are confirmed.

  17. Music therapy protocol development to enhance swallowing training for stroke patients with dysphagia.

    PubMed

    Kim, Soo Ji

    2010-01-01

    Considering the devastating condition of dysphagia, it is necessary to provide intensive therapeutic regimen based on interdisciplinary approach. In this aspect, music-enhanced swallowing protocol was developed through a pilot study. Then, the modified protocol from a pilot study was examined with 8 stroke patients in a local hospital. The protocol was designed to improve oral motor control, laryngeal elevation, breathing, and swallowing functions. The dependent variables measured included reflex, respiration, and laryngeal functions using the Frenchay Dysarthria assessment. Results from the initial to the midevaluation showed that pitch in the laryngeal category were statistically significant after 6th sessions. After the 12th session, when the final evaluation was compared with the initial assessment, additional categories revealed statistically significant changes. It is recommended that this study should be replicated with a control group and a larger sample using either FEES or video fluoroscopy for scientific data to further substantiate music therapy outcomes in stroke rehabilitation.

  18. DOE Office of Scientific and Technical Information (OSTI.GOV)

    Yu, Weikuan; Vetter, Jeffrey S

    Parallel NFS (pNFS) is touted as an emergent standard protocol for parallel I/O access in various storage environments. Several pNFS prototypes have been implemented for initial validation and protocol examination. Previous efforts have focused on realizing the pNFS protocol to expose the best bandwidth potential from underlying file and storage systems. In this presentation, we provide an initial characterization of two pNFS prototype implementations, lpNFS (a Lustre-based parallel NFS implementation) and spNFS (another reference implementation from Network Appliance, Inc.). We show that both lpNFS and spNFS can faithfully achieve the primary goal of pNFS, i.e., aggregating I/O bandwidth from manymore » storage servers. However, they both face the challenge of scalable metadata management. Particularly, the throughput of sp-NFS metadata operations degrades significanlty with an increasing number of data servers. Even for the better-performing lpNFS, we discuss its architecture and propose a direct I/O request flow protocol to improve its performance.« less

  19. Long-term seafloor monitoring at an open ocean aquaculture site in the western Gulf of Maine, USA: development of an adaptive protocol.

    PubMed

    Grizzle, R E; Ward, L G; Fredriksson, D W; Irish, J D; Langan, R; Heinig, C S; Greene, J K; Abeels, H A; Peter, C R; Eberhardt, A L

    2014-11-15

    The seafloor at an open ocean finfish aquaculture facility in the western Gulf of Maine, USA was monitored from 1999 to 2008 by sampling sites inside a predicted impact area modeled by oceanographic conditions and fecal and food settling characteristics, and nearby reference sites. Univariate and multivariate analyses of benthic community measures from box core samples indicated minimal or no significant differences between impact and reference areas. These findings resulted in development of an adaptive monitoring protocol involving initial low-cost methods that required more intensive and costly efforts only when negative impacts were initially indicated. The continued growth of marine aquaculture is dependent on further development of farming methods that minimize negative environmental impacts, as well as effective monitoring protocols. Adaptive monitoring protocols, such as the one described herein, coupled with mathematical modeling approaches, have the potential to provide effective protection of the environment while minimize monitoring effort and costs. Copyright © 2014 Elsevier Ltd. All rights reserved.

  20. Development of protocols for confined extension/creep testing of geosynthetics for highway applications

    DOT National Transportation Integrated Search

    1998-03-01

    This report presents the development and verification of a testing protocol and protocol equipment for confined extension testing and confined creep testing for geosynthetic reinforcement materials. The developed data indicate that confined response ...

  1. A Family of Quantum Protocols

    NASA Astrophysics Data System (ADS)

    Devetak, Igor; Harrow, Aram W.; Winter, Andreas

    2004-12-01

    We introduce three new quantum protocols involving noisy quantum channels and entangled states, and relate them operationally and conceptually with four well-known old protocols. Two of the new protocols (the mother and father) can generate the other five “child” protocols by direct application of teleportation and superdense coding, and can be derived in turn by making the old protocols “coherent.” This gives very simple proofs for two famous old protocols (the hashing inequality and quantum channel capacity) and provides the basis for optimal trade-off curves in several quantum information processing tasks.

  2. Single-step affinity purification for fungal proteomics.

    PubMed

    Liu, Hui-Lin; Osmani, Aysha H; Ukil, Leena; Son, Sunghun; Markossian, Sarine; Shen, Kuo-Fang; Govindaraghavan, Meera; Varadaraj, Archana; Hashmi, Shahr B; De Souza, Colin P; Osmani, Stephen A

    2010-05-01

    A single-step protein affinity purification protocol using Aspergillus nidulans is described. Detailed protocols for cell breakage, affinity purification, and depending on the application, methods for protein release from affinity beads are provided. Examples defining the utility of the approaches, which should be widely applicable, are included.

  3. Protocol for Uniformly Measuring and Expressing the Performance of Energy Storage Systems

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Conover, David R.; Crawford, Aladsair J.; Viswanathan, Vilayanur V.

    2014-06-01

    The Protocol for Uniformly Measuring and Expressing the Performance of Energy Storage Systems (PNNL-22010) was first issued in November 2012 as a first step toward providing a foundational basis for developing an initial standard for the uniform measurement and expression of energy storage system (ESS) performance. Its subsequent use in the field and review by the protocol working group and most importantly the users’ subgroup and the thermal subgroup has led to the fundamental modifications reflected in this update of the 2012 Protocol. As an update of the 2012 Protocol, this document (the June 2014 Protocol) is intended to supersedemore » its predecessor and be used as the basis for measuring and expressing ESS performance. The foreword provides general and specific details about what additions, revisions, and enhancements have been made to the 2012 Protocol and the rationale for them in arriving at the June 2014 Protocol.« less

  4. A two-step dilution tris-egg yolk extender containing Equex STM significantly improves sperm cryopreservation in the African wild dog (Lycaon pictus).

    PubMed

    Van den Berghe, Femke; Paris, Monique Christina Johanna; Briggs, Michael Brent; Farstad, Wenche Kristin; Paris, Damien Boyd Bertrand Paul

    2018-02-01

    Conservation management of endangered African wild dogs (AWD; Lycaon pictus) can benefit greatly from development of sperm freezing and artificial insemination. Previous freezing attempts yielded nearly 0% motile sperm within 2 h of thawing. In this study, two canine freezing protocols were tested: Protocol 1: a one-step dilution in TRIS-20% egg yolk containing 8% glycerol; and Protocol 2: a two-step dilution in TRIS-20% egg yolk containing a final extender concentration of 5% glycerol and 0.5% Equex STM, coupled with a TRIS-citrate-fructose thawing solution. Semen was collected by electroejaculation from n = 24 AWDs, of which eight ejaculates of sufficient quality (four good quality with initial sperm motility of 75.0 ± 4.4% and four poor quality; showing rapid decrease in sperm motility to 3.3 ± 3.3% prior to freezing) were frozen. For good quality samples, motility and sperm motility index persisted for up to 8 h for Protocol 2, and was higher between 2 and 6 h after thawing with a decrease from 4 h of incubation. Motility dropped to nearly 0% after 2 h incubation for Protocol 1. Viability was higher for Protocol 2 throughout the 8 h of incubation, with a decrease after 6 h, compared to 4 h for Protocol 1. Acrosome integrity was higher for Protocol 2 throughout post-thaw incubation, with a decrease after 2 h for both protocols. Protocols did not differ in normal sperm morphology or DNA integrity. Poor quality samples yielded similar results, except for acrosome integrity, which declined for Protocol 2. In conclusion, a two-step dilution in TRIS-egg yolk-glycerol extender containing Equex STM yields significantly improved post-thaw quality and longevity of AWD spermatozoa, making it suitable for sperm banking and artificial insemination initiatives. Copyright © 2018 The Authors. Published by Elsevier Inc. All rights reserved.

  5. Considerations in establishing a post-mortem brain and tissue bank for the study of myalgic encephalomyelitis/chronic fatigue syndrome: a proposed protocol

    PubMed Central

    2014-01-01

    Background Our aim, having previously investigated through a qualitative study involving extensive discussions with experts and patients the issues involved in establishing and maintaining a disease specific brain and tissue bank for myalgic encephalomyelitis/chronic fatigue syndrome (ME/CFS), was to develop a protocol for a UK ME/CFS repository of high quality human tissue from well characterised subjects with ME/CFS and controls suitable for a broad range of research applications. This would involve a specific donor program coupled with rapid tissue collection and processing, supplemented by comprehensive prospectively collected clinical, laboratory and self-assessment data from cases and controls. Findings We reviewed the operations of existing tissue banks from published literature and from their internal protocols and standard operating procedures (SOPs). On this basis, we developed the protocol presented here, which was designed to meet high technical and ethical standards and legal requirements and was based on recommendations of the MRC UK Brain Banks Network. The facility would be most efficient and cost-effective if incorporated into an existing tissue bank. Tissue collection would be rapid and follow robust protocols to ensure preservation sufficient for a wide range of research uses. A central tissue bank would have resources both for wide-scale donor recruitment and rapid response to donor death for prompt harvesting and processing of tissue. Conclusion An ME/CFS brain and tissue bank could be established using this protocol. Success would depend on careful consideration of logistic, technical, legal and ethical issues, continuous consultation with patients and the donor population, and a sustainable model of funding ideally involving research councils, health services, and patient charities. This initiative could revolutionise the understanding of this still poorly-understood disease and enhance development of diagnostic biomarkers and treatments. PMID:24938650

  6. ZEA-TDMA: design and system level implementation of a TDMA protocol for anonymous wireless networks

    NASA Astrophysics Data System (ADS)

    Banerjee, Debasmit; Dong, Bo; Biswas, Subir

    2013-05-01

    Wireless sensor network used in military applications may be deployed in hostile environments, where privacy and security is of primary concern. This can lead to the formation of a trust-based sub-network among mutually-trusting nodes. However, designing a TDMA MAC protocol is very challenging in situations where such multiple sub-networks coexist, since TDMA protocols require node identity information for slot assignments. This paper introduces a novel distributed TDMA MAC protocol, ZEA-TDMA (Zero Exposure Anonymous TDMA), for anonymous wireless networks. ZEA-TDMA achieves slot allocation with strict anonymity constraints, i.e. without nodes having to exchange any identity revealing information. By using just the relative time of arrival of packets and a novel technique of wireless collision-detection and resolution for fixed packetsizes, ZEA-TDMA is able to achieve MAC slot-allocation which is described as follows. Initially, a newly joined node listens to its one-hop neighborhood channel usage and creates a slot allocation table based on its own relative time, and finally, selects a slot that is collision free within its one-hop neighborhood. The selected slot can however cause hidden collisions with a two-hop neighbor of the node. These collisions are resolved by a common neighbor of the colliding nodes, which first detects the collision, and then resolve them using an interrupt packet. ZEA-TDMA provides the following features: a) it is a TDMA protocol ideally suited for highly secure or strictly anonymous environments b) it can be used in heterogeneous environments where devices use different packet structures c) it does not require network time-synchronization, and d) it is insensitive to channel errors. We have implemented ZEA-TDMA on the MICA2 hardware platform running TinyOS and evaluated the protocol functionality and performance on a MICA2 test-bed.

  7. Interplanetary Overlay Network Bundle Protocol Implementation

    NASA Technical Reports Server (NTRS)

    Burleigh, Scott C.

    2011-01-01

    The Interplanetary Overlay Network (ION) system's BP package, an implementation of the Delay-Tolerant Networking (DTN) Bundle Protocol (BP) and supporting services, has been specifically designed to be suitable for use on deep-space robotic vehicles. Although the ION BP implementation is unique in its use of zero-copy objects for high performance, and in its use of resource-sensitive rate control, it is fully interoperable with other implementations of the BP specification (Internet RFC 5050). The ION BP implementation is built using the same software infrastructure that underlies the implementation of the CCSDS (Consultative Committee for Space Data Systems) File Delivery Protocol (CFDP) built into the flight software of Deep Impact. It is designed to minimize resource consumption, while maximizing operational robustness. For example, no dynamic allocation of system memory is required. Like all the other ION packages, ION's BP implementation is designed to port readily between Linux and Solaris (for easy development and for ground system operations) and VxWorks (for flight systems operations). The exact same source code is exercised in both environments. Initially included in the ION BP implementations are the following: libraries of functions used in constructing bundle forwarders and convergence-layer (CL) input and output adapters; a simple prototype bundle forwarder and associated CL adapters designed to run over an IPbased local area network; administrative tools for managing a simple DTN infrastructure built from these components; a background daemon process that silently destroys bundles whose time-to-live intervals have expired; a library of functions exposed to applications, enabling them to issue and receive data encapsulated in DTN bundles; and some simple applications that can be used for system checkout and benchmarking.

  8. IEEE 802.15.4 Frame Aggregation Enhancement to Provide High Performance in Life-Critical Patient Monitoring Systems

    PubMed Central

    Akbar, Muhammad Sajjad; Yu, Hongnian; Cang, Shuang

    2017-01-01

    In wireless body area sensor networks (WBASNs), Quality of Service (QoS) provision for patient monitoring systems in terms of time-critical deadlines, high throughput and energy efficiency is a challenging task. The periodic data from these systems generates a large number of small packets in a short time period which needs an efficient channel access mechanism. The IEEE 802.15.4 standard is recommended for low power devices and widely used for many wireless sensor networks applications. It provides a hybrid channel access mechanism at the Media Access Control (MAC) layer which plays a key role in overall successful transmission in WBASNs. There are many WBASN’s MAC protocols that use this hybrid channel access mechanism in variety of sensor applications. However, these protocols are less efficient for patient monitoring systems where life critical data requires limited delay, high throughput and energy efficient communication simultaneously. To address these issues, this paper proposes a frame aggregation scheme by using the aggregated-MAC protocol data unit (A-MPDU) which works with the IEEE 802.15.4 MAC layer. To implement the scheme accurately, we develop a traffic patterns analysis mechanism to understand the requirements of the sensor nodes in patient monitoring systems, then model the channel access to find the performance gap on the basis of obtained requirements, finally propose the design based on the needs of patient monitoring systems. The mechanism is initially verified using numerical modelling and then simulation is conducted using NS2.29, Castalia 3.2 and OMNeT++. The proposed scheme provides the optimal performance considering the required QoS. PMID:28134853

  9. IEEE 802.15.4 Frame Aggregation Enhancement to Provide High Performance in Life-Critical Patient Monitoring Systems.

    PubMed

    Akbar, Muhammad Sajjad; Yu, Hongnian; Cang, Shuang

    2017-01-28

    In wireless body area sensor networks (WBASNs), Quality of Service (QoS) provision for patient monitoring systems in terms of time-critical deadlines, high throughput and energy efficiency is a challenging task. The periodic data from these systems generates a large number of small packets in a short time period which needs an efficient channel access mechanism. The IEEE 802.15.4 standard is recommended for low power devices and widely used for many wireless sensor networks applications. It provides a hybrid channel access mechanism at the Media Access Control (MAC) layer which plays a key role in overall successful transmission in WBASNs. There are many WBASN's MAC protocols that use this hybrid channel access mechanism in variety of sensor applications. However, these protocols are less efficient for patient monitoring systems where life critical data requires limited delay, high throughput and energy efficient communication simultaneously. To address these issues, this paper proposes a frame aggregation scheme by using the aggregated-MAC protocol data unit (A-MPDU) which works with the IEEE 802.15.4 MAC layer. To implement the scheme accurately, we develop a traffic patterns analysis mechanism to understand the requirements of the sensor nodes in patient monitoring systems, then model the channel access to find the performance gap on the basis of obtained requirements, finally propose the design based on the needs of patient monitoring systems. The mechanism is initially verified using numerical modelling and then simulation is conducted using NS2.29, Castalia 3.2 and OMNeT++. The proposed scheme provides the optimal performance considering the required QoS.

  10. Microbiological effects and recolonization patterns after adjunctive subgingival debridement with Er:YAG laser.

    PubMed

    Sanz-Sánchez, Ignacio; Ortiz-Vigón, Alberto; Herrera, David; Sanz, Mariano

    2016-07-01

    The objective of this study was to assess the microbiological effects and recolonization patterns after non-surgical periodontal treatment protocol based on the adjunctive use of erbium-doped yttrium aluminium garnet (Er:YAG) laser. Patients diagnosed with chronic periodontitis were randomly assigned to two different treatment protocols: test, full-mouth subgingival ultrasonic instrumentation followed by Er-YAG laser application 1 week later to sites with initial probing pocket depth ≥4.5 mm; and control, full-mouth ultrasonic subgingival instrumentation within 1 week. Clinical (at sampled sites) and microbiological (culture-based) parameters were recorded at baseline and 3 and 12 months. Microbiological variables included total counts, frequency of detection, proportions and counts of target species. Results from 19 test and 21 control patients were compared. Minor changes were observed for total colony-forming units, with no differences between groups. For the frequency of detection, a limited and similar impact in both groups was observed for the most prevalent (over 80 %) periodontal pathogens (Porphyromonas gingivalis, Prevotella intermedia, Fusobacterium nucleatum). For proportions, reductions in P. gingivalis occurred at 3 months, both in the test and control groups (from 16.3 to 10 % and 16 to 14.8 %, respectively), although these differences were not statistically significant. At 12 months, the test group showed a statistically significant greater reduction in probing depth for the sampled sites. The adjunctive use of Er:YAG laser when compared with conventional ultrasonic debridement did not provide a microbiological added benefit. Even though some clinical benefits with the adjunctive laser application were identified when comparing both treatment protocols, there were no differences in microbiological outcomes or in the bacterial recolonization patterns.

  11. A Public-Key Based Authentication and Key Establishment Protocol Coupled with a Client Puzzle.

    ERIC Educational Resources Information Center

    Lee, M. C.; Fung, Chun-Kan

    2003-01-01

    Discusses network denial-of-service attacks which have become a security threat to the Internet community and suggests the need for reliable authentication protocols in client-server applications. Presents a public-key based authentication and key establishment protocol coupled with a client puzzle protocol and validates it through formal logic…

  12. Accelerated rehabilitation compared with a standard protocol after distal radial fractures treated with volar open reduction and internal fixation: a prospective, randomized, controlled study.

    PubMed

    Brehmer, Jess L; Husband, Jeffrey B

    2014-10-01

    There are relatively few studies in the literature that specifically evaluate accelerated rehabilitation protocols for distal radial fractures treated with open reduction and internal fixation (ORIF). The purpose of this study was to compare the early postoperative outcomes (at zero to twelve weeks postoperatively) of patients enrolled in an accelerated rehabilitation protocol with those of patients enrolled in a standard rehabilitation protocol following ORIF for a distal radial fracture. We hypothesized that patients with accelerated rehabilitation after volar ORIF for a distal radial fracture would have an earlier return to function compared with patients who followed a standard protocol. From November 2007 to November 2010, eighty-one patients with an unstable distal radial fracture were prospectively randomized to follow either an accelerated or a standard rehabilitation protocol after undergoing ORIF with a volar plate for a distal radial fracture. Both groups began with gentle active range of motion at three to five days postoperatively. At two weeks, the accelerated group initiated wrist/forearm passive range of motion and strengthening exercises, whereas the standard group initiated passive range of motion and strengthening at six weeks postoperatively. Patients were assessed at three to five days, two weeks, three weeks, four weeks, six weeks, eight weeks, twelve weeks, and six months postoperatively. Outcomes included Disabilities of the Arm, Shoulder and Hand (DASH) scores (primary outcome) and measurements of wrist flexion/extension, supination, pronation, grip strength, and palmar pinch. The patients in the accelerated group had better mobility, strength, and DASH scores at the early postoperative time points (zero to eight weeks postoperatively) compared with the patients in the standard rehabilitation group. The difference between the groups was both clinically relevant and statistically significant. Patients who follow an accelerated rehabilitation protocol that emphasizes motion immediately postoperatively and initiates strengthening at two weeks after volar ORIF of a distal radial fracture have an earlier return to function than patients who follow a more standard rehabilitation protocol. Therapeutic Level I. See Instructions for Authors for a complete description of levels of evidence. Copyright © 2014 by The Journal of Bone and Joint Surgery, Incorporated.

  13. Evaluation of quality improvement initiative in pediatric oncology: implementation of aggressive hydration protocol.

    PubMed

    Fratino, Lisa M; Daniel, Denise A; Cohen, Kenneth J; Chen, Allen R

    2009-01-01

    Our goal was to improve the efficiency of chemotherapy administration for pediatric oncology patients. We identified prechemotherapy hydration as the process that most often delayed chemotherapy administration. An aggressive hydration protocol, supported by fluid order sets, was developed for patients receiving planned chemotherapy. The mean interval from admission to achieving adequate hydration status was reduced significantly from 4.9 to 1.4 hours with a minor reduction in the time to initiate chemotherapy from 9.6 to 8.6 hours. Chemotherapy availability became the new rate-limiting process.

  14. A Quantum Private Query Protocol for Enhancing both User and Database Privacy

    NASA Astrophysics Data System (ADS)

    Zhou, Yi-Hua; Bai, Xue-Wei; Li, Lei-Lei; Shi, Wei-Min; Yang, Yu-Guang

    2018-01-01

    In order to protect the privacy of query user and database, some QKD-based quantum private query (QPQ) protocols were proposed. Unfortunately some of them cannot resist internal attack from database perfectly; some others can ensure better user privacy but require a reduction of database privacy. In this paper, a novel two-way QPQ protocol is proposed to ensure the privacy of both sides of communication. In our protocol, user makes initial quantum states and derives the key bit by comparing initial quantum state and outcome state returned from database by ctrl or shift mode instead of announcing two non-orthogonal qubits as others which may leak part secret information. In this way, not only the privacy of database be ensured but also user privacy is strengthened. Furthermore, our protocol can also realize the security of loss-tolerance, cheat-sensitive, and resisting JM attack etc. Supported by National Natural Science Foundation of China under Grant Nos. U1636106, 61572053, 61472048, 61602019, 61502016; Beijing Natural Science Foundation under Grant Nos. 4152038, 4162005; Basic Research Fund of Beijing University of Technology (No. X4007999201501); The Scientific Research Common Program of Beijing Municipal Commission of Education under Grant No. KM201510005016

  15. A Salute to a Leader: ARL's Assessment Protocol Initiatives

    ERIC Educational Resources Information Center

    Heath, Fred

    2009-01-01

    This brief salute to Duane Webster and his defining role over the past several decades at the Association of Research Libraries (ARL) focuses on his formative role in defining and evolving the assessment protocols employed by both the association and the profession. (Contains 8 notes.)

  16. Selective sentinel lymph node biopsy after neoadjuvant chemotherapy in breast cancer: results of the GEICAM 2005-07 study.

    PubMed

    Piñero-Madrona, Antonio; Escudero-Barea, María J; Fernández-Robayna, Francisco; Alberro-Adúriz, José A; García-Fernández, Antonio; Vicente-García, Francisco; Dueñas-Rodriguez, Basilio; Lorenzo-Campos, Miguel; Caparrós, Xavier; Cansado-Martínez, María P; Ramos-Boyero, Manuel; Rojo-Blanco, Roberto; Serra-Genís, Constantí

    2015-01-01

    A controversial aspect of breast cancer management is the use of sentinel lymph node biopsy (SLNB) in patients requiring neoadjuvant chemotherapy (NCT). This paper discusses the detection rate (DT) and false negatives (FN) of SLNB after NCT to investigate the influence of initial nodal disease and the protocols applied. Prospective observational multicenter study in women with breast cancer, treated with NCT and SLNB post-NCT with subsequent lymphadenectomy. DT and FN rates were calculated, both overall and depending on the initial nodal status or the use of diagnostic protocols pre-SLNB. No differences in DT between initial node-negative cases and positive cases were found (89.8 vs. 84.4%, P=.437). Significant differences were found (94.1 vs. 56.5%, P=0,002) in the negative predictive value, which was lower when there was initial lymph node positivity, and a higher rate of FN, not significant (18.2 vs. 43.5%, P=.252) in the same cases. The axillary study before SLNB and after the NCT, significantly decreased the rate of FN in patients with initial involvement (55.6 vs 12.5, P=0,009). NCT means less DT and a higher rate of FN in subsequent SLNB, especially if there is initial nodal involvement. The use of protocols in axillary evaluation after administering the NCT and before BSGC, decreases the FN rate in these patients. Copyright © 2013 AEC. Publicado por Elsevier España, S.L.U. All rights reserved.

  17. Survey of Advanced Applications Over ACTS

    NASA Technical Reports Server (NTRS)

    Bauer, Robert; McMasters, Paul

    2000-01-01

    The Advanced Communications Technology Satellite (ACTS) system provided a national testbed that enabled advanced applications to be tested and demonstrated over a live satellite link. Of the applications that used ACTS. some offered unique advantages over current methods, while others simply could not be accommodated by conventional systems. The initial technical and experiments results of the program were reported at the 1995 ACTS Results Conference. in Cleveland, Ohio. Since then, the Experiments Program has involved 45 new experiments comprising 30 application experiments and 15 technology related experiments that took advantage of the advanced technologies and unique capabilities offered by ACTS. The experiments are categorized and quantified to show the organizational mix of the experiments program and relative usage of the satellite. Since paper length guidelines preclude each experiment from being individually reported, the application experiments and significant demonstrations are surveyed to show the breadth of the activities that have been supported. Experiments in a similar application category are collectively discussed, such as. telemedicine. or networking and protocol evaluation. Where available. experiment conclusions and impact are presented and references of results and experiment information are provided. The quantity and diversity of the experiments program demonstrated a variety of service areas for the next generation of commercially available, advanced satellite communications.

  18. A review of tags anti-collision and localization protocols in RFID networks.

    PubMed

    Ullah, S; Alsalih, W; Alsehaim, A; Alsadhan, N

    2012-12-01

    Radio Frequency IDentification (RFID) has allowed the realization of ubiquitous tracking and monitoring of physical objects wirelessly with minimum human interactions. It plays a key role in a wide range of applications including asset tracking, contactless payment, access control, transportation and logistics, and other industrial applications. On the other side, RFID systems face several technical challenges that need to be overcome in order to achieve their potential benefits; tags collisions and localization of tagged objects are two important challenges. Numerous anti-collision and localization protocols have been proposed to address these challenges. This paper reviews the state-of-art tags' anti-collision and localization protocols, and provides a deep insight into technical issues of these protocols. The probabilistic and deterministic anti-collision protocols are critically studied and compared in terms of different parameters. We further review distance estimation, scene analysis, and proximity localization schemes and provide useful suggestions. We also introduce a new hybrid direction that utilizes power control to spatially partition the interrogation range of a reader for more efficient anti-collision and localization. Finally, we present the applications of RFID systems in healthcare sectors.

  19. One Approach for Transitioning the iNET Standards into the IRIG 106 Telemetry Standards

    DTIC Science & Technology

    2015-05-26

    Protocol Suite. Figure 1 illustrates the Open Systems Interconnection ( OSI ) Model, the corresponding TCP/IP Model, and the major components of the TCP...IP Protocol Suite. Figure 2 represents the iNET-specific protocols layered onto the TCP/IP Model. Figure 1. OSI and TCP/IP Model with TCP/IP...Protocol Suite TCP/IP Protocol Suite Major Components IPv4 IPv6 TCP/IP Model OSI Model Application Presentation

  20. Determining the influence of rainfall patterns and carbendazim on the surface activity of the earthworm Lumbricus terrestris.

    PubMed

    Ellis, Sian R; Hodson, Mark E; Wege, Phil

    2010-08-01

    Carbendazim is highly toxic to earthworms and is used as a standard control substance when running field-based trials of pesticides, but results using carbendazim are highly variable. In the present study, impacts of timing of rainfall events following carbendazim application on earthworms were investigated. Lumbricus terrestris were maintained in soil columns to which carbendazim and then deionized water (a rainfall substitute) were applied. Carbendazim was applied at 4 kg/ha, the rate recommended in pesticide field trials. Three rainfall regimes were investigated: initial and delayed heavy rainfall 24 h and 6 d after carbendazim application, and frequent rainfall every 48 h. Earthworm mortality and movement of carbendazim through the soil was assessed 14 d after carbendazim application. No detectable movement of carbendazim occurred through the soil in any of the treatments or controls. Mortality in the initial heavy and frequent rainfall was significantly higher (approximately 55%) than in the delayed rainfall treatment (approximately 25%). This was due to reduced bioavailability of carbendazim in the latter treatment due to a prolonged period of sorption of carbendazim to soil particles before rainfall events. The impact of carbendazim application on earthworm surface activity was assessed using video cameras. Carbendazim applications significantly reduced surface activity due to avoidance behavior of the earthworms. Surface activity reductions were least in the delayed rainfall treatment due to the reduced bioavailability of the carbendazim. The nature of rainfall events' impacts on the response of earthworms to carbendazim applications, and details of rainfall events preceding and following applications during field trials should be made at a higher level of resolution than is currently practiced according to standard International Organization for Standardization protocols. Copyright 2010 SETAC

  1. Comparison of seven protocols to identify fecal contamination sources using Escherichia coli

    USGS Publications Warehouse

    Stoeckel, D.M.; Mathes, M.V.; Hyer, K.E.; Hagedorn, C.; Kator, H.; Lukasik, J.; O'Brien, T. L.; Fenger, T.W.; Samadpour, M.; Strickler, K.M.; Wiggins, B.A.

    2004-01-01

    Microbial source tracking (MST) uses various approaches to classify fecal-indicator microorganisms to source hosts. Reproducibility, accuracy, and robustness of seven phenotypic and genotypic MST protocols were evaluated by use of Escherichia coli from an eight-host library of known-source isolates and a separate, blinded challenge library. In reproducibility tests, measuring each protocol's ability to reclassify blinded replicates, only one (pulsed-field gel electrophoresis; PFGE) correctly classified all test replicates to host species; three protocols classified 48-62% correctly, and the remaining three classified fewer than 25% correctly. In accuracy tests, measuring each protocol's ability to correctly classify new isolates, ribotyping with EcoRI and PvuII approached 100% correct classification but only 6% of isolates were classified; four of the other six protocols (antibiotic resistance analysis, PFGE, and two repetitive-element PCR protocols) achieved better than random accuracy rates when 30-100% of challenge isolates were classified. In robustness tests, measuring each protocol's ability to recognize isolates from nonlibrary hosts, three protocols correctly classified 33-100% of isolates as "unknown origin," whereas four protocols classified all isolates to a source category. A relevance test, summarizing interpretations for a hypothetical water sample containing 30 challenge isolates, indicated that false-positive classifications would hinder interpretations for most protocols. Study results indicate that more representation in known-source libraries and better classification accuracy would be needed before field application. Thorough reliability assessment of classification results is crucial before and during application of MST protocols.

  2. Zero-Copy Objects System

    NASA Technical Reports Server (NTRS)

    Burleigh, Scott C.

    2011-01-01

    Zero-Copy Objects System software enables application data to be encapsulated in layers of communication protocol without being copied. Indirect referencing enables application source data, either in memory or in a file, to be encapsulated in place within an unlimited number of protocol headers and/or trailers. Zero-copy objects (ZCOs) are abstract data access representations designed to minimize I/O (input/output) in the encapsulation of application source data within one or more layers of communication protocol structure. They are constructed within the heap space of a Simple Data Recorder (SDR) data store to which all participating layers of the stack must have access. Each ZCO contains general information enabling access to the core source data object (an item of application data), together with (a) a linked list of zero or more specific extents that reference portions of this source data object, and (b) linked lists of protocol header and trailer capsules. The concatenation of the headers (in ascending stack sequence), the source data object extents, and the trailers (in descending stack sequence) constitute the transmitted data object constructed from the ZCO. This scheme enables a source data object to be encapsulated in a succession of protocol layers without ever having to be copied from a buffer at one layer of the protocol stack to an encapsulating buffer at a lower layer of the stack. For large source data objects, the savings in copy time and reduction in memory consumption may be considerable.

  3. Cryotherapy for acute ankle sprains: a randomised controlled study of two different icing protocols.

    PubMed

    Bleakley, C M; McDonough, S M; MacAuley, D C; Bjordal, J

    2006-08-01

    The use of cryotherapy in the management of acute soft tissue injury is largely based on anecdotal evidence. Preliminary evidence suggests that intermittent cryotherapy applications are most effective at reducing tissue temperature to optimal therapeutic levels. However, its efficacy in treating injured human subjects is not yet known. To compare the efficacy of an intermittent cryotherapy treatment protocol with a standard cryotherapy treatment protocol in the management of acute ankle sprains. Sportsmen (n = 44) and members of the general public (n = 45) with mild/moderate acute ankle sprains. Subjects were randomly allocated, under strictly controlled double blind conditions, to one of two treatment groups: standard ice application (n = 46) or intermittent ice application (n = 43). The mode of cryotherapy was standardised across groups and consisted of melting iced water (0 degrees C) in a standardised pack. Function, pain, and swelling were recorded at baseline and one, two, three, four, and six weeks after injury. Subjects treated with the intermittent protocol had significantly (p<0.05) less ankle pain on activity than those using a standard 20 minute protocol; however, one week after ankle injury, there were no significant differences between groups in terms of function, swelling, or pain at rest. Intermittent applications may enhance the therapeutic effect of ice in pain relief after acute soft tissue injury.

  4. Data aggregation in wireless sensor networks using the SOAP protocol

    NASA Astrophysics Data System (ADS)

    Al-Yasiri, A.; Sunley, A.

    2007-07-01

    Wireless sensor networks (WSN) offer an increasingly attractive method of data gathering in distributed system architectures and dynamic access via wireless connectivity. Wireless sensor networks have physical and resource limitations, this leads to increased complexity for application developers and often results in applications that are closely coupled with network protocols. In this paper, a data aggregation framework using SOAP (Simple Object Access Protocol) on wireless sensor networks is presented. The framework works as a middleware for aggregating data measured by a number of nodes within a network. The aim of the study is to assess the suitability of the protocol in such environments where resources are limited compared to traditional networks.

  5. High-Performance, Reliable Multicasting: Foundations for Future Internet Groupware Applications

    NASA Technical Reports Server (NTRS)

    Callahan, John; Montgomery, Todd; Whetten, Brian

    1997-01-01

    Network protocols that provide efficient, reliable, and totally-ordered message delivery to large numbers of users will be needed to support many future Internet applications. The Reliable Multicast Protocol (RMP) is implemented on top of IP multicast to facilitate reliable transfer of data for replicated databases and groupware applications that will emerge on the Internet over the next decade. This paper explores some of the basic questions and applications of reliable multicasting in the context of the development and analysis of RMP.

  6. Science Initiatives of the US Virtual Astronomical Observatory

    NASA Astrophysics Data System (ADS)

    Hanisch, R. J.

    2012-09-01

    The United States Virtual Astronomical Observatory program is the operational facility successor to the National Virtual Observatory development project. The primary goal of the US VAO is to build on the standards, protocols, and associated infrastructure developed by NVO and the International Virtual Observatory Alliance partners and to bring to fruition a suite of applications and web-based tools that greatly enhance the research productivity of professional astronomers. To this end, and guided by the advice of our Science Council (Fabbiano et al. 2011), we have focused on five science initiatives in the first two years of VAO operations: 1) scalable cross-comparisons between astronomical source catalogs, 2) dynamic spectral energy distribution construction, visualization, and model fitting, 3) integration and periodogram analysis of time series data from the Harvard Time Series Center and NASA Star and Exoplanet Database, 4) integration of VO data discovery and access tools into the IRAF data analysis environment, and 5) a web-based portal to VO data discovery, access, and display tools. We are also developing tools for data linking and semantic discovery, and have a plan for providing data mining and advanced statistical analysis resources for VAO users. Initial versions of these applications and web-based services are being released over the course of the summer and fall of 2011, with further updates and enhancements planned for throughout 2012 and beyond.

  7. Evaluation of the efficacy of intramuscular versus intramammary treatment of subclinical Streptococcus agalactiae mastitis in dairy cows in Colombia.

    PubMed

    Reyes, J; Chaffer, M; Sanchez, J; Torres, G; Macias, D; Jaramillo, M; Duque, P C; Ceballos, A; Keefe, G P

    2015-08-01

    A randomized controlled trial was performed in 17 Colombian dairy herds to determine the cure risk among cows subclinically infected with Streptococcus agalactiae exposed to 2 antibiotic therapies. Composite milk samples were collected before milking at the onset of the trial (pretreatment) and 2 subsequent times over a period of approximately 63 d. The intramammary application (IMM) of ampicillin-cloxacillin was compared with the intramuscular application (IM) of penethamate hydriodide, and cure risks after an initial and retreatment application were assessed. Cure risk after the initial treatment was higher (82.4%) for the IMM treatment than for IM therapy (65.8%). However, no difference was observed in the cure risk of refractory cases after retreatment (IMM=52.6% vs. IM=51.2%). The cumulative cure risk (both initial and retreatment) was 90.4 and 82.9% for the IMM and IM products, respectively. A 2-level random effects logistic model that controlled for pretreatment cow-level somatic cell count, indicated that IM treatment (odds ratio=0.37) had a lower cure risk than IMM and a tendency for a lower cure risk with increasing baseline somatic cell count. Our findings suggest that both products and administration routes can reduce the prevalence of S. agalactiae in affected herds, but the IMM product had a better efficacy in curing the infection. In addition to the treatment protocol, the cow somatic cell count should be considered when making management decisions for cows infected with S. agalactiae. Copyright © 2015 American Dairy Science Association. Published by Elsevier Inc. All rights reserved.

  8. SU-E-I-26: The CT Compatibility of a Novel Direction Modulated Brachytherapy (DMBT) Tandem Applicator for Cervical Cancer

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Elzibak, A; Safigholi, H; Soliman, A

    2015-06-15

    Purpose: To examine CT metal image artifact from a novel direction-modulated brachytherapy (DMBT) tandem applicator (95% tungsten) for cervical cancer using a commercially available orthopedic metal artifact reduction (O-MAR) algorithm. Comparison to a conventional stainless steel applicator is also performed. Methods: Each applicator was placed in a water-filled phantom resembling the female pelvis and scanned in a Philips Brilliance 16-slice CT scanner using two pelvis protocols: a typical clinical protocol (120kVp, 16×0.75mm collimation, 0.692 pitch, 1.0s rotation, 350mm field of view (FOV), 600mAs, 1.5mm slices) and a protocol with a higher kVp and mAs setting useful for larger patients (140kVp,more » 16×0.75mm collimation, 0.688 pitch, 1.5s rotation, 350mm FOV, 870mAs, 1.5mm slices). Images of each tandem were acquired with and without the application of the O-MAR algorithm. Baseline scans of the phantom (no applicator) were also collected. CT numbers were quantified at distances from 5 to 30 mm away from the applicator’s edge (in increments of 5mm) using measurements at eight angles around the applicator, on three consecutive slices. Results: While the presence of both applicators degraded image quality, the DMBT applicator resulted in larger streaking artifacts and dark areas in the image compared to the stainless steel applicator. Application of the O-MAR algorithm improved all acquired images, both visually and quantitatively. The use of low and high kVp and mAs settings (120 kVp/600mAs and 140 kVp/870mAs) in conjunction with the O-MAR algorithm lead to similar CT numbers in the vicinity of the applicator and a similar reduction of the induced metal artifact. Conclusion: This work indicated that metal artifacts induced by the DMBT and the stainless steel applicator are greatly reduced when using the O-MAR algorithm, leading to better quality phantom images. The use of a high dose protocol provided similar improvements in metal artifacts compared to the clinical protocol.« less

  9. Data exchange technology based on handshake protocol for industrial automation system

    NASA Astrophysics Data System (ADS)

    Astafiev, A. V.; Shardin, T. O.

    2018-05-01

    In the article, questions of data exchange technology based on the handshake protocol for industrial automation system are considered. The methods of organizing the technology in client-server applications are analyzed. In the process of work, the main threats of client-server applications that arise during the information interaction of users are indicated. Also, a comparative analysis of analogue systems was carried out, as a result of which the most suitable option was chosen for further use. The basic schemes for the operation of the handshake protocol are shown, as well as the general scheme of the implemented application, which describes the entire process of interaction between the client and the server.

  10. Design of MPPT Controller Monitoring Software Based on QT Framework

    NASA Astrophysics Data System (ADS)

    Meng, X. Z.; Lu, P. G.

    2017-10-01

    The MPPT controller was a hardware device for tracking the maximum power point of solar photovoltaic array. Multiple controllers could be working as networking mode by specific communicating protocol. In this article, based on C++ GUI programming with Qt frame, we designed one sort of desktop application for monitoring and analyzing operational parameter of MPPT controller. The type of communicating protocol for building network was Modbus protocol which using Remote Terminal Unit mode and The desktop application of host computer was connected with all the controllers in the network through RS485 communication or ZigBee wireless communication. Using this application, user could monitor the parameter of controller wherever they were by internet.

  11. Enhancing user privacy in SARG04-based private database query protocols

    NASA Astrophysics Data System (ADS)

    Yu, Fang; Qiu, Daowen; Situ, Haozhen; Wang, Xiaoming; Long, Shun

    2015-11-01

    The well-known SARG04 protocol can be used in a private query application to generate an oblivious key. By usage of the key, the user can retrieve one out of N items from a database without revealing which one he/she is interested in. However, the existing SARG04-based private query protocols are vulnerable to the attacks of faked data from the database since in its canonical form, the SARG04 protocol lacks means for one party to defend attacks from the other. While such attacks can cause significant loss of user privacy, a variant of the SARG04 protocol is proposed in this paper with new mechanisms designed to help the user protect its privacy in private query applications. In the protocol, it is the user who starts the session with the database, trying to learn from it bits of a raw key in an oblivious way. An honesty test is used to detect a cheating database who had transmitted faked data. The whole private query protocol has O( N) communication complexity for conveying at least N encrypted items. Compared with the existing SARG04-based protocols, it is efficient in communication for per-bit learning.

  12. A protocol for rheological characterization of hydrogels for tissue engineering strategies.

    PubMed

    Zuidema, Jonathan M; Rivet, Christopher J; Gilbert, Ryan J; Morrison, Faith A

    2014-07-01

    Hydrogels are studied extensively for many tissue engineering applications, and their mechanical properties influence both cellular and tissue compatibility. However, it is difficult to compare the mechanical properties of hydrogels between studies due to a lack of continuity between rheological protocols. This study outlines a straightforward protocol to accurately determine hydrogel equilibrium modulus and gelation time using a series of rheological tests. These protocols are applied to several hydrogel systems used within tissue engineering applications: agarose, collagen, fibrin, Matrigel™, and methylcellulose. The protocol is outlined in four steps: (1) Time sweep to determine the gelation time of the hydrogel. (2) Strain sweep to determine the linear-viscoelastic region of the hydrogel with respect to strain. (3) Frequency sweep to determine the linear equilibrium modulus plateau of the hydrogel. (4) Time sweep with values obtained from strain and frequency sweeps to accurately report the equilibrium moduli and gelation time. Finally, the rheological characterization protocol was evaluated using a composite Matrigel™-methylcellulose hydrogel blend whose mechanical properties were previously unknown. The protocol described herein provides a standardized approach for proper analysis of hydrogel rheological properties. © 2013 Wiley Periodicals, Inc.

  13. A protocol for rat in vitro fertilization during conventional laboratory working hours.

    PubMed

    Aoto, Toshihiro; Takahashi, Ri-ichi; Ueda, Masatsugu

    2011-12-01

    In vitro fertilization (IVF) is a valuable technique for the propagation of experimental animals. IVF has typically been used in mice to rapidly expand breeding colonies and create large numbers of embryos. However, applications of IVF in rat breeding experiments have stalled due to the inconvenient laboratory work schedules imposed by current IVF protocols for this species. Here, we developed a new rat IVF protocol that consists of experimental steps performed during common laboratory working hours. Our protocol can be completed within 12 h by shortening the period of sperm capacitation from 5 to 1 h and the fertilization time from 10 to 8 h in human tubal fluid (HTF) medium. This new protocol generated an excellent birth rate and was applicable not only to closed colony rat strains, such as Wistar, Long-Evans, and Sprague-Dawley (SD), but also to the inbred Lewis strain. Moreover, Wistar and Long-Evans embryos prepared by this protocol were successfully frozen by vitrification and later successfully thawed and resuscitated. This protocol is practical and can be easily adopted by laboratory workers.

  14. A secure RFID-based WBAN for healthcare applications.

    PubMed

    Ullah, Sana; Alamri, Atif

    2013-10-01

    A Wireless Body Area Network (WBAN) allows the seamless integration of small and intelligent invasive or non-invasive sensor nodes in, on or around a human body for continuous health monitoring. These nodes are expected to use different power-efficient protocols in order to extend the WBAN lifetime. This paper highlights the power consumption and security issues of WBAN for healthcare applications. Numerous power saving mechanisms are discussed and a secure RFID-based protocol for WBAN is proposed. The performance of the proposed protocol is analyzed and compared with that of IEEE 802.15.6-based CSMA/CA and preamble-based TDMA protocols using extensive simulations. It is shown that the proposed protocol is power-efficient and protects patients' data from adversaries. It is less vulnerable to different attacks compared to that of IEEE 802.15.6-based CSMA/CA and preamble-based TDMA protocols. For a low traffic load and a single alkaline battery of capacity 2.6 Ah, the proposed protocol could extend the WBAN lifetime, when deployed on patients in hospitals or at homes, to approximately five years.

  15. Protocol for Uniformly Measuring and Expressing the Performance of Energy Storage Systems

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Conover, David R.; Crawford, Alasdair J.; Fuller, Jason

    This Protocol provides a set of “best practices” for characterizing energy storage systems (ESSs) and measuring and reporting their performance. It serves as a basis for assessing how an ESS will perform with respect to key performance attributes relevant to different applications. It is intended to provide a valid and accurate basis for the comparison of different ESSs. By achieving the stated purpose, the Protocol will enable more informed decision-making in the selection of ESSs for various stationary applications. The Protocol identifies general information and technical specifications relevant in describing an ESS and also defines a set of test, measurement,more » and evaluation criteria with which to express the performance of ESSs that are intended for energy-intensive and/or power-intensive stationary applications. An ESS includes a storage device, battery management system, and any power conversion systems installed with the storage device. The Protocol is agnostic with respect to the storage technology and the size and rating of the ESS. The Protocol does not apply to single-use storage devices and storage devices that are not coupled with power conversion systems, nor does it address safety, security, or operations and maintenance of ESSs, or provide any pass/fail criteria.« less

  16. Minimally-invasive Ultrasound Devices for Treating Low Back Pain

    NASA Astrophysics Data System (ADS)

    Nau, William; Diederich, C.; Shu, R.; Kinsey, A.; Lotz, J.; Ferrier, W.; Sutton, J.; Pellegrino, R.

    2006-05-01

    Catheter-based ultrasound is being investigated for the potential to deliver heat to disc tissue for the treatment of discogenic low back pain. Two ultrasound applicator design configurations were tested: an intradiscal (IDUS) applicator which can be implanted directly within the disc, and an extradiscal (EDUS) applicator which is placed adjacent to the disc. In vitro heating trials were performed in human lumbar cadaveric disc segments instrumented with 24 thermocouples to obtain detailed maps of the temperature distributions. A low temperature elevation heating protocol in which the maximum temperature measured 5 mm away from the applicator is controlled to 52° C for the treatment period, and a high temperature elevation protocol (maximum temperature controlled to >70° C) were evaluated in this study. In vivo experiments were performed in sheep cervical spine using both applicator configurations, and both heating protocols. Steady-state temperature maps, and thermal doses (t43) calculated from the transient temperature data were used to assess regions of thermal damage within the disc. During the in vitro human disc studies using the high temperature protocol, temperatures were maintained at 71.5° ± 0.4°C 5 mm from an IDUS applicator implanted within the annular wall, with a maximum temperature (Tmax) of 78.6°C (t43 > 4.85 × 1010 min) measured 2 mm from the applicator. For the EDUS applicator, the temperature was maintained at 78.7° °C 5 mm from the applicator, with a Tmax of 86.3°C within 1 mm of the applicator surface. In the in vivo sheep studies, steady-state temperatures were maintained at 49.4° ± 0.3°C (t43 = 8.74 × 102 min) and 73.2° ± 0.6°C (t43 = 1.34 × 1010 min) with the IDUS applicator for the low and high temperature protocols, respectively. Using the EDUS applicator, temperatures were maintained at 54.4° ± 3.2°C (t43 = 4.11 × 104 min) and 69.4° ± 2.8°C (t43 = 2.81 × 109 min) for the two protocols. Directional heating was demonstrated with both applicator design configurations. Results from these studies demonstrated the capability to control temperature distributions within targeted regions of the disc using interstitial ultrasound with greater thermal penetration than can be achieved with the RF heating devices currently in clinical use. Thus interstitial ultrasound offers a potential alternative heating modality for the clinical management of low back pain.

  17. Generic Verification Protocol for Testing Pesticide Application Spray Drift Reduction Technologies for Row and Field Crops (Version 1.4)

    EPA Science Inventory

    This generic verification protocol provides a detailed method for conducting and reporting results from verification testing of pesticide application technologies. It can be used to evaluate technologies for their potential to reduce spray drift, hence the term “drift reduction t...

  18. High-Throughput Cryopreservation of Plant Cell Cultures for Functional Genomics

    PubMed Central

    Ogawa, Yoichi; Sakurai, Nozomu; Oikawa, Akira; Kai, Kosuke; Morishita, Yoshihiko; Mori, Kumiko; Moriya, Kanami; Fujii, Fumiko; Aoki, Koh; Suzuki, Hideyuki; Ohta, Daisaku; Saito, Kazuki; Shibata, Daisuke

    2012-01-01

    Suspension-cultured cell lines from plant species are useful for genetic engineering. However, maintenance of these lines is laborious, involves routine subculturing and hampers wider use of transgenic lines, especially when many lines are required for a high-throughput functional genomics application. Cryopreservation of these lines may reduce the need for subculturing. Here, we established a simple protocol for cryopreservation of cell lines from five commonly used plant species, Arabidopsis thaliana, Daucus carota, Lotus japonicus, Nicotiana tabacum and Oryza sativa. The LSP solution (2 M glycerol, 0.4 M sucrose and 86.9 mM proline) protected cells from damage during freezing and was only mildly toxic to cells kept at room temperature for at least 2 h. More than 100 samples were processed for freezing simultaneously. Initially, we determined the conditions for cryopreservation using a programmable freezer; we then developed a modified simple protocol that did not require a programmable freezer. In the simple protocol, a thick expanded polystyrene (EPS) container containing the vials with the cell–LSP solution mixtures was kept at −30°C for 6 h to cool the cells slowly (pre-freezing); samples from the EPS containers were then plunged into liquid nitrogen before long-term storage. Transgenic Arabidopsis cells were subjected to cryopreservation, thawed and then re-grown in culture; transcriptome and metabolome analyses indicated that there was no significant difference in gene expression or metabolism between cryopreserved cells and control cells. The simplicity of the protocol will accelerate the pace of research in functional plant genomics. PMID:22437846

  19. Demonstration-Scale High-Cell-Density Fermentation of Pichia pastoris.

    PubMed

    Liu, Wan-Cang; Zhu, Ping

    2018-01-01

    Pichia pastoris has been one of the most successful heterologous overexpression systems in generating proteins for large-scale production through high-cell-density fermentation. However, optimizing conditions of the large-scale high-cell-density fermentation for biochemistry and industrialization is usually a laborious and time-consuming process. Furthermore, it is often difficult to produce authentic proteins in large quantities, which is a major obstacle for functional and structural features analysis and industrial application. For these reasons, we have developed a protocol for efficient demonstration-scale high-cell-density fermentation of P. pastoris, which employs a new methanol-feeding strategy-biomass-stat strategy and a strategy of increased air pressure instead of pure oxygen supplement. The protocol included three typical stages of glycerol batch fermentation (initial culture phase), glycerol fed-batch fermentation (biomass accumulation phase), and methanol fed-batch fermentation (induction phase), which allows direct online-monitoring of fermentation conditions, including broth pH, temperature, DO, anti-foam generation, and feeding of glycerol and methanol. Using this protocol, production of the recombinant β-xylosidase of Lentinula edodes origin in 1000-L scale fermentation can be up to ~900 mg/L or 9.4 mg/g cells (dry cell weight, intracellular expression), with the specific production rate and average specific production of 0.1 mg/g/h and 0.081 mg/g/h, respectively. The methodology described in this protocol can be easily transferred to other systems, and eligible to scale up for a large number of proteins used in either the scientific studies or commercial purposes.

  20. A Proxy Design to Leverage the Interconnection of CoAP Wireless Sensor Networks with Web Applications

    PubMed Central

    Ludovici, Alessandro; Calveras, Anna

    2015-01-01

    In this paper, we present the design of a Constrained Application Protocol (CoAP) proxy able to interconnect Web applications based on Hypertext Transfer Protocol (HTTP) and WebSocket with CoAP based Wireless Sensor Networks. Sensor networks are commonly used to monitor and control physical objects or environments. Smart Cities represent applications of such a nature. Wireless Sensor Networks gather data from their surroundings and send them to a remote application. This data flow may be short or long lived. The traditional HTTP long-polling used by Web applications may not be adequate in long-term communications. To overcome this problem, we include the WebSocket protocol in the design of the CoAP proxy. We evaluate the performance of the CoAP proxy in terms of latency and memory consumption. The tests consider long and short-lived communications. In both cases, we evaluate the performance obtained by the CoAP proxy according to the use of WebSocket and HTTP long-polling. PMID:25585107

  1. EPIGEN-Brazil Initiative resources: a Latin American imputation panel and the Scientific Workflow.

    PubMed

    Magalhães, Wagner C S; Araujo, Nathalia M; Leal, Thiago P; Araujo, Gilderlanio S; Viriato, Paula J S; Kehdy, Fernanda S; Costa, Gustavo N; Barreto, Mauricio L; Horta, Bernardo L; Lima-Costa, Maria Fernanda; Pereira, Alexandre C; Tarazona-Santos, Eduardo; Rodrigues, Maíra R

    2018-06-14

    EPIGEN-Brazil is one of the largest Latin American initiatives at the interface of human genomics, public health, and computational biology. Here, we present two resources to address two challenges to the global dissemination of precision medicine and the development of the bioinformatics know-how to support it. To address the underrepresentation of non-European individuals in human genome diversity studies, we present the EPIGEN-5M+1KGP imputation panel-the fusion of the public 1000 Genomes Project (1KGP) Phase 3 imputation panel with haplotypes derived from the EPIGEN-5M data set (a product of the genotyping of 4.3 million SNPs in 265 admixed individuals from the EPIGEN-Brazil Initiative). When we imputed a target SNPs data set (6487 admixed individuals genotyped for 2.2 million SNPs from the EPIGEN-Brazil project) with the EPIGEN-5M+1KGP panel, we gained 140,452 more SNPs in total than when using the 1KGP Phase 3 panel alone and 788,873 additional high confidence SNPs ( info score ≥ 0.8). Thus, the major effect of the inclusion of the EPIGEN-5M data set in this new imputation panel is not only to gain more SNPs but also to improve the quality of imputation. To address the lack of transparency and reproducibility of bioinformatics protocols, we present a conceptual Scientific Workflow in the form of a website that models the scientific process (by including publications, flowcharts, masterscripts, documents, and bioinformatics protocols), making it accessible and interactive. Its applicability is shown in the context of the development of our EPIGEN-5M+1KGP imputation panel. The Scientific Workflow also serves as a repository of bioinformatics resources. © 2018 Magalhães et al.; Published by Cold Spring Harbor Laboratory Press.

  2. Vulnerability Assessment of IPv6 Websites to SQL Injection and Other Application Level Attacks

    PubMed Central

    Cho, Ying-Chiang; Pan, Jen-Yi

    2013-01-01

    Given the proliferation of internet connected devices, IPv6 has been proposed to replace IPv4. Aside from providing a larger address space which can be assigned to internet enabled devices, it has been suggested that the IPv6 protocol offers increased security due to the fact that with the large number of addresses available, standard IP scanning attacks will no longer become feasible. However, given the interest in attacking organizations rather than individual devices, most initial points of entry onto an organization's network and their attendant devices are visible and reachable through web crawling techniques, and, therefore, attacks on the visible application layer may offer ways to compromise the overall network. In this evaluation, we provide a straightforward implementation of a web crawler in conjunction with a benign black box penetration testing system and analyze the ease at which SQL injection attacks can be carried out. PMID:24574863

  3. DNA microarrays: a powerful genomic tool for biomedical and clinical research

    PubMed Central

    Trevino, Victor; Falciani, Francesco; Barrera-Saldaña, Hugo A.

    2007-01-01

    Among the many benefits of the Human Genome Project are new and powerful tools such as the genome-wide hybridization devices referred as microarrays. Initially designed to measure gene transcriptional levels, microarray technologies are now used for comparing other genome features among individuals and their tissues and cells. Results provide valuable information on disease subcategories, disease prognosis, and treatment outcome. Likewise, reveal differences in genetic makeup, regulatory mechanisms and subtle variations are approaching the era of personalized medicine. To understand this powerful tool, its versatility and how it is dramatically changing the molecular approach to biomedical and clinical research, this review describes the technology, its applications, a didactic step-by-step review of a typical microarray protocol, and a real experiment. Finally, it calls the attention of the medical community to integrate multidisciplinary teams, to take advantage of this technology and its expanding applications that in a slide reveals our genetic inheritance and destiny. PMID:17660860

  4. JavaScript Access to DICOM Network and Objects in Web Browser.

    PubMed

    Drnasin, Ivan; Grgić, Mislav; Gogić, Goran

    2017-10-01

    Digital imaging and communications in medicine (DICOM) 3.0 standard provides the baseline for the picture archiving and communication systems (PACS). The development of Internet and various communication media initiated demand for non-DICOM access to PACS systems. Ever-increasing utilization of the web browsers, laptops and handheld devices, as opposed to desktop applications and static organizational computers, lead to development of different web technologies. The DICOM standard officials accepted those subsequently as tools of alternative access. This paper provides an overview of the current state of development of the web access technology to the DICOM repositories. It presents a different approach of using HTML5 features of the web browsers through the JavaScript language and the WebSocket protocol by enabling real-time communication with DICOM repositories. JavaScript DICOM network library, DICOM to WebSocket proxy and a proof-of-concept web application that qualifies as a DICOM 3.0 device were developed.

  5. DESIGN, SYNTHESIS, AND APPLICATION OF THE TRIMETHOPRIM-BASED CHEMICAL TAG FOR LIVE CELL IMAGING

    PubMed Central

    Jing, Chaoran; Cornish, Virginia W.

    2013-01-01

    Over the past decade chemical tags have been developed to complement the use of fluorescent proteins in live cell imaging. Chemical tags retain the specificity of protein labeling achieved with fluorescent proteins through genetic encoding, but provide smaller, more robust tags and modular use of organic fluorophores with high photon-output and tailored functionalities. The trimethoprim-based chemical tag (TMP-tag) was initially developed based on the high affinity interaction between E.coli dihydrofolatereductase and the antibiotic trimethoprim and subsequently rendered covalent and fluorogenic via proximity-induced protein labeling reactions. To date, the TMP-tag is one of the few chemical tags that enable intracellular protein labeling and high-resolution live cell imaging. Here we describe the general design, chemical synthesis, and application of TMP-tag for live cell imaging. Alternative protocols for synthesizing and using the covalent and the fluorogenic TMP-tags are also included. PMID:23839994

  6. Vulnerability assessment of IPv6 websites to SQL injection and other application level attacks.

    PubMed

    Cho, Ying-Chiang; Pan, Jen-Yi

    2013-01-01

    Given the proliferation of internet connected devices, IPv6 has been proposed to replace IPv4. Aside from providing a larger address space which can be assigned to internet enabled devices, it has been suggested that the IPv6 protocol offers increased security due to the fact that with the large number of addresses available, standard IP scanning attacks will no longer become feasible. However, given the interest in attacking organizations rather than individual devices, most initial points of entry onto an organization's network and their attendant devices are visible and reachable through web crawling techniques, and, therefore, attacks on the visible application layer may offer ways to compromise the overall network. In this evaluation, we provide a straightforward implementation of a web crawler in conjunction with a benign black box penetration testing system and analyze the ease at which SQL injection attacks can be carried out.

  7. Prospective Intervention of a Novel Levothyroxine Dosing Protocol Based on Body Mass Index after Thyroidectomy.

    PubMed

    Elfenbein, Dawn M; Schaefer, Sarah; Shumway, Cynthia; Chen, Herbert; Sippel, Rebecca S; Schneider, David F

    2016-01-01

    Weight-based postoperative levothyroxine (LT4) dosing often fails to appropriately dose overweight and underweight patients. Previously, we created an LT4-dosing algorithm based on BMI. We hypothesize that more patients will achieve euthyroidism at their postoperative visit with the use of the protocol. A prospective evaluation was performed of our previously published BMI-based LT4 dosing. All adults who underwent thyroidectomy for benign disease between January 1, 2011 and December 31, 2013 were included; the new protocol was implemented in October 2012. Serum TSH was measured for all patients 6 to 8 weeks postoperatively, and adjustments were based on TSH. Three hundred and thirty patients were included, with 54% undergoing thyroidectomy after institution of the protocol. The groups were well matched. Before protocol implementation, LT4 was dosed solely by weight and 25% of patients were euthyroid at initial follow-up. After the protocol, 39% of patients were euthyroid (p = 0.01). The percentage of patients who were given too high a dose of LT4 remained the same (46% vs 42%), and there was a significant reduction in the number of patients who were given too little (29% vs 19%; p = 0.05). The effect was most profound in patients with low and normal BMI, and there were slight differences between sexes. Although correct initial dosing of LT4 remains challenging, this dosing protocol that we developed and implemented has improved patient care by increasing the number of patients who achieve euthyroidism at the first postoperative visit. We have made a change to our original protocol to incorporate sex differences into the calculation. Copyright © 2016 American College of Surgeons. Published by Elsevier Inc. All rights reserved.

  8. GMPLS-based control plane for optical networks: early implementation experience

    NASA Astrophysics Data System (ADS)

    Liu, Hang; Pendarakis, Dimitrios; Komaee, Nooshin; Saha, Debanjan

    2002-07-01

    Generalized Multi-Protocol Label Switching (GMPLS) extends MPLS signaling and Internet routing protocols to provide a scalable, interoperable, distributed control plane, which is applicable to multiple network technologies such as optical cross connects (OXCs), photonic switches, IP routers, ATM switches, SONET and DWDM systems. It is intended to facilitate automatic service provisioning and dynamic neighbor and topology discovery across multi-vendor intelligent transport networks, as well as their clients. Efforts to standardize such a distributed common control plane have reached various stages in several bodies such as the IETF, ITU and OIF. This paper describes the design considerations and architecture of a GMPLS-based control plane that we have prototyped for core optical networks. Functional components of GMPLS signaling and routing are integrated in this architecture with an application layer controller module. Various requirements including bandwidth, network protection and survivability, traffic engineering, optimal utilization of network resources, and etc. are taken into consideration during path computation and provisioning. Initial experiments with our prototype demonstrate the feasibility and main benefits of GMPLS as a distributed control plane for core optical networks. In addition to such feasibility results, actual adoption and deployment of GMPLS as a common control plane for intelligent transport networks will depend on the successful completion of relevant standardization activities, extensive interoperability testing as well as the strengthening of appropriate business drivers.

  9. Vitrification, a complementary cryopreservation method for Betula pendula Roth.

    PubMed

    Ryynänen, Leena; Aronen, Tuija

    2005-10-01

    Cryopreservation--the storage of plant germplasm in liquid nitrogen--provides a modern tool for the conservation of forest genetic resources. It is especially applicable for species in which their micropropagation can be initiated from mature tree buds, e.g., silver birch (Betula pendula Roth), thus enabling the conservation of specific genotypes: endangered elite trees and trees expressing rare, valuable or interesting characteristics. The aim of the present study was to develop a vitrification protocol applicable for the cryostorage of silver birch that avoids the use of expensive sophisticated freezers. The average recovery of vitrified axillary silver birch buds was 71% using a protocol that started with four-week cold hardening of bud-bearing in vitro donor shoots on modified medium under short day conditions. After cold hardening, the excised axillary buds were precultivated on medium containing 0.7 M sucrose for 24 h under the same conditions as during the cold hardening period. Following preculture, the buds were treated with loading solution containing 2M glycerol and 0.4 M sucrose for 20 min at room temperature. Finally, the buds were dehydrated with PVS2 cryoprotectant for 120 min followed by direct immersion in liquid nitrogen. According to the morphology and the RAPD profiles of regenerated plants in the greenhouse, the genetic fidelity of the vitrified birch material seems to have remained unchanged.

  10. European health telematics networks for positron emission tomography

    NASA Astrophysics Data System (ADS)

    Kontaxakis, George; Pozo, Miguel Angel; Ohl, Roland; Visvikis, Dimitris; Sachpazidis, Ilias; Ortega, Fernando; Guerra, Pedro; Cheze-Le Rest, Catherine; Selby, Peter; Pan, Leyun; Diaz, Javier; Dimitrakopoulou-Strauss, Antonia; Santos, Andres; Strauss, Ludwig; Sakas, Georgios

    2006-12-01

    A pilot network of positron emission tomography centers across Europe has been setup employing telemedicine services. The primary aim is to bring all PET centers in Europe (and beyond) closer, by integrating advanced medical imaging technology and health telematics networks applications into a single, easy to operate health telematics platform, which allows secure transmission of medical data via a variety of telecommunications channels and fosters the cooperation between professionals in the field. The platform runs on PCs with Windows 2000/XP and incorporates advanced techniques for image visualization, analysis and fusion. The communication between two connected workstations is based on a TCP/IP connection secured by secure socket layers and virtual private network or jabber protocols. A teleconsultation can be online (with both physicians physically present) or offline (via transmission of messages which contain image data and other information). An interface sharing protocol enables online teleconsultations even over low bandwidth connections. This initiative promotes the cooperation and improved communication between nuclear medicine professionals, offering options for second opinion and training. It permits physicians to remotely consult patient data, even if they are away from the physical examination site.

  11. An efficient protocol for tissue sampling and DNA isolation from the stem bark of Leguminosae trees.

    PubMed

    Novaes, R M L; Rodrigues, J G; Lovato, M B

    2009-02-03

    Traditionally, molecular studies of plant species have used leaves as the source of DNA. However, sampling leaves from tall tree species can be quite difficult and expensive. We developed a sequence of procedures for using stem bark as a source of DNA from Leguminosae trees of the Atlantic Forest and the Cerrado. Leguminosae is an important species-rich family in these two highly diverse and endangered biomes. A modified CTAB protocol for DNA isolation is described, and details of the procedures for sampling and storage of the bark are given. The procedures were initially developed for three species, and then their applicability for 15 other species was evaluated. DNA of satisfactory quality was obtained from the bark of all species. The amounts of DNA obtained from leaves were slightly higher than from bark samples, while its purity was the same. Storing the bark frozen or by drying in silica gel yielded similar results. Polymerase chain reaction amplification worked for both plastid and nuclear genomes. This alternative for isolating DNA from bark samples of trees facilitates field work with these tree species.

  12. Clinical examination of subjects with halitosis.

    PubMed

    Donaldson, A C; Riggio, M P; Rolph, H J; Bagg, J; Hodge, P J

    2007-01-01

    To develop and apply a detailed clinical protocol for screening and assessing subjects with a complaint of halitosis. Cross-sectional. Several methods were used to recruit subjects with a complaint of halitosis, including a newspaper advertisement. A definition of halitosis arising from within the oral cavity, which is not related to generalized chronic gingivitis, chronic periodontitis or pathology of the oral mucosa was used. An extensive list of exclusion criteria was applied at the initial visit. Eligible subjects were asked to follow strict instructions and complete a questionnaire prior to their second visit for data collection. The clinical examination consisted of an organoleptic assessment, Halimeter reading and periodontal examination. The best method of recruiting subjects was advertising. Of 66 individuals recruited, four failed to attend the screening visit and 25 were excluded. The main reasons for exclusion were poor oral hygiene and existing periodontal disease. Thirty-seven completed the full protocol, resulting in identification of 18 with halitosis and 19 controls. Application of the exclusion criteria resulted in significant attrition of eligible participants. Our results suggest that organoleptic assessment should be regarded as a useful standard for defining subjects with halitosis.

  13. Atomic entanglement purification and concentration using coherent state input-output process in low-Q cavity QED regime.

    PubMed

    Cao, Cong; Wang, Chuan; He, Ling-Yan; Zhang, Ru

    2013-02-25

    We investigate an atomic entanglement purification protocol based on the coherent state input-output process by working in low-Q cavity in the atom-cavity intermediate coupling region. The information of entangled states are encoded in three-level configured single atoms confined in separated one-side optical micro-cavities. Using the coherent state input-output process, we design a two-qubit parity check module (PCM), which allows the quantum nondemolition measurement for the atomic qubits, and show its use for remote parities to distill a high-fidelity atomic entangled ensemble from an initial mixed state ensemble nonlocally. The proposed scheme can further be used for unknown atomic states entanglement concentration. Also by exploiting the PCM, we describe a modified scheme for atomic entanglement concentration by introducing ancillary single atoms. As the coherent state input-output process is robust and scalable in realistic applications, and the detection in the PCM is based on the intensity of outgoing coherent state, the present protocols may be widely used in large-scaled and solid-based quantum repeater and quantum information processing.

  14. Using software security analysis to verify the secure socket layer (SSL) protocol

    NASA Technical Reports Server (NTRS)

    Powell, John D.

    2004-01-01

    nal Aeronautics and Space Administration (NASA) have tens of thousands of networked computer systems and applications. Software Security vulnerabilities present risks such as lost or corrupted data, information the3, and unavailability of critical systems. These risks represent potentially enormous costs to NASA. The NASA Code Q research initiative 'Reducing Software Security Risk (RSSR) Trough an Integrated Approach '' offers, among its capabilities, formal verification of software security properties, through the use of model based verification (MBV) to address software security risks. [1,2,3,4,5,6] MBV is a formal approach to software assurance that combines analysis of software, via abstract models, with technology, such as model checkers, that provide automation of the mechanical portions of the analysis process. This paper will discuss: The need for formal analysis to assure software systems with respect to software and why testing alone cannot provide it. The means by which MBV with a Flexible Modeling Framework (FMF) accomplishes the necessary analysis task. An example of FMF style MBV in the verification of properties over the Secure Socket Layer (SSL) communication protocol as a demonstration.

  15. What is needed to make low-density lipoprotein transport in human aorta computational models suitable to explore links to atherosclerosis? Impact of initial and inflow boundary conditions.

    PubMed

    De Nisco, Giuseppe; Zhang, Peng; Calò, Karol; Liu, Xiao; Ponzini, Raffaele; Bignardi, Cristina; Rizzo, Giovanna; Deng, Xiaoyan; Gallo, Diego; Morbiducci, Umberto

    2018-02-08

    Personalized computational hemodynamics (CH) is a promising tool to clarify/predict the link between low density lipoproteins (LDL) transport in aorta, disturbed shear and atherogenesis. However, CH uses simplifying assumptions that represent sources of uncertainty. In particular, modelling blood-side to wall LDL transfer is challenged by the cumbersomeness of protocols needed to obtain reliable LDL concentration profile estimations. This paucity of data is limiting the establishment of rigorous CH protocols able to balance the trade-offs among the variety of in vivo data to be acquired, and the accuracy required by biological/clinical applications. In this study, we analyze the impact of LDL concentration initialization (initial conditions, ICs) and inflow boundary conditions (BCs) on CH models of LDL blood-to-wall transfer in aorta. Technically, in an image-based model of human aorta, two different inflow BCs are generated imposing subject-specific inflow 3D PC-MRI measured or idealized (flat) velocity profiles. For each simulated BC, four different ICs for LDL concentration are applied, imposing as IC the LDL distribution resulting from steady-state simulations with average conditions, or constant LDL concentration values. Based on CH results, we conclude that: (1) the imposition of realistic 3D velocity profiles as inflow BC reduces the uncertainty affecting the representation of LDL transfer; (2) different LDL concentration ICs lead to markedly different patterns of LDL transfer. Given that it is not possible to verify in vivo the proper LDL concentration initialization to be applied, we suggest to carefully set and unambiguously declare the imposed BCs and LDL concentration IC when modelling LDL transfer in aorta, in order to obtain reproducible and ultimately comparable results among different laboratories. Copyright © 2017 Elsevier Ltd. All rights reserved.

  16. Plug-and-play initiative : phase II : final report.

    DOT National Transportation Integrated Search

    2017-01-01

    Clear Roads has undertaken an initiative to establish a Plug-and-Play protocol that fosters interoperability between various winter maintenance equipment and a point location (central office). This report documents the data types and communication me...

  17. Protecting Privacy and Securing the Gathering of Location Proofs - The Secure Location Verification Proof Gathering Protocol

    NASA Astrophysics Data System (ADS)

    Graham, Michelle; Gray, David

    As wireless networks become increasingly ubiquitous, the demand for a method of locating a device has increased dramatically. Location Based Services are now commonplace but there are few methods of verifying or guaranteeing a location provided by a user without some specialised hardware, especially in larger scale networks. We propose a system for the verification of location claims, using proof gathered from neighbouring devices. In this paper we introduce a protocol to protect this proof gathering process, protecting the privacy of all involved parties and securing it from intruders and malicious claiming devices. We present the protocol in stages, extending the security of this protocol to allow for flexibility within its application. The Secure Location Verification Proof Gathering Protocol (SLVPGP) has been designed to function within the area of Vehicular Networks, although its application could be extended to any device with wireless & cryptographic capabilities.

  18. Privacy-preserving record linkage using Bloom filters

    PubMed Central

    2009-01-01

    Background Combining multiple databases with disjunctive or additional information on the same person is occurring increasingly throughout research. If unique identification numbers for these individuals are not available, probabilistic record linkage is used for the identification of matching record pairs. In many applications, identifiers have to be encrypted due to privacy concerns. Methods A new protocol for privacy-preserving record linkage with encrypted identifiers allowing for errors in identifiers has been developed. The protocol is based on Bloom filters on q-grams of identifiers. Results Tests on simulated and actual databases yield linkage results comparable to non-encrypted identifiers and superior to results from phonetic encodings. Conclusion We proposed a protocol for privacy-preserving record linkage with encrypted identifiers allowing for errors in identifiers. Since the protocol can be easily enhanced and has a low computational burden, the protocol might be useful for many applications requiring privacy-preserving record linkage. PMID:19706187

  19. Privacy-preserving record linkage using Bloom filters.

    PubMed

    Schnell, Rainer; Bachteler, Tobias; Reiher, Jörg

    2009-08-25

    Combining multiple databases with disjunctive or additional information on the same person is occurring increasingly throughout research. If unique identification numbers for these individuals are not available, probabilistic record linkage is used for the identification of matching record pairs. In many applications, identifiers have to be encrypted due to privacy concerns. A new protocol for privacy-preserving record linkage with encrypted identifiers allowing for errors in identifiers has been developed. The protocol is based on Bloom filters on q-grams of identifiers. Tests on simulated and actual databases yield linkage results comparable to non-encrypted identifiers and superior to results from phonetic encodings. We proposed a protocol for privacy-preserving record linkage with encrypted identifiers allowing for errors in identifiers. Since the protocol can be easily enhanced and has a low computational burden, the protocol might be useful for many applications requiring privacy-preserving record linkage.

  20. Research on low-latency MAC protocols for wireless sensor networks

    NASA Astrophysics Data System (ADS)

    He, Chenguang; Sha, Xuejun; Lee, Chankil

    2007-11-01

    Energy-efficient should not be the only design goal in MAC protocols for wireless sensor networks, which involve the use of battery-operated computing and sensing devices. Low-latency operation becomes the same important as energy-efficient in the case that the traffic load is very heavy or the real-time constrain is used in applications like tracking or locating. This paper introduces some causes of traditional time delays which are inherent in a multi-hops network using existing WSN MAC protocols, illuminates the importance of low-latency MAC design for wireless sensor networks, and presents three MACs as examples of low-latency protocols designed specially for sleep delay, wait delay and wakeup delay in wireless sensor networks, respectively. The paper also discusses design trade-offs with emphasis on low-latency and points out their advantages and disadvantages, together with some design considerations and suggestions for MAC protocols for future applications and researches.

  1. [Enhanced Recovery after Surgery from Theory to Practice
What do We Need to Do?

    PubMed

    Che, Guowei; Liu, Lunxu; Zhou, Qinghua

    2017-04-20

    Enhanced recovery after surgery (ERAS) is a paradigm shift in perioperative care, resulting in substantial improvements in clinical outcomes, shorter length of hospital stay and cost savings. But the current ERAS either by application of breadth or depth is not enough, why? The main reason is the lack of "operability, evaluation, repetition" ERAS protocol and suitable for clinical extensive application protocol. How to form the clinical available protocol? Operational mainly refers to the clinical scheme is simple and feasible, and protocol compliance is good; Evaluate refers to the methods used before, during and after are the objective evaluation criteria and plan; Repeatable is clinical scheme repeatability in the process of single or multiple center.

  2. Refinement for fault-tolerance: An aircraft hand-off protocol

    NASA Technical Reports Server (NTRS)

    Marzullo, Keith; Schneider, Fred B.; Dehn, Jon

    1994-01-01

    Part of the Advanced Automation System (AAS) for air-traffic control is a protocol to permit flight hand-off from one air-traffic controller to another. The protocol must be fault-tolerant and, therefore, is subtle -- an ideal candidate for the application of formal methods. This paper describes a formal method for deriving fault-tolerant protocols that is based on refinement and proof outlines. The AAS hand-off protocol was actually derived using this method; that derivation is given.

  3. High-Bandwidth Tactical-Network Data Analysis in a High-Performance-Computing (HPC) Environment: Voice Call Analysis

    DTIC Science & Technology

    2015-09-01

    Gateway 2 4. Voice Packet Flow: SIP , Session Description Protocol (SDP), and RTP 3 5. Voice Data Analysis 5 6. Call Analysis 6 7. Call Metrics 6...analysis processing is designed for a general VoIP system architecture based on Session Initiation Protocol ( SIP ) for negotiating call sessions and...employs Skinny Client Control Protocol for network communication between the phone and the local CallManager (e.g., for each dialed digit), SIP

  4. Observer Use of Standardized Observation Protocols in Consequential Observation Systems

    ERIC Educational Resources Information Center

    Bell, Courtney A.; Yi, Qi; Jones, Nathan D.; Lewis, Jennifer M.; McLeod, Monica; Liu, Shuangshuang

    2014-01-01

    Evidence from a handful of large-scale studies suggests that although observers can be trained to score reliably using observation protocols, there are concerns related to initial training and calibration activities designed to keep observers scoring accurately over time (e.g., Bell, et al, 2012; BMGF, 2012). Studies offer little insight into how…

  5. 40 CFR 8.7 - Initial environmental evaluation.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... documentation requirements under Article 8 and Annex I to the Protocol and the provisions of this part or a CEE... documentation submitted does not meet the requirements of Article 8 and Annex I of the Protocol and the provisions of this part. This finding will be made with the concurrence of the National Science Foundation...

  6. 40 CFR 8.7 - Initial environmental evaluation.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... documentation requirements under Article 8 and Annex I to the Protocol and the provisions of this part or a CEE... documentation submitted does not meet the requirements of Article 8 and Annex I of the Protocol and the provisions of this part. This finding will be made with the concurrence of the National Science Foundation...

  7. 40 CFR 8.7 - Initial environmental evaluation.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... documentation requirements under Article 8 and Annex I to the Protocol and the provisions of this part or a CEE... documentation submitted does not meet the requirements of Article 8 and Annex I of the Protocol and the provisions of this part. This finding will be made with the concurrence of the National Science Foundation...

  8. 40 CFR 8.7 - Initial environmental evaluation.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... documentation requirements under Article 8 and Annex I to the Protocol and the provisions of this part or a CEE... documentation submitted does not meet the requirements of Article 8 and Annex I of the Protocol and the provisions of this part. This finding will be made with the concurrence of the National Science Foundation...

  9. 40 CFR 8.7 - Initial environmental evaluation.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... documentation requirements under Article 8 and Annex I to the Protocol and the provisions of this part or a CEE... documentation submitted does not meet the requirements of Article 8 and Annex I of the Protocol and the provisions of this part. This finding will be made with the concurrence of the National Science Foundation...

  10. Testing the Integrity of a Psychotherapy Protocol: Assessment of Adherence and Competence.

    ERIC Educational Resources Information Center

    Waltz, Jennifer; And Others

    1993-01-01

    Treatment manuals and protocols have made delivery of particular therapies purer and more consistent, initiating a demand that researchers not only use treatment manuals to improve purity of their therapy but document that their efforts to achieve purity have been successful. Strategies that have been used to document treatment integrity are…

  11. Steroid-induced diabetes: a clinical and molecular approach to understanding and treatment

    PubMed Central

    Hwang, Jessica L.; Weiss, Roy E.

    2014-01-01

    Summary Since the advent of glucocorticoid therapy for autoimmune disease in the 1940s, their widespread application has led to the concurrent therapy-limiting discovery of many adverse metabolic side effects. Unanticipated hyperglycemia associated with the initiation of glucocorticoids often leads to preventable hospital admissions, prolonged hospital stays, increased risks for infection and reduced graft function in solid organ transplant recipients. Challenges in managing steroid-induced diabetes stem from wide fluctuations in post-prandial hyperglycemia and the lack of clearly defined treatment protocols. The mainstay of treatment is insulin therapy coincident with meals. This article aims to review the pathogenesis, risk factors, diagnosis and treatment principles unique to steroid-induced diabetes. PMID:24123849

  12. A DICOM Based Collaborative Platform for Real-Time Medical Teleconsultation on Medical Images.

    PubMed

    Maglogiannis, Ilias; Andrikos, Christos; Rassias, Georgios; Tsanakas, Panayiotis

    2017-01-01

    The paper deals with the design of a Web-based platform for real-time medical teleconsultation on medical images. The proposed platform combines the principles of heterogeneous Workflow Management Systems (WfMSs), the peer-to-peer networking architecture and the SPA (Single-Page Application) concept, to facilitate medical collaboration among healthcare professionals geographically distributed. The presented work leverages state-of-the-art features of the web to support peer-to-peer communication using the WebRTC (Web Real Time Communication) protocol and client-side data processing for creating an integrated collaboration environment. The paper discusses the technical details of implementation and presents the operation of the platform in practice along with some initial results.

  13. Experimental temporal quantum steering

    PubMed Central

    Bartkiewicz, Karol; Černoch, Antonín; Lemr, Karel; Miranowicz, Adam; Nori, Franco

    2016-01-01

    Temporal steering is a form of temporal correlation between the initial and final state of a quantum system. It is a temporal analogue of the famous Einstein-Podolsky-Rosen (spatial) steering. We demonstrate, by measuring the photon polarization, that temporal steering allows two parties to verify if they have been interacting with the same particle, even if they have no information about what happened with the particle in between the measurements. This is the first experimental study of temporal steering. We also performed experimental tests, based on the violation of temporal steering inequalities, of the security of two quantum key distribution protocols against individual attacks. Thus, these results can lead to applications for secure quantum communications and quantum engineering. PMID:27901121

  14. Catalytic Conia-ene and related reactions.

    PubMed

    Hack, Daniel; Blümel, Marcus; Chauhan, Pankaj; Philipps, Arne R; Enders, Dieter

    2015-10-07

    Since its initial inception, the Conia-ene reaction, known as the intramolecular addition of enols to alkynes or alkenes, has experienced a tremendous development and appealing catalytic protocols have emerged. This review fathoms the underlying mechanistic principles rationalizing how substrate design, substrate activation, and the nature of the catalyst work hand in hand for the efficient synthesis of carbocycles and heterocycles at mild reaction conditions. Nowadays, Conia-ene reactions can be found as part of tandem reactions, and the road for asymmetric versions has already been paved. Based on their broad applicability, Conia-ene reactions have turned into a highly appreciated synthetic tool with impressive examples in natural product synthesis reported in recent years.

  15. Modeling the effect of topical oxygen therapy on wound healing

    NASA Astrophysics Data System (ADS)

    Agyingi, Ephraim; Ross, David; Maggelakis, Sophia

    2011-11-01

    Oxygen supply is a critical element for the healing of wounds. Clinical investigations have shown that topical oxygen therapy (TOT) increases the healing rate of wounds. The reason behind TOT increasing the healing rate of a wound remains unclear and hence current protocols are empirical. In this paper we present a mathematical model of wound healing that we use to simulate the application of TOT in the treatment of cutaneous wounds. At the core of our model is an account of the initiation of angiogenesis by macrophage-derived growth factors. The model is expressed as a system of reaction-diffusion equations. We present results of simulations for a version of the model with one spatial dimension.

  16. Structural reliability analysis of laminated CMC components

    NASA Technical Reports Server (NTRS)

    Duffy, Stephen F.; Palko, Joseph L.; Gyekenyesi, John P.

    1991-01-01

    For laminated ceramic matrix composite (CMC) materials to realize their full potential in aerospace applications, design methods and protocols are a necessity. The time independent failure response of these materials is focussed on and a reliability analysis is presented associated with the initiation of matrix cracking. A public domain computer algorithm is highlighted that was coupled with the laminate analysis of a finite element code and which serves as a design aid to analyze structural components made from laminated CMC materials. Issues relevant to the effect of the size of the component are discussed, and a parameter estimation procedure is presented. The estimation procedure allows three parameters to be calculated from a failure population that has an underlying Weibull distribution.

  17. Single-Cell RNA-Sequencing in Glioma.

    PubMed

    Johnson, Eli; Dickerson, Katherine L; Connolly, Ian D; Hayden Gephart, Melanie

    2018-04-10

    In this review, we seek to summarize the literature concerning the use of single-cell RNA-sequencing for CNS gliomas. Single-cell analysis has revealed complex tumor heterogeneity, subpopulations of proliferating stem-like cells and expanded our view of tumor microenvironment influence in the disease process. Although bulk RNA-sequencing has guided our initial understanding of glioma genetics, this method does not accurately define the heterogeneous subpopulations found within these tumors. Single-cell techniques have appealing applications in cancer research, as diverse cell types and the tumor microenvironment have important implications in therapy. High cost and difficult protocols prevent widespread use of single-cell RNA-sequencing; however, continued innovation will improve accessibility and expand our of knowledge gliomas.

  18. Effects of slow and accelerated rehabilitation protocols on range of motion after arthroscopic rotator cuff repair.

    PubMed

    Düzgün, İrem; Baltacı, Gül; Turgut, Elif; Atay, O Ahmet

    2014-01-01

    The aim of the study was to investigate the effects of the early initiation of passive and active range of motion exercises following arthroscopic rotator cuff repair. The study included 40 patients who underwent arthroscopic rotator cuff repair. Patients were quasi-randomly assigned into accelerated (ACCEL) protocol (n=19) and slow (SLOW) protocol (n=21) groups. Patients in both groups were treated with the same protocol. Active range of motion was begun at the 3rd week in the ACCEL group and the 6th week in the SLOW group. Range of motion was recorded at postoperative weeks 3, 5, 8, 12, and 24. While active range of motion for all measurements improved across weeks, there were no differences between groups, with the exception of active total elevation which was greater at all time point measurements in the ACCEL group (p<0.05). The early initiation of passive and gentle controlled active motion exercise following rotator cuff repairs does not appear to affect range of motion in the first 6 postoperative months.

  19. Individualized music for dementia: Evolution and application of evidence-based protocol.

    PubMed

    Gerdner, Linda A

    2012-04-22

    The theory-based intervention of individualized music has been evaluated clinically and empirically leading to advancement and refinement of an evidence-based protocol, currently in its 5th edition. An expanded version of the protocol was written for professional health care providers with a consumer version tailored for family caregivers. The underlying mid-range theory is presented along with a seminal study that was followed by further research in the United States, Canada, Great Britain, France, Sweden, Norway, Japan and Taiwan. Key studies are summarized. Given its efficacy when implemented by research staff, studies have advanced to testing the intervention under real-life conditions when implemented and evaluated by trained nursing assistants in long-term care facilities and visiting family members. In addition, one study evaluated the implementation of music by family members in the home setting. Initial research focused on agitation as the dependent variable with subsequent research indicating a more holistic response such as positive affect, expressed satisfaction, and meaningful interaction with others. The article advances by describing on-line programs designed to train health care professionals in the assessment, implementation and evaluation of individualized music. In addition, Gerdner has written a story for a picture book intended for children and their families (in press). The story models principles of individualized music to elicit positive memories, reduce anxiety and agitation, and promote communication. The article concludes with implications for future research.

  20. Individualized music for dementia: Evolution and application of evidence-based protocol

    PubMed Central

    Gerdner, Linda A

    2012-01-01

    The theory-based intervention of individualized music has been evaluated clinically and empirically leading to advancement and refinement of an evidence-based protocol, currently in its 5th edition. An expanded version of the protocol was written for professional health care providers with a consumer version tailored for family caregivers. The underlying mid-range theory is presented along with a seminal study that was followed by further research in the United States, Canada, Great Britain, France, Sweden, Norway, Japan and Taiwan. Key studies are summarized. Given its efficacy when implemented by research staff, studies have advanced to testing the intervention under real-life conditions when implemented and evaluated by trained nursing assistants in long-term care facilities and visiting family members. In addition, one study evaluated the implementation of music by family members in the home setting. Initial research focused on agitation as the dependent variable with subsequent research indicating a more holistic response such as positive affect, expressed satisfaction, and meaningful interaction with others. The article advances by describing on-line programs designed to train health care professionals in the assessment, implementation and evaluation of individualized music. In addition, Gerdner has written a story for a picture book intended for children and their families (in press). The story models principles of individualized music to elicit positive memories, reduce anxiety and agitation, and promote communication. The article concludes with implications for future research. PMID:24175165

  1. Lightweight SIP/SDP compression scheme (LSSCS)

    NASA Astrophysics Data System (ADS)

    Wu, Jian J.; Demetrescu, Cristian

    2001-10-01

    In UMTS new IP based services with tight delay constraints will be deployed over the W-CDMA air interface such as IP multimedia and interactive services. To integrate the wireline and wireless IP services, 3GPP standard forum adopted the Session Initiation Protocol (SIP) as the call control protocol for the UMTS Release 5, which will implement next generation, all IP networks for real-time QoS services. In the current form the SIP protocol is not suitable for wireless transmission due to its large message size which will need either a big radio pipe for transmission or it will take far much longer to transmit than the current GSM Call Control (CC) message sequence. In this paper we present a novel compression algorithm called Lightweight SIP/SDP Compression Scheme (LSSCS), which acts at the SIP application layer and therefore removes the information redundancy before it is sent to the network and transport layer. A binary octet-aligned header is added to the compressed SIP/SDP message before sending it to the network layer. The receiver uses this binary header as well as the pre-cached information to regenerate the original SIP/SDP message. The key features of the LSSCS compression scheme are presented in this paper along with implementation examples. It is shown that this compression algorithm makes SIP transmission efficient over the radio interface without losing the SIP generality and flexibility.

  2. Effects of physical therapy for the management of patients with ankylosing spondylitis in the biological era.

    PubMed

    Giannotti, Erika; Trainito, Sabina; Arioli, Giovanni; Rucco, Vincenzo; Masiero, Stefano

    2014-09-01

    Exercise is considered a fundamental tool for the management of ankylosing spondylitis (AS), in combination with pharmacological therapy that with the advent of biological therapy has improved dramatically the control of signs and symptoms of this challenging disease. Current evidence shows that a specific exercise protocol has not been validated yet. The purpose of this review is to update the most recent evidence (July 2010-November 2013) about physiotherapy in AS, analyzing the possible role and synergistic interactions between exercise and biological drugs. From 117 studies initially considered, only 15 were included in the review. The results support a multimodal approach, including educational sessions, conducted in a group setting, supervised by a physiotherapist and followed by a maintaining home-based regimen. Spa exercise and McKenzie, Heckscher, and Pilates methods seem promising in AS rehabilitation, but their effectiveness should be further investigated in future randomized controlled trials (RCTs). When performed in accordance with the American College of Sports Medicine guidelines, cardiovascular training has been proven safe and effective and should be included in AS rehabilitation protocols. Exercise training plays an important role in the biological era, being now applicable to stabilized patients, leading ultimately to a better management of AS by physiatrists and rheumatologists throughout the world. On the basis of the current evidence, further research should aim to determine which exercise protocols should be recommended.

  3. The Myth, the Truth, the NASA IRB

    NASA Technical Reports Server (NTRS)

    Covington, M. D.; Flores, M. P.; Neutzler, V. P.; Schlegel, T. T.; Platts, S. H.; Lioyd, C. W.

    2017-01-01

    The purpose of the NASA Institutional Review Board (IRB) is to review research activities involving human subjects to ensure that ethical standards for the care and protection of human subjects have been met and research activities are in compliance with all pertinent federal, state and local regulations as well as NASA policies. NASA IRB's primary role is the protection of human subjects in research studies. Protection of human subjects is the shared responsibility of NASA, the IRB, and the scientific investigators. Science investigators who plan to conduct NASA-funded human research involving NASA investigators, facilities, or funds must submit and coordinate their research studies for review and approval by the NASA IRB prior to initiation. The IRB has the authority to approve, require changes in, or disapprove research involving human subjects. Better knowledge of the NASA IRB policies, procedures and guidelines should help facilitate research protocol applications and approvals. In this presentation, the myths and truths of NASA IRB policies and procedures will be discussed. We will focus on the policies that guide a protocol through the NASA IRB and the procedures that principal investigators must take to obtain required IRB approvals for their research studies. In addition, tips to help ensure a more efficient IRB review will be provided. By understanding the requirements and processes, investigators will be able to more efficiently prepare their protocols and obtain the required NASA IRB approval in a timely manner.

  4. Cryptography in the Bounded-Quantum-Storage Model

    NASA Astrophysics Data System (ADS)

    Schaffner, Christian

    2007-09-01

    This thesis initiates the study of cryptographic protocols in the bounded-quantum-storage model. On the practical side, simple protocols for Rabin Oblivious Transfer, 1-2 Oblivious Transfer and Bit Commitment are presented. No quantum memory is required for honest players, whereas the protocols can only be broken by an adversary controlling a large amount of quantum memory. The protocols are efficient, non-interactive and can be implemented with today's technology. On the theoretical side, new entropic uncertainty relations involving min-entropy are established and used to prove the security of protocols according to new strong security definitions. For instance, in the realistic setting of Quantum Key Distribution (QKD) against quantum-memory-bounded eavesdroppers, the uncertainty relation allows to prove the security of QKD protocols while tolerating considerably higher error rates compared to the standard model with unbounded adversaries.

  5. Heuristic Evaluation of E-Learning Courses: A Comparative Analysis of Two E-Learning Heuristic Sets

    ERIC Educational Resources Information Center

    Zaharias, Panagiotis; Koutsabasis, Panayiotis

    2012-01-01

    Purpose: The purpose of this paper is to discuss heuristic evaluation as a method for evaluating e-learning courses and applications and more specifically to investigate the applicability and empirical use of two customized e-learning heuristic protocols. Design/methodology/approach: Two representative e-learning heuristic protocols were chosen…

  6. Virtual Reality Transfer Protocol (VRTP): Implementing a Monitor Application for the Real-Time Transport Protocol (RTP) Using the JAVA Media Framework (JMF)

    DTIC Science & Technology

    1999-09-01

    application, a complete specification will require one or more companion documents, as follows. 1. Profile Specification Documents A Profile...Rio de Janeiro - RJ - Brazil 21. Diretoria de Sistemas de Armas da Marinha Rua Primeiro de Marco, 118 Rio de Janeiro - RJ - Brazil CEP 20010 22

  7. MTP: An atomic multicast transport protocol

    NASA Technical Reports Server (NTRS)

    Freier, Alan O.; Marzullo, Keith

    1990-01-01

    Multicast transport protocol (MTP); a reliable transport protocol that utilizes the multicast strategy of applicable lower layer network architectures is described. In addition to transporting data reliably and efficiently, MTP provides the client synchronization necessary for agreement on the receipt of data and the joining of the group of communicants.

  8. Evaluation of the University of Florida lomustine, vincristine, procarbazine, and prednisone chemotherapy protocol for the treatment of relapsed lymphoma in dogs: 33 cases (2003-2009).

    PubMed

    Fahey, Christine E; Milner, Rowan J; Barabas, Karri; Lurie, David; Kow, Kelvin; Parfitt, Shannon; Lyles, Sarah; Clemente, Monica

    2011-07-15

    To evaluate the toxicity and efficacy of a modification of a previously evaluated combination of lomustine, vincristine, procarbazine, and prednisone (LOPP) as a rescue protocol for refractory lymphoma in dogs. Retrospective case series. Animals-33 dogs with a cytologic or histologic diagnosis of lymphoma that developed resistance to their induction chemotherapy protocol. Lomustine was administered on day 0 of the protocol. Vincristine was administered on day 0 and again 1 time on day 14. Procarbazine and prednisone were administered on days 0 through 13 of the protocol. This cycle was repeated every 28 days. Median time from initiation to discontinuation of the University of Florida LOPP protocol was 84 days (range, 10 to 308 days). Overall median survival time was 290 days (range, 51 to 762 days). Overall response rate with this protocol was 61% (20/33), with 36% (12) having a complete response and 24% (8) having a partial response. Toxicosis rates were lower than for the previously published LOPP protocol. The University of Florida LOPP protocol may be an acceptable alternative to the mechlorethamine, vincristine, procarbazine, and prednisone protocol as a rescue protocol for dogs with lymphoma.

  9. Improving management performance of P2PSIP for mobile sensing in wireless overlays.

    PubMed

    Sendín-Raña, Pablo; González-Castaño, Francisco Javier; Gómez-Cuba, Felipe; Asorey-Cacheda, Rafael; Pousada-Carballo, José María

    2013-11-08

    Future wireless communications are heading towards an all-Internet Protocol (all-IP) design, and will rely on the Session Initiation Protocol (SIP) to manage services, such as voice over IP (VoIP). The centralized architecture of traditional SIP has numerous disadvantages for mobile ad hoc services that may be possibly overcome by advanced peer-to-peer (P2P) technologies initially developed for the Internet. In the context of mobile sensing, P2PSIP protocols facilitate decentralized and fast communications with sensor-enabled terminals. Nevertheless, in order to make P2PSIP protocols feasible in mobile sensing networks, it is necessary to minimize overhead transmissions for signaling purposes, which reduces the battery lifetime. In this paper, we present a solution to improve the management of wireless overlay networks by defining an adaptive algorithm for the calculation of refresh time. The main advantage of the proposed algorithm is that it takes into account new parameters, such as the delay between nodes, and provides satisfactory performance and reliability levels at a much lower management overhead than previous approaches. The proposed solution can be applied to many structured P2P overlays or P2PSIP protocols. We evaluate it with Kademlia-based distributed hash tables (DHT) and dSIP.

  10. Improving Management Performance of P2PSIP for Mobile Sensing in Wireless Overlays

    PubMed Central

    Sendín-Raña, Pablo; González-Castaño, Francisco Javier; Gómez-Cuba, Felipe; Asorey-Cacheda, Rafael; Pousada-Carballo, José María

    2013-01-01

    Future wireless communications are heading towards an all-Internet Protocol (all-IP) design, and will rely on the Session Initiation Protocol (SIP) to manage services, such as voice over IP (VoIP). The centralized architecture of traditional SIP has numerous disadvantages for mobile ad hoc services that may be possibly overcome by advanced peer-to-peer (P2P) technologies initially developed for the Internet. In the context of mobile sensing, P2PSIP protocols facilitate decentralized and fast communications with sensor-enabled terminals. Nevertheless, in order to make P2PSIP protocols feasible in mobile sensing networks, it is necessary to minimize overhead transmissions for signaling purposes, which reduces the battery lifetime. In this paper, we present a solution to improve the management of wireless overlay networks by defining an adaptive algorithm for the calculation of refresh time. The main advantage of the proposed algorithm is that it takes into account new parameters, such as the delay between nodes, and provides satisfactory performance and reliability levels at a much lower management overhead than previous approaches. The proposed solution can be applied to many structured P2P overlays or P2PSIP protocols. We evaluate it with Kademlia-based distributed hash tables (DHT) and dSIP PMID:24217358

  11. Space Flight Middleware: Remote AMS over DTN for Delay-Tolerant Messaging

    NASA Technical Reports Server (NTRS)

    Burleigh, Scott

    2011-01-01

    This paper describes a technique for implementing scalable, reliable, multi-source multipoint data distribution in space flight communications -- Delay-Tolerant Reliable Multicast (DTRM) -- that is fully supported by the "Remote AMS" (RAMS) protocol of the Asynchronous Message Service (AMS) proposed for standardization within the Consultative Committee for Space Data Systems (CCSDS). The DTRM architecture enables applications to easily "publish" messages that will be reliably and efficiently delivered to an arbitrary number of "subscribing" applications residing anywhere in the space network, whether in the same subnet or in a subnet on a remote planet or vehicle separated by many light minutes of interplanetary space. The architecture comprises multiple levels of protocol, each included for a specific purpose and allocated specific responsibilities: "application AMS" traffic performs end-system data introduction and delivery subject to access control; underlying "remote AMS" directs this application traffic to populations of recipients at remote locations in a multicast distribution tree, enabling the architecture to scale up to large networks; further underlying Delay-Tolerant Networking (DTN) Bundle Protocol (BP) advances RAMS protocol data units through the distribution tree using delay-tolerant storeand- forward methods; and further underlying reliable "convergence-layer" protocols ensure successful data transfer over each segment of the end-to-end route. The result is scalable, reliable, delay-tolerant multi-source multicast that is largely self-configuring.

  12. Byzantine-fault tolerant self-stabilizing protocol for distributed clock synchronization systems

    NASA Technical Reports Server (NTRS)

    Malekpour, Mahyar R. (Inventor)

    2010-01-01

    A rapid Byzantine self-stabilizing clock synchronization protocol that self-stabilizes from any state, tolerates bursts of transient failures, and deterministically converges within a linear convergence time with respect to the self-stabilization period. Upon self-stabilization, all good clocks proceed synchronously. The Byzantine self-stabilizing clock synchronization protocol does not rely on any assumptions about the initial state of the clocks. Furthermore, there is neither a central clock nor an externally generated pulse system. The protocol converges deterministically, is scalable, and self-stabilizes in a short amount of time. The convergence time is linear with respect to the self-stabilization period.

  13. Network-Friendly Gossiping

    NASA Astrophysics Data System (ADS)

    Serbu, Sabina; Rivière, Étienne; Felber, Pascal

    The emergence of large-scale distributed applications based on many-to-many communication models, e.g., broadcast and decentralized group communication, has an important impact on the underlying layers, notably the Internet routing infrastructure. To make an effective use of network resources, protocols should both limit the stress (amount of messages) on each infrastructure entity like routers and links, and balance as much as possible the load in the network. Most protocols use application-level metrics such as delays to improve efficiency of content dissemination or routing, but the extend to which such application-centric optimizations help reduce and balance the load imposed to the infrastructure is unclear. In this paper, we elaborate on the design of such network-friendly protocols and associated metrics. More specifically, we investigate random-based gossip dissemination. We propose and evaluate different ways of making this representative protocol network-friendly while keeping its desirable properties (robustness and low delays). Simulations of the proposed methods using synthetic and real network topologies convey and compare their abilities to reduce and balance the load while keeping good performance.

  14. Changes in morphology of long bone marrow tissue of rats submitted to cryotherapy with liquid nitrogen.

    PubMed

    Costa, Fábio Wildson Gurgel; Pessoa, Rosana Maria Andrade; Nogueira, Carlos Bruno Pinheiro; Pereira, Karuza Maria Alves; Brito, Gerly Anne de Castro; Soares, Eduardo Costa Studart

    2012-02-01

    To study the main effects of local use of liquid nitrogen on bone marrow tissue in rats. The femoral diaphyses of 42 Wistar rats were exposed to three local and sequential applications of liquid nitrogen for one or two minutes, intercalated with periods of five minutes of passive thawing. The animals were sacrificed after one, two, four and 12 weeks and the specimens obtained were analyzed histomorphologically. In the second experimental week of one-minute protocol, histological degree of inflammation obtained a mean score of one (mild), ranging from 0 (absent or scarce) and two (moderate) (Kruskal-Wallis test p=0.01). In the second experimental week of two-minute protocol, degree of inflammation to the medullar tissue obtained an average score of two (Kruskal-Wallis test p=0.01). The degree of inflammation of the bone marrow tissue was higher in protocol of three applications of two minutes compared to protocol of three applications of one minute.

  15. Communication-Gateway Software For NETEX, DECnet, And TCP/IP

    NASA Technical Reports Server (NTRS)

    Keith, B.; Ferry, D.; Fendler, E.

    1990-01-01

    Communications gateway software, GATEWAY, provides process-to-process communication between remote applications programs in different protocol domains. Communicating peer processes may be resident on any paired combination of NETEX, DECnet, or TCP/IP hosts. Provides necessary mapping from one protocol to another and facilitates practical intermachine communications in cost-effective manner by eliminating need to standardize on single protocol or to implement multiple protocols in host computers. Written in Ada.

  16. Secure authentication protocol for Internet applications over CATV network

    NASA Astrophysics Data System (ADS)

    Chin, Le-Pond

    1998-02-01

    An authentication protocol is proposed in this paper to implement secure functions which include two way authentication and key management between end users and head-end. The protocol can protect transmission from frauds, attacks such as reply and wiretap. Location privacy is also achieved. A rest protocol is designed to restore the system once when systems fail. The security is verified by taking several security and privacy requirements into consideration.

  17. BLUE-protocol and FALLS-protocol: two applications of lung ultrasound in the critically ill.

    PubMed

    Lichtenstein, Daniel A

    2015-06-01

    This review article describes two protocols adapted from lung ultrasound: the bedside lung ultrasound in emergency (BLUE)-protocol for the immediate diagnosis of acute respiratory failure and the fluid administration limited by lung sonography (FALLS)-protocol for the management of acute circulatory failure. These applications require the mastery of 10 signs indicating normal lung surface (bat sign, lung sliding, A-lines), pleural effusions (quad and sinusoid sign), lung consolidations (fractal and tissue-like sign), interstitial syndrome (lung rockets), and pneumothorax (stratosphere sign and the lung point). These signs have been assessed in adults, with diagnostic accuracies ranging from 90% to 100%, allowing consideration of ultrasound as a reasonable bedside gold standard. In the BLUE-protocol, profiles have been designed for the main diseases (pneumonia, congestive heart failure, COPD, asthma, pulmonary embolism, pneumothorax), with an accuracy > 90%. In the FALLS-protocol, the change from A-lines to lung rockets appears at a threshold of 18 mm Hg of pulmonary artery occlusion pressure, providing a direct biomarker of clinical volemia. The FALLS-protocol sequentially rules out obstructive, then cardiogenic, then hypovolemic shock for expediting the diagnosis of distributive (usually septic) shock. These applications can be done using simple grayscale machines and one microconvex probe suitable for the whole body. Lung ultrasound is a multifaceted tool also useful for decreasing radiation doses (of interest in neonates where the lung signatures are similar to those in adults), from ARDS to trauma management, and from ICUs to points of care. If done in suitable centers, training is the least of the limitations for making use of this kind of visual medicine.

  18. ICONE: An International Consortium of Neuro Endovascular Centres.

    PubMed

    Raymond, J; White, P; Kallmes, D F; Spears, J; Marotta, T; Roy, D; Guilbert, F; Weill, A; Nguyen, T; Molyneux, A J; Cloft, H; Cekirge, S; Saatci, I; Bracard, S; Meder, J F; Moret, J; Cognard, C; Qureshi, A I; Turk, A S; Berenstein, A

    2008-06-30

    The proliferation of new endovascular devices and therapeutic strategies calls for a prudentand rational evaluation of their clinical benefit. This evaluation must be done in an effective manner and in collaboration with industry. Such research initiative requires organisation a land methodological support to survive and thrive in a competitive environment. We propose the formation of an international consortium, an academic alliance committed to the pursuit of effective neurovascular therapies. Such a consortium would be dedicated to the designand execution of basic science, device developmentand clinical trials. The Consortium is owned and operated by its members. Members are international leaders in neurointerventional research and clinical practice. The Consortium brings competency, knowledge, and expertise to industry as well as to its membership across aspectrum of research initiatives such as: expedited review of clinical trials, protocol development, surveys and systematic reviews; laboratory expertise and support for research design and grant applications to public agencies. Once objectives and protocols are approved, the Consortium provides a stable network of centers capable of timely realization of clinical trials or pre clinical investigations in an optimal environment. The Consortium is a non-profit organization. The potential revenue generated from clientsponsored financial agreements will be redirected to the academic and research objectives of the organization. The Consortium wishes to work inconcert with industry, to support emerging trends in neurovascular therapeutic development. The Consortium is a realistic endeavour optimally structured to promote excellence through scientific appraisal of our treatments, and to accelerate technical progress while maximizing patients' safety and welfare.

  19. Interactive MPEG-4 low-bit-rate speech/audio transmission over the Internet

    NASA Astrophysics Data System (ADS)

    Liu, Fang; Kim, JongWon; Kuo, C.-C. Jay

    1999-11-01

    The recently developed MPEG-4 technology enables the coding and transmission of natural and synthetic audio-visual data in the form of objects. In an effort to extend the object-based functionality of MPEG-4 to real-time Internet applications, architectural prototypes of multiplex layer and transport layer tailored for transmission of MPEG-4 data over IP are under debate among Internet Engineering Task Force (IETF), and MPEG-4 systems Ad Hoc group. In this paper, we present an architecture for interactive MPEG-4 speech/audio transmission system over the Internet. It utilities a framework of Real Time Streaming Protocol (RTSP) over Real-time Transport Protocol (RTP) to provide controlled, on-demand delivery of real time speech/audio data. Based on a client-server model, a couple of low bit-rate bit streams (real-time speech/audio, pre- encoded speech/audio) are multiplexed and transmitted via a single RTP channel to the receiver. The MPEG-4 Scene Description (SD) and Object Descriptor (OD) bit streams are securely sent through the RTSP control channel. Upon receiving, an initial MPEG-4 audio- visual scene is constructed after de-multiplexing, decoding of bit streams, and scene composition. A receiver is allowed to manipulate the initial audio-visual scene presentation locally, or interactively arrange scene changes by sending requests to the server. A server may also choose to update the client with new streams and list of contents for user selection.

  20. Application of EARL (ResEARch 4 Life®) protocols for [18F]FDG-PET/CT clinical and research studies. A roadmap towards exact recovery coefficient

    NASA Astrophysics Data System (ADS)

    Balcerzyk, Marcin; Fernández-López, Rosa; Parrado-Gallego, Ángel; Pachón-Garrudo, Víctor Manuel; Chavero-Royan, José; Hevilla, Juan; Jiménez-Ortega, Elisa; Leal, Antonio

    2017-11-01

    Tumour uptake value is a critical result in [18F]FDG-PET/CT ([18F]fluorodeoxyglucose) quantitative scans such as the dose prescription for radiotherapy and oncology. The quantification is highly dependent on the protocol of acquisition and reconstruction of the image, especially in low activity tumours. During adjusting acquisition and reconstruction protocols available in our Siemens Biograph mCT scanner for EARL (ResEARch 4 Life®) [18F]FDG-PET/CT accreditation requirements, we developed reconstruction protocols which will be used in PET based radiotherapy planning able to reduce inter-/intra-institute variability in Standard Uptake Value (SUV) results, and to bring Recovery Coefficient to 1 as close as possible for Image Quality NEMA 2007 phantom. Primary and secondary tumours from two patients were assessed by four independent evaluators. The influence of reconstruction protocols on tumour clinical assessment was presented. We proposed the improvement route for EARL accredited protocols so that they may be developed in classes to take advantage of scanner possibilities. The application of optimized reconstruction protocol eliminates the need of partial volume corrections.

  1. A new communication protocol family for a distributed spacecraft control system

    NASA Technical Reports Server (NTRS)

    Baldi, Andrea; Pace, Marco

    1994-01-01

    In this paper we describe the concepts behind and architecture of a communication protocol family, which was designed to fulfill the communication requirements of ESOC's new distributed spacecraft control system SCOS 2. A distributed spacecraft control system needs a data delivery subsystem to be used for telemetry (TLM) distribution, telecommand (TLC) dispatch and inter-application communication, characterized by the following properties: reliability, so that any operational workstation is guaranteed to receive the data it needs to accomplish its role; efficiency, so that the telemetry distribution, even for missions with high telemetry rates, does not cause a degradation of the overall control system performance; scalability, so that the network is not the bottleneck both in terms of bandwidth and reconfiguration; flexibility, so that it can be efficiently used in many different situations. The new protocol family which satisfies the above requirements is built on top of widely used communication protocols (UDP and TCP), provides reliable point-to-point and broadcast communication (UDP+) and is implemented in C++. Reliability is achieved using a retransmission mechanism based on a sequence numbering scheme. Such a scheme allows to have cost-effective performances compared to the traditional protocols, because retransmission is only triggered by applications which explicitly need reliability. This flexibility enables applications with different profiles to take advantage of the available protocols, so that the best rate between sped and reliability can be achieved case by case.

  2. Antibiotic prophylaxis audit and questionnaire study: Traffic Light Poster improves adherence to protocol in gastrointestinal surgery.

    PubMed

    Cameron, Michaella; Jones, Stacey; Adedeji, Olufunso

    2015-07-01

    To measure adherence to antibiotic prophylaxis (AP) protocol amongst surgeons and anesthetists and explore their understanding of AP prescribing in practice. A prospective audit of AP in gastrointestinal surgery and re-audit after intervention. A questionnaire survey of practice. 58 (38%- clean; 62%- clean contaminated) operations were audited and 73 (48%-clean; 51%-clean contaminated) operations were re-audited after intervention with "Traffic Light Poster" (TFP) .55 colleagues (32 consultants and 23 trainees) were recruited for questionnaire survey in three West Midlands hospitals. Audit and Re-Audits. Only 31% of procedures followed the protocol correctly in the initial audit and this increased to 73% in the re-audit. 73% of patients undergoing clean procedures received AP inappropriately in the initial audit but reduced significantly to 20% (p < 0.002) in the re-audit. In the initial audit, 62% of clean contaminated procedures did not receive the appropriate first line AP but this fell to 35% (p < 0.05) in the re-audit. Questionnaire Survey- Only 30% of respondents would not give AP in clean surgery as recommended. 45% would use appropriate AP for clean-contaminated wounds. 73% of respondents will give AP at induction, 20% 1 h pre op and 7% just before incision. There is poor compliance with AP protocols in gastrointestinal surgery in part due to general lack of awareness. An educational intervention in the form of a 'Traffic Light Poster' improved adherence to AP protocol two fold. There was improved rationalizing of AP. Clean procedures, in particular, had less inappropriate prescribing. Copyright © 2015 IJS Publishing Group Limited. Published by Elsevier Ltd. All rights reserved.

  3. Multiple Object Based RFID System Using Security Level

    NASA Astrophysics Data System (ADS)

    Kim, Jiyeon; Jung, Jongjin; Ryu, Ukjae; Ko, Hoon; Joe, Susan; Lee, Yongjun; Kim, Boyeon; Chang, Yunseok; Lee, Kyoonha

    2007-12-01

    RFID systems are increasingly applied for operational convenience in wide range of industries and individual life. However, it is uneasy for a person to control many tags because common RFID systems have the restriction that a tag used to identify just a single object. In addition, RFID systems can make some serious problems in violation of privacy and security because of their radio frequency communication. In this paper, we propose a multiple object RFID tag which can keep multiple object identifiers for different applications in a same tag. The proposed tag allows simultaneous access for their pair applications. We also propose an authentication protocol for multiple object tag to prevent serious problems of security and privacy in RFID applications. Especially, we focus on efficiency of the authentication protocol by considering security levels of applications. In the proposed protocol, the applications go through different authentication procedures according to security level of the object identifier stored in the tag. We implemented the proposed RFID scheme and made experimental results about efficiency and stability for the scheme.

  4. An Evidence-Based Protocol for Antibiotic Use Prior to Cystoscopy Decreases Antibiotic Use without Impacting Post-Procedural Symptomatic Urinary Tract Infection Rates.

    PubMed

    Gregg, Justin R; Bhalla, Rohan G; Cook, J Paul; Kang, Caroline; Dmochowski, Roger; Talbot, Thomas R; Barocas, Daniel A

    2018-04-01

    Symptomatic urinary tract infection is a complication of office based cystourethroscopy. Studies are mixed regarding the efficacy of antibiotic prophylaxis to prevent urinary tract infections. Our aim was to develop and evaluate an evidence-based protocol that reduces unnecessary antibiotic use while avoiding an increase in urinary tract infections. We created a clinic antibiogram based on all urology office visits performed during a 2-year period. Bacterial resistance rates, institutional risk related data and clinical guidelines were applied to create a protocol for antibiotic administration before cystourethroscopy. We then analyzed 1,245 consecutive patients without a renal transplant who underwent outpatient cystourethroscopy, including 610 after protocol initiation. Urinary tract infection rates and antibiotic use were analyzed for an association with the protocol change using the Fisher exact test. Cultures had an overall 20% rate of resistance to fluoroquinolones, representing 40% of the cultures that grew Escherichia coli. Before the protocol change 602 of 635 patients (94.8%) received a preprocedural antibiotic compared to 426 of 610 (69.9%) after protocol initiation (p <0.01). A total of 19 patients (3.0%) had a symptomatic urinary tract infection prior to the protocol change while 16 (2.6%) had a urinary tract infection after the change (p = 0.69). Regarding resistance, fluoroquinolone resistant organisms grew in the cultures of 12 of 19 patients (63.2%) with a urinary tract infection before the protocol change compared to 5 of 16 (31.3%) with a urinary tract infection after the change. Recent antibiotic administration, hospitalization and chronic catheterization were associated with urinary tract infection in the entire cohort (all p ≤0.01). A local antibiogram with infection related risk data effectively risk stratifies patients before cystourethroscopy, decreasing the use of antibiotics without increasing the rate of symptomatic urinary tract infection. Copyright © 2018 American Urological Association Education and Research, Inc. Published by Elsevier Inc. All rights reserved.

  5. Graphical user interface for wireless sensor networks simulator

    NASA Astrophysics Data System (ADS)

    Paczesny, Tomasz; Paczesny, Daniel; Weremczuk, Jerzy

    2008-01-01

    Wireless Sensor Networks (WSN) are currently very popular area of development. It can be suited in many applications form military through environment monitoring, healthcare, home automation and others. Those networks, when working in dynamic, ad-hoc model, need effective protocols which must differ from common computer networks algorithms. Research on those protocols would be difficult without simulation tool, because real applications often use many nodes and tests on such a big networks take much effort and costs. The paper presents Graphical User Interface (GUI) for simulator which is dedicated for WSN studies, especially in routing and data link protocols evaluation.

  6. Performance and analysis of MAC protocols based on application

    NASA Astrophysics Data System (ADS)

    Yadav, Ravi; Daniel, A. K.

    2018-04-01

    Wireless Sensor Network is one of the rapid emerging technology in recent decades. It covers large application area as civilian and military. Wireless Sensor Network primary consists of sensor nodes having low-power, low cost and multifunctional activities to collaborates and communicates via wireless medium. The deployment of sensor nodes are adhoc in nature, so sensor nodes are auto organize themselves in such a way to communicate with each other. The characteristics make more challenging areas on WSNs. This paper gives overview about characteristics of WSNs, Architecture and Contention Based MAC protocol. The paper present analysis of various protocol based on performance.

  7. Delayed treatment with hypothermia protects against the no-reflow phenomenon despite failure to reduce infarct size.

    PubMed

    Hale, Sharon L; Herring, Michael J; Kloner, Robert A

    2013-01-04

    Many studies have shown that when hypothermia is started after coronary artery reperfusion (CAR), it is ineffective at reducing necrosis. However, some suggest that hypothermia may preferentially reduce no-reflow. Our aim was to test the effects of hypothermia on no-reflow when initiated close to reperfusion and 30 minutes after reperfusion, times not associated with a protective effect on myocardial infarct size. Rabbits received 30 minutes coronary artery occlusion/3 hours CAR. In protocol 1, hearts were treated for 1 hour with topical hypothermia (myocardial temperature ≈32°C) initiated at 5 minutes before or 5 minutes after CAR, and the results were compared with a normothermic group. In protocol 2, hypothermia was delayed until 30 minutes after CAR and control hearts remained normothermic. In protocol 1, risk zones were similar and infarct size was not significantly reduced by hypothermia initiated close to CAR. However, the no-reflow defect was significantly reduced by 43% (5 minutes before CAR) and 38% (5 minutes after CAR) in hypothermic compared with normothermic hearts (P=0.004, ANOVA, P=ns between the 2 treated groups). In protocol 2, risk zones and infarct sizes were similar, but delayed hypothermia significantly reduced no-reflow in hypothermic hearts by 30% (55±6% of the necrotic region in hypothermia group versus 79±6% with normothermia, P=0.008). These studies suggest that treatment with hypothermia reduces no-reflow even when initiated too late to reduce infarct size and that the microvasculature is especially receptive to the protective properties of hypothermia and confirm that microvascular damage is in large part a form of true reperfusion injury.

  8. Young investigator challenge: Validation and optimization of immunohistochemistry protocols for use on cellient cell block specimens.

    PubMed

    Sauter, Jennifer L; Grogg, Karen L; Vrana, Julie A; Law, Mark E; Halvorson, Jennifer L; Henry, Michael R

    2016-02-01

    The objective of the current study was to establish a process for validating immunohistochemistry (IHC) protocols for use on the Cellient cell block (CCB) system. Thirty antibodies were initially tested on CCBs using IHC protocols previously validated on formalin-fixed, paraffin-embedded tissue (FFPE). Cytology samples were split to generate thrombin cell blocks (TCB) and CCBs. IHC was performed in parallel. Antibody immunoreactivity was scored, and concordance or discordance in immunoreactivity between the TCBs and CCBs for each sample was determined. Criteria for validation of an antibody were defined as concordant staining in expected positive and negative cells, in at least 5 samples each, and concordance in at least 90% of the samples total. Antibodies that failed initial validation were retested after alterations in IHC conditions. Thirteen of the 30 antibodies (43%) did not meet initial validation criteria. Of those, 8 antibodies (calretinin, clusters of differentiation [CD] 3, CD20, CDX2, cytokeratin 20, estrogen receptor, MOC-31, and p16) were optimized for CCBs and subsequently validated. Despite several alterations in conditions, 3 antibodies (Ber-EP4, D2-40, and paired box gene 8 [PAX8]) were not successfully validated. Nearly one-half of the antibodies tested in the current study failed initial validation using IHC conditions that were established in the study laboratory for FFPE material. Although some antibodies subsequently met validation criteria after optimization of conditions, a few continued to demonstrate inadequate immunoreactivity. These findings emphasize the importance of validating IHC protocols for methanol-fixed tissue before clinical use and suggest that optimization for alcohol fixation may be needed to obtain adequate immunoreactivity on CCBs. © 2016 American Cancer Society.

  9. Introduction of the second-generation direct-acting antivirals (DAAs) in chronic hepatitis C: a register-based study in Sweden.

    PubMed

    Frisk, P; Aggefors, K; Cars, T; Feltelius, N; Loov, S A; Wettermark, B; Weiland, O

    2018-07-01

    Introduction of the direct-acting antivirals (DAAs) for treatment of chronic hepatitis C (CHC) infection has been challenging in all health systems. In Sweden, a national protocol for managed introduction was developed. It was optional, but all county councils agreed to implement and follow it. The purpose of this study was to study (a) cure rates among all patients initiated on treatment in 2014-2015, (b) prescribers' adherence to the drug recommendations and treatment eligibility criteria in the protocol, and (c) introduction rate in the six Swedish healthcare regions. A cross-sectional study where national data from the Prescribed Drug Register and the quality register InfCare Hepatitis defined the study population, and clinical data from the Patient Register and InfCare Hepatitis were used to monitor outcomes. Descriptive statistics were used. A total of 3447 patients were initiated on treatment during 2014-2015. The overall cure rate, based on data from 85% of the cohort, was 96%, with variation between genotypes. Adherence to drug recommendations increased over time and varied between 43.2 and 94.2%. Adherence to the treatment eligibility criteria was initially 80% and increased to 87% when treatment restrictions were widened. The introduction rate differed initially between the regions and reached stable levels 15-18 months after the launch of the first DAA. The estimated overall cure rate was 96%, with some variations between genotypes. A high level of adherence to the introduction protocol as well as similar introduction rates in the health care regions indicate that the introduction protocol, alongside with other measures taken, contributed considerably to a rapid uptake and equal distribution of DAAs in Sweden.

  10. A Survey on an Energy-Efficient and Energy-Balanced Routing Protocol for Wireless Sensor Networks.

    PubMed

    Ogundile, Olayinka O; Alfa, Attahiru S

    2017-05-10

    Wireless sensor networks (WSNs) form an important part of industrial application. There has been growing interest in the potential use of WSNs in applications such as environment monitoring, disaster management, health care monitoring, intelligence surveillance and defence reconnaissance. In these applications, the sensor nodes (SNs) are envisaged to be deployed in sizeable numbers in an outlying area, and it is quite difficult to replace these SNs after complete deployment in many scenarios. Therefore, as SNs are predominantly battery powered devices, the energy consumption of the nodes must be properly managed in order to prolong the network lifetime and functionality to a rational time. Different energy-efficient and energy-balanced routing protocols have been proposed in literature over the years. The energy-efficient routing protocols strive to increase the network lifetime by minimizing the energy consumption in each SN. On the other hand, the energy-balanced routing protocols protract the network lifetime by uniformly balancing the energy consumption among the nodes in the network. There have been various survey papers put forward by researchers to review the performance and classify the different energy-efficient routing protocols for WSNs. However, there seems to be no clear survey emphasizing the importance, concepts, and principles of load-balanced energy routing protocols for WSNs. In this paper, we provide a clear picture of both the energy-efficient and energy-balanced routing protocols for WSNs. More importantly, this paper presents an extensive survey of the different state-of-the-art energy-efficient and energy-balanced routing protocols. A taxonomy is introduced in this paper to classify the surveyed energy-efficient and energy-balanced routing protocols based on their proposed mode of communication towards the base station (BS). In addition, we classified these routing protocols based on the solution types or algorithms, and the input decision variables defined in the routing algorithm. The strengths and weaknesses of the choice of the decision variables used in the design of these energy-efficient and energy-balanced routing protocols are emphasised. Finally, we suggest possible research directions in order to optimize the energy consumption in sensor networks.

  11. A Survey on an Energy-Efficient and Energy-Balanced Routing Protocol for Wireless Sensor Networks

    PubMed Central

    Ogundile, Olayinka O.; Alfa, Attahiru S.

    2017-01-01

    Wireless sensor networks (WSNs) form an important part of industrial application. There has been growing interest in the potential use of WSNs in applications such as environment monitoring, disaster management, health care monitoring, intelligence surveillance and defence reconnaissance. In these applications, the sensor nodes (SNs) are envisaged to be deployed in sizeable numbers in an outlying area, and it is quite difficult to replace these SNs after complete deployment in many scenarios. Therefore, as SNs are predominantly battery powered devices, the energy consumption of the nodes must be properly managed in order to prolong the network lifetime and functionality to a rational time. Different energy-efficient and energy-balanced routing protocols have been proposed in literature over the years. The energy-efficient routing protocols strive to increase the network lifetime by minimizing the energy consumption in each SN. On the other hand, the energy-balanced routing protocols protract the network lifetime by uniformly balancing the energy consumption among the nodes in the network. There have been various survey papers put forward by researchers to review the performance and classify the different energy-efficient routing protocols for WSNs. However, there seems to be no clear survey emphasizing the importance, concepts, and principles of load-balanced energy routing protocols for WSNs. In this paper, we provide a clear picture of both the energy-efficient and energy-balanced routing protocols for WSNs. More importantly, this paper presents an extensive survey of the different state-of-the-art energy-efficient and energy-balanced routing protocols. A taxonomy is introduced in this paper to classify the surveyed energy-efficient and energy-balanced routing protocols based on their proposed mode of communication towards the base station (BS). In addition, we classified these routing protocols based on the solution types or algorithms, and the input decision variables defined in the routing algorithm. The strengths and weaknesses of the choice of the decision variables used in the design of these energy-efficient and energy-balanced routing protocols are emphasised. Finally, we suggest possible research directions in order to optimize the energy consumption in sensor networks. PMID:28489054

  12. Initiation and Termination of Massive Transfusion Protocols: Current Strategies and Future Prospects.

    PubMed

    Foster, John C; Sappenfield, Joshua W; Smith, Robert S; Kiley, Sean P

    2017-12-01

    The advent of massive transfusion protocols (MTP) has had a significant positive impact on hemorrhaging trauma patient morbidity and mortality. Nevertheless, societal MTP guidelines and individual MTPs at academic institutions continue to circulate opposing recommendations on topics critical to MTPs. This narrative review discusses up-to-date information on 2 such topics, the initiation and termination of an MTP. The discussion for each begins with a review of the recommendations and supporting literature presented by MTP guidelines from 3 prominent societies, the American Society of Anesthesiologists, the American College of Surgeons, and the task force for Advanced Bleeding Care in Trauma. This is followed by an in-depth analysis of the main components within those recommendations. Societal recommendations on MTP initiation in hemorrhaging trauma patients emphasize the use of retrospectively validated massive transfusion (MT) prediction score, specifically, the Assessment of Blood Consumption and Trauma-Associated Severe Hemorrhage scores. Validation studies have shown that both scoring systems perform similarly. Both scores reliably identify patients that will not require an MT, while simultaneously overpredicting MT requirements. However, each scoring system has its unique advantages and disadvantages, and this review discusses how specific aspects of each scoring system can affect widespread applicability and statistical performance. In addition, we discuss the often overlooked topic of initiating MT in nontrauma patients and the specific tools physicians have to guide the MT initiation decision in this unique setting. Despite the serious complications that can arise with transfusion of large volumes of blood products, there is considerably less research pertinent to the topic of MTP termination. Societal recommendations on MTP termination emphasize applying clinical reasoning to identify patients who have bleeding source control and are adequately resuscitated. This review, however, focuses primarily on the recommendations presented by the Advanced Bleeding Care in Trauma's MTP guidelines that call for prompt termination of the algorithm-guided model of resuscitation and rapidly transitioning into a resuscitation model guided by laboratory test results. We also discuss the evidence in support of laboratory result-guided resuscitation and how recent literature on viscoelastic hemostatic assays, although limited, highlights the potential to achieve additional benefits from this method of resuscitation.

  13. mHealth Assessment: Conceptualization of a Global Framework

    PubMed Central

    2017-01-01

    Background The mass availability and use of mobile health (mHealth) technologies offers the potential for these technologies to support or substitute medical advice. However, it is worrisome that most assessment initiatives are still not able to successfully evaluate all aspects of mHealth solutions. As a result, multiple strategies to assess mHealth solutions are being proposed by medical regulatory bodies and similar organizations. Objective We aim to offer a collective description of a universally applicable description of mHealth assessment initiatives, given their current and, as we see it, potential impact. In doing so, we recommend a common foundation for the development or update of assessment initiatives by addressing the multistakeholder issues that mHealth technology adds to the traditional medical environment. Methods Organized by the Mobile World Capital Barcelona Foundation, we represent a workgroup consisting of patient associations, developers, and health authority representatives, including medical practitioners, within Europe. Contributions from each group’s diverse competencies has allowed us to create an overview of the complex yet similar approaches to mHealth evaluation that are being developed today, including common gaps in concepts and perspectives. In response, we summarize commonalities of existing initiatives and exemplify additional characteristics that we believe will strengthen and unify these efforts. Results As opposed to a universal standard or protocol in evaluating mHealth solutions, assessment frameworks should respect the needs and capacity of each medical system or country. Therefore, we expect that the medical system will specify the content, resources, and workflow of assessment protocols in order to ensure a sustainable plan for mHealth solutions within their respective countries. Conclusions A common framework for all mHealth initiatives around the world will be useful in order to assess whatever mHealth solution is desirable in different areas, adapting it to the specifics of each context, to bridge the gap between health authorities, patients, and mHealth developers. We aim to foster a more trusting and collaborative environment to safeguard the well-being of patients and citizens while encouraging innovation of technology and policy. PMID:28465282

  14. Publication trends of study protocols in rehabilitation.

    PubMed

    Jesus, Tiago S; Colquhoun, Heather L

    2017-09-04

    Growing evidence points for the need to publish study protocols in the health field. To observe whether the growing interest in publishing study protocols in the broader health field has been translated into increased publications of rehabilitation study protocols. Observational study using publication data and its indexation in PubMed. Not applicable. Not applicable. PubMed was searched with appropriate combinations of Medical Subject Headings up to December 2014. The effective presence of study protocols was manually screened. Regression models analyzed the yearly growth of publications. Two-sample Z-tests analyzed whether the proportion of Systematic Reviews (SRs) and Randomized Controlled Trials (RCTs) among study protocols differed from that of the same designs for the broader rehabilitation research. Up to December 2014, 746 publications of rehabilitation study protocols were identified, with an exponential growth since 2005 (r2=0.981; p<0.001). RCT protocols were the most common among rehabilitation study protocols (83%), while RCTs were significantly more prevalent among study protocols than among the broader rehabilitation research (83% vs. 35.8%; p<0.001). For SRs, the picture was reversed: significantly less common among study protocols (2.8% vs. 9.3%; p<0.001). Funding was more often reported by rehabilitation study protocols than the broader rehabilitation research (90% vs. 53.1%; p<0.001). Rehabilitation journals published a significantly lower share of rehabilitation study protocols than they did for the broader rehabilitation research (1.8% vs.16.7%; p<0.001). Identifying the reasons for these discrepancies and reverting unwarranted disparities (e.g. low rate of publication for rehabilitation SR protocols) are likely new avenues for rehabilitation research and its publication. SRs, particularly those aggregating RCT results, are considered the best standard of evidence to guide rehabilitation clinical practice; however, that standard can be improved in rigor and/or transparency if the publications of rehabilitation SRs protocols become more common.

  15. Pilot study to evaluate 3 hygiene protocols on the reduction of bacterial load on the hands of veterinary staff performing routine equine physical examinations.

    PubMed

    Traub-Dargatz, Josie L; Weese, J Scott; Rousseau, Joyce D; Dunowska, Magdalena; Morley, Paul S; Dargatz, David A

    2006-07-01

    Reduction factors (RFs) for bacterial counts on examiners' hands were compared when performing a standardized equine physical examination, followed by the use of one of 3 hand-hygiene protocols (washing with soap, ethanol gel application, and chlorohexidine-ethanol application). The mean RFs were 1.29 log10 and 1.44 log10 at 2 study sites for the alcohol-gel (62% ethyl alcohol active ingredient) protocols and 1.47 log10 and 1.94 log10 at 2 study sites for the chlorhexidine-alcohol (61% ethyl alcohol plus 1% chlorhexidine active ingredients) protocols, respectively. The RFs were significantly different (P < 0.0001) between the hand-washing group and the other 2 treatment groups (the alcohol-gel and the chlorhexidine-alcohol lotion). The use of alcohol-based gels or chlorhexidine-alcohol hand hygiene protocols must still be proven effective in equine practice settings, but in this study, these protocols were equivalent or superior to hand washing for reduction in bacterial load on the hands of people after they perform routine physical examinations.

  16. Pilot study to evaluate 3 hygiene protocols on the reduction of bacterial load on the hands of veterinary staff performing routine equine physical examinations

    PubMed Central

    Traub-Dargatz, Josie L.; Weese, J. Scott; Rousseau, Joyce D.; Dunowska, Magdalena; Morley, Paul S.; Dargatz, David A.

    2006-01-01

    Abstract Reduction factors (RFs) for bacterial counts on examiners’ hands were compared when performing a standardized equine physical examination, followed by the use of one of 3 hand-hygiene protocols (washing with soap, ethanol gel application, and chlorohexidine-ethanol application). The mean RFs were 1.29 log10 and 1.44 log10 at 2 study sites for the alcohol-gel (62% ethyl alcohol active ingredient) protocols and 1.47 log10 and 1.94 log10 at 2 study sites for the chlorhexidine-alcohol (61% ethyl alcohol plus 1% chlorhexidine active ingredients) protocols, respectively. The RFs were significantly different (P < 0.0001) between the hand-washing group and the other 2 treatment groups (the alcohol-gel and the chlorhexidine-alcohol lotion). The use of alcohol-based gels or chlorhexidine-alcohol hand hygiene protocols must still be proven effective in equine practice settings, but in this study, these protocols were equivalent or superior to hand washing for reduction in bacterial load on the hands of people after they perform routine physical examinations. PMID:16898109

  17. Virtual Global Transplant Laboratory Standard Operating Procedures for Blood Collection, PBMC Isolation, and Storage.

    PubMed

    Higdon, Lauren E; Lee, Karim; Tang, Qizhi; Maltzman, Jonathan S

    2016-09-01

    Research on human immune responses frequently involves the use of peripheral blood mononuclear cells (PBMC) immediately, or at significantly delayed timepoints, after collection. This requires PBMC isolation from whole blood and cryopreservation for some applications. It is important to standardize protocols for blood collection, PBMC isolation, cryopreservation, and thawing that maximize survival and functionality of PBMC at the time of analysis. This resource includes detailed protocols describing blood collection tubes, isolation of PBMC using a density gradient, cryopreservation of PBMC, and thawing of cells as well as preparation for functional assays. For each protocol, we include important considerations, such as timing, storage temperatures, and freezing rate. In addition, we provide alternatives so that researchers can make informed decisions in determining the optimal protocol for their application.

  18. Provably-Secure (Chinese Government) SM2 and Simplified SM2 Key Exchange Protocols

    PubMed Central

    Nam, Junghyun; Kim, Moonseong

    2014-01-01

    We revisit the SM2 protocol, which is widely used in Chinese commercial applications and by Chinese government agencies. Although it is by now standard practice for protocol designers to provide security proofs in widely accepted security models in order to assure protocol implementers of their security properties, the SM2 protocol does not have a proof of security. In this paper, we prove the security of the SM2 protocol in the widely accepted indistinguishability-based Bellare-Rogaway model under the elliptic curve discrete logarithm problem (ECDLP) assumption. We also present a simplified and more efficient version of the SM2 protocol with an accompanying security proof. PMID:25276863

  19. Non-invasive Assessments of Subjective and Objective Recovery Characteristics Following an Exhaustive Jump Protocol

    PubMed Central

    Hohenauer, Erich; Clarys, Peter; Baeyens, Jean-Pierre; Clijsen, Ron

    2017-01-01

    Fast recovery after strenuous exercise is important in sports and is often studied via cryotherapy applications. Cryotherapy has a significant vasoconstrictive effect, which seems to be the leading factor in its effectiveness. The resulting enhanced recovery can be measured by using both objective and subjective parameters. Two commonly measured subjective characteristics of recovery are delayed-onset muscle soreness (DOMS) and ratings of perceived exertion (RPE). Two important objective recovery characteristics are countermovement jump (CMJ) performance and peak power output (PPO). Here, we provide a detailed protocol to induce muscular exhaustion of the frontal thighs with a self-paced, 3 x 30 countermovement jump protocol (30-s rest between each set). This randomized controlled trial protocol explains how to perform local cryotherapy cuff application (+ 8 °C for 20 min) and thermoneutral cuff application (+ 32 °C for 20 min) on both thighs as two possible post-exercise recovery modalities. Finally, we provide a non-invasive protocol to measure the effects of these two recovery modalities on subjective (i.e., DOMS of both frontal thighs and RPE) and objective recovery (i.e., CMJ and PPO) characteristics 24, 48, and 72 h post-application. The advantage of this method is that it provides a tool for researchers or coaches to induce muscular exhaustion, without using any expensive devices; to implement local cooling strategies; and to measure both subjective and objective recovery, without using invasive methods. Limitations of this protocol are that the 30 s rest period between sets is very short, and the cardiovascular demand is very high. Future studies may find the assessment of maximum voluntary contractions to be a more sensitive assessment of muscular exhaustion compared to CMJs. PMID:28654037

  20. Asynchronous Message Service Reference Implementation

    NASA Technical Reports Server (NTRS)

    Burleigh, Scott C.

    2011-01-01

    This software provides a library of middleware functions with a simple application programming interface, enabling implementation of distributed applications in conformance with the CCSDS AMS (Consultative Committee for Space Data Systems Asynchronous Message Service) specification. The AMS service, and its protocols, implement an architectural concept under which the modules of mission systems may be designed as if they were to operate in isolation, each one producing and consuming mission information without explicit awareness of which other modules are currently operating. Communication relationships among such modules are self-configuring; this tends to minimize complexity in the development and operations of modular data systems. A system built on this model is a society of generally autonomous, inter-operating modules that may fluctuate freely over time in response to changing mission objectives, modules functional upgrades, and recovery from individual module failure. The purpose of AMS, then, is to reduce mission cost and risk by providing standard, reusable infrastructure for the exchange of information among data system modules in a manner that is simple to use, highly automated, flexible, robust, scalable, and efficient. The implementation is designed to spawn multiple threads of AMS functionality under the control of an AMS application program. These threads enable all members of an AMS-based, distributed application to discover one another in real time, subscribe to messages on specific topics, and to publish messages on specific topics. The query/reply (client/server) communication model is also supported. Message exchange is optionally subject to encryption (to support confidentiality) and authorization. Fault tolerance measures in the discovery protocol minimize the likelihood of overall application failure due to any single operational error anywhere in the system. The multi-threaded design simplifies processing while enabling application nodes to operate at high speeds; linked lists protected by mutex semaphores and condition variables are used for efficient, inter-thread communication. Applications may use a variety of transport protocols underlying AMS itself, including TCP (Transmission Control Protocol), UDP (User Datagram Protocol), and message queues.

  1. Emergency airway management in critically injured patients: a survey of U.S. aero-medical transport programs.

    PubMed

    James, Dorsha N; Voskresensky, Igor V; Jack, Meg; Cotton, Bryan A

    2009-06-01

    Pre-hospital airway management represents the intervention most likely to impact outcomes in critically injured patients. As such, airway management issues dominate quality improvement (QI) reviews of aero-medical programs. The purpose of this study was to evaluate current practice patterns of airway management in trauma among U.S. aero-medical service (AMS) programs. The Association of Air Medical Services (AAMS) Resource Guide from 2005 to 2006 was utilized to identify the e-mail addresses of all directors of U.S. aero-medical transport programs. Program directors from 182 U.S. aero-medical programs were asked to participate in an anonymous, web-based survey of emergency airway management protocols and practices. Non-responders to the initial request were contacted a second time by e-mail. 89 programs responded. 98.9% have rapid sequence intubation (RSI) protocols. 90% use succinylcholine, 70% use long-acting neuromuscular blockers (NMB) within their RSI protocol. 77% have protocols for mandatory in-flight sedation but only 13% have similar protocols for maintenance paralytics. 60% administer long-acting NMB immediately after RSI, 13% after confirmation of neurological activity. Given clinical scenarios, however, 97% administer long-acting NMB to patients with scene and in-flight Glasgow Coma Scale (GCS) of 3, even for brief transport times. The majority of AMS programs have well defined RSI and in-flight sedation protocols, while protocols for in-flight NMB are uncommon. Despite this, nearly all programs administer long-acting NMB following RSI, irrespective of GCS or flight time. Given the impact of in-flight NMB on initial assessment, early intervention, and injury severity scoring, a critical appraisal of current AMS airway management practices appears warranted.

  2. Thermo-mechanical characterization of silicone foams

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Rangaswamy, Partha; Smith, Nickolaus A.; Cady, Carl M.

    Cellular solids such as elastomeric foams are used in many structural applications to absorb and dissipate energy, due to their light weight (low density) and high energy absorption capability. In this paper we will discuss foams derived from S5370, a silicone foam formulation developed by Dow Corning. In the application presented, the foam is consolidated into a cushion component of constant thickness but variable density. A mechanical material model developed by Lewis (2013), predicts material response, in part, as a function of relative density. To determine the required parameters for this model we have obtained the mechanical response in compressionmore » for ambient, cold and hot temperatures. The variable density cushion provided samples sufficient samples so that the effect of sample initial density on the mechanical response could be studied. The mechanical response data showed extreme sensitivity to relative density. We also observed at strains corresponding to 1 MPa a linear relationship between strain and initial density for all temperatures. Samples taken from parts with a history of thermal cycling demonstrated a stiffening response that was a function of temperature, with the trend of more stiffness as temperature increased above ambient. This observation is in agreement with the entropic effects on the thermo-mechanical behavior of silicone polymers. In this study, we present the experimental methods necessary for the development of a material model, the testing protocol, analysis of test data, and a discussion of load (stress) and gap (strain) as a function of sample initial densities and temperatures« less

  3. Passive fMRI mapping of language function for pediatric epilepsy surgical planning: validation using Wada, ECS, and FMAER.

    PubMed

    Suarez, Ralph O; Taimouri, Vahid; Boyer, Katrina; Vega, Clemente; Rotenberg, Alexander; Madsen, Joseph R; Loddenkemper, Tobias; Duffy, Frank H; Prabhu, Sanjay P; Warfield, Simon K

    2014-12-01

    In this study we validate passive language fMRI protocols designed for clinical application in pediatric epilepsy surgical planning as they do not require overt participation from patients. We introduced a set of quality checks that assess reliability of noninvasive fMRI mappings utilized for clinical purposes. We initially compared two fMRI language mapping paradigms, one active in nature (requiring participation from the patient) and the other passive in nature (requiring no participation from the patient). Group-level analysis in a healthy control cohort demonstrated similar activation of the putative language centers of the brain in the inferior frontal (IFG) and temporoparietal (TPG) regions. Additionally, we showed that passive language fMRI produced more left-lateralized activation in TPG (LI=+0.45) compared to the active task; with similarly robust left-lateralized IFG (LI=+0.24) activations using the passive task. We validated our recommended fMRI mapping protocols in a cohort of 15 pediatric epilepsy patients by direct comparison against the invasive clinical gold-standards. We found that language-specific TPG activation by fMRI agreed to within 9.2mm to subdural localizations by invasive functional mapping in the same patients, and language dominance by fMRI agreed with Wada test results at 80% congruency in TPG and 73% congruency in IFG. Lastly, we tested the recommended passive language fMRI protocols in a cohort of very young patients and confirmed reliable language-specific activation patterns in that challenging cohort. We concluded that language activation maps can be reliably achieved using the passive language fMRI protocols we proposed even in very young (average 7.5 years old) or sedated pediatric epilepsy patients. Copyright © 2014 Elsevier B.V. All rights reserved.

  4. Update on the MRI Core of the Alzheimer's Disease Neuroimaging Initiative

    PubMed Central

    Jack, Clifford R; Bernstein, Matt A; Borowski, Bret J; Gunter, Jeffrey L; Fox, Nick C; Thompson, Paul M; Schuff, Norbert; Krueger, Gunnar; Killiany, Ronald J; DeCarli, Charles S; Dale, Anders M; Weiner, Michael W

    2010-01-01

    Functions of the ADNI MRI core fall into three categories: (1) those of the central MRI core lab at Mayo Clinic, Rochester, Minnesota, needed to generate high quality MRI data in all subjects at each time point; (2) those of the funded ADNI MRI core imaging analysis groups responsible for analyzing the MRI data, and (3) the joint function of the entire MRI core in designing and problem solving MR image acquisition, pre-processing and analyses methods. The primary objective of ADNI was and continues to be improving methods for clinical trials in Alzheimer's disease. Our approach to the present (“ADNI-GO”) and future (“ADNI-2”, if funded) MRI protocol will be to maintain MRI methodological consistency in previously enrolled “ADNI-1” subjects who are followed longitudinally in ADNI-GO and ADNI-2. We will modernize and expand the MRI protocol for all newly enrolled ADNI-GO and ADNI-2 subjects. All newly enrolled subjects will be scanned at 3T with a core set of three sequence types: 3D T1-weighted volume, FLAIR, and a long TE gradient echo volumetric acquisition for micro hemorrhage detection. In addition to this core ADNI-GO and ADNI-2 protocol, we will perform vendor specific pilot sub-studies of arterial spin labeling perfusion, resting state functional connectivity and diffusion tensor imaging. One each of these sequences will be added to the core protocol on systems from each MRI vendor. These experimental sub-studies are designed to demonstrate the feasibility of acquiring useful data in a multi-center (but single vendor) setting for these three emerging MRI applications. PMID:20451869

  5. Human platelet lysate in mesenchymal stromal cell expansion according to a GMP grade protocol: a cell factory experience.

    PubMed

    Becherucci, Valentina; Piccini, Luisa; Casamassima, Serena; Bisin, Silvia; Gori, Valentina; Gentile, Francesca; Ceccantini, Riccardo; De Rienzo, Elena; Bindi, Barbara; Pavan, Paola; Cunial, Vanessa; Allegro, Elisa; Ermini, Stefano; Brugnolo, Francesca; Astori, Giuseppe; Bambi, Franco

    2018-05-02

    The use of platelet lysate (PL) for the ex-vivo expansion of mesenchymal stromal/stem cells (MSCs) was initially proposed by Doucet et al. in 2005, as an alternative to animal serum. Moreover, regulatory authorities discourage the use of fetal bovine serum (FBS) or other animal derivatives, to avoid risk of zoonoses and xenogeneic immune reactions. Even if many studies investigated PL composition, there still are some open issues related to its use in ex-vivo MSC expansion, especially according to good manufacturing practice (GMP) grade protocols. As an authorized cell factory, we report our experience using standardized PL produced by Azienda Ospedaliero Universitaria Meyer Transfusion Service for MSC expansion according to a GMP grade clinical protocol. As suggested by other authors, we performed an in-vitro test on MSCs versus MSCs cultured with FBS that still represents the best way to test PL batches. We compared 12 MSC batches cultured with DMEM 5% PL with similar batches cultured with DMEM 10% FBS, focusing on the MSC proliferation rate, MSC surface marker expression, MSC immunomodulatory and differentiation potential, and finally MSC relative telomere length. Results confirmed the literature data as PL increases cell proliferation without affecting the MSC immunophenotype, immunomodulatory potential, differentiation potential and relative telomere length. PL can be considered a safe alternative to FBS for ex-vivo expansion of MSC according to a GMP grade protocol. Our experience confirms the literature data: a large number of MSCs for clinical applications can be obtained by expansion with PL, without affecting the MSC main features. Our experience underlines the benefits of a close collaboration between the PL producers (transfusion service) and the end users (cell factory) in a synergy of skills and experiences that can lead to standardized PL production.

  6. Interorganizational exchanges as performance markers in a community cancer network.

    PubMed Central

    McKinney, M M; Morrissey, J P; Kaluzny, A D

    1993-01-01

    OBJECTIVE. This study examines how "strategic partnerships" between community-based consortia of oncologists and hospitals (CCOPs) and clinical cooperative groups emerge, develop, and influence patient accruals (i.e., the number of patients enrolled in clinical trials) over time. DATA SOURCES AND STUDY SETTING. Study analyses are based on 65 pairwise relationships that 38 CCOPs established with eight clinical cooperative groups in September 1983 and maintained through February 1989. Data are drawn from grantee applications and progress reports. STUDY DESIGN. The study examines how different types of CCOP-cooperative group exchange relate to one another and to CCOP patient accruals over six time points. Key independent variables include resource dependence, information exchange (i.e., meeting attendance and committee membership), and protocol exchange (i.e., the number of different protocols used). DATA COLLECTION METHODS. Data extracted from secondary sources were entered in a data base. PRINCIPAL FINDINGS. The number of CCOP physicians and support staff who attend cooperative group meetings during the first two years of a clinical research partnership has a significant influence on meeting attendance and protocol use in later years. Two-thirds or more of the variance in patient accruals at each time point can be explained by the number of different protocols used and the number of CCOP representatives serving on cooperative group committees (or attending cooperative group meetings). CONCLUSIONS. The findings highlight the importance of historical relationships and anticipated resource dependence in shaping initial exchange patterns. They also suggest that strategic partnerships need to emphasize structures and processes that encourage early involvement in collaborative activities and that reward participants for maintaining high levels of interaction. PMID:8407338

  7. Application of Metagenomic Sequencing to Food Safety: Detection of Shiga Toxin-Producing Escherichia coli on Fresh Bagged Spinach

    PubMed Central

    Leonard, Susan R.; Mammel, Mark K.; Lacher, David W.

    2015-01-01

    Culture-independent diagnostics reduce the reliance on traditional (and slower) culture-based methodologies. Here we capitalize on advances in next-generation sequencing (NGS) to apply this approach to food pathogen detection utilizing NGS as an analytical tool. In this study, spiking spinach with Shiga toxin-producing Escherichia coli (STEC) following an established FDA culture-based protocol was used in conjunction with shotgun metagenomic sequencing to determine the limits of detection, sensitivity, and specificity levels and to obtain information on the microbiology of the protocol. We show that an expected level of contamination (∼10 CFU/100 g) could be adequately detected (including key virulence determinants and strain-level specificity) within 8 h of enrichment at a sequencing depth of 10,000,000 reads. We also rationalize the relative benefit of static versus shaking culture conditions and the addition of selected antimicrobial agents, thereby validating the long-standing culture-based parameters behind such protocols. Moreover, the shotgun metagenomic approach was informative regarding the dynamics of microbial communities during the enrichment process, including initial surveys of the microbial loads associated with bagged spinach; the microbes found included key genera such as Pseudomonas, Pantoea, and Exiguobacterium. Collectively, our metagenomic study highlights and considers various parameters required for transitioning to such sequencing-based diagnostics for food safety and the potential to develop better enrichment processes in a high-throughput manner not previously possible. Future studies will investigate new species-specific DNA signature target regimens, rational design of medium components in concert with judicious use of additives, such as antibiotics, and alterations in the sample processing protocol to enhance detection. PMID:26386062

  8. Recolonization of the oral cavity by Streptococcus mutans after a combined mechanical/chemical antisepsis protocol.

    PubMed

    Farina, R; Squarzoni, M A; Calura, G; Trombelli, L

    2009-06-01

    The bacterial colonization of teeth by Streptococcus mutans (StrepM) represents a major risk factor for the development of dental caries. At present, no clinical studies have explored the effect of a combined mechanical-chemical antisepsis protocol in a periodontally-healthy population and the pattern of recolonization of StrepM in subjects whose StrepM infection was successfully eradicated. The present study was designed in order to 1) determine the salivary and plaque changes in StrepM content after a combined mechanical/chemical antisepsis protocol; and 2) evaluate the pattern of recolonization when StrepM was successfully eradicated from saliva and plaque. Thirty-five periodontally-healthy and caries-susceptible subjects successfully entered and concluded the study. At baseline, non-surgical periodontal therapy was performed according to the principles of full mouth disinfection. Adjunctive home-based rinsing with a 0.2% chlorhexidine mouthrinse was requested for the following week. StrepM concentration was assessed in saliva and plaque at the initial contact appointment, at baseline, and 1-week, 1-month, 3-month and 6-month follow-up. A significant effect of ''time'' on StrepM concentration in saliva and plaque was observed (P<0.000). In subjects with successful eradication of StrepM at 1 week (N=17 plaque samples), StrepM infection recurrence occurred within 3-6 months. The results of the present study demonstrated that 1) the application of the investigated mechanical/chemical antisepsis protocol can effectively reduce StrepM colonies in saliva and plaque of periodontally healthy subjects; and 2) in plaque samples, StrepM infection recurrence tends to occur within 3-6 months.

  9. Intelligent device management in the selfcare marketplace.

    PubMed

    Biniaris, Christos G; Marsh, Andrew J

    2008-01-01

    Over the last ten years the Internet has emerged as a key infrastructure for service innovation, enabling IP (Internet Protocol) to become the wide area network communication protocol of choice. The natural result of this choice is that service providers and their customers are looking for ways to optimise costs by migrating existing services and applications onto IP as well. A good example is the medical industry, which is transitioning to Internet-based communications as the field of telemedicine broadens to preventative and self healthcare. However, technology is changing quickly and consumers face an array of choices to satisfy their healthcare needs with numerous devices from different vendors. Seamless healthcare device networking can play a major role in automating and safeguarding the process of collecting and transferring medical data, remote patient monitoring and reducing costs through remote equipment monitoring. In this scope, we describe an approach augmenting the Session Initiation Protocol (SIP) with healthcare services in order to form a framework for efficient collection and storage of measurements, aiming to address the issues of the lack of a standardised data interface for consumer healthcare technologies (including hardware and protocols) and the lack of a standardised format for self-collected healthcare data (including the storage medium). In this framework, measurements can be seamlessly collected and stored as XML notes located virtually anywhere, such as the user's home or mobile device. Additionally, these notes can be accessed locally or remotely by doctors and specialists. Also, we discuss how this approach supports user mobility by proxying and redirecting requests to the user's current location and how it can remove the complexity of using consumer healthcare technologies from different vendors connected to different devices and the opportunities for Independent Software Vendors to develop additional services.

  10. Microdose flare protocol with interrupted follicle stimulating hormone and added androgen for poor responders--an observational pilot study.

    PubMed

    Mitri, Frederic; Behan, Lucy Ann; Murphy, Courtney A; Hershko-Klement, Anat; Casper, Robert F; Bentov, Yaakov

    2016-01-01

    To investigate whether temporarily withholding FSH and adding androgen could improve follicular response during a microdose flare protocol in women with slow follicular growth or asynchronous follicular development. Observational pilot study. University-affiliated private fertility center. Twenty-six women aged 34-47 years with poor response to stimulation or a previous cancelled IVF cycle and with slow or asynchronous follicular growth during a microdose flare cycle. For 13 women, after initiation of ovarian stimulation using the microdose flare protocol, gonadotropin administration was interrupted and transdermal testosterone gel was added for several days (4.4 ± 1.2 d) starting after cycle day 7 (mean cycle day 10 ± 2.6). FSH, E2, follicular growth, and total number of mature oocytes retrieved were determined for all of the patients. Cycle cancellation rate as well as pregnancy rate following embryo transfer were also documented when applicable. FSH levels declined (25.2 ± 6.5 to 6.8 ± 3.2 IU/L), E2 levels increased (896 ± 687 to 2,163 ± 1,667 pmol/L), and follicular growth improved significantly during gonadotropin interruption and were tracked for 2 days during this time frame. The average number of oocytes retrieved was 5.3 ± 2.6, and the ratio of mature to total oocytes was 4:5. Four of the 13 women in the interruption group conceived following frozen embryo transfer, whereas none in the control group did. The androgen-interrupted FSH protocol may improve follicular response to gonadotropins in cycles that might otherwise be cancelled. Copyright © 2016 American Society for Reproductive Medicine. Published by Elsevier Inc. All rights reserved.

  11. Distributed synchronization of networked drive-response systems: A nonlinear fixed-time protocol.

    PubMed

    Zhao, Wen; Liu, Gang; Ma, Xi; He, Bing; Dong, Yunfeng

    2017-11-01

    The distributed synchronization of networked drive-response systems is investigated in this paper. A novel nonlinear protocol is proposed to ensure that the tracking errors converge to zeros in a fixed-time. By comparison with previous synchronization methods, the present method considers more practical conditions and the synchronization time is not dependent of arbitrary initial conditions but can be offline pre-assign according to the task assignment. Finally, the feasibility and validity of the presented protocol have been illustrated by a numerical simulation. Copyright © 2017. Published by Elsevier Ltd.

  12. LAN (Local Area Network) Interoperability Study of Protocols Needed for Distributed Command and Control

    DTIC Science & Technology

    1985-03-01

    model referred to by the study group . IMCKIiN cuINICATION 31215FOR SDATA TWSU•l Sa *BSTtEO POOTO• AA14FTICT’WI PEM1 ITS ...operating systems, compared the DOD and ISO networking protocol architecture models , the protocols for LAN’s developed by the IEEE and ANSI, reviewed and...be initiated, so as to provide the Air Force a roadmap to guide its * "technology develop •ents. 4,’ �/LAN 3-4 .°. SECTION 4.0

  13. A survey of critical care nurses' practices and perceptions surrounding early intravenous antibiotic initiation during septic shock.

    PubMed

    Roberts, Russel J; Alhammad, Abdullah M; Crossley, Lindsay; Anketell, Eric; Wood, LeeAnn; Schumaker, Greg; Garpestad, Erik; Devlin, John W

    2017-08-01

    Delays in antibiotic administration after severe sepsis recognition increases mortality. While physician and pharmacy-related barriers to early antibiotic initiation have been well evaluated, those factors that affect the speed by which critical care nurses working in either the emergency department or the intensive care unit setting initiate antibiotic therapy remains poorly characterized. To evaluate the knowledge, practices and perceptions of critical care nurses regarding antibiotic initiation in patients with newly recognised septic shock. A validated survey was distributed to 122 critical care nurses at one 320-bed academic institution with a sepsis protocol advocating intravenous(IV) antibiotic initiation within 1hour of shock recognition. Among 100 (82%) critical care nurses responding, nearly all (98%) knew of the existence of the sepsis protocol. However, many critical care nurses stated they would optimise blood pressure [with either fluid (38%) or both fluid and a vasopressor (23%)] before antibiotic initiation. Communicated barriers to rapid antibiotic initiation included: excessive patient workload (74%), lack of awareness IV antibiotic(s) ordered (57%) or delivered (69%), need for administration of multiple non-antibiotic IV medications (54%) and no IV access (51%). Multiple nurse-related factors influence IV antibiotic(s) initiation speed and should be incorporated into sepsis quality improvement efforts. Copyright © 2017 Elsevier Ltd. All rights reserved.

  14. The Rockefeller University Navigation Program: A Structured Multidisciplinary Protocol Development and Educational Program to Advance Translational Research

    PubMed Central

    Kost, Rhonda G.; Dowd, Kathleen A.; Hurley, Arlene M.; Rainer, Tyler‐Lauren; Coller, Barry S.

    2014-01-01

    Abstract The development of translational clinical research protocols is complex. To assist investigators, we developed a structured supportive guidance process (Navigation) to expedite protocol development to the standards of good clinical practice (GCP), focusing on research ethics and integrity. Navigation consists of experienced research coordinators leading investigators through a concerted multistep protocol development process from concept initiation to submission of the final protocol. To assess the effectiveness of Navigation, we collect data on the experience of investigators, the intensity of support required for protocol development, IRB review outcomes, and protocol start and completion dates. One hundred forty‐four protocols underwent Navigation and achieved IRB approval since the program began in 2007, including 37 led by trainee investigators, 26 led by MDs, 9 by MD/PhDs, 57 by PhDs, and 12 by investigators with other credentials (e.g., RN, MPH). In every year, more than 50% of Navigated protocols were approved by the IRB within 30 days. For trainees who had more than one protocol navigated, the intensity of Navigation support required decreased over time. Navigation can increase access to translational studies for basic scientists, facilitate GCP training for investigators, and accelerate development and approval of protocols of high ethical and scientific quality. PMID:24405608

  15. CSDMS2.0: Computational Infrastructure for Community Surface Dynamics Modeling

    NASA Astrophysics Data System (ADS)

    Syvitski, J. P.; Hutton, E.; Peckham, S. D.; Overeem, I.; Kettner, A.

    2012-12-01

    The Community Surface Dynamic Modeling System (CSDMS) is an NSF-supported, international and community-driven program that seeks to transform the science and practice of earth-surface dynamics modeling. CSDMS integrates a diverse community of more than 850 geoscientists representing 360 international institutions (academic, government, industry) from 60 countries and is supported by a CSDMS Interagency Committee (22 Federal agencies), and a CSDMS Industrial Consortia (18 companies). CSDMS presently distributes more 200 Open Source models and modeling tools, access to high performance computing clusters in support of developing and running models, and a suite of products for education and knowledge transfer. CSDMS software architecture employs frameworks and services that convert stand-alone models into flexible "plug-and-play" components to be assembled into larger applications. CSDMS2.0 will support model applications within a web browser, on a wider variety of computational platforms, and on other high performance computing clusters to ensure robustness and sustainability of the framework. Conversion of stand-alone models into "plug-and-play" components will employ automated wrapping tools. Methods for quantifying model uncertainty are being adapted as part of the modeling framework. Benchmarking data is being incorporated into the CSDMS modeling framework to support model inter-comparison. Finally, a robust mechanism for ingesting and utilizing semantic mediation databases is being developed within the Modeling Framework. Six new community initiatives are being pursued: 1) an earth - ecosystem modeling initiative to capture ecosystem dynamics and ensuing interactions with landscapes, 2) a geodynamics initiative to investigate the interplay among climate, geomorphology, and tectonic processes, 3) an Anthropocene modeling initiative, to incorporate mechanistic models of human influences, 4) a coastal vulnerability modeling initiative, with emphasis on deltas and their multiple threats and stressors, 5) a continental margin modeling initiative, to capture extreme oceanic and atmospheric events generating turbidity currents in the Gulf of Mexico, and 6) a CZO Focus Research Group, to develop compatibility between CSDMS architecture and protocols and Critical Zone Observatory-developed models and data.

  16. Cryotherapy for acute ankle sprains: a randomised controlled study of two different icing protocols

    PubMed Central

    Bleakley, C M; McDonough, S M; MacAuley, D C

    2006-01-01

    Background The use of cryotherapy in the management of acute soft tissue injury is largely based on anecdotal evidence. Preliminary evidence suggests that intermittent cryotherapy applications are most effective at reducing tissue temperature to optimal therapeutic levels. However, its efficacy in treating injured human subjects is not yet known. Objective : To compare the efficacy of an intermittent cryotherapy treatment protocol with a standard cryotherapy treatment protocol in the management of acute ankle sprains. Subjects Sportsmen (n  =  44) and members of the general public (n  =  45) with mild/moderate acute ankle sprains. Methods Subjects were randomly allocated, under strictly controlled double blind conditions, to one of two treatment groups: standard ice application (n  =  46) or intermittent ice application (n  =  43). The mode of cryotherapy was standardised across groups and consisted of melting iced water (0°C) in a standardised pack. Function, pain, and swelling were recorded at baseline and one, two, three, four, and six weeks after injury. Results Subjects treated with the intermittent protocol had significantly (p<0.05) less ankle pain on activity than those using a standard 20 minute protocol; however, one week after ankle injury, there were no significant differences between groups in terms of function, swelling, or pain at rest. Conclusion Intermittent applications may enhance the therapeutic effect of ice in pain relief after acute soft tissue injury. PMID:16611722

  17. Further developments in generating type-safe messaging

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Neswold, R.; King, C.; /Fermilab

    2011-11-01

    At ICALEPCS 09, we introduced a source code generator that allows processes to communicate safely using data types native to each host language. In this paper, we discuss further development that has occurred since the conference in Kobe, Japan, including the addition of three more client languages, an optimization in network packet size and the addition of a new protocol data type. The protocol compiler is continuing to prove itself as an easy and robust way to get applications written in different languages hosted on different computer architectures to communicate. We have two active Erlang projects that are using themore » protocol compiler to access ACNET data at high data rates. We also used the protocol compiler output to deliver ACNET data to an iPhone/iPad application. Since it takes an average of two weeks to support a new language, we're willing to expand the protocol compiler to support new languages that our community uses.« less

  18. New mechanism of spiral wave initiation in a reaction-diffusion-mechanics system.

    PubMed

    Weise, Louis D; Panfilov, Alexander V

    2011-01-01

    Spiral wave initiation in the heart muscle is a mechanism for the onset of dangerous cardiac arrhythmias. A standard protocol for spiral wave initiation is the application of a stimulus in the refractory tail of a propagating excitation wave, a region that we call the "classical vulnerable zone." Previous studies of vulnerability to spiral wave initiation did not take the influence of deformation into account, which has been shown to have a substantial effect on the excitation process of cardiomyocytes via the mechano-electrical feedback phenomenon. In this work we study the effect of deformation on the vulnerability of excitable media in a discrete reaction-diffusion-mechanics (dRDM) model. The dRDM model combines FitzHugh-Nagumo type equations for cardiac excitation with a discrete mechanical description of a finite-elastic isotropic material (Seth material) to model cardiac excitation-contraction coupling and stretch activated depolarizing current. We show that deformation alters the "classical," and forms a new vulnerable zone at longer coupling intervals. This mechanically caused vulnerable zone results in a new mechanism of spiral wave initiation, where unidirectional conduction block and rotation directions of the consequently initiated spiral waves are opposite compared to the mechanism of spiral wave initiation due to the "classical vulnerable zone." We show that this new mechanism of spiral wave initiation can naturally occur in situations that involve wave fronts with curvature, and discuss its relation to supernormal excitability of cardiac tissue. The concept of mechanically induced vulnerability may lead to a better understanding about the onset of dangerous heart arrhythmias via mechano-electrical feedback.

  19. 40 CFR 82.13 - Recordkeeping and reporting requirements for class I controlled substances.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... petition is contrary to other provisions in the Vienna Convention or the Montreal Protocol; (D) If the..., by the producer and or by other U.S. companies, to a Party to the Protocol that will be transformed... to the Protocol that will be used solely for quarantine and preshipment applications and therefore...

  20. 40 CFR 82.13 - Recordkeeping and reporting requirements for class I controlled substances.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... petition is contrary to other provisions in the Vienna Convention or the Montreal Protocol; (D) If the..., by the producer and or by other U.S. companies, to a Party to the Protocol that will be transformed... to the Protocol that will be used solely for quarantine and preshipment applications and therefore...

  1. Method of Performance-Aware Security of Unicast Communication in Hybrid Satellite Networks

    NASA Technical Reports Server (NTRS)

    Baras, John S. (Inventor); Roy-Chowdhury, Ayan (Inventor)

    2014-01-01

    A method and apparatus utilizes Layered IPSEC (LES) protocol as an alternative to IPSEC for network-layer security including a modification to the Internet Key Exchange protocol. For application-level security of web browsing with acceptable end-to-end delay, the Dual-mode SSL protocol (DSSL) is used instead of SSL. The LES and DSSL protocols achieve desired end-to-end communication security while allowing the TCP and HTTP proxy servers to function correctly.

  2. Cetuximab-induced skin exanthema: Improvement by a reactive skin therapy.

    PubMed

    Schimanski, Carl C; Moehler, Markus; Zimmermann, Tim; Wörns, Markus A; Steinbach, Alma; Baum, Michael; Galle, Peter R

    2010-01-01

    More than 80% of patients treated with cetuximab develop an acneiform follicular skin exanthema. Grade 3 exanthema develops in 9-19% of these cases, bearing the risk of cetuximab dose-reduction or cessation. We retrospectively analysed a cohort of 20 patients treated with cetuximab and an in-house reactive skin protocol upon development of an exanthema. The reactive skin protocol was built up as follows: grade 1 exanthema: topical cleansing syndet (Dermowas®) + topical metronidazole cream (Rosiced®); grade 2 exanthema: grade 1 treatment + oral minocycline 50 mg twice per day; grade 3 exanthema: grade 2 treatment + topical corticoid (Dermatop®) + topical nadifloxacin (Nadixa®). As soon as a grade 3 had improved to a grade less than or equal to 2, the application of the topical corticoid was ceased. During the initial 12 weeks of therapy with cetuximab, all patients developed a skin exanthema (20/20; 100%). Of these, 2 patients (10%) developed a grade 3 exanthema, 10 patients (50%) experienced a grade 2 and 8 patients (40%) a grade 1 exanthema. Time to onset ranged from 1 to 4 weeks, with the average time to onset being 2.8 weeks. Applying the reactive skin protocol after the first occurrence of an exanthema, the grade of exanthema was downgraded as follows: no patients (0%) had a persisting grade 3 exanthema, while only 2 patients (10%) experienced a persisting grade 2 exanthema and 8 patients (40%) a persisting grade 1 exanthema. In the majority of cases (10 patients; 50%), the reactive skin protocol completely controlled the exanthema (grade 0). The average time to exanthema reduction by one grade was 9.5 days. No dose reductions of cetuximab were necessary. Cetuximab-induced skin exanthema is effectively managed by applying our reactive protocol. The simple protocol is based on a topical cleansing syndet and topical metronidazole and is to be intensified by the addition of oral minocycline, a topical corticoid and topical nadifloxacine, in cases of high-grade exanthema. More comprehensive results are expected from a prospective study with higher patient numbers that is currently being planned.

  3. Performance Analysis of the IEEE 802.11p Multichannel MAC Protocol in Vehicular Ad Hoc Networks

    PubMed Central

    2017-01-01

    Vehicular Ad Hoc Networks (VANETs) employ multichannel to provide a variety of safety and non-safety applications, based on the IEEE 802.11p and IEEE 1609.4 protocols. The safety applications require timely and reliable transmissions, while the non-safety applications require efficient and high throughput. In the IEEE 1609.4 protocol, operating interval is divided into alternating Control Channel (CCH) interval and Service Channel (SCH) interval with an identical length. During the CCH interval, nodes transmit safety-related messages and control messages, and Enhanced Distributed Channel Access (EDCA) mechanism is employed to allow four Access Categories (ACs) within a station with different priorities according to their criticality for the vehicle’s safety. During the SCH interval, the non-safety massages are transmitted. An analytical model is proposed in this paper to evaluate performance, reliability and efficiency of the IEEE 802.11p and IEEE 1609.4 protocols. The proposed model improves the existing work by taking serval aspects and the character of multichannel switching into design consideration. Extensive performance evaluations based on analysis and simulation help to validate the accuracy of the proposed model and analyze the capabilities and limitations of the IEEE 802.11p and IEEE 1609.4 protocols, and enhancement suggestions are given. PMID:29231882

  4. Performance Analysis of the IEEE 802.11p Multichannel MAC Protocol in Vehicular Ad Hoc Networks.

    PubMed

    Song, Caixia

    2017-12-12

    Vehicular Ad Hoc Networks (VANETs) employ multichannel to provide a variety of safety and non-safety applications, based on the IEEE 802.11p and IEEE 1609.4 protocols. The safety applications require timely and reliable transmissions, while the non-safety applications require efficient and high throughput. In the IEEE 1609.4 protocol, operating interval is divided into alternating Control Channel (CCH) interval and Service Channel (SCH) interval with an identical length. During the CCH interval, nodes transmit safety-related messages and control messages, and Enhanced Distributed Channel Access (EDCA) mechanism is employed to allow four Access Categories (ACs) within a station with different priorities according to their criticality for the vehicle's safety. During the SCH interval, the non-safety massages are transmitted. An analytical model is proposed in this paper to evaluate performance, reliability and efficiency of the IEEE 802.11p and IEEE 1609.4 protocols. The proposed model improves the existing work by taking serval aspects and the character of multichannel switching into design consideration. Extensive performance evaluations based on analysis and simulation help to validate the accuracy of the proposed model and analyze the capabilities and limitations of the IEEE 802.11p and IEEE 1609.4 protocols, and enhancement suggestions are given.

  5. ATM QoS Experiments Using TCP Applications: Performance of TCP/IP Over ATM in a Variety of Errored Links

    NASA Technical Reports Server (NTRS)

    Frantz, Brian D.; Ivancic, William D.

    2001-01-01

    Asynchronous Transfer Mode (ATM) Quality of Service (QoS) experiments using the Transmission Control Protocol/Internet Protocol (TCP/IP) were performed for various link delays. The link delay was set to emulate a Wide Area Network (WAN) and a Satellite Link. The purpose of these experiments was to evaluate the ATM QoS requirements for applications that utilize advance TCP/IP protocols implemented with large windows and Selective ACKnowledgements (SACK). The effects of cell error, cell loss, and random bit errors on throughput were reported. The detailed test plan and test results are presented herein.

  6. Prevention of Tinea Corporis in Collegiate Wrestlers

    PubMed Central

    Hand, James W.; Wroble, Randall R.

    1999-01-01

    Objective: To examine the role of a comprehensive skin disease prevention protocol in conjunction with the use of a barrier cream to prevent tinea corporis (ringworm) in collegiate wrestlers. Design and Setting: We studied a college wrestling team for 16 weeks during 1 season. During the first 8 weeks, no preventive measures were taken. For the remaining 8 weeks, wrestlers were randomized into 2 groups and used either a barrier or a placebo. Subjects: Twenty-two male college wrestlers with a mean age of 20.4 years (range, 18.1 to 23.2), a mean weight of 68.4 kg (range, 55.8 to 130.2), and a mean height of 177.8 cm (range, 168.7 to 186.9). Measurements: We performed skin checks daily. All new or exacerbated lesions were clinically diagnosed by the same team physician and recorded. Results: Cases of tinea corporis declined from 10 diagnosed before initiation of the protocol to 1 after the protocol was initiated. One athlete in the placebo group was found to have tinea corporis versus none in the barrier cream group. Conclusions: Strict adherence to the prevention protocol for skin infections significantly decreased the number of cases of tinea corporis. The use of the barrier cream in conjunction with the prevention protocol did not result in any further statistical reduction in the number of wrestlers who contracted tinea corporis. PMID:16558587

  7. Distillation of Bell states in open systems

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Isasi, E.; Mundarain, D.

    2010-04-15

    In this work we show that the distillation protocol proposed by P. Chen et al. [Phys. Rev. A 54, 3824 (1996)] allows one to distill Bell states at any time for a system evolving in vacuum and prepared in an initial singlet. It is also shown that the same protocol, applied in nonzero temperature thermal baths, yields a considerable recovering of entanglement.

  8. Management of paediatric periorbital cellulitis: Our experience of 243 children managed according to a standardised protocol 2012-2015.

    PubMed

    Crosbie, Robin A; Nairn, Jonathan; Kubba, Haytham

    2016-08-01

    Paediatric periorbital cellulitis is a common condition. Accurate assessment can be challenging and appropriate use of CT imaging is essential. We audited admissions to our unit over a four year period, with reference to CT scanning and adherence to our protocol. Retrospective audit of paediatric patients admitted with periorbital cellulitis, 2012-2015. Total of 243 patients included, mean age 4.7 years with slight male predominance, the median length of admission was 2 days. 48/243 (20%) underwent CT during admission, 25 (52%) of these underwent surgical drainage. As per protocol, CT brain performed with all orbital scans; no positive intracranial findings on any initial scan. Three children developed intracranial complications subsequently; all treated with antibiotics. Our re-admission rate within 30 days was 2.5%. Our audit demonstrates benefit of standardising practice and the low CT rate, with high percentage taken to theatre and no missed abscesses, supports the protocol. There may be an argument to avoid CT brain routinely in all initial imaging sequences in those children without neurological signs or symptoms. Copyright © 2016 Elsevier Ireland Ltd. All rights reserved.

  9. Defining Hand Stereotypies in Rett Syndrome: A Movement Disorders Perspective.

    PubMed

    Dy, Marisela E; Waugh, Jeff L; Sharma, Nutan; O'Leary, Heather; Kapur, Kush; D'Gama, Alissa M; Sahin, Mustafa; Urion, David K; Kaufmann, Walter E

    2017-10-01

    Hand stereotypies (HS) are a primary diagnostic criterion for Rett syndrome (RTT) but are difficult to characterize and quantify systematically. We collected video on 27 girls (2-12 years of age) with classic RTT who participated in a mecasermin trial. The present study focused exclusively on video analyses, by reviewing two five-minute windows per subject to identify the two most common HS. Three raters with expertise in movement disorders independently rated the five-minute windows using standardized terminology to determine the level of agreement. We iteratively refined the protocol in three stages to improve descriptive accuracy, categorizing HS as "central" or "peripheral," "simple" or "complex," scoring each hand separately. Inter-rater agreement was analyzed using Kappa statistics. In the initial protocol evaluating HS by video, inter-rater agreement was 20.7%. In the final protocol, inter-rater agreement for the two most frequent HS was higher than the initial protocol at 50%. Phenotypic variability makes standardized evaluation of HS in RTT a challenge; we achieved only 50% level of agreement and only for the most frequent HS. Therefore, objective measures are needed to evaluate HS. Copyright © 2017 Elsevier Inc. All rights reserved.

  10. Effect of modulated ultrasound parameters on ultrasound-induced thrombolysis.

    PubMed

    Soltani, Azita; Volz, Kim R; Hansmann, Doulas R

    2008-12-07

    The potential of ultrasound to enhance enzyme-mediated thrombolysis by application of constant operating parameters (COP) has been widely demonstrated. In this study, the effect of ultrasound with modulated operating parameters (MOP) on enzyme-mediated thrombolysis was investigated. The MOP protocol was applied to an in vitro model of thrombolysis. The results were compared to a COP with the equivalent soft tissue thermal index (TIS) over the duration of ultrasound exposure of 30 min (p < 0.14). To explore potential differences in the mechanism responsible for ultrasound-induced thrombolysis, a perfusion model was used to measure changes in average fibrin pore size of clot before, after and during exposure to MOP and COP protocols and cavitational activity was monitored in real time for both protocols using a passive cavitation detection system. The relative lysis enhancement by each COP and MOP protocol compared to alteplase alone yielded values of 33.69 +/- 12.09% and 63.89 +/- 15.02% in a thrombolysis model, respectively (p < 0.007). Both COP and MOP protocols caused an equivalent significant increase in average clot pore size of 2.09 x 10(-2) +/- 0.01 microm and 1.99 x 10(-2) +/- 0.004 microm, respectively (p < 0.74). No signatures of inertial or stable cavitation were observed for either acoustic protocol. In conclusion, due to mechanisms other than cavitation, application of ultrasound with modulated operating parameters has the potential to significantly enhance the relative lysis enhancement compared to application of ultrasound with constant operating parameters.

  11. International Standardization of the Clinical Dosimetry of Beta Radiation Brachytherapy Sources: Progress of an ISO Standard

    NASA Astrophysics Data System (ADS)

    Soares, Christopher

    2006-03-01

    In 2004 a new work item proposal (NWIP) was accepted by the International Organization for Standardization (ISO) Technical Committee 85 (TC85 -- Nuclear Energy), Subcommittee 2 (Radiation Protection) for the development of a standard for the clinical dosimetry of beta radiation sources used for brachytherapy. To develop this standard, a new Working Group (WG 22 - Ionizing Radiation Dosimetry and Protocols in Medical Applications) was formed. The standard is based on the work of an ad-hoc working group initiated by the Dosimetry task group of the Deutsches Insitiut für Normung (DIN). Initially the work was geared mainly towards the needs of intravascular brachytherapy, but with the decline of this application, more focus has been placed on the challenges of accurate dosimetry for the concave eye plaques used to treat ocular melanoma. Guidance is given for dosimetry formalisms, reference data to be used, calibrations, measurement methods, modeling, uncertainty determinations, treatment planning and reporting, and clinical quality control. The document is currently undergoing review by the ISO member bodies for acceptance as a Committee Draft (CD) with publication of the final standard expected by 2007. There are opportunities for other ISO standards for medical dosimetry within the framework of WG22.

  12. A secure RFID authentication protocol adopting error correction code.

    PubMed

    Chen, Chien-Ming; Chen, Shuai-Min; Zheng, Xinying; Chen, Pei-Yu; Sun, Hung-Min

    2014-01-01

    RFID technology has become popular in many applications; however, most of the RFID products lack security related functionality due to the hardware limitation of the low-cost RFID tags. In this paper, we propose a lightweight mutual authentication protocol adopting error correction code for RFID. Besides, we also propose an advanced version of our protocol to provide key updating. Based on the secrecy of shared keys, the reader and the tag can establish a mutual authenticity relationship. Further analysis of the protocol showed that it also satisfies integrity, forward secrecy, anonymity, and untraceability. Compared with other lightweight protocols, the proposed protocol provides stronger resistance to tracing attacks, compromising attacks and replay attacks. We also compare our protocol with previous works in terms of performance.

  13. A Secure RFID Authentication Protocol Adopting Error Correction Code

    PubMed Central

    Zheng, Xinying; Chen, Pei-Yu

    2014-01-01

    RFID technology has become popular in many applications; however, most of the RFID products lack security related functionality due to the hardware limitation of the low-cost RFID tags. In this paper, we propose a lightweight mutual authentication protocol adopting error correction code for RFID. Besides, we also propose an advanced version of our protocol to provide key updating. Based on the secrecy of shared keys, the reader and the tag can establish a mutual authenticity relationship. Further analysis of the protocol showed that it also satisfies integrity, forward secrecy, anonymity, and untraceability. Compared with other lightweight protocols, the proposed protocol provides stronger resistance to tracing attacks, compromising attacks and replay attacks. We also compare our protocol with previous works in terms of performance. PMID:24959619

  14. Managing pregnancy of unknown location based on initial serum progesterone and serial serum hCG levels: development and validation of a two-step triage protocol.

    PubMed

    Van Calster, B; Bobdiwala, S; Guha, S; Van Hoorde, K; Al-Memar, M; Harvey, R; Farren, J; Kirk, E; Condous, G; Sur, S; Stalder, C; Timmerman, D; Bourne, T

    2016-11-01

    A uniform rationalized management protocol for pregnancies of unknown location (PUL) is lacking. We developed a two-step triage protocol to select PUL at high risk of ectopic pregnancy (EP), based on serum progesterone level at presentation (step 1) and the serum human chorionic gonadotropin (hCG) ratio, defined as the ratio of hCG at 48 h to hCG at presentation (step 2). This was a cohort study of 2753 PUL (301 EP), involving a secondary analysis of prospectively and consecutively collected PUL data from two London-based university teaching hospitals. Using a chronological split we used 1449 PUL for development and 1304 for validation. We aimed to assign PUL as low risk with high confidence (high negative predictive value (NPV)) while classifying most EP as high risk (high sensitivity). The first triage step assigned PUL as low risk using a threshold of serum progesterone at presentation. The remaining PUL were triaged using a novel logistic regression risk model based on hCG ratio and initial serum progesterone (second step), defining low risk as an estimated EP risk of < 5%. On validation, initial serum progesterone ≤ 2 nmol/L (step 1) classified 16.1% PUL as low risk. Second-step classification with the risk model selected an additional 46.0% of all PUL as low risk. Overall, the two-step protocol classified 62.1% of PUL as low risk, with an NPV of 98.6% and a sensitivity of 92.0%. When the risk model was used in isolation (i.e. without the first step), 60.5% of PUL were classified as low risk with 99.1% NPV and 94.9% sensitivity. PUL can be classified efficiently into being either high or low risk for complications using a two-step protocol involving initial progesterone and hCG levels and the hCG ratio. Copyright © 2016 ISUOG. Published by John Wiley & Sons Ltd. Copyright © 2016 ISUOG. Published by John Wiley & Sons Ltd.

  15. Effects of a Short Drilling Implant Protocol on Osteotomy Site Temperature and Drill Torque.

    PubMed

    Mihali, Sorin G; Canjau, Silvana; Cernescu, Anghel; Bortun, Cristina M; Wang, Hom-Lay; Bratu, Emanuel

    2018-02-01

    To establish a protocol for reducing the drilling sequence during implant site preparation based on temperature and insertion torque. The traditional conventional drilling sequence (used several drills with 0.6-mm increment each time) was compared with the proposed short drilling protocol (only used 2 drills: initial and final drill). One hundred drilling osteotomies were performed in bovine and porcine bones. Sets of 2 osteotomy sites were created in 5 bone densities using 2 types of drilling protocols. Thermographic pictures were captured throughout all drilling procedures and analyzed using ThermaCAM Researcher Professional 2.10. Torque values were determined during drilling by measuring electrical input and drill speed. There were statistically significant differences in bone temperature between the conventional and short drilling protocols during implant site preparation (analysis of variance P = 0.0008). However, there were no significant differences between the 2 types of drilling protocols for both implant diameters. Implant site preparation time was significantly reduced when using the short drilling protocol compared with the conventional drilling protocol (P < 0.001). Within the limitations of the study, the short drilling protocol proposed herein may represent a safe approach for implant site preparation.

  16. SU-F-P-04: Implementation of Dose Monitoring Software: Successes and Pitfalls

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Och, J

    2016-06-15

    Purpose: to successfully install a dose monitoring software (DMS) application to assist in CT protocol and dose management. Methods: Upon selecting the DMS, we began our implementation of the application. A working group composed of Medical Physics, Radiology Administration, Information Technology, and CT technologists was formed. On-site training in the application was supplied by the vendor. The decision was made to apply the process for all the CT protocols on all platforms at all facilities. Protocols were painstakingly mapped to the correct masters, and the system went ‘live’. Results: We are routinely using DMS as a tool in our Clinicalmore » Performance CT QA program. It is useful in determining the effectiveness of revisions to existing protocols, and establishing performance baselines for new units. However, the implementation was not without difficulty. We identified several pitfalls and obstacles which frustrated progress. Including: Training deficiencies, Nomenclature problems, Communication, DICOM variability. Conclusion: Dose monitoring software can be a potent tool for QA. However, implementation of the program can be problematic and requires planning, organization and commitment.« less

  17. ShareSync: A Solution for Deterministic Data Sharing over Ethernet

    NASA Technical Reports Server (NTRS)

    Dunn, Daniel J., II; Koons, William A.; Kennedy, Richard D.; Davis, Philip A.

    2007-01-01

    As part of upgrading the Contact Dynamics Simulation Laboratory (CDSL) at the NASA Marshall Space Flight Center (MSFC), a simple, cost effective method was needed to communicate data among the networked simulation machines and I/O controllers used to run the facility. To fill this need and similar applicable situations, a generic protocol was developed, called ShareSync. ShareSync is a lightweight, real-time, publish-subscribe Ethernet protocol for simple and deterministic data sharing across diverse machines and operating systems. ShareSync provides a simple Application Programming Interface (API) for simulation programmers to incorporate into their code. The protocol is compatible with virtually all Ethernet-capable machines, is flexible enough to support a variety of applications, is fast enough to provide soft real-time determinism, and is a low-cost resource for distributed simulation development, deployment, and maintenance. The first design cycle iteration of ShareSync has been completed, and the protocol has undergone several testing procedures including endurance and benchmarking tests and approaches the 2001ts data synchronization design goal for the CDSL.

  18. Effect of Shock Wave Lithotripsy on Renal Hemodynamics

    NASA Astrophysics Data System (ADS)

    Handa, Rajash K.; Willis, Lynn R.; Evan, Andrew P.; Connors, Bret A.

    2008-09-01

    Extracorporeal shock wave lithotripsy (SWL) can injure tissue and decrease blood flow in the SWL-treated kidney, both tissue and functional effects being largely localized to the region targeted with shock waves (SWs). A novel method of limiting SWL-induced tissue injury is to employ the "protection" protocol, where the kidney is pretreated with low-energy SWs prior to the application of a standard clinical dose of high-energy SWs. Resistive index measurements of renal vascular resistance/impedance to blood flow during SWL treatment protocols revealed that a standard clinical dose of high-energy SWs did not alter RI during SW application. However, there was an interaction between low- and high-energy SWL treatment phases of the "protection" protocol such that an increase in RI (vasoconstriction) was observed during the later half of SW application, a time when tissue damage is occurring during the standard high-energy SWL protocol. We suggest that renal vasoconstriction may be responsible for reducing the degree of tissue damage that normally results from a standard clinical dose of high-energy SWs.

  19. Automated genomic DNA purification options in agricultural applications using MagneSil paramagnetic particles

    NASA Astrophysics Data System (ADS)

    Bitner, Rex M.; Koller, Susan C.

    2002-06-01

    The automated high throughput purification of genomic DNA form plant materials can be performed using MagneSil paramagnetic particles on the Beckman-Coulter FX, BioMek 2000, and the Tecan Genesis robot. Similar automated methods are available for DNA purifications from animal blood. These methods eliminate organic extractions, lengthy incubations and cumbersome filter plates. The DNA is suitable for applications such as PCR and RAPD analysis. Methods are described for processing traditionally difficult samples such as those containing large amounts of polyphenolics or oils, while still maintaining a high level of DNA purity. The robotic protocols have ben optimized for agricultural applications such as marker assisted breeding, seed-quality testing, and SNP discovery and scoring. In addition to high yield purification of DNA from plant samples or animal blood, the use of Promega's DNA-IQ purification system is also described. This method allows for the purification of a narrow range of DNA regardless of the amount of additional DNA that is present in the initial sample. This simultaneous Isolation and Quantification of DNA allows the DNA to be used directly in applications such as PCR, SNP analysis, and RAPD, without the need for separate quantitation of the DNA.

  20. Relations between dissipated work and Rényi divergences in the generalized Gibbs ensemble

    NASA Astrophysics Data System (ADS)

    Wei, Bo-Bo

    2018-04-01

    In this work, we show that the dissipation in a many-body system under an arbitrary nonequilibrium process is related to the Rényi divergences between two states along the forward and reversed dynamics under a very general family of initial conditions. This relation generalizes the links between dissipated work and Rényi divergences to quantum systems with conserved quantities whose equilibrium state is described by the generalized Gibbs ensemble. The relation is applicable for quantum systems with conserved quantities and can be applied to protocols driving the system between integrable and chaotic regimes. We demonstrate our ideas by considering the one-dimensional transverse quantum Ising model and the Jaynes-Cummings model which are driven out of equilibrium.

  1. [CERN-MEDICIS (Medical Isotopes Collected from ISOLDE): a new facility].

    PubMed

    Viertl, David; Buchegger, Franz; Prior, John O; Forni, Michel; Morel, Philippe; Ratib, Osman; Bühler Léo H; Stora, Thierry

    2015-06-17

    CERN-MEDICIS is a facility dedicated to research and development in life science and medical applications. The research platform was inaugurated in October 2014 and will produce an increasing range of innovative isotopes using the proton beam of ISOLDE for fundamental studies in cancer research, for new imaging and therapy protocols in cell and animal models and for preclinical trials, possibly extended to specific early phase clinical studies (phase 0) up to phase I trials. CERN, the University Hospital of Geneva (HUG), the University Hospital of Lausanne (CHUV), the Swiss Institute for Experimental Cancer (ISREC) at Swiss Federal Institutes of Technology (EPFL) that currently support the project will benefit of the initial production that will then be extended to other centers.

  2. Subjective perception of cocaine reward in mice assessed by a single exposure place preference (sePP) paradigm.

    PubMed

    Runegaard, Annika H; Jensen, Kathrine Louise; Dencker, Ditte; Wörtwein, Gitta; Gether, Ulrik

    2017-09-01

    The potential of abused drugs to induce addiction and compulsive drug-related behavior is associated with their ability to alter dopamine signaling. Dopamine plays a key role in reward signaling and it has been of great interest to investigate how various drugs of abuse alter reward-related behavior. In rodents, the rewarding effects of drugs have often been assessed in self-administration or place preference paradigms; both involving repeated drug exposure and weeks of training and testing. Our investigation describes a valid approach to assess the initial rewarding effects of cocaine in mice with a single exposure place preference (sePP) paradigm, avoiding repeated drug injections. We present the sePP paradigm with a 3-day protocol to assess the initial rewarding effects of cocaine. Interestingly, only male mice exhibit sePP to cocaine. To assess subsequent drug-related behavior, the protocol was extended by 3days of extinction followed by reinstatement on day 10. The sePP paradigm provides a reliable and convenient approach to assess the initial rewarding effects of cocaine, circumventing the need for repeated drug injections. The sePP protocol allows further dissection of the mechanism and influence of initial cocaine exposure on subsequent drug-related behaviors by including extinction and reinstatement. The lack of sePP in female mice may reflect a biologically relevant sex difference in the initial subjective perception of cocaine-induced reward. This could relate to and explain why males and females have been reported to respond differently to cocaine and cocaine-associated cues. Copyright © 2017 Elsevier B.V. All rights reserved.

  3. Routing Protocols for Underwater Wireless Sensor Networks: Taxonomy, Research Challenges, Routing Strategies and Future Directions.

    PubMed

    Khan, Anwar; Ali, Ihsan; Ghani, Abdullah; Khan, Nawsher; Alsaqer, Mohammed; Rahman, Atiq Ur; Mahmood, Hasan

    2018-05-18

    Recent research in underwater wireless sensor networks (UWSNs) has gained the attention of researchers in academia and industry for a number of applications. They include disaster and earthquake prediction, water quality and environment monitoring, leakage and mine detection, military surveillance and underwater navigation. However, the aquatic medium is associated with a number of limitations and challenges: long multipath delay, high interference and noise, harsh environment, low bandwidth and limited battery life of the sensor nodes. These challenges demand research techniques and strategies to be overcome in an efficient and effective fashion. The design of routing protocols for UWSNs is one of the promising solutions to cope with these challenges. This paper presents a survey of the routing protocols for UWSNs. For the ease of description, the addressed routing protocols are classified into two groups: localization-based and localization-free protocols. These groups are further subdivided according to the problems they address or the major parameters they consider during routing. Unlike the existing surveys, this survey considers only the latest and state-of-the-art routing protocols. In addition, every protocol is described in terms of its routing strategy and the problem it addresses and solves. The merit(s) of each protocol is (are) highlighted along with the cost. A description of the protocols in this fashion has a number of advantages for researchers, as compared to the existing surveys. Firstly, the description of the routing strategy of each protocol makes its routing operation easily understandable. Secondly, the demerit(s) of a protocol provides (provide) insight into overcoming its flaw(s) in future investigation. This, in turn, leads to the foundation of new protocols that are more intelligent, robust and efficient with respect to the desired parameters. Thirdly, a protocol can be selected for the appropriate application based on its described merit(s). Finally, open challenges and research directions are presented for future investigation.

  4. Routing Protocols for Underwater Wireless Sensor Networks: Taxonomy, Research Challenges, Routing Strategies and Future Directions

    PubMed Central

    Ghani, Abdullah; Alsaqer, Mohammed; Rahman, Atiq Ur; Mahmood, Hasan

    2018-01-01

    Recent research in underwater wireless sensor networks (UWSNs) has gained the attention of researchers in academia and industry for a number of applications. They include disaster and earthquake prediction, water quality and environment monitoring, leakage and mine detection, military surveillance and underwater navigation. However, the aquatic medium is associated with a number of limitations and challenges: long multipath delay, high interference and noise, harsh environment, low bandwidth and limited battery life of the sensor nodes. These challenges demand research techniques and strategies to be overcome in an efficient and effective fashion. The design of routing protocols for UWSNs is one of the promising solutions to cope with these challenges. This paper presents a survey of the routing protocols for UWSNs. For the ease of description, the addressed routing protocols are classified into two groups: localization-based and localization-free protocols. These groups are further subdivided according to the problems they address or the major parameters they consider during routing. Unlike the existing surveys, this survey considers only the latest and state-of-the-art routing protocols. In addition, every protocol is described in terms of its routing strategy and the problem it addresses and solves. The merit(s) of each protocol is (are) highlighted along with the cost. A description of the protocols in this fashion has a number of advantages for researchers, as compared to the existing surveys. Firstly, the description of the routing strategy of each protocol makes its routing operation easily understandable. Secondly, the demerit(s) of a protocol provides (provide) insight into overcoming its flaw(s) in future investigation. This, in turn, leads to the foundation of new protocols that are more intelligent, robust and efficient with respect to the desired parameters. Thirdly, a protocol can be selected for the appropriate application based on its described merit(s). Finally, open challenges and research directions are presented for future investigation. PMID:29783686

  5. Management of complicated shunt infections: a clinical report.

    PubMed

    James, Hector E; Bradley, John S

    2008-03-01

    The authors present their experience with a protocol for the treatment of patients with complicated shunt infections. Complicated shunt infections are defined for the purpose of this protocol as multiple compartment hydrocephalus, multiple organism shunt infection, severe peritonitis, or infections in other sites of the body. The initial treatment protocol for these patients was 3 weeks of intravenous antibiotic therapy and 2 weeks of twice daily intraventricular/intrashunt antibiotic therapy. Cerebrospinal fluid (CSF) cultures were monitored during therapy and obtained again 48 hours after completion. The shunt was completely replaced. Additionally, follow-up cultures were obtained in all patients 3-6 months after therapy was completed. A cure of the infection was achieved in all patients as defined by negative cultures obtained at completion of antibiotic therapy and in follow-up studies. The follow-up period was 2-11 years (mean 4.4 +/- 2.5 years). The treatment protocol was modified in the patients treated after 1991, and 18 patients were treated with this modified treatment regime. In these patients, intraventricular antibiotics were administered only once daily for 14 days, and the CSF was cultured 24 hours after antibiotic therapy had been stopped instead of after 48 hours. The results were similar to those obtained with the initial protocol. Based on their prospective nonrandomized series, the authors believe that patients with complicated shunt infections can be successfully treated with 2 weeks of intraventricular antibiotic therapy administered once daily, concurrent with 3 weeks of intravenous antibiotic therapy. This protocol reduces length of treatment and hospital stay, and avoids recurrence of infection.

  6. An Approach to Verification and Validation of a Reliable Multicasting Protocol

    NASA Technical Reports Server (NTRS)

    Callahan, John R.; Montgomery, Todd L.

    1994-01-01

    This paper describes the process of implementing a complex communications protocol that provides reliable delivery of data in multicast-capable, packet-switching telecommunication networks. The protocol, called the Reliable Multicasting Protocol (RMP), was developed incrementally using a combination of formal and informal techniques in an attempt to ensure the correctness of its implementation. Our development process involved three concurrent activities: (1) the initial construction and incremental enhancement of a formal state model of the protocol machine; (2) the initial coding and incremental enhancement of the implementation; and (3) model-based testing of iterative implementations of the protocol. These activities were carried out by two separate teams: a design team and a V&V team. The design team built the first version of RMP with limited functionality to handle only nominal requirements of data delivery. In a series of iterative steps, the design team added new functionality to the implementation while the V&V team kept the state model in fidelity with the implementation. This was done by generating test cases based on suspected errant or offnominal behaviors predicted by the current model. If the execution of a test was different between the model and implementation, then the differences helped identify inconsistencies between the model and implementation. The dialogue between both teams drove the co-evolution of the model and implementation. Testing served as the vehicle for keeping the model and implementation in fidelity with each other. This paper describes (1) our experiences in developing our process model; and (2) three example problems found during the development of RMP.

  7. An approach to verification and validation of a reliable multicasting protocol

    NASA Technical Reports Server (NTRS)

    Callahan, John R.; Montgomery, Todd L.

    1995-01-01

    This paper describes the process of implementing a complex communications protocol that provides reliable delivery of data in multicast-capable, packet-switching telecommunication networks. The protocol, called the Reliable Multicasting Protocol (RMP), was developed incrementally using a combination of formal and informal techniques in an attempt to ensure the correctness of its implementation. Our development process involved three concurrent activities: (1) the initial construction and incremental enhancement of a formal state model of the protocol machine; (2) the initial coding and incremental enhancement of the implementation; and (3) model-based testing of iterative implementations of the protocol. These activities were carried out by two separate teams: a design team and a V&V team. The design team built the first version of RMP with limited functionality to handle only nominal requirements of data delivery. In a series of iterative steps, the design team added new functionality to the implementation while the V&V team kept the state model in fidelity with the implementation. This was done by generating test cases based on suspected errant or off-nominal behaviors predicted by the current model. If the execution of a test was different between the model and implementation, then the differences helped identify inconsistencies between the model and implementation. The dialogue between both teams drove the co-evolution of the model and implementation. Testing served as the vehicle for keeping the model and implementation in fidelity with each other. This paper describes (1) our experiences in developing our process model; and (2) three example problems found during the development of RMP.

  8. A History of Streptokinase Use in Acute Myocardial Infarction

    PubMed Central

    Sikri, Nikhil; Bardia, Amit

    2007-01-01

    A serendipitous discovery by William Smith Tillett in 1933, followed by many years of work with his student Sol Sherry, laid a sound foundation for the use of streptokinase as a thrombolytic agent in the treatment of acute myocardial infarction. The drug found initial clinical application in combating fibrinous pleural exudates, hemothorax, and tuberculous meningitis. In 1958, Sherry and others started using streptokinase in patients with acute myocardial infarction and changed the focus of treatment from palliation to “cure.” Initial trials that used streptokinase infusion produced conflicting results. An innovative approach of intracoronary streptokinase infusion was initiated by Rentrop and colleagues in 1979. Subsequently, larger trials of intracoronary infusion achieved reperfusion rates ranging from 70% to 90%. The need for a meticulously planned and systematically executed randomized multicenter trial was fulfilled by the Gruppo Italiano per la Sperimentazione della Streptochinasi nell'Infarto Miocardico (GISSI) trial in 1986, which not only validated streptokinase as an effective therapeutic method but also established a fixed protocol for its use in acute myocardial infarction. Currently, despite the wide use of tissue plasminogen activator in developed nations, streptokinase remains essential to the management of acute myocardial infarction in developing nations. PMID:17948083

  9. Comments on the "Byzantine Self-Stabilizing Pulse Synchronization" Protocol: Counter-examples

    NASA Technical Reports Server (NTRS)

    Malekpour, Mahyar R.; Siminiceanu, Radu

    2006-01-01

    Embedded distributed systems have become an integral part of many safety-critical applications. There have been many attempts to solve the self-stabilization problem of clocks across a distributed system. An analysis of one such protocol called the Byzantine Self-Stabilizing Pulse Synchronization (BSS-Pulse-Synch) protocol from a paper entitled "Linear Time Byzantine Self-Stabilizing Clock Synchronization" by Daliot, et al., is presented in this report. This report also includes a discussion of the complexity and pitfalls of designing self-stabilizing protocols and provides counter-examples for the claims of the above protocol.

  10. Recyclable amplification for single-photon entanglement from photon loss and decoherence

    NASA Astrophysics Data System (ADS)

    Zhou, Lan; Chen, Ling-Quan; Zhong, Wei; Sheng, Yu-Bo

    2018-01-01

    We put forward a highly efficient recyclable single-photon assisted amplification protocol, which can protect single-photon entanglement (SPE) from photon loss and decoherence. Making use of quantum nondemolition detection gates constructed with the help of cross-Kerr nonlinearity, our protocol has some attractive advantages. First, the parties can recover less-entangled SPE to be maximally entangled SPE, and reduce photon loss simultaneously. Second, if the protocol fails, the parties can repeat the protocol to reuse some discarded items, which can increase the success probability. Third, when the protocol is successful, they can similarly repeat the protocol to further increase the fidelity of the SPE. Thereby, our protocol provides a possible way to obtain high entanglement, high fidelity and high success probability simultaneously. In particular, our protocol shows higher success probability in the practical high photon loss channel. Based on the above features, our amplification protocol has potential for future application in long-distance quantum communication.

  11. Nitrous oxide emissions from agricultural landscapes: quantification tools, policy development, and opportunities for improved management

    NASA Astrophysics Data System (ADS)

    Tonitto, C.; Gurwick, N. P.

    2012-12-01

    Policy initiatives to reduce greenhouse gas emissions (GHG) have promoted the development of agricultural management protocols to increase SOC storage and reduce GHG emissions. We review approaches for quantifying N2O flux from agricultural landscapes. We summarize the temporal and spatial extent of observations across representative soil classes, climate zones, cropping systems, and management scenarios. We review applications of simulation and empirical modeling approaches and compare validation outcomes across modeling tools. Subsequently, we review current model application in agricultural management protocols. In particular, we compare approaches adapted for compliance with the California Global Warming Solutions Act, the Alberta Climate Change and Emissions Management Act, and by the American Carbon Registry. In the absence of regional data to drive model development, policies that require GHG quantification often use simple empirical models based on highly aggregated data of N2O flux as a function of applied N - Tier 1 models according to IPCC categorization. As participants in development of protocols that could be used in carbon offset markets, we observed that stakeholders outside of the biogeochemistry community favored outcomes from simulation modeling (Tier 3) rather than empirical modeling (Tier 2). In contrast, scientific advisors were more accepting of outcomes based on statistical approaches that rely on local observations, and their views sometimes swayed policy practitioners over the course of policy development. Both Tier 2 and Tier 3 approaches have been implemented in current policy development, and it is important that the strengths and limitations of both approaches, in the face of available data, be well-understood by those drafting and adopting policies and protocols. The reliability of all models is contingent on sufficient observations for model development and validation. Simulation models applied without site-calibration generally result in poor validation results, and this point particularly needs to be emphasized during policy development. For cases where sufficient calibration data are available, simulation models have demonstrated the ability to capture seasonal patterns of N2O flux. The reliability of statistical models likewise depends on data availability. Because soil moisture is a significant driver of N2O flux, the best outcomes occur when empirical models are applied to systems with relevant soil classification and climate. The structure of current carbon offset protocols is not well-aligned with a budgetary approach to GHG accounting. Current protocols credit field-scale reduction in N2O flux as a result of reduced fertilizer use. Protocols do not award farmers credit for reductions in CO2 emissions resulting from reduced production of synthetic N fertilizer. To achieve the greatest GHG emission reductions through reduced synthetic N production and reduced landscape N saturation requires a re-envisioning of the agricultural landscape to include cropping systems with legume and manure N sources. The current focus on on-farm GHG sources focuses credits on simple reductions of N applied in conventional systems rather than on developing cropping systems which promote higher recycling and retention of N.

  12. Determination of Duty Cycle for Energy Storage Systems in a Renewables (Solar) Firming Application

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Schoenwald, David A.; Ellison, James

    2016-04-01

    This report supplements the document, “Protocol for Uniformly Measuring and Expressing the Performance of Energy Storage Systems,” issued in a revised version in April 2016, which will include the renewables (solar) firming application for an energy storage system (ESS). This report provides the background and documentation associated with the determination of a duty cycle for an ESS operated in a renewables (solar) firming application for the purpose of measuring and expressing ESS performance in accordance with the ESS performance protocol.

  13. An improved ATAC-seq protocol reduces background and enables interrogation of frozen tissues.

    PubMed

    Corces, M Ryan; Trevino, Alexandro E; Hamilton, Emily G; Greenside, Peyton G; Sinnott-Armstrong, Nicholas A; Vesuna, Sam; Satpathy, Ansuman T; Rubin, Adam J; Montine, Kathleen S; Wu, Beijing; Kathiria, Arwa; Cho, Seung Woo; Mumbach, Maxwell R; Carter, Ava C; Kasowski, Maya; Orloff, Lisa A; Risca, Viviana I; Kundaje, Anshul; Khavari, Paul A; Montine, Thomas J; Greenleaf, William J; Chang, Howard Y

    2017-10-01

    We present Omni-ATAC, an improved ATAC-seq protocol for chromatin accessibility profiling that works across multiple applications with substantial improvement of signal-to-background ratio and information content. The Omni-ATAC protocol generates chromatin accessibility profiles from archival frozen tissue samples and 50-μm sections, revealing the activities of disease-associated DNA elements in distinct human brain structures. The Omni-ATAC protocol enables the interrogation of personal regulomes in tissue context and translational studies.

  14. On Robust Key Agreement Based on Public Key Authentication

    NASA Astrophysics Data System (ADS)

    Hao, Feng

    We describe two new attacks on the HMQV protocol. The first attack raises a serious question on the basic definition of "authentication" in HMQV, while the second attack is generally applicable to many other protocols. In addition, we present a new authenticated key agreement protocol called YAK. Our approach is to depend on well-established techniques such as Schnorr's signature. Among all the related protocols, YAK appears to be the simplest so far. We believe simplicity is an important engineering principle.

  15. Generation of concatenated Greenberger-Horne-Zeilinger-type entangled coherent state based on linear optics

    NASA Astrophysics Data System (ADS)

    Guo, Rui; Zhou, Lan; Gu, Shi-Pu; Wang, Xing-Fu; Sheng, Yu-Bo

    2017-03-01

    The concatenated Greenberger-Horne-Zeilinger (C-GHZ) state is a new type of multipartite entangled state, which has potential application in future quantum information. In this paper, we propose a protocol of constructing arbitrary C-GHZ entangled state approximatively. Different from previous protocols, each logic qubit is encoded in the coherent state. This protocol is based on the linear optics, which is feasible in experimental technology. This protocol may be useful in quantum information based on the C-GHZ state.

  16. A Secure Authenticated Key Exchange Protocol for Credential Services

    NASA Astrophysics Data System (ADS)

    Shin, Seonghan; Kobara, Kazukuni; Imai, Hideki

    In this paper, we propose a leakage-resilient and proactive authenticated key exchange (called LRP-AKE) protocol for credential services which provides not only a higher level of security against leakage of stored secrets but also secrecy of private key with respect to the involving server. And we show that the LRP-AKE protocol is provably secure in the random oracle model with the reduction to the computational Difie-Hellman problem. In addition, we discuss about some possible applications of the LRP-AKE protocol.

  17. Reducing the Indication for Ventilatory Support in the Severely Burned Patient: Results of a New Protocol Approach at a Regional Burn Center.

    PubMed

    Gille, Jochen; Bauer, Nicole; Malcharek, Michael J; Dragu, Adrian; Sablotzki, Armin; Taha, Hischam; Czeslick, Elke

    2016-01-01

    Initial management of the severely injured routinely includes sedation and mechanical ventilatory support. However, nonjudiciously applied mechanical ventilatory support can itself lead to poorer patient outcomes. In an attempt to reduce this iatrogenic risk, a standardized, in-house, five-point protocol providing clinical guidance on the use and duration of ventilation was introduced and analyzed, and the impact on patient outcomes was assessed. In 2007, a protocol for early spontaneous breathing was introduced and established in clinical practice. This protocol included: 1) early extubation (≤6 hours after admission) in the absence of absolute ventilatory indication; 2) avoidance of "routine intubation" in spontaneously breathing patients; 3) early postoperative extubation, including patients requiring multiple surgical interventions; 4) intensive chest and respiratory physiotherapy with routine application of expectorants; and 5) early active mobilization. A retrospective clinical study compared patients (group A) over a 2-year period admitted under the new protocol with a historical patient group (group B). Patients in group A (n = 38) had fewer ventilator days over the time-course of treatment (3 [1; 5.8] vs 18.5 days [0.5; 20.5]; P = .0001) with a lower rate of tracheostomies (15.8 vs 54%; P = .0003). Patients on ventilation at admission in group A had shorter ventilation periods after admission (4.75 [4; 22.25] vs 378 hours [8.5; 681.5]; P = .0003), and 66.7% of these patients were extubated within 6 hours of admission (vs 9.1% in group B). No patients fulfilling the inclusion criteria required re- or emergency intubation. In the first 5 days of treatment, significantly lower Sequential Organ Failure Assessment scores were recorded in group A. There was also a trend for lower mortality rates (0 [0%] vs 6 [14%]), sepsis rates (24 [63.2%] vs 37 [88.1%]), and cumulative fluid balance on days 3 and 7 in group A. In contrast, group A demonstrated an elevated rate of pneumonia (15 [39.5%] vs 8 [19%]). These trends, however, lacked statistical significance. Our five-point protocol was safe and easily translated into clinical practice. In the authors experience, this protocol significantly reduced the ventilatory period in severely injured. Furthermore, this study suggests that many injured may be over-treated with routine ventilation, which carries accompanying risks.

  18. Implementation and Analysis of Real-Time Streaming Protocols.

    PubMed

    Santos-González, Iván; Rivero-García, Alexandra; Molina-Gil, Jezabel; Caballero-Gil, Pino

    2017-04-12

    Communication media have become the primary way of interaction thanks to the discovery and innovation of many new technologies. One of the most widely used communication systems today is video streaming, which is constantly evolving. Such communications are a good alternative to face-to-face meetings, and are therefore very useful for coping with many problems caused by distance. However, they suffer from different issues such as bandwidth limitation, network congestion, energy efficiency, cost, reliability and connectivity. Hence, the quality of service and the quality of experience are considered the two most important issues for this type of communication. This work presents a complete comparative study of two of the most used protocols of video streaming, Real Time Streaming Protocol (RTSP) and the Web Real-Time Communication (WebRTC). In addition, this paper proposes two new mobile applications that implement those protocols in Android whose objective is to know how they are influenced by the aspects that most affect the streaming quality of service, which are the connection establishment time and the stream reception time. The new video streaming applications are also compared with the most popular video streaming applications for Android, and the experimental results of the analysis show that the developed WebRTC implementation improves the performance of the most popular video streaming applications with respect to the stream packet delay.

  19. Microbiological Research Under the Nagoya Protocol: Facts and Fiction.

    PubMed

    Overmann, Jörg; Scholz, Amber Hartman

    2017-02-01

    The Nagoya Protocol is based on concepts of biological diversity that are hardly applicable to microorganisms. Because of this incongruence, the Nagoya Protocol threatens future microbial research, potentially defeating its original purpose. Countries with appropriate regulations can promote science and their bioeconomy through international collaboration and simultaneously gain a competitive advantage. Copyright © 2016 Elsevier Ltd. All rights reserved.

  20. TreeMAC: Localized TDMA MAC protocol for real-time high-data-rate sensor networks

    USGS Publications Warehouse

    Song, W.-Z.; Huang, R.; Shirazi, B.; Husent, R.L.

    2009-01-01

    Earlier sensor network MAC protocols focus on energy conservation in low-duty cycle applications, while some recent applications involve real-time high-data-rate signals. This motivates us to design an innovative localized TDMA MAC protocol to achieve high throughput and low congestion in data collection sensor networks, besides energy conservation. TreeMAC divides a time cycle into frames and frame into slots. Parent determines children's frame assigmnent based on their relative bandwidth demand, and each node calculates its own slot assignment based on its hop-count to the sink. This innovative 2-dimensional frame-slot assignment algorithm has the following nice theory properties. Firstly, given any node, at any time slot, there is at most one active sender in its neighborhood (includ ing itself). Secondly, the packet scheduling with TreelMAC is bufferless, which therefore minimizes the probability of network congestion. Thirdly, the data throughput to gateway is at least 1/3 of the optimum assuming reliable links. Our experiments on a 24 node test bed demonstrate that TreeMAC protocol significantly improves network throughput and energy efficiency, by comparing to the TinyOS's default CSMA MAC protocol and a recent TDMA MAC protocol Funneling-MAC[8]. ?? 2009 IEEE.

  1. A History of the Improvement of Internet Protocols Over Satellites Using ACTS

    NASA Technical Reports Server (NTRS)

    Allman, Mark; Kruse, Hans; Ostermann, Shawn

    2000-01-01

    This paper outlines the main results of a number of ACTS experiments on the efficacy of using standard Internet protocols over long-delay satellite channels. These experiments have been jointly conducted by NASAs Glenn Research Center and Ohio University over the last six years. The focus of our investigations has been the impact of long-delay networks with non-zero bit-error rates on the performance of the suite of Internet protocols. In particular, we have focused on the most widely used transport protocol, the Transmission Control Protocol (TCP), as well as several application layer protocols. This paper presents our main results, as well as references to more verbose discussions of our experiments.

  2. Impersonation attack on a quantum secure direct communication and authentication protocol with improvement

    NASA Astrophysics Data System (ADS)

    Amerimehr, Ali; Hadain Dehkordi, Massoud

    2018-03-01

    We analyze the security of a quantum secure direct communication and authentication protocol based on single photons. We first give an impersonation attack on the protocol. The cryptanalysis shows that there is a gap in the authentication procedure of the protocol so that an opponent can reveal the secret information by an undetectable attempt. We then propose an improvement for the protocol and show it closes the gap by applying a mutual authentication procedure. In the improved protocol single photons are transmitted once in a session, so it is easy to implement as the primary protocol. Furthermore, we use a novel technique for secret order rearrangement of photons by which not only quantum storage is eliminated also a secret key can be reused securely. So the new protocol is applicable in practical approaches like embedded system devices.

  3. On the security of a simple three-party key exchange protocol without server's public keys.

    PubMed

    Nam, Junghyun; Choo, Kim-Kwang Raymond; Park, Minkyu; Paik, Juryon; Won, Dongho

    2014-01-01

    Authenticated key exchange protocols are of fundamental importance in securing communications and are now extensively deployed for use in various real-world network applications. In this work, we reveal major previously unpublished security vulnerabilities in the password-based authenticated three-party key exchange protocol according to Lee and Hwang (2010): (1) the Lee-Hwang protocol is susceptible to a man-in-the-middle attack and thus fails to achieve implicit key authentication; (2) the protocol cannot protect clients' passwords against an offline dictionary attack; and (3) the indistinguishability-based security of the protocol can be easily broken even in the presence of a passive adversary. We also propose an improved password-based authenticated three-party key exchange protocol that addresses the security vulnerabilities identified in the Lee-Hwang protocol.

  4. On the Security of a Simple Three-Party Key Exchange Protocol without Server's Public Keys

    PubMed Central

    Nam, Junghyun; Choo, Kim-Kwang Raymond; Park, Minkyu; Paik, Juryon; Won, Dongho

    2014-01-01

    Authenticated key exchange protocols are of fundamental importance in securing communications and are now extensively deployed for use in various real-world network applications. In this work, we reveal major previously unpublished security vulnerabilities in the password-based authenticated three-party key exchange protocol according to Lee and Hwang (2010): (1) the Lee-Hwang protocol is susceptible to a man-in-the-middle attack and thus fails to achieve implicit key authentication; (2) the protocol cannot protect clients' passwords against an offline dictionary attack; and (3) the indistinguishability-based security of the protocol can be easily broken even in the presence of a passive adversary. We also propose an improved password-based authenticated three-party key exchange protocol that addresses the security vulnerabilities identified in the Lee-Hwang protocol. PMID:25258723

  5. Applications of a hologram watermarking protocol: aging-aware biometric signature verification and time validity check with personal documents

    NASA Astrophysics Data System (ADS)

    Vielhauer, Claus; Croce Ferri, Lucilla

    2003-06-01

    Our paper addresses two issues of a biometric authentication algorithm for ID cardholders previously presented namely the security of the embedded reference data and the aging process of the biometric data. We describe a protocol that allows two levels of verification, combining a biometric hash technique based on handwritten signature and hologram watermarks with cryptographic signatures in a verification infrastructure. This infrastructure consists of a Trusted Central Public Authority (TCPA), which serves numerous Enrollment Stations (ES) in a secure environment. Each individual performs an enrollment at an ES, which provides the TCPA with the full biometric reference data and a document hash. The TCPA then calculates the authentication record (AR) with the biometric hash, a validity timestamp, and a document hash provided by the ES. The AR is then signed with a cryptographic signature function, initialized with the TCPA's private key and embedded in the ID card as a watermark. Authentication is performed at Verification Stations (VS), where the ID card will be scanned and the signed AR is retrieved from the watermark. Due to the timestamp mechanism and a two level biometric verification technique based on offline and online features, the AR can deal with the aging process of the biometric feature by forcing a re-enrollment of the user after expiry, making use of the ES infrastructure. We describe some attack scenarios and we illustrate the watermarking embedding, retrieval and dispute protocols, analyzing their requisites, advantages and disadvantages in relation to security requirements.

  6. Strategies for Optimal MAC Parameters Tuning in IEEE 802.15.6 Wearable Wireless Sensor Networks.

    PubMed

    Alam, Muhammad Mahtab; Ben Hamida, Elyes

    2015-09-01

    Wireless body area networks (WBAN) has penetrated immensely in revolutionizing the classical heath-care system. Recently, number of WBAN applications has emerged which introduce potential limits to existing solutions. In particular, IEEE 802.15.6 standard has provided great flexibility, provisions and capabilities to deal emerging applications. In this paper, we investigate the application-specific throughput analysis by fine-tuning the physical (PHY) and medium access control (MAC) parameters of the IEEE 802.15.6 standard. Based on PHY characterizations in narrow band, at the MAC layer, carrier sense multiple access collision avoidance (CSMA/CA) and scheduled access protocols are extensively analyzed. It is concluded that, IEEE 802.15.6 standard can satisfy most of the WBANs applications throughput requirements by maximum achieving 680 Kbps. However, those emerging applications which require high quality audio or video transmissions, standard is not able to meet their constraints. Moreover, delay, energy efficiency and successful packet reception are considered as key performance metrics for comparing the MAC protocols. CSMA/CA protocol provides the best results to meet the delay constraints of medical and non-medical WBAN applications. Whereas, the scheduled access approach, performs very well both in energy efficiency and packet reception ratio.

  7. "Application of Tunable Diode Laser Spectrometry to Isotopic Studies for Exobiology"

    NASA Technical Reports Server (NTRS)

    Sauke, Todd B.

    1999-01-01

    Computer-controlled electrically-activated valves for rapid gas-handling have been incorporated into the Stable Isotope Laser Spectrometer (SILS) which now permits rapid filling and evacuating of the sample and reference gas cells, Experimental protocols have been developed to take advantage of the fast gas handling capabilities of the instrument and to achieve increased accuracy which results from reduced instrumental drift during rapid isotopic ratio measurements. Using these protocols' accuracies of 0.5 del (0.05%) have been achieved in measurements of 13C/12C in carbon dioxide. Using the small stable isotope laser spectrometer developed in a related PIDDP project of the Co-I, protocols for acquisition of rapid sequential calibration spectra were developed which resulted in 0.5 del accuracy also being achieved in this less complex instrument. An initial version of software for automatic characterization of tunable diode lasers has been developed and diodes have been characterized in order to establish their spectral output properties. A new state-of-the-art high operating temperature (200 K) mid infrared diode laser was purchased (through NASA procurement) and characterized. A thermo-electrically cooled mid infrared tunable diode laser system for use with high temperature operation lasers was developed. In addition to isotopic ratio measurements of carbon and oxygen, measurements of a third biologically important element (15N/14N in N2O gas) have been achieved to a preliminary accuracy of about 0.2%. Transfer of the basic SILS technology to the commercial sector is proceeding under an unfunded Space Act Agreement between NASA and SpiraMed, a medical diagnostic instrument company. Two patents have been issued. Foreign patents based on these two US patents have been applied for and are expected to be issued. A preliminary design was developed for a thermo-electrically cooled SILS instruments for application to planetary space flight exploration missions.

  8. Thermally assisted OSL application for equivalent dose estimation; comparison of multiple equivalent dose values as well as saturation levels determined by luminescence and ESR techniques for a sedimentary sample collected from a fault gouge

    NASA Astrophysics Data System (ADS)

    Şahiner, Eren; Meriç, Niyazi; Polymeris, George S.

    2017-02-01

    Equivalent dose estimation (De) constitutes the most important part of either trap-charge dating techniques or dosimetry applications. In the present work, multiple, independent equivalent dose estimation approaches were adopted, using both luminescence and ESR techniques; two different minerals were studied, namely quartz as well as feldspathic polymineral samples. The work is divided into three independent parts, depending on the type of signal employed. Firstly, different De estimation approaches were carried out on both polymineral and contaminated quartz, using single aliquot regenerative dose protocols employing conventional OSL and IRSL signals, acquired at different temperatures. Secondly, ESR equivalent dose estimations using the additive dose procedure both at room temperature and at 90 K were discussed. Lastly, for the first time in the literature, a single aliquot regenerative protocol employing a thermally assisted OSL signal originating from Very Deep Traps was applied for natural minerals. Rejection criteria such as recycling and recovery ratios are also presented. The SAR protocol, whenever applied, provided with compatible De estimations with great accuracy, independent on either the type of mineral or the stimulation temperature. Low temperature ESR signals resulting from Al and Ti centers indicate very large De values due to bleaching in-ability, associated with large uncertainty values. Additionally, dose saturation of different approaches was investigated. For the signal arising from Very Deep Traps in quartz saturation is extended almost by one order of magnitude. It is interesting that most of De values yielded using different luminescence signals agree with each other and ESR Ge center has very large D0 values. The results presented above highly support the argument that the stability and the initial ESR signal of the Ge center is highly sample-dependent, without any instability problems for the cases of quartz resulting from fault gouge.

  9. Reducing software security risk through an integrated approach research initiative model based verification of the Secure Socket Layer (SSL) Protocol

    NASA Technical Reports Server (NTRS)

    Powell, John D.

    2003-01-01

    This document discusses the verification of the Secure Socket Layer (SSL) communication protocol as a demonstration of the Model Based Verification (MBV) portion of the verification instrument set being developed under the Reducing Software Security Risk (RSSR) Trough an Integrated Approach research initiative. Code Q of the National Aeronautics and Space Administration (NASA) funds this project. The NASA Goddard Independent Verification and Validation (IV&V) facility manages this research program at the NASA agency level and the Assurance Technology Program Office (ATPO) manages the research locally at the Jet Propulsion Laboratory (California institute of Technology) where the research is being carried out.

  10. Developing consistent Landsat data sets for large area applications: the MRLC 2001 protocol

    USGS Publications Warehouse

    Chander, G.; Huang, Chengquan; Yang, Limin; Homer, Collin G.; Larson, C.

    2009-01-01

    One of the major efforts in large area land cover mapping over the last two decades was the completion of two U.S. National Land Cover Data sets (NLCD), developed with nominal 1992 and 2001 Landsat imagery under the auspices of the MultiResolution Land Characteristics (MRLC) Consortium. Following the successful generation of NLCD 1992, a second generation MRLC initiative was launched with two primary goals: (1) to develop a consistent Landsat imagery data set for the U.S. and (2) to develop a second generation National Land Cover Database (NLCD 2001). One of the key enhancements was the formulation of an image preprocessing protocol and implementation of a consistent image processing method. The core data set of the NLCD 2001 database consists of Landsat 7 Enhanced Thematic Mapper Plus (ETM+) images. This letter details the procedures for processing the original ETM+ images and more recent scenes added to the database. NLCD 2001 products include Anderson Level II land cover classes, percent tree canopy, and percent urban imperviousness at 30-m resolution derived from Landsat imagery. The products are freely available for download to the general public from the MRLC Consortium Web site at http://www.mrlc.gov.

  11. Definition and evaluation of the data-link layer of PACnet

    NASA Astrophysics Data System (ADS)

    Alsafadi, Yasser H.; Martinez, Ralph; Sanders, William H.

    1991-07-01

    PACnet is a 200-500 Mbps dual-ring fiber optic network designed to implement a picture archiving and communication system (PACS) in a hospital environment. The network consists of three channels: an image transfer channel, a command and control channel, and a real-time data channel. An initial network interface unit (NIU) design for PACnet consisted of a functional description of the protocols and NIU major components. In order to develop a demonstration prototype, additional definition of protocol algorithms of each channel is necessary. Using the International Standards Organization/Open Systems Interconnection (ISO/OSI) reference model as a guide, the definition of the data link layer is extended. This definition covers interface service specifications for the two constituent sublayers: logical link control (LLC) and medium access control (MAC). Furthermore, it describes procedures for data transfer, mechanisms of error detection and fault recovery. A performance evaluation study was then made to determine how the network performs under various application scenarios. The performance evaluation study was performed using stochastic activity networks, which can formally describe the network behavior. The results of the study demonstrate the feasibility of PACnet as an integrated image, data, and voice network for PACS.

  12. Overcoming pain thresholds with multilevel models-an example using quantitative sensory testing (QST) data.

    PubMed

    Hirschfeld, Gerrit; Blankenburg, Markus R; Süß, Moritz; Zernikow, Boris

    2015-01-01

    The assessment of somatosensory function is a cornerstone of research and clinical practice in neurology. Recent initiatives have developed novel protocols for quantitative sensory testing (QST). Application of these methods led to intriguing findings, such as the presence lower pain-thresholds in healthy children compared to healthy adolescents. In this article, we (re-) introduce the basic concepts of signal detection theory (SDT) as a method to investigate such differences in somatosensory function in detail. SDT describes participants' responses according to two parameters, sensitivity and response-bias. Sensitivity refers to individuals' ability to discriminate between painful and non-painful stimulations. Response-bias refers to individuals' criterion for giving a "painful" response. We describe how multilevel models can be used to estimate these parameters and to overcome central critiques of these methods. To provide an example we apply these methods to data from the mechanical pain sensitivity test of the QST protocol. The results show that adolescents are more sensitive to mechanical pain and contradict the idea that younger children simply use more lenient criteria to report pain. Overall, we hope that the wider use of multilevel modeling to describe somatosensory functioning may advance neurology research and practice.

  13. Improved Compressive Sensing of Natural Scenes Using Localized Random Sampling

    PubMed Central

    Barranca, Victor J.; Kovačič, Gregor; Zhou, Douglas; Cai, David

    2016-01-01

    Compressive sensing (CS) theory demonstrates that by using uniformly-random sampling, rather than uniformly-spaced sampling, higher quality image reconstructions are often achievable. Considering that the structure of sampling protocols has such a profound impact on the quality of image reconstructions, we formulate a new sampling scheme motivated by physiological receptive field structure, localized random sampling, which yields significantly improved CS image reconstructions. For each set of localized image measurements, our sampling method first randomly selects an image pixel and then measures its nearby pixels with probability depending on their distance from the initially selected pixel. We compare the uniformly-random and localized random sampling methods over a large space of sampling parameters, and show that, for the optimal parameter choices, higher quality image reconstructions can be consistently obtained by using localized random sampling. In addition, we argue that the localized random CS optimal parameter choice is stable with respect to diverse natural images, and scales with the number of samples used for reconstruction. We expect that the localized random sampling protocol helps to explain the evolutionarily advantageous nature of receptive field structure in visual systems and suggests several future research areas in CS theory and its application to brain imaging. PMID:27555464

  14. ISPyB: an information management system for synchrotron macromolecular crystallography.

    PubMed

    Delagenière, Solange; Brenchereau, Patrice; Launer, Ludovic; Ashton, Alun W; Leal, Ricardo; Veyrier, Stéphanie; Gabadinho, José; Gordon, Elspeth J; Jones, Samuel D; Levik, Karl Erik; McSweeney, Seán M; Monaco, Stéphanie; Nanao, Max; Spruce, Darren; Svensson, Olof; Walsh, Martin A; Leonard, Gordon A

    2011-11-15

    Individual research groups now analyze thousands of samples per year at synchrotron macromolecular crystallography (MX) resources. The efficient management of experimental data is thus essential if the best possible experiments are to be performed and the best possible data used in downstream processes in structure determination pipelines. Information System for Protein crystallography Beamlines (ISPyB), a Laboratory Information Management System (LIMS) with an underlying data model allowing for the integration of analyses down-stream of the data collection experiment was developed to facilitate such data management. ISPyB is now a multisite, generic LIMS for synchrotron-based MX experiments. Its initial functionality has been enhanced to include improved sample tracking and reporting of experimental protocols, the direct ranking of the diffraction characteristics of individual samples and the archiving of raw data and results from ancillary experiments and post-experiment data processing protocols. This latter feature paves the way for ISPyB to play a central role in future macromolecular structure solution pipelines and validates the application of the approach used in ISPyB to other experimental techniques, such as biological solution Small Angle X-ray Scattering and spectroscopy, which have similar sample tracking and data handling requirements.

  15. Colon cleansing protocol in children: research conditions vs. clinical practice.

    PubMed

    Elitsur, Yoram; Balfaqih, Yaslam; Preston, Deborah

    2018-04-01

     Colon preparation rates are the limiting factor for a successful diagnostic colonoscopy in children. Different colon cleansing protocols have been published for use in children. Unfortunately, the applicability of those published research protocols has not been formally evaluated in routine clinical practice. We investigated the success rate of our previously published colon cleansing protocol as utilized in our clinical practice.  This was a retrospective study. In the clinical practice, the colon cleansing protocol included PEG-3350 at a dose of 2 g/kg/day plus Dulcolax (Bisacodyl, Boehringer Ingelheim, TX USA) 5 mg/day for 2 days. Adequate colon preparation was graded between 1 - 5, as previously described, and grade ≥ 4.0 was considered an adequate preparation. Patients were instructed to complete a questionnaire that included PEG-3350 dose, number of stools per day, consistency of each stool, and side effects (vomiting, abdominal pain). Clinical and endoscopic results were compared between the protocol under research conditions and routine practice.  The success rate of the colon preparation in our clinical practice was similar to the results observed under our research protocol (75 % vs. 73.6 %). Moreover, the total number of stools, stool consistency, and the intubation rate of the terminal ileum were also similar. We concluded, that in our experience, the colon cleansing protocol used under research conditions was effective and appropriate for use in routine clinical practice.  We recommend testing each new protocol under the routine conditions of clinical practice to confirm its applicability for general practitioners.

  16. Technical modification of the Balb/c 3T3 cell transformation assay: the use of serum-reduced medium to optimise the practicability of the protocol.

    PubMed

    Hayashi, Kumiko; Sasaki, Kiyoshi; Asada, Shin; Tsuchiya, Toshiyuki; Hayashi, Makoto; Yoshimura, Isao; Tanaka, Noriho; Umeda, Makoto

    2008-12-01

    The two-stage Balb/c 3T3 model of cell transformation can mimic the two-stage carcinogenicity bioassay, and has been recognised as a screening method for detecting potential tumour initiators and promoters. A technical modification to the original protocol (which involved the use of M10F medium, consisting of MEM plus 10% fetal bovine serum [FBS]) has been previously proposed, in order to increase its efficacy, namely: the introduction of enriched, serum-reduced medium (DF2F medium, comprising DMEM/F12 plus 2% FBS and other supplements). The aim of this study was to further modify the protocol, so as to attain higher practicability for the assay. The protocol was further optimised by: a) reducing the number of plates required, through the use of larger plates; b) reducing the cost of the assay by retaining the reduced serum concentration and by using 2microg/ml insulin, rather than the more-complex insulin-transferrin-ethanolamine-sodium selenite (ITES) supplement (i.e. DF2F2I medium); and c) extending the culture period from 24-25 days to 31-32 days, resulting in clearer foci (the number of medium changes did not increase, as less-frequent medium changes were performed during the extended culture period). Growth curve construction revealed that variations in the saturation densities of the parental Balb/c 3T3 cell line and its three transformed clones were highest when M10F medium was replaced with DF2F2I medium just before cells reached confluence. We applied this newly-optimised protocol to the assessment of: a) the tumour initiating activity of 3-methylcholanthrene (MCA), N-methyl-N'-nitro-N-nitrosoguanidine, mitomycin C, methylmethane sulphonate, CdCl(2) and phenacetin, combining a post-treatment of 100ng/ml 12-O-tetradecanoylphorbol-13-acetate at the promotion stage; and b) the tumour promoting activity of insulin, lithocholic acid, CdCl(2) and phenobarbital, with pre-treatment of 0.2microg/ml MCA at the initiation stage. In the present study, only phenobarbital was negative when tested by using the modified protocol. 2008 FRAME.

  17. Vital pulp therapy with bipolar electrocoagulation after intentional pulp exposure of fixed prosthodontic abutments: a clinical report.

    PubMed

    Livaditis, G J

    2001-10-01

    A clinical protocol is described for the treatment of intentional and unavoidable exposed pulps during crown preparation. The protocol includes a definitive cavity preparation to create space in the exposed dentin for an adhesive pulp barrier; procedures to develop the highly desirable hybrid zone to prevent microleakage; the use of a specific resinous material that serves as a long-term pulp barrier with a relatively neutral and biocompatible impact on the pulp; and the use of precise bipolar electrocoagulation to provide durable hemostasis for restoration of the pulp wall and a relatively clot-free surgical wound to facilitate healing. The protocol involves the application of gentle surgical and restorative procedures to support the inherent healing process to restore the health of the pulp. The patient presented was part of a larger investigation and was selected in an attempt to identify a fixed prosthodontic application of the proposed pulp therapy protocol.

  18. A MAC Protocol for Medical Monitoring Applications of Wireless Body Area Networks

    PubMed Central

    Shu, Minglei; Yuan, Dongfeng; Zhang, Chongqing; Wang, Yinglong; Chen, Changfang

    2015-01-01

    Targeting the medical monitoring applications of wireless body area networks (WBANs), a hybrid medium access control protocol using an interrupt mechanism (I-MAC) is proposed to improve the energy and time slot utilization efficiency and to meet the data delivery delay requirement at the same time. Unlike existing hybrid MAC protocols, a superframe structure with a longer length is adopted to avoid unnecessary beacons. The time slots are mostly allocated to nodes with periodic data sources. Short interruption slots are inserted into the superframe to convey the urgent data and to guarantee the real-time requirements of these data. During these interruption slots, the coordinator can break the running superframe and start a new superframe. A contention access period (CAP) is only activated when there are more data that need to be delivered. Experimental results show the effectiveness of the proposed MAC protocol in WBANs with low urgent traffic. PMID:26046596

  19. Application of biomechanics to tendon transfers.

    PubMed

    Hoard, A S; Bell-Krotoski, J A; Mathews, R

    1995-01-01

    This article has focused on considerations important in the application of biomechanics to tendon transfers and has used an example protocol. Different surgeries require different protocols. What is most important is that specific protocols are used, and that they are both safe and effective. The communication among the therapist, surgeon, and patient is essential with the use of any protocol. As Brand has stated, "A hand is a very personal thing. It is the interface between the patient and his or her world. It is an emblem of strength, beauty, skill, sexuality, and sensibility. When it is damaged it becomes a symbol of the vulnerability of the whole person." For the patient who has damage from nerve palsy, paralysis, or injury resulting in a dysfunctional hand, a tendon transfer procedure may prove to be a viable option to restore balance and function, especially if the biomechanics of deformity and correction are considered.

  20. Understanding antimicrobial stewardship: Disease severity treatment thresholds and antimicrobial alternatives among organic and conventional calf producers.

    PubMed

    Habing, Greg; Djordjevic, Catherine; Schuenemann, Gustavo M; Lakritz, Jeff

    2016-08-01

    Reductions in livestock antimicrobial use (AMU) can be achieved through identification of effective antimicrobial alternatives as well as accurate and stringent identification of cases requiring antimicrobial therapy. Objective measurements of selectivity that incorporate appropriate case definitions are necessary to understand the need and potential for reductions in AMU through judicious use. The objective of this study was to measure selectivity using a novel disease severity treatment threshold for calf diarrhea, and identify predictors of more selective application of antimicrobials among conventional dairy producers. A second objective of this study was to describe the usage frequency and perceptions of efficacy of common antimicrobial alternatives among conventional and organic producers. The cross-sectional survey was mailed to Michigan and Ohio, USA dairy producers and contained questions on AMU attitudes, AMU practices, veterinary-written protocols, and antimicrobial alternatives. The treatment threshold, defined based on the case severity where the producer would normally apply antimicrobials, was identified with a series of descriptions with increasing severity, and ordinal multivariable logistic regression was used to determine the association between the treatment threshold and individual or herd characteristics. The response rate was 49% (727/1488). Overall, 42% of conventional producers reported any veterinary-written treatment protocol, and 27% (113/412) of conventional producers had a veterinary-written protocol for the treatment of diarrhea that included a case identification. The majority (58%, 253/437) of conventional producers, but a minority (7%) of organic producers disagreed that antibiotic use in agriculture led to resistant bacterial infections in people. Among conventional producers, the proportion of producers applying antimicrobials for therapy increased from 13% to 67% with increasing case severity. The treatment threshold was low, medium, and high for 11% (47/419), 57% (251/419), and 28% (121/419) of conventional producers, respectively. Treatment threshold was not significantly associated with the use of protocols or frequency of veterinary visits; however, individuals with more concern for the public health impact of livestock AMU had a significantly higher treatment threshold (i.e. more selective) (p<0.05). Alternative therapies were used by both organic and conventional producers, but, garlic, aloe, and "other herbal therapies" with little documented efficacy were used by a majority (>60%) of organic producers. Overall, findings from this study highlight the need for research on antimicrobial alternatives, wider application of treatment protocols, and farm personnel education and training on diagnostic criteria for initiation of antimicrobial therapy. Copyright © 2016 Elsevier B.V. All rights reserved.

Top