NASA Technical Reports Server (NTRS)
Iannicca, Dennis; Hylton, Alan; Ishac, Joseph
2012-01-01
Delay-Tolerant Networking (DTN) is an active area of research in the space communications community. DTN uses a standard layered approach with the Bundle Protocol operating on top of transport layer protocols known as convergence layers that actually transmit the data between nodes. Several different common transport layer protocols have been implemented as convergence layers in DTN implementations including User Datagram Protocol (UDP), Transmission Control Protocol (TCP), and Licklider Transmission Protocol (LTP). The purpose of this paper is to evaluate several stand-alone implementations of negative-acknowledgment based transport layer protocols to determine how they perform in a variety of different link conditions. The transport protocols chosen for this evaluation include Consultative Committee for Space Data Systems (CCSDS) File Delivery Protocol (CFDP), Licklider Transmission Protocol (LTP), NACK-Oriented Reliable Multicast (NORM), and Saratoga. The test parameters that the protocols were subjected to are characteristic of common communications links ranging from terrestrial to cis-lunar and apply different levels of delay, line rate, and error.
Protocol Support for a New Satellite-Based Airspace Communication Network
NASA Technical Reports Server (NTRS)
Shang, Yadong; Hadjitheodosiou, Michael; Baras, John
2004-01-01
We recommend suitable transport protocols for an aeronautical network supporting Internet and data services via satellite. We study the characteristics of an aeronautical satellite hybrid network and focus on the problems that cause dramatically degraded performance of the Transport Protocol. We discuss various extensions to standard TCP that alleviate some of these performance problems. Through simulation, we identify those TCP implementations that can be expected to perform well. Based on the observation that it is difficult for an end-to-end solution to solve these problems effectively, we propose a new TCP-splitting protocol, termed Aeronautical Transport Control Protocol (AeroTCP). The main idea of this protocol is to use a fixed window for flow control and one duplicated acknowledgement (ACK) for fast recovery. Our simulation results show that AeroTCP can maintain higher utilization for the satellite link than end-to-end TCP, especially in high BER environment.
A Robust and Energy-Efficient Transport Protocol for Cognitive Radio Sensor Networks
Salim, Shelly; Moh, Sangman
2014-01-01
A cognitive radio sensor network (CRSN) is a wireless sensor network in which sensor nodes are equipped with cognitive radio. CRSNs benefit from cognitive radio capabilities such as dynamic spectrum access and transmission parameters reconfigurability; but cognitive radio also brings additional challenges and leads to higher energy consumption. Motivated to improve the energy efficiency in CRSNs, we propose a robust and energy-efficient transport protocol (RETP). The novelties of RETP are two-fold: (I) it combines distributed channel sensing and channel decision with centralized schedule-based data transmission; and (II) it differentiates the types of data transmission on the basis of data content and adopts different acknowledgment methods for different transmission types. To the best of our knowledge, no transport layer protocols have yet been designed for CRSNs. Simulation results show that the proposed protocol achieves remarkably longer network lifetime and shorter event-detection delay compared to those achieved with a conventional transport protocol, while simultaneously preserving event-detection reliability. PMID:25333288
Non-adiabatic quantum state preparation and quantum state transport in chains of Rydberg atoms
NASA Astrophysics Data System (ADS)
Ostmann, Maike; Minář, Jiří; Marcuzzi, Matteo; Levi, Emanuele; Lesanovsky, Igor
2017-12-01
Motivated by recent progress in the experimental manipulation of cold atoms in optical lattices, we study three different protocols for non-adiabatic quantum state preparation and state transport in chains of Rydberg atoms. The protocols we discuss are based on the blockade mechanism between atoms which, when excited to a Rydberg state, interact through a van der Waals potential, and rely on single-site addressing. Specifically, we discuss protocols for efficient creation of an antiferromagnetic GHZ state, a class of matrix product states including a so-called Rydberg crystal and for the state transport of a single-qubit quantum state between two ends of a chain of atoms. We identify system parameters allowing for the operation of the protocols on timescales shorter than the lifetime of the Rydberg states while yielding high fidelity output states. We discuss the effect of positional disorder on the resulting states and comment on limitations due to other sources of noise such as radiative decay of the Rydberg states. The proposed protocols provide a testbed for benchmarking the performance of quantum information processing platforms based on Rydberg atoms.
Profiling optimization for big data transfer over dedicated channels
DOE Office of Scientific and Technical Information (OSTI.GOV)
Yun, D.; Wu, Qishi; Rao, Nageswara S
The transfer of big data is increasingly supported by dedicated channels in high-performance networks, where transport protocols play an important role in maximizing applicationlevel throughput and link utilization. The performance of transport protocols largely depend on their control parameter settings, but it is prohibitively time consuming to conduct an exhaustive search in a large parameter space to find the best set of parameter values. We propose FastProf, a stochastic approximation-based transport profiler, to quickly determine the optimal operational zone of a given data transfer protocol/method over dedicated channels. We implement and test the proposed method using both emulations based onmore » real-life performance measurements and experiments over physical connections with short (2 ms) and long (380 ms) delays. Both the emulation and experimental results show that FastProf significantly reduces the profiling overhead while achieving a comparable level of end-to-end throughput performance with the exhaustive search-based approach.« less
A Scenario-Based Protocol Checker for Public-Key Authentication Scheme
NASA Astrophysics Data System (ADS)
Saito, Takamichi
Security protocol provides communication security for the internet. One of the important features of it is authentication with key exchange. Its correctness is a requirement of the whole of the communication security. In this paper, we introduce three attack models realized as their attack scenarios, and provide an authentication-protocol checker for applying three attack-scenarios based on the models. We also utilize it to check two popular security protocols: Secure SHell (SSH) and Secure Socket Layer/Transport Layer Security (SSL/TLS).
A Network Coding Based Hybrid ARQ Protocol for Underwater Acoustic Sensor Networks
Wang, Hao; Wang, Shilian; Zhang, Eryang; Zou, Jianbin
2016-01-01
Underwater Acoustic Sensor Networks (UASNs) have attracted increasing interest in recent years due to their extensive commercial and military applications. However, the harsh underwater channel causes many challenges for the design of reliable underwater data transport protocol. In this paper, we propose an energy efficient data transport protocol based on network coding and hybrid automatic repeat request (NCHARQ) to ensure reliability, efficiency and availability in UASNs. Moreover, an adaptive window length estimation algorithm is designed to optimize the throughput and energy consumption tradeoff. The algorithm can adaptively change the code rate and can be insensitive to the environment change. Extensive simulations and analysis show that NCHARQ significantly reduces energy consumption with short end-to-end delay. PMID:27618044
A hash based mutual RFID tag authentication protocol in telecare medicine information system.
Srivastava, Keerti; Awasthi, Amit K; Kaul, Sonam D; Mittal, R C
2015-01-01
Radio Frequency Identification (RFID) is a technology which has multidimensional applications to reduce the complexity of today life. Everywhere, like access control, transportation, real-time inventory, asset management and automated payment systems etc., RFID has its enormous use. Recently, this technology is opening its wings in healthcare environments, where potential applications include patient monitoring, object traceability and drug administration systems etc. In this paper, we propose a secure RFID-based protocol for the medical sector. This protocol is based on hash operation with synchronized secret. The protocol is safe against active and passive attacks such as forgery, traceability, replay and de-synchronization attack.
NASA Astrophysics Data System (ADS)
Fathirad, Iraj; Devlin, John; Jiang, Frank
2012-09-01
The key-exchange and authentication are two crucial elements of any network security mechanism. IPsec, SSL/TLS, PGP and S/MIME are well-known security approaches in providing security service to network, transport and application layers; these protocols use different methods (based on their requirements) to establish keying materials and authenticates key-negotiation and participated parties. This paper studies and compares the authenticated key negotiation methods in mentioned protocols.
Mobile Virtual Private Networking
NASA Astrophysics Data System (ADS)
Pulkkis, Göran; Grahn, Kaj; Mårtens, Mathias; Mattsson, Jonny
Mobile Virtual Private Networking (VPN) solutions based on the Internet Security Protocol (IPSec), Transport Layer Security/Secure Socket Layer (SSL/TLS), Secure Shell (SSH), 3G/GPRS cellular networks, Mobile IP, and the presently experimental Host Identity Protocol (HIP) are described, compared and evaluated. Mobile VPN solutions based on HIP are recommended for future networking because of superior processing efficiency and network capacity demand features. Mobile VPN implementation issues associated with the IP protocol versions IPv4 and IPv6 are also evaluated. Mobile VPN implementation experiences are presented and discussed.
A Secured Authentication Protocol for SIP Using Elliptic Curves Cryptography
NASA Astrophysics Data System (ADS)
Chen, Tien-Ho; Yeh, Hsiu-Lien; Liu, Pin-Chuan; Hsiang, Han-Chen; Shih, Wei-Kuan
Session initiation protocol (SIP) is a technology regularly performed in Internet Telephony, and Hyper Text Transport Protocol (HTTP) as digest authentication is one of the major methods for SIP authentication mechanism. In 2005, Yang et al. pointed out that HTTP could not resist server spoofing attack and off-line guessing attack and proposed a secret authentication with Diffie-Hellman concept. In 2009, Tsai proposed a nonce based authentication protocol for SIP. In this paper, we demonstrate that their protocol could not resist the password guessing attack and insider attack. Furthermore, we propose an ECC-based authentication mechanism to solve their issues and present security analysis of our protocol to show that ours is suitable for applications with higher security requirement.
Shortcuts to Adiabaticity in Transport of a Single Trapped Ion
NASA Astrophysics Data System (ADS)
An, Shuoming; Lv, Dingshun; Campo, Adolfo Del; Kim, Kihwan
2015-05-01
We report an experimental study on shortcuts to adiabaticity in the transport of a single 171Yb+ ion trapped in a harmonic potential. In these driving schemes, the application of a force induces a nonadiabatic dynamics in which excitations are tailored so as to preserve the ion motional state in the ground state upon completion of the process. We experimentally apply the laser induced force and realize three different protocols: (1) a transitionless driving with a counterdiabatic term out of phase with the displacement force, (2) a classical protocol assisted by counterdiabatic fields in phase with the main force, (3) and an engineered transport protocol based on the Fourier transform of the trap acceleration. We experimentally compare and discuss the robustness of these protocols under given experimental limitations such as trap frequency drifts. This work was supported by the National Basic Research Program of China under Grants No. 2011CBA00300 (No. 2011CBA00301), the National Natural Science Foundation of China 11374178, and the University of Massachusetts Boston (No. P20150000029279).
Taking the Politics Out of Satellite and Space-Based Communications Protocols
NASA Technical Reports Server (NTRS)
Ivancic, William D.
2006-01-01
After many years of studies, experimentation, and deployment, large amounts of misinformation and misconceptions remain regarding applicability of various communications protocols for use in satellite and space-based networks. This paper attempts to remove much of the politics, misconceptions, and misinformation that have plagued spacebased communications protocol development and deployment. This paper provides a common vocabulary for communications; a general discussion of the requirements for various communication environments; an evaluation of tradeoffs between circuit and packet-switching technologies, and the pros and cons of various link, network, transport, application, and security protocols. Included is the applicability of protocol enhancing proxies to NASA, Department of Defense (DOD), and commercial space communication systems.
MTP: An atomic multicast transport protocol
NASA Technical Reports Server (NTRS)
Freier, Alan O.; Marzullo, Keith
1990-01-01
Multicast transport protocol (MTP); a reliable transport protocol that utilizes the multicast strategy of applicable lower layer network architectures is described. In addition to transporting data reliably and efficiently, MTP provides the client synchronization necessary for agreement on the receipt of data and the joining of the group of communicants.
Geo-Based Inter-Domain Routing (GIDR) Protocol for MANETS
2009-10-01
routing, and support for node mobility. Crowcroft et al. proposed Plutarch as architecture to translate address spaces and transport protocols among...Warfield, “ Plutarch : an argument for network pluralism,” ACM Computer Communication Review, vol. 33, no. 4, pp. 258–266, 2003. [6] S. Schmid, L
DOT National Transportation Integrated Search
2017-01-01
The New York State Department of Transportation (NYSDOT) has used the AASHTO 1993 Design Guide for the design of new flexible pavement structures for more than two decades. The AASHTO 1993 Guide is based on the empirical design equations developed fr...
Aghdasi, Hadi S; Abbaspour, Maghsoud; Moghadam, Mohsen Ebrahimi; Samei, Yasaman
2008-08-04
Technological progress in the fields of Micro Electro-Mechanical Systems (MEMS) and wireless communications and also the availability of CMOS cameras, microphones and small-scale array sensors, which may ubiquitously capture multimedia content from the field, have fostered the development of low-cost limited resources Wireless Video-based Sensor Networks (WVSN). With regards to the constraints of videobased sensor nodes and wireless sensor networks, a supporting video stream is not easy to implement with the present sensor network protocols. In this paper, a thorough architecture is presented for video transmission over WVSN called Energy-efficient and high-Quality Video transmission Architecture (EQV-Architecture). This architecture influences three layers of communication protocol stack and considers wireless video sensor nodes constraints like limited process and energy resources while video quality is preserved in the receiver side. Application, transport, and network layers are the layers in which the compression protocol, transport protocol, and routing protocol are proposed respectively, also a dropping scheme is presented in network layer. Simulation results over various environments with dissimilar conditions revealed the effectiveness of the architecture in improving the lifetime of the network as well as preserving the video quality.
Strong Password-Based Authentication in TLS Using the Three-PartyGroup Diffie-Hellman Protocol
DOE Office of Scientific and Technical Information (OSTI.GOV)
Abdalla, Michel; Bresson, Emmanuel; Chevassut, Olivier
2006-08-26
The Internet has evolved into a very hostile ecosystem where"phishing'' attacks are common practice. This paper shows that thethree-party group Diffie-Hellman key exchange can help protect againstthese attacks. We have developed a suite of password-based cipher suitesfor the Transport Layer Security (TLS) protocol that are not onlyprovably secure but also assumed to be free from patent and licensingrestrictions based on an analysis of relevant patents in thearea.
Mobile Router Technology Development
NASA Technical Reports Server (NTRS)
Ivancic, William D.; Stewart, David H.; Bell, Terry L.; Kachmar, Brian A.; Shell, Dan; Leung, Kent
2002-01-01
Cisco Systems and NASA have been performing joint research on mobile routing technology under a NASA Space Act Agreement. Cisco developed mobile router technology and provided that technology to NASA for applications to aeronautic and space-based missions. NASA has performed stringent performance testing of the mobile router, including the interaction of routing and transport-level protocols. This paper describes mobile routing, the mobile router, and some key configuration parameters. In addition, the paper describes the mobile routing test network and test results documenting the performance of transport protocols in dynamic routing environments.
The Xpress Transfer Protocol (XTP): A tutorial (expanded version)
NASA Technical Reports Server (NTRS)
Sanders, Robert M.; Weaver, Alfred C.
1990-01-01
The Xpress Transfer Protocol (XTP) is a reliable, real-time, light weight transfer layer protocol. Current transport layer protocols such as DoD's Transmission Control Protocol (TCP) and ISO's Transport Protocol (TP) were not designed for the next generation of high speed, interconnected reliable networks such as fiber distributed data interface (FDDI) and the gigabit/second wide area networks. Unlike all previous transport layer protocols, XTP is being designed to be implemented in hardware as a VLSI chip set. By streamlining the protocol, combining the transport and network layers and utilizing the increased speed and parallelization possible with a VLSI implementation, XTP will be able to provide the end-to-end data transmission rates demanded in high speed networks without compromising reliability and functionality. This paper describes the operation of the XTP protocol and in particular, its error, flow and rate control; inter-networking addressing mechanisms; and multicast support features, as defined in the XTP Protocol Definition Revision 3.4.
Networking observers and observatories with remote telescope markup language
NASA Astrophysics Data System (ADS)
Hessman, Frederic V.; Tuparev, Georg; Allan, Alasdair
2006-06-01
Remote Telescope Markup Language (RTML) is an XML-based protocol for the transport of the high-level description of a set of observations to be carried out on a remote, robotic or service telescope. We describe how RTML is being used in a wide variety of contexts: the transport of service and robotic observing requests in the Hands-On Universe TM, ACP, eSTAR, and MONET networks; how RTML is easily combined with other XML protocols for more localized control of telescopes; RTML as a secondary observation report format for the IVOA's VOEvent protocol; the input format for a general-purpose observation simulator; and the observatory-independent means for carrying out request transactions for the international Heterogeneous Telescope Network (HTN).
SCPS-TP, TCP, and Rate-Based Protocol Evaluation. Revised
NASA Technical Reports Server (NTRS)
Tran, Diepchi T.; Lawas-Grodek, Frances J.; Dimond, Robert P.; Ivancic, William D.
2005-01-01
Tests were performed at Glenn Research Center to compare the performance of the Space Communications Protocol Standard Transport Protocol (SCPS TP, otherwise known as "TCP Tranquility") relative to other variants of TCP and to determine the implementation maturity level of these protocols, particularly for higher speeds. The testing was performed over reasonably high data rates of up to 100 Mbps with delays that are characteristic of near-planetary environments. The tests were run for a fixed packet size, but for variously errored environments. This report documents the testing performed to date.
2015-09-01
the network Mac8 Medium Access Control ( Mac ) (Ethernet) address observed as destination for outgoing packets subsessionid8 Zero-based index of...15. SUBJECT TERMS tactical networks, data reduction, high-performance computing, data analysis, big data 16. SECURITY CLASSIFICATION OF: 17...Integer index of row cts_deid Device (instrument) Identifier where observation took place cts_collpt Collection point or logical observation point on
Protocol for a Delay-Tolerant Data-Communication Network
NASA Technical Reports Server (NTRS)
Torgerson, Jordan; Hooke, Adrian; Burleigh, Scott; Fall, Kevin
2004-01-01
As its name partly indicates, the Delay-Tolerant Networking (DTN) Bundle Protocol is a protocol for delay-tolerant transmission of data via communication networks. This protocol was conceived as a result of studies of how to adapt Internet protocols so that Internet-like services could be provided across interplanetary distances in support of deep-space exploration. The protocol, and software to implement the protocol, is being developed in collaboration among experts at NASA's Jet Propulsion Laboratory and other institutions. No current Internet protocols can accommodate long transmission delay times or intermittent link connectivity. The DTN Bundle Protocol represents a departure from the standard Internet assumption that a continuous path is available from a host computer to a client computer: It provides for routing of data through networks that may be disjointed and may be characterized by long transmission delays. In addition to networks that include deepspace communication links, examples of such networks include terrestrial ones within which branches are temporarily disconnected. The protocol is based partly on the definition of a message-based overlay above the transport layers of the networks on which it is hosted.
Packet-Based Protocol Efficiency for Aeronautical and Satellite Communications
NASA Technical Reports Server (NTRS)
Carek, David A.
2005-01-01
This paper examines the relation between bit error ratios and the effective link efficiency when transporting data with a packet-based protocol. Relations are developed to quantify the impact of a protocol s packet size and header size relative to the bit error ratio of the underlying link. These relations are examined in the context of radio transmissions that exhibit variable error conditions, such as those used in satellite, aeronautical, and other wireless networks. A comparison of two packet sizing methodologies is presented. From these relations, the true ability of a link to deliver user data, or information, is determined. Relations are developed to calculate the optimal protocol packet size forgiven link error characteristics. These relations could be useful in future research for developing an adaptive protocol layer. They can also be used for sizing protocols in the design of static links, where bit error ratios have small variability.
SCTP as scalable video coding transport
NASA Astrophysics Data System (ADS)
Ortiz, Jordi; Graciá, Eduardo Martínez; Skarmeta, Antonio F.
2013-12-01
This study presents an evaluation of the Stream Transmission Control Protocol (SCTP) for the transport of the scalable video codec (SVC), proposed by MPEG as an extension to H.264/AVC. Both technologies fit together properly. On the one hand, SVC permits to split easily the bitstream into substreams carrying different video layers, each with different importance for the reconstruction of the complete video sequence at the receiver end. On the other hand, SCTP includes features, such as the multi-streaming and multi-homing capabilities, that permit to transport robustly and efficiently the SVC layers. Several transmission strategies supported on baseline SCTP and its concurrent multipath transfer (CMT) extension are compared with the classical solutions based on the Transmission Control Protocol (TCP) and the Realtime Transmission Protocol (RTP). Using ns-2 simulations, it is shown that CMT-SCTP outperforms TCP and RTP in error-prone networking environments. The comparison is established according to several performance measurements, including delay, throughput, packet loss, and peak signal-to-noise ratio of the received video.
FTP Extensions for Variable Protocol Specification
NASA Technical Reports Server (NTRS)
Allman, Mark; Ostermann, Shawn
2000-01-01
The specification for the File Transfer Protocol (FTP) assumes that the underlying network protocols use a 32-bit network address and a 16-bit transport address (specifically IP version 4 and TCP). With the deployment of version 6 of the Internet Protocol, network addresses will no longer be 32-bits. This paper species extensions to FTP that will allow the protocol to work over a variety of network and transport protocols.
An Efficient and QoS Supported Multichannel MAC Protocol for Vehicular Ad Hoc Networks
Tan, Guozhen; Yu, Chao
2017-01-01
Vehicular Ad Hoc Networks (VANETs) employ multichannel to provide a variety of safety and non-safety (transport efficiency and infotainment) applications, based on the IEEE 802.11p and IEEE 1609.4 protocols. Different types of applications require different levels Quality-of-Service (QoS) support. Recently, transport efficiency and infotainment applications (e.g., electronic map download and Internet access) have received more and more attention, and this kind of applications is expected to become a big market driver in a near future. In this paper, we propose an Efficient and QoS supported Multichannel Medium Access Control (EQM-MAC) protocol for VANETs in a highway environment. The EQM-MAC protocol utilizes the service channel resources for non-safety message transmissions during the whole synchronization interval, and it dynamically adjusts minimum contention window size for different non-safety services according to the traffic conditions. Theoretical model analysis and extensive simulation results show that the EQM-MAC protocol can support QoS services, while ensuring the high saturation throughput and low transmission delay for non-safety applications. PMID:28991217
An implementation of the SNR high speed network communication protocol (Receiver part)
NASA Astrophysics Data System (ADS)
Wan, Wen-Jyh
1995-03-01
This thesis work is to implement the receiver pan of the SNR high speed network transport protocol. The approach was to use the Systems of Communicating Machines (SCM) as the formal definition of the protocol. Programs were developed on top of the Unix system using C programming language. The Unix system features that were adopted for this implementation were multitasking, signals, shared memory, semaphores, sockets, timers and process control. The problems encountered, and solved, were signal loss, shared memory conflicts, process synchronization, scheduling, data alignment and errors in the SCM specification itself. The result was a correctly functioning program which implemented the SNR protocol. The system was tested using different connection modes, lost packets, duplicate packets and large data transfers. The contributions of this thesis are: (1) implementation of the receiver part of the SNR high speed transport protocol; (2) testing and integration with the transmitter part of the SNR transport protocol on an FDDI data link layered network; (3) demonstration of the functions of the SNR transport protocol such as connection management, sequenced delivery, flow control and error recovery using selective repeat methods of retransmission; and (4) modifications to the SNR transport protocol specification such as corrections for incorrect predicate conditions, defining of additional packet types formats, solutions for signal lost and processes contention problems etc.
A survey of system architecture requirements for health care-based wireless sensor networks.
Egbogah, Emeka E; Fapojuwo, Abraham O
2011-01-01
Wireless Sensor Networks (WSNs) have emerged as a viable technology for a vast number of applications, including health care applications. To best support these health care applications, WSN technology can be adopted for the design of practical Health Care WSNs (HCWSNs) that support the key system architecture requirements of reliable communication, node mobility support, multicast technology, energy efficiency, and the timely delivery of data. Work in the literature mostly focuses on the physical design of the HCWSNs (e.g., wearable sensors, in vivo embedded sensors, et cetera). However, work towards enhancing the communication layers (i.e., routing, medium access control, et cetera) to improve HCWSN performance is largely lacking. In this paper, the information gleaned from an extensive literature survey is shared in an effort to fortify the knowledge base for the communication aspect of HCWSNs. We highlight the major currently existing prototype HCWSNs and also provide the details of their routing protocol characteristics. We also explore the current state of the art in medium access control (MAC) protocols for WSNs, for the purpose of seeking an energy efficient solution that is robust to mobility and delivers data in a timely fashion. Furthermore, we review a number of reliable transport layer protocols, including a network coding based protocol from the literature, that are potentially suitable for delivering end-to-end reliability of data transmitted in HCWSNs. We identify the advantages and disadvantages of the reviewed MAC, routing, and transport layer protocols as they pertain to the design and implementation of a HCWSN. The findings from this literature survey will serve as a useful foundation for designing a reliable HCWSN and also contribute to the development and evaluation of protocols for improving the performance of future HCWSNs. Open issues that required further investigations are highlighted.
James, Dorsha N; Voskresensky, Igor V; Jack, Meg; Cotton, Bryan A
2009-06-01
Pre-hospital airway management represents the intervention most likely to impact outcomes in critically injured patients. As such, airway management issues dominate quality improvement (QI) reviews of aero-medical programs. The purpose of this study was to evaluate current practice patterns of airway management in trauma among U.S. aero-medical service (AMS) programs. The Association of Air Medical Services (AAMS) Resource Guide from 2005 to 2006 was utilized to identify the e-mail addresses of all directors of U.S. aero-medical transport programs. Program directors from 182 U.S. aero-medical programs were asked to participate in an anonymous, web-based survey of emergency airway management protocols and practices. Non-responders to the initial request were contacted a second time by e-mail. 89 programs responded. 98.9% have rapid sequence intubation (RSI) protocols. 90% use succinylcholine, 70% use long-acting neuromuscular blockers (NMB) within their RSI protocol. 77% have protocols for mandatory in-flight sedation but only 13% have similar protocols for maintenance paralytics. 60% administer long-acting NMB immediately after RSI, 13% after confirmation of neurological activity. Given clinical scenarios, however, 97% administer long-acting NMB to patients with scene and in-flight Glasgow Coma Scale (GCS) of 3, even for brief transport times. The majority of AMS programs have well defined RSI and in-flight sedation protocols, while protocols for in-flight NMB are uncommon. Despite this, nearly all programs administer long-acting NMB following RSI, irrespective of GCS or flight time. Given the impact of in-flight NMB on initial assessment, early intervention, and injury severity scoring, a critical appraisal of current AMS airway management practices appears warranted.
Internetting tactical security sensor systems
NASA Astrophysics Data System (ADS)
Gage, Douglas W.; Bryan, W. D.; Nguyen, Hoa G.
1998-08-01
The Multipurpose Surveillance and Security Mission Platform (MSSMP) is a distributed network of remote sensing packages and control stations, designed to provide a rapidly deployable, extended-range surveillance capability for a wide variety of military security operations and other tactical missions. The baseline MSSMP sensor suite consists of a pan/tilt unit with video and FLIR cameras and laser rangefinder. With an additional radio transceiver, MSSMP can also function as a gateway between existing security/surveillance sensor systems such as TASS, TRSS, and IREMBASS, and IP-based networks, to support the timely distribution of both threat detection and threat assessment information. The MSSMP system makes maximum use of Commercial Off The Shelf (COTS) components for sensing, processing, and communications, and of both established and emerging standard communications networking protocols and system integration techniques. Its use of IP-based protocols allows it to freely interoperate with the Internet -- providing geographic transparency, facilitating development, and allowing fully distributed demonstration capability -- and prepares it for integration with the IP-based tactical radio networks that will evolve in the next decade. Unfortunately, the Internet's standard Transport layer protocol, TCP, is poorly matched to the requirements of security sensors and other quasi- autonomous systems in being oriented to conveying a continuous data stream, rather than discrete messages. Also, its canonical 'socket' interface both conceals short losses of communications connectivity and simply gives up and forces the Application layer software to deal with longer losses. For MSSMP, a software applique is being developed that will run on top of User Datagram Protocol (UDP) to provide a reliable message-based Transport service. In addition, a Session layer protocol is being developed to support the effective transfer of control of multiple platforms among multiple control stations.
NASA Technical Reports Server (NTRS)
Hooke, A. J.
1979-01-01
A set of standard telemetry protocols for downlink data flow facilitating the end-to-end transport of instrument data from the spacecraft to the user in real time is proposed. The direct switching of data by autonomous message 'packets' that are assembled by the source instrument on the spacecraft is discussed. The data system consists thus of a format on a message rather than word basis, and such packet telemetry would include standardized protocol headers. Standards are being developed within the NASA End-to-End Data System (NEEDS) program for the source packet and transport frame protocols. The source packet protocol contains identification of both the sequence number of the packet as it is generated by the source and the total length of the packet, while the transport frame protocol includes a sequence count defining the serial number of the frame as it is generated by the spacecraft data system, and a field specifying any 'options' selected in the format of the frame itself.
An Evaluation of Protocols for UAV Science Applications
NASA Technical Reports Server (NTRS)
Ivancic, William D.; Stewart, David E.; Sullivan, Donald V.; Finch, Patrick E.
2012-01-01
This paper identifies data transport needs for current and future science payloads deployed on the NASA Global Hawk Unmanned Aeronautical Vehicle (UAV). The NASA Global Hawk communication system and operational constrains are presented. The Genesis and Rapid Intensification Processes (GRIP) mission is used to provide the baseline communication requirements as a variety of payloads were utilized in this mission. User needs and desires are addressed. Protocols are matched to the payload needs and an evaluation of various techniques and tradeoffs are presented. Such techniques include utilization rate-base selective negative acknowledgement protocols and possible use of protocol enhancing proxies. Tradeoffs of communication architectures that address ease-of-use and security considerations are also presented.
SCPS-TP: A Satellite-Enhanced TCP
NASA Technical Reports Server (NTRS)
Scott, Keith; Torgerson, Leigh
2004-01-01
This viewgraph presentation reviews the Space Communications Protocol Standard Transport Protocol (SCPS-TP) which is a satellite enhanced Transport Control Protocol (TCP). The contents include: 1) Purpose; 2) Background; 3) Stressed Communication Environments; 4) SCPS-TP Features; 5) SCPS-TP Performance; 6) Performance Enhancing Proxies (PEPs); and 7) Ongoing and Future SCPS-TP Work.
On Estimating End-to-End Network Path Properties
NASA Technical Reports Server (NTRS)
Allman, Mark; Paxson, Vern
1999-01-01
The more information about current network conditions available to a transport protocol, the more efficiently it can use the network to transfer its data. In networks such as the Internet, the transport protocol must often form its own estimates of network properties based on measurements per-formed by the connection endpoints. We consider two basic transport estimation problems: determining the setting of the retransmission timer (RTO) for are reliable protocol, and estimating the bandwidth available to a connection as it begins. We look at both of these problems in the context of TCP, using a large TCP measurement set [Pax97b] for trace-driven simulations. For RTO estimation, we evaluate a number of different algorithms, finding that the performance of the estimators is dominated by their minimum values, and to a lesser extent, the timer granularity, while being virtually unaffected by how often round-trip time measurements are made or the settings of the parameters in the exponentially-weighted moving average estimators commonly used. For bandwidth estimation, we explore techniques previously sketched in the literature [Hoe96, AD98] and find that in practice they perform less well than anticipated. We then develop a receiver-side algorithm that performs significantly better.
Issues in designing transport layer multicast facilities
NASA Technical Reports Server (NTRS)
Dempsey, Bert J.; Weaver, Alfred C.
1990-01-01
Multicasting denotes a facility in a communications system for providing efficient delivery from a message's source to some well-defined set of locations using a single logical address. While modem network hardware supports multidestination delivery, first generation Transport Layer protocols (e.g., the DoD Transmission Control Protocol (TCP) (15) and ISO TP-4 (41)) did not anticipate the changes over the past decade in underlying network hardware, transmission speeds, and communication patterns that have enabled and driven the interest in reliable multicast. Much recent research has focused on integrating the underlying hardware multicast capability with the reliable services of Transport Layer protocols. Here, we explore the communication issues surrounding the design of such a reliable multicast mechanism. Approaches and solutions from the literature are discussed, and four experimental Transport Layer protocols that incorporate reliable multicast are examined.
DOT National Transportation Integrated Search
2009-02-01
The Next Generation 9-1-1 (NG9-1-1) Initiative is a research and development project funded by the US Department of Transportation (USDOT) to define the framework and plan to deploy Internet Protocol (IP)-based emergency communications across the nat...
Channegowda, M; Nejabati, R; Rashidi Fard, M; Peng, S; Amaya, N; Zervas, G; Simeonidou, D; Vilalta, R; Casellas, R; Martínez, R; Muñoz, R; Liu, L; Tsuritani, T; Morita, I; Autenrieth, A; Elbers, J P; Kostecki, P; Kaczmarek, P
2013-03-11
Software defined networking (SDN) and flexible grid optical transport technology are two key technologies that allow network operators to customize their infrastructure based on application requirements and therefore minimizing the extra capital and operational costs required for hosting new applications. In this paper, for the first time we report on design, implementation & demonstration of a novel OpenFlow based SDN unified control plane allowing seamless operation across heterogeneous state-of-the-art optical and packet transport domains. We verify and experimentally evaluate OpenFlow protocol extensions for flexible DWDM grid transport technology along with its integration with fixed DWDM grid and layer-2 packet switching.
Droplet-based pyrosequencing using digital microfluidics.
Boles, Deborah J; Benton, Jonathan L; Siew, Germaine J; Levy, Miriam H; Thwar, Prasanna K; Sandahl, Melissa A; Rouse, Jeremy L; Perkins, Lisa C; Sudarsan, Arjun P; Jalili, Roxana; Pamula, Vamsee K; Srinivasan, Vijay; Fair, Richard B; Griffin, Peter B; Eckhardt, Allen E; Pollack, Michael G
2011-11-15
The feasibility of implementing pyrosequencing chemistry within droplets using electrowetting-based digital microfluidics is reported. An array of electrodes patterned on a printed-circuit board was used to control the formation, transportation, merging, mixing, and splitting of submicroliter-sized droplets contained within an oil-filled chamber. A three-enzyme pyrosequencing protocol was implemented in which individual droplets contained enzymes, deoxyribonucleotide triphosphates (dNTPs), and DNA templates. The DNA templates were anchored to magnetic beads which enabled them to be thoroughly washed between nucleotide additions. Reagents and protocols were optimized to maximize signal over background, linearity of response, cycle efficiency, and wash efficiency. As an initial demonstration of feasibility, a portion of a 229 bp Candida parapsilosis template was sequenced using both a de novo protocol and a resequencing protocol. The resequencing protocol generated over 60 bp of sequence with 100% sequence accuracy based on raw pyrogram levels. Excellent linearity was observed for all of the homopolymers (two, three, or four nucleotides) contained in the C. parapsilosis sequence. With improvements in microfluidic design it is expected that longer reads, higher throughput, and improved process integration (i.e., "sample-to-sequence" capability) could eventually be achieved using this low-cost platform.
Droplet-Based Pyrosequencing Using Digital Microfluidics
Boles, Deborah J.; Benton, Jonathan L.; Siew, Germaine J.; Levy, Miriam H.; Thwar, Prasanna K.; Sandahl, Melissa A.; Rouse, Jeremy L.; Perkins, Lisa C.; Sudarsan, Arjun P.; Jalili, Roxana; Pamula, Vamsee K.; Srinivasan, Vijay; Fair, Richard B.; Griffin, Peter B.; Eckhardt, Allen E.; Pollack, Michael G.
2013-01-01
The feasibility of implementing pyrosequencing chemistry within droplets using electrowetting-based digital microfluidics is reported. An array of electrodes patterned on a printed-circuit board was used to control the formation, transportation, merging, mixing, and splitting of submicroliter-sized droplets contained within an oil-filled chamber. A three-enzyme pyrosequencing protocol was implemented in which individual droplets contained enzymes, deoxyribonucleotide triphosphates (dNTPs), and DNA templates. The DNA templates were anchored to magnetic beads which enabled them to be thoroughly washed between nucleotide additions. Reagents and protocols were optimized to maximize signal over background, linearity of response, cycle efficiency, and wash efficiency. As an initial demonstration of feasibility, a portion of a 229 bp Candida parapsilosis template was sequenced using both a de novo protocol and a resequencing protocol. The resequencing protocol generated over 60 bp of sequence with 100% sequence accuracy based on raw pyrogram levels. Excellent linearity was observed for all of the homopolymers (two, three, or four nucleotides) contained in the C. parapsilosis sequence. With improvements in microfluidic design it is expected that longer reads, higher throughput, and improved process integration (i.e., “sample-to-sequence” capability) could eventually be achieved using this low-cost platform. PMID:21932784
NASA Astrophysics Data System (ADS)
Phister, P. W., Jr.
1983-12-01
Development of the Air Force Institute of Technology's Digital Engineering Laboratory Network (DELNET) was continued with the development of an initial draft of a protocol standard for all seven layers as specified by the International Standards Organization's (ISO) Reference Model for Open Systems Interconnections. This effort centered on the restructuring of the Network Layer to perform Datagram routing and to conform to the developed protocol standards and actual software module development of the upper four protocol layers residing within the DELNET Monitor (Zilog MCZ 1/25 Computer System). Within the guidelines of the ISO Reference Model the Transport Layer was developed utilizing the Internet Header Format (IHF) combined with the Transport Control Protocol (TCP) to create a 128-byte Datagram. Also a limited Application Layer was created to pass the Gettysburg Address through the DELNET. This study formulated a first draft for the DELNET Protocol Standard and designed, implemented, and tested the Network, Transport, and Application Layers to conform to these protocol standards.
A review on transport layer protocol performance for delivering video on an adhoc network
NASA Astrophysics Data System (ADS)
Suherman; Suwendri; Al-Akaidi, Marwan
2017-09-01
The transport layer protocol is responsible for the end to end data transmission. Transmission control protocol (TCP) provides a reliable connection and user datagram protocol (UDP) offers fast but unguaranteed data transfer. Meanwhile, the 802.11 (wireless fidelity/WiFi) networks have been widely used as internet hotspots. This paper evaluates TCP, TCP variants and UDP performances for video transmission on an adhoc network. The transport protocol - medium access cross-layer is proposed by prioritizing TCP acknowledgement to reduce delay. The NS-2 evaluations show that the average delays increase linearly for all the evaluated protocols and the average packet losses grow logarithmically. UDP produces the lowest transmission delay; 5.4% and 5.8% lower than TCP and TCP variant, but experiences the highest packet loss. Both TCP and TCP Vegas maintain packet loss as low as possible. The proposed cross-layer successfully decreases TCP and TCP Vegas delay about 0.12 % and 0.15%, although losses remain similar.
Fessler, Stephanie J; Simon, Harold K; Yancey, Arthur H; Colman, Michael; Hirsh, Daniel A
2014-03-01
The use of Emergency Medical Services (EMS) for low-acuity pediatric problems is well documented. Attempts have been made to curb potentially unnecessary transports, including using EMS dispatch protocols, shown to predict acuity and needs of adults. However, there are limited data about this in children. The primary objective of this study is to determine the pediatric emergency department (PED) resource utilization (surrogate of acuity level) for pediatric patients categorized as "low-acuity" by initial EMS protocols. Records of all pediatric patients classified as "low acuity" and transported to a PED in winter and summer of 2010 were reviewed. Details of the PED visit were recorded. Patients were categorized and compared based on chief complaint group. Resource utilization was defined as requiring any prescription medications, labs, procedures, consults, admission or transfer. "Under-triage" was defined as a "low-acuity" EMS transport subsequently requiring emergent interventions. Of the 876 eligible cases, 801 were included; 392/801 had no resource utilization while 409 of 801 had resource utilization. Most (737/801) were discharged to home; however, 64/801 were admitted, including 1 of 801 requiring emergent intervention (under-triage rate 0.12%). Gastroenterology and trauma groups had a significant increase in resource utilization, while infectious disease and ear-nose-throat groups had decreased resource utilization. While this EMS system did not well predict overall resource utilization, it safely identified most low-acuity patients, with a low under-triage rate. This study identifies subgroups of patients that could be managed without emergent transport and can be used to further refine current protocols or establish secondary triage systems. © 2013.
Testing ZigBee Motes for Monitoring Refrigerated Vegetable Transportation under Real Conditions
Ruiz-Garcia, Luis; Barreiro, Pilar; Robla, Jose Ignacio; Lunadei, Loredana
2010-01-01
Quality control and monitoring of perishable goods during transportation and delivery services is an increasing concern for producers, suppliers, transport decision makers and consumers. The major challenge is to ensure a continuous ‘cold chain’ from producer to consumer in order to guaranty prime condition of goods. In this framework, the suitability of ZigBee protocol for monitoring refrigerated transportation has been proposed by several authors. However, up to date there was not any experimental work performed under real conditions. Thus, the main objective of our experiment was to test wireless sensor motes based in the ZigBee/IEEE 802.15.4 protocol during a real shipment. The experiment was conducted in a refrigerated truck traveling through two countries (Spain and France) which means a journey of 1,051 kilometers. The paper illustrates the great potential of this type of motes, providing information about several parameters such as temperature, relative humidity, door openings and truck stops. Psychrometric charts have also been developed for improving the knowledge about water loss and condensation on the product during shipments. PMID:22399917
Testing ZigBee motes for monitoring refrigerated vegetable transportation under real conditions.
Ruiz-Garcia, Luis; Barreiro, Pilar; Robla, Jose Ignacio; Lunadei, Loredana
2010-01-01
Quality control and monitoring of perishable goods during transportation and delivery services is an increasing concern for producers, suppliers, transport decision makers and consumers. The major challenge is to ensure a continuous 'cold chain' from producer to consumer in order to guaranty prime condition of goods. In this framework, the suitability of ZigBee protocol for monitoring refrigerated transportation has been proposed by several authors. However, up to date there was not any experimental work performed under real conditions. Thus, the main objective of our experiment was to test wireless sensor motes based in the ZigBee/IEEE 802.15.4 protocol during a real shipment. The experiment was conducted in a refrigerated truck traveling through two countries (Spain and France) which means a journey of 1,051 kilometers. The paper illustrates the great potential of this type of motes, providing information about several parameters such as temperature, relative humidity, door openings and truck stops. Psychrometric charts have also been developed for improving the knowledge about water loss and condensation on the product during shipments.
NASA Astrophysics Data System (ADS)
Martinez, Ralph; Nam, Jiseung
1992-07-01
Picture Archiving and Communication Systems (PACS) is an integration of digital image formation in a hospital, which encompasses various imaging equipment, image viewing workstations, image databases, and a high speed network. The integration requires a standardization of communication protocols to connect devices from different vendors. The American College of Radiology and the National Electrical Manufacturers Association (ACR- NEMA) standard Version 2.0 provides a point-to-point hardware interface, a set of software commands, and a consistent set of data formats for PACS. But, it is inadequate for PACS networking environments, because of its point-to-point nature and its inflexibility to allow other services and protocols in the future. Based on previous experience of PACS developments in The University of Arizona, a new communication protocol for PACS networks and an approach were proposed to ACR-NEMA Working Group VI. The defined PACS protocol is intended to facilitate the development of PACS''s capable of interfacing with other hospital information systems. Also, it is intended to allow the creation of diagnostic information data bases which can be interrogated by a variety of distributed devices. A particularly important goal is to support communications in a multivendor environment. The new protocol specifications are defined primarily as a combination of the International Organization for Standardization/Open Systems Interconnection (ISO/OSI), TCP/IP protocols, and the data format portion of ACR-NEMA standard. This paper addresses the specification and implementation of the ISO-based protocol into a PACS prototype. The protocol specification, which covers Presentation, Session, Transport, and Network layers, is summarized briefly. The protocol implementation is discussed based on our implementation efforts in the UNIX Operating System Environment. At the same time, results of performance comparison between the ISO and TCP/IP implementations are presented to demonstrate the implementation of defined protocol. The testing of performance analysis is done by prototyping PACS on available platforms, which are Micro VAX II, DECstation and SUN Workstation.
IJS: An Intelligent Junction Selection Based Routing Protocol for VANET to Support ITS Services.
Bhoi, Sourav Kumar; Khilar, Pabitra Mohan
2014-01-01
Selecting junctions intelligently for data transmission provides better intelligent transportation system (ITS) services. The main problem in vehicular communication is high disturbances of link connectivity due to mobility and less density of vehicles. If link conditions are predicted earlier, then there is a less chance of performance degradation. In this paper, an intelligent junction selection based routing protocol (IJS) is proposed to transmit the data in a quickest path, in which the vehicles are mostly connected and have less link connectivity problem. In this protocol, a helping vehicle is set at every junction to control the communication by predicting link failures or network gaps in a route. Helping vehicle at the junction produces a score for every neighboring junction to forward the data to the destination by considering the current traffic information and selects that junction which has minimum score. IJS protocol is implemented and compared with GyTAR, A-STAR, and GSR routing protocols. Simulation results show that IJS performs better in terms of average end-to-end delay, network gap encounter, and number of hops.
IJS: An Intelligent Junction Selection Based Routing Protocol for VANET to Support ITS Services
Khilar, Pabitra Mohan
2014-01-01
Selecting junctions intelligently for data transmission provides better intelligent transportation system (ITS) services. The main problem in vehicular communication is high disturbances of link connectivity due to mobility and less density of vehicles. If link conditions are predicted earlier, then there is a less chance of performance degradation. In this paper, an intelligent junction selection based routing protocol (IJS) is proposed to transmit the data in a quickest path, in which the vehicles are mostly connected and have less link connectivity problem. In this protocol, a helping vehicle is set at every junction to control the communication by predicting link failures or network gaps in a route. Helping vehicle at the junction produces a score for every neighboring junction to forward the data to the destination by considering the current traffic information and selects that junction which has minimum score. IJS protocol is implemented and compared with GyTAR, A-STAR, and GSR routing protocols. Simulation results show that IJS performs better in terms of average end-to-end delay, network gap encounter, and number of hops. PMID:27433485
A Lightweight Protocol for Secure Video Streaming
Morkevicius, Nerijus; Bagdonas, Kazimieras
2018-01-01
The Internet of Things (IoT) introduces many new challenges which cannot be solved using traditional cloud and host computing models. A new architecture known as fog computing is emerging to address these technological and security gaps. Traditional security paradigms focused on providing perimeter-based protections and client/server point to point protocols (e.g., Transport Layer Security (TLS)) are no longer the best choices for addressing new security challenges in fog computing end devices, where energy and computational resources are limited. In this paper, we present a lightweight secure streaming protocol for the fog computing “Fog Node-End Device” layer. This protocol is lightweight, connectionless, supports broadcast and multicast operations, and is able to provide data source authentication, data integrity, and confidentiality. The protocol is based on simple and energy efficient cryptographic methods, such as Hash Message Authentication Codes (HMAC) and symmetrical ciphers, and uses modified User Datagram Protocol (UDP) packets to embed authentication data into streaming data. Data redundancy could be added to improve reliability in lossy networks. The experimental results summarized in this paper confirm that the proposed method efficiently uses energy and computational resources and at the same time provides security properties on par with the Datagram TLS (DTLS) standard. PMID:29757988
A Lightweight Protocol for Secure Video Streaming.
Venčkauskas, Algimantas; Morkevicius, Nerijus; Bagdonas, Kazimieras; Damaševičius, Robertas; Maskeliūnas, Rytis
2018-05-14
The Internet of Things (IoT) introduces many new challenges which cannot be solved using traditional cloud and host computing models. A new architecture known as fog computing is emerging to address these technological and security gaps. Traditional security paradigms focused on providing perimeter-based protections and client/server point to point protocols (e.g., Transport Layer Security (TLS)) are no longer the best choices for addressing new security challenges in fog computing end devices, where energy and computational resources are limited. In this paper, we present a lightweight secure streaming protocol for the fog computing "Fog Node-End Device" layer. This protocol is lightweight, connectionless, supports broadcast and multicast operations, and is able to provide data source authentication, data integrity, and confidentiality. The protocol is based on simple and energy efficient cryptographic methods, such as Hash Message Authentication Codes (HMAC) and symmetrical ciphers, and uses modified User Datagram Protocol (UDP) packets to embed authentication data into streaming data. Data redundancy could be added to improve reliability in lossy networks. The experimental results summarized in this paper confirm that the proposed method efficiently uses energy and computational resources and at the same time provides security properties on par with the Datagram TLS (DTLS) standard.
Enhanced Estimation of Terrestrial Loadings for TMDLs: Normalization Approach
USDA-ARS?s Scientific Manuscript database
TMDL implementation plans to remediate pathogen-impaired streams are usually based on deterministic terrestrial fate and transport (DTFT) models. A novel protocol is proposed that can effectively, efficiently, and explicitly capture the predictive uncertainty of DTFT models used to establish terres...
Analysis of Pervasive Mobile Ad Hoc Routing Protocols
NASA Astrophysics Data System (ADS)
Qadri, Nadia N.; Liotta, Antonio
Mobile ad hoc networks (MANETs) are a fundamental element of pervasive networks and therefore, of pervasive systems that truly support pervasive computing, where user can communicate anywhere, anytime and on-the-fly. In fact, future advances in pervasive computing rely on advancements in mobile communication, which includes both infrastructure-based wireless networks and non-infrastructure-based MANETs. MANETs introduce a new communication paradigm, which does not require a fixed infrastructure - they rely on wireless terminals for routing and transport services. Due to highly dynamic topology, absence of established infrastructure for centralized administration, bandwidth constrained wireless links, and limited resources in MANETs, it is challenging to design an efficient and reliable routing protocol. This chapter reviews the key studies carried out so far on the performance of mobile ad hoc routing protocols. We discuss performance issues and metrics required for the evaluation of ad hoc routing protocols. This leads to a survey of existing work, which captures the performance of ad hoc routing algorithms and their behaviour from different perspectives and highlights avenues for future research.
Microfluidic Transduction Harnesses Mass Transport Principles to Enhance Gene Transfer Efficiency.
Tran, Reginald; Myers, David R; Denning, Gabriela; Shields, Jordan E; Lytle, Allison M; Alrowais, Hommood; Qiu, Yongzhi; Sakurai, Yumiko; Li, William C; Brand, Oliver; Le Doux, Joseph M; Spencer, H Trent; Doering, Christopher B; Lam, Wilbur A
2017-10-04
Ex vivo gene therapy using lentiviral vectors (LVs) is a proven approach to treat and potentially cure many hematologic disorders and malignancies but remains stymied by cumbersome, cost-prohibitive, and scale-limited production processes that cannot meet the demands of current clinical protocols for widespread clinical utilization. However, limitations in LV manufacture coupled with inefficient transduction protocols requiring significant excess amounts of vector currently limit widespread implementation. Herein, we describe a microfluidic, mass transport-based approach that overcomes the diffusion limitations of current transduction platforms to enhance LV gene transfer kinetics and efficiency. This novel ex vivo LV transduction platform is flexible in design, easy to use, scalable, and compatible with standard cell transduction reagents and LV preparations. Using hematopoietic cell lines, primary human T cells, primary hematopoietic stem and progenitor cells (HSPCs) of both murine (Sca-1 + ) and human (CD34 + ) origin, microfluidic transduction using clinically processed LVs occurs up to 5-fold faster and requires as little as one-twentieth of LV. As an in vivo validation of the microfluidic-based transduction technology, HSPC gene therapy was performed in hemophilia A mice using limiting amounts of LV. Compared to the standard static well-based transduction protocols, only animals transplanted with microfluidic-transduced cells displayed clotting levels restored to normal. Copyright © 2017 The Author(s). Published by Elsevier Inc. All rights reserved.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Ameme, Dan Selorm Kwami; Guttromson, Ross
This report characterizes communications network latency under various network topologies and qualities of service (QoS). The characterizations are probabilistic in nature, allowing deeper analysis of stability for Internet Protocol (IP) based feedback control systems used in grid applications. The work involves the use of Raspberry Pi computers as a proxy for a controlled resource, and an ns-3 network simulator on a Linux server to create an experimental platform (testbed) that can be used to model wide-area grid control network communications in smart grid. Modbus protocol is used for information transport, and Routing Information Protocol is used for dynamic route selectionmore » within the simulated network.« less
The Behavior of TCP and Its Extensions in Space
NASA Technical Reports Server (NTRS)
Wang, Ruhai; Horan, Stephen
2001-01-01
The performance of Transmission Control Protocol (TCP) in space has been examined from the observations of simulation and experimental tests for several years at National Aeronautics and Space Administration (NASA), Department of Defense (DoD) and universities. At New Mexico State University (NMSU), we have been concentrating on studying the performance of two protocol suites: the file transfer protocol (ftp) running over Transmission Control Protocol/Internet Protocol (TCP/IP) stack and the file protocol (fp) running over the Space Communications Protocol Standards (SCPS)-Transport Protocol (TP) developed under the Consultative Committee for Space Data Systems (CCSDS) standards process. SCPS-TP is considered to be TCP's extensions for space communications. This dissertation experimentally studies the behavior of TCP and SCPS-TP by running the protocol suites over both the Space-to-Ground Link Simulator (SGLS) test-bed and realistic satellite link. The study concentrates on comparing protocol behavior by plotting the averaged file transfer times for different experimental configurations and analyzing them using Statistical Analysis System (SAS) based procedures. The effects of different link delays and various Bit-Error-Rates (BERS) on each protocol performance are also studied and linear regression models are built for experiments over SGLS test-bed to reflect the relationships between the file transfer time and various transmission conditions.
Solving iTOUGH2 simulation and optimization problems using the PEST protocol
DOE Office of Scientific and Technical Information (OSTI.GOV)
Finsterle, S.A.; Zhang, Y.
2011-02-01
The PEST protocol has been implemented into the iTOUGH2 code, allowing the user to link any simulation program (with ASCII-based inputs and outputs) to iTOUGH2's sensitivity analysis, inverse modeling, and uncertainty quantification capabilities. These application models can be pre- or post-processors of the TOUGH2 non-isothermal multiphase flow and transport simulator, or programs that are unrelated to the TOUGH suite of codes. PEST-style template and instruction files are used, respectively, to pass input parameters updated by the iTOUGH2 optimization routines to the model, and to retrieve the model-calculated values that correspond to observable variables. We summarize the iTOUGH2 capabilities and demonstratemore » the flexibility added by the PEST protocol for the solution of a variety of simulation-optimization problems. In particular, the combination of loosely coupled and tightly integrated simulation and optimization routines provides both the flexibility and control needed to solve challenging inversion problems for the analysis of multiphase subsurface flow and transport systems.« less
RATIONALE
Understanding the transport and deposition of inhaled aerosols is of fundamental importance to inhalation toxicology and aerosol therapy. Herein, we focus on the development of a computer based oral morphology and related computational fluid dynamics (CFD) studi...
VANET Clustering Based Routing Protocol Suitable for Deserts.
Nasr, Mohammed Mohsen Mohammed; Abdelgader, Abdeldime Mohamed Salih; Wang, Zhi-Gong; Shen, Lian-Feng
2016-04-06
In recent years, there has emerged applications of vehicular ad hoc networks (VANETs) towards security, safety, rescue, exploration, military and communication redundancy systems in non-populated areas, besides its ordinary use in urban environments as an essential part of intelligent transportation systems (ITS). This paper proposes a novel algorithm for the process of organizing a cluster structure and cluster head election (CHE) suitable for VANETs. Moreover, it presents a robust clustering-based routing protocol, which is appropriate for deserts and can achieve high communication efficiency, ensuring reliable information delivery and optimal exploitation of the equipment on each vehicle. A comprehensive simulation is conducted to evaluate the performance of the proposed CHE and routing algorithms.
VANET Clustering Based Routing Protocol Suitable for Deserts
Mohammed Nasr, Mohammed Mohsen; Abdelgader, Abdeldime Mohamed Salih; Wang, Zhi-Gong; Shen, Lian-Feng
2016-01-01
In recent years, there has emerged applications of vehicular ad hoc networks (VANETs) towards security, safety, rescue, exploration, military and communication redundancy systems in non-populated areas, besides its ordinary use in urban environments as an essential part of intelligent transportation systems (ITS). This paper proposes a novel algorithm for the process of organizing a cluster structure and cluster head election (CHE) suitable for VANETs. Moreover, it presents a robust clustering-based routing protocol, which is appropriate for deserts and can achieve high communication efficiency, ensuring reliable information delivery and optimal exploitation of the equipment on each vehicle. A comprehensive simulation is conducted to evaluate the performance of the proposed CHE and routing algorithms. PMID:27058539
The reliable multicast protocol application programming interface
NASA Technical Reports Server (NTRS)
Montgomery , Todd; Whetten, Brian
1995-01-01
The Application Programming Interface for the Berkeley/WVU implementation of the Reliable Multicast Protocol is described. This transport layer protocol is implemented as a user library that applications and software buses link against.
An Evaluation of Protocol Enhancing Proxies and File Transport Protocols for Satellite Communication
NASA Technical Reports Server (NTRS)
Finch, Patrick Eugene; Sullivan, Donald; Ivancic, William D.
2012-01-01
NASA is utilizing Global Hawk aircraft in high-altitude, long-duration Earth science missions. Communications with the onboard research equipment and sensors (the science payload) is via Ku-Band radio utilizing satellites in geostationary orbits. All payload communications use standard Internet Protocols and routing, and much of the data to be transferred is comprised of very large files. The science community is interested in fully utilizing these communication links to retrieve data as quickly and reliably as possible. A test bed was developed at NASA Ames to evaluate modern transport protocols as well as Protocol Enhancing Proxies (PEPs) to determine what tools best fit the needs of the science community. This paper describes the test bed used, the protocols, the PEPs that were evaluated, the particular tests performed and the results and conclusions.
Secure transport and adaptation of MC-EZBC video utilizing H.264-based transport protocols☆
Hellwagner, Hermann; Hofbauer, Heinz; Kuschnig, Robert; Stütz, Thomas; Uhl, Andreas
2012-01-01
Universal Multimedia Access (UMA) calls for solutions where content is created once and subsequently adapted to given requirements. With regard to UMA and scalability, which is required often due to a wide variety of end clients, the best suited codecs are wavelet based (like the MC-EZBC) due to their inherent high number of scaling options. However, most transport technologies for delivering videos to end clients are targeted toward the H.264/AVC standard or, if scalability is required, the H.264/SVC. In this paper we will introduce a mapping of the MC-EZBC bitstream to existing H.264/SVC based streaming and scaling protocols. This enables the use of highly scalable wavelet based codecs on the one hand and the utilization of already existing network technologies without accruing high implementation costs on the other hand. Furthermore, we will evaluate different scaling options in order to choose the best option for given requirements. Additionally, we will evaluate different encryption options based on transport and bitstream encryption for use cases where digital rights management is required. PMID:26869746
Control systems and coordination protocols of the secretory pathway.
Luini, Alberto; Mavelli, Gabriella; Jung, Juan; Cancino, Jorge
2014-01-01
Like other cellular modules, the secretory pathway and the Golgi complex are likely to be supervised by control systems that support homeostasis and optimal functionality under all conditions, including external and internal perturbations. Moreover, the secretory apparatus must be functionally connected with other cellular modules, such as energy metabolism and protein degradation, via specific rules of interaction, or "coordination protocols". These regulatory devices are of fundamental importance for optimal function; however, they are generally "hidden" at steady state. The molecular components and the architecture of the control systems and coordination protocols of the secretory pathway are beginning to emerge through studies based on the use of controlled transport-specific perturbations aimed specifically at the detection and analysis of these internal regulatory devices.
van Rein, Eveline A J; Houwert, R Marijn; Gunning, Amy C; Lichtveld, Rob A; Leenen, Luke P H; van Heijl, Mark
2017-08-01
Prehospital trauma triage ensures proper transport of patients at risk of severe injury to hospitals with an appropriate corresponding level of trauma care. Incorrect triage results in undertriage and overtriage. The American College of Surgeons Committee on Trauma recommends an undertriage rate below 5% and an overtriage rate below 50% for prehospital trauma triage protocols. To find the most accurate prehospital trauma triage protocol, a clear overview of all currently available protocols and corresponding outcomes is necessary. The aim of this systematic review was to evaluate the current literature on all available prehospital trauma triage protocols and determine accuracy of protocol-based triage quality in terms of sensitivity and specificity. A search of Pubmed, Embase, and Cochrane Library databases was performed to identify all studies describing prehospital trauma triage protocols before November 2016. The search terms included "trauma," "trauma center," or "trauma system" combined with "triage," "undertriage," or "overtriage." All studies describing protocol-based triage quality were reviewed. To assess the quality of these type of studies, a new critical appraisal tool was developed. In this review, 21 articles were included with numbers of patients ranging from 130 to over 1 million. Significant predictors for severe injury were: vital signs, suspicion of certain anatomic injuries, mechanism of injury, and age. Sensitivity ranged from 10% to 100%; specificity from 9% to 100%. Nearly all protocols had a low sensitivity, thereby failing to identify severely injured patients. Additionally, the critical appraisal showed poor quality of the majority of included studies. This systematic review shows that nearly all protocols are incapable of identifying severely injured patients. Future studies of high methodological quality should be performed to improve prehospital trauma triage protocols. Systematic review, level III.
Role of Distance-Based Routing in Traffic Dynamics on Mobile Networks
NASA Astrophysics Data System (ADS)
Yang, Han-Xin; Wang, Wen-Xu
2013-06-01
Despite of intensive investigations on transportation dynamics taking place on complex networks with fixed structures, a deep understanding of networks consisting of mobile nodes is challenging yet, especially the lacking of insight into the effects of routing strategies on transmission efficiency. We introduce a distance-based routing strategy for networks of mobile agents toward enhancing the network throughput and the transmission efficiency. We study the transportation capacity and delivering time of data packets associated with mobility and communication ability. Interestingly, we find that the transportation capacity is optimized at moderate moving speed, which is quite different from random routing strategy. In addition, both continuous and discontinuous transitions from free flow to congestions are observed. Degree distributions are explored in order to explain the enhancement of network throughput and other observations. Our work is valuable toward understanding complex transportation dynamics and designing effective routing protocols.
Security Analysis of DTN Architecture and Bundle Protocol Specification for Space-Based Networks
NASA Technical Reports Server (NTRS)
Ivancic, William D.
2009-01-01
A Delay-Tolerant Network (DTN) Architecture (Request for Comment, RFC-4838) and Bundle Protocol Specification, RFC-5050, have been proposed for space and terrestrial networks. Additional security specifications have been provided via the Bundle Security Specification (currently a work in progress as an Internet Research Task Force internet-draft) and, for link-layer protocols applicable to Space networks, the Licklider Transport Protocol Security Extensions. This document provides a security analysis of the current DTN RFCs and proposed security related internet drafts with a focus on space-based communication networks, which is a rather restricted subset of DTN networks. Note, the original focus and motivation of DTN work was for the Interplanetary Internet . This document does not address general store-and-forward network overlays, just the current work being done by the Internet Research Task Force (IRTF) and the Consultative Committee for Space Data Systems (CCSDS) Space Internetworking Services Area (SIS) - DTN working group under the DTN and Bundle umbrellas. However, much of the analysis is relevant to general store-and-forward overlays.
A New Event Builder for CMS Run II
NASA Astrophysics Data System (ADS)
Albertsson, K.; Andre, J.-M.; Andronidis, A.; Behrens, U.; Branson, J.; Chaze, O.; Cittolin, S.; Darlea, G.-L.; Deldicque, C.; Dobson, M.; Dupont, A.; Erhan, S.; Gigi, D.; Glege, F.; Gomez-Ceballos, G.; Hegeman, J.; Holzner, A.; Jimenez-Estupiñán, R.; Masetti, L.; Meijers, F.; Meschi, E.; Mommsen, R. K.; Morovic, S.; Nunez-Barranco-Fernandez, C.; O'Dell, V.; Orsini, L.; Paus, C.; Petrucci, A.; Pieri, M.; Racz, A.; Roberts, P.; Sakulin, H.; Schwick, C.; Stieger, B.; Sumorok, K.; Veverka, J.; Zaza, S.; Zejdl, P.
2015-12-01
The data acquisition system (DAQ) of the CMS experiment at the CERN Large Hadron Collider (LHC) assembles events at a rate of 100 kHz, transporting event data at an aggregate throughput of 100GB/s to the high-level trigger (HLT) farm. The DAQ system has been redesigned during the LHC shutdown in 2013/14. The new DAQ architecture is based on state-of-the-art network technologies for the event building. For the data concentration, 10/40 Gbps Ethernet technologies are used together with a reduced TCP/IP protocol implemented in FPGA for a reliable transport between custom electronics and commercial computing hardware. A 56 Gbps Infiniband FDR CLOS network has been chosen for the event builder. This paper discusses the software design, protocols, and optimizations for exploiting the hardware capabilities. We present performance measurements from small-scale prototypes and from the full-scale production system.
A new event builder for CMS Run II
Albertsson, K.; Andre, J-M; Andronidis, A.; ...
2015-12-23
The data acquisition system (DAQ) of the CMS experiment at the CERN Large Hadron Collider (LHC) assembles events at a rate of 100 kHz, transporting event data at an aggregate throughput of 100 GB/s to the high-level trigger (HLT) farm. The DAQ system has been redesigned during the LHC shutdown in 2013/14. The new DAQ architecture is based on state-of-the-art network technologies for the event building. For the data concentration, 10/40 Gbps Ethernet technologies are used together with a reduced TCP/IP protocol implemented in FPGA for a reliable transport between custom electronics and commercial computing hardware. A 56 Gbps Innibandmore » FDR CLOS network has been chosen for the event builder. This paper discusses the software design, protocols, and optimizations for exploiting the hardware capabilities. In conclusion, ee present performance measurements from small-scale prototypes and from the full-scale production system.« less
DOT National Transportation Integrated Search
2006-08-01
The purpose of this Traffic Noise Analysis Protocol for New Highway : Construction, Reconstruction, and Retrofit Barrier Projects (Protocol) is : to present California Department of Transportation (Caltrans) policies and : procedures for applying 23 ...
NASA Technical Reports Server (NTRS)
Ivancic, William D.
2003-01-01
Traditional NASA missions, both near Earth and deep space, have been stovepipe in nature and point-to-point in architecture. Recently, NASA and others have conceptualized missions that required space-based networking. The notion of networks in space is a drastic shift in thinking and requires entirely new architectures, radio systems (antennas, modems, and media access), and possibly even new protocols. A full system engineering approach for some key mission architectures will occur that considers issues such as the science being performed, stationkeeping, antenna size, contact time, data rates, radio-link power requirements, media access techniques, and appropriate networking and transport protocols. This report highlights preliminary architecture concepts and key technologies that will be investigated.
Introduction to Solid Supported Membrane Based Electrophysiology
Bazzone, Andre; Costa, Wagner Steuer; Braner, Markus; Călinescu, Octavian; Hatahet, Lina; Fendler, Klaus
2013-01-01
The electrophysiological method we present is based on a solid supported membrane (SSM) composed of an octadecanethiol layer chemisorbed on a gold coated sensor chip and a phosphatidylcholine monolayer on top. This assembly is mounted into a cuvette system containing the reference electrode, a chlorinated silver wire. After adsorption of membrane fragments or proteoliposomes containing the membrane protein of interest, a fast solution exchange is used to induce the transport activity of the membrane protein. In the single solution exchange protocol two solutions, one non-activating and one activating solution, are needed. The flow is controlled by pressurized air and a valve and tubing system within a faraday cage. The kinetics of the electrogenic transport activity is obtained via capacitive coupling between the SSM and the proteoliposomes or membrane fragments. The method, therefore, yields only transient currents. The peak current represents the stationary transport activity. The time dependent transporter currents can be reconstructed by circuit analysis. This method is especially suited for prokaryotic transporters or eukaryotic transporters from intracellular membranes, which cannot be investigated by patch clamp or voltage clamp methods. PMID:23711952
Introduction to solid supported membrane based electrophysiology.
Bazzone, Andre; Costa, Wagner Steuer; Braner, Markus; Călinescu, Octavian; Hatahet, Lina; Fendler, Klaus
2013-05-11
The electrophysiological method we present is based on a solid supported membrane (SSM) composed of an octadecanethiol layer chemisorbed on a gold coated sensor chip and a phosphatidylcholine monolayer on top. This assembly is mounted into a cuvette system containing the reference electrode, a chlorinated silver wire. After adsorption of membrane fragments or proteoliposomes containing the membrane protein of interest, a fast solution exchange is used to induce the transport activity of the membrane protein. In the single solution exchange protocol two solutions, one non-activating and one activating solution, are needed. The flow is controlled by pressurized air and a valve and tubing system within a faraday cage. The kinetics of the electrogenic transport activity is obtained via capacitive coupling between the SSM and the proteoliposomes or membrane fragments. The method, therefore, yields only transient currents. The peak current represents the stationary transport activity. The time dependent transporter currents can be reconstructed by circuit analysis. This method is especially suited for prokaryotic transporters or eukaryotic transporters from intracellular membranes, which cannot be investigated by patch clamp or voltage clamp methods.
Shortcuts to adiabaticity by counterdiabatic driving for trapped-ion displacement in phase space
An, Shuoming; Lv, Dingshun; del Campo, Adolfo; Kim, Kihwan
2016-01-01
The application of adiabatic protocols in quantum technologies is severely limited by environmental sources of noise and decoherence. Shortcuts to adiabaticity by counterdiabatic driving constitute a powerful alternative that speed up time-evolution while mimicking adiabatic dynamics. Here we report the experimental implementation of counterdiabatic driving in a continuous variable system, a shortcut to the adiabatic transport of a trapped ion in phase space. The resulting dynamics is equivalent to a ‘fast-motion video' of the adiabatic trajectory. The robustness of this protocol is shown to surpass that of competing schemes based on classical local controls and Fourier optimization methods. Our results demonstrate that shortcuts to adiabaticity provide a robust speedup of quantum protocols of wide applicability in quantum technologies. PMID:27669897
Schindler, Jens; Nothwang, Hans Gerd
2009-01-01
The plasma membrane separates the cell-interior from the cell's environment. To maintain homeostatic conditions and to enable transfer of information, the plasma membrane is equipped with a variety of different proteins such as transporters, channels, and receptors. The kind and number of plasma membrane proteins are a characteristic of each cell type. Owing to their location, plasma membrane proteins also represent a plethora of drug targets. Their importance has entailed many studies aiming at their proteomic identification and characterization. Therefore, protocols are required that enable their purification in high purity and quantity. Here, we report a protocol, based on aqueous polymer two-phase systems, which fulfils these demands. Furthermore, the protocol is time-saving and protects protein structure and function.
Web-based Traffic Noise Control Support System for Sustainable Transportation
NASA Astrophysics Data System (ADS)
Fan, Lisa; Dai, Liming; Li, Anson
Traffic noise is considered as one of the major pollutions that will affect our communities in the future. This paper presents a framework of web-based traffic noise control support system (WTNCSS) for a sustainable transportation. WTNCSS is to provide the decision makers, engineers and publics a platform to efficiently access the information, and effectively making decisions related to traffic control. The system is based on a Service Oriented Architecture (SOA) which takes the advantages of the convenience of World Wide Web system with the data format of XML. The whole system is divided into different modules such as the prediction module, ontology-based expert module and dynamic online survey module. Each module of the system provides a distinct information service to the decision support center through the HTTP protocol.
Isolation of Tonoplast Vesicles from Tomato Fruit Pericarp
Snowden, Christopher J.; Thomas, Benjamin; Baxter, Charles J.; Smith, J. Andrew C.; Sweetlove, Lee J.
2017-01-01
This protocol describes the isolation of tonoplast vesicles from tomato fruit. The vesicles isolated using this procedure are of sufficiently high purity for downstream proteomic analysis whilst remaining transport competent for functional assays. The methodology was used to study the transport of amino acids during tomato fruit ripening (Snowden et al., 2015) and based on the procedure used by Betty and Smith (Bettey and Smith, 1993). Such vesicles may be useful in further studies into the dynamic transfer of metabolites across the tonoplast for storage and metabolism during tomato fruit development. PMID:29085859
Two RFID standard-based security protocols for healthcare environments.
Picazo-Sanchez, Pablo; Bagheri, Nasour; Peris-Lopez, Pedro; Tapiador, Juan E
2013-10-01
Radio Frequency Identification (RFID) systems are widely used in access control, transportation, real-time inventory and asset management, automated payment systems, etc. Nevertheless, the use of this technology is almost unexplored in healthcare environments, where potential applications include patient monitoring, asset traceability and drug administration systems, to mention just a few. RFID technology can offer more intelligent systems and applications, but privacy and security issues have to be addressed before its adoption. This is even more dramatical in healthcare applications where very sensitive information is at stake and patient safety is paramount. In Wu et al. (J. Med. Syst. 37:19, 43) recently proposed a new RFID authentication protocol for healthcare environments. In this paper we show that this protocol puts location privacy of tag holders at risk, which is a matter of gravest concern and ruins the security of this proposal. To facilitate the implementation of secure RFID-based solutions in the medical sector, we suggest two new applications (authentication and secure messaging) and propose solutions that, in contrast to previous proposals in this field, are fully based on ISO Standards and NIST Security Recommendations.
Choi, Bryan; Asselin, Nicholas; Pettit, Catherine C; Dannecker, Max; Machan, Jason T; Merck, Derek L; Merck, Lisa H; Suner, Selim; Williams, Kenneth A; Jay, Gregory D; Kobayashi, Leo
2016-12-01
Effective resuscitation of out-of-hospital cardiac arrest (OHCA) patients is challenging. Alternative resuscitative approaches using electromechanical adjuncts may improve provider performance. Investigators applied simulation to study the effect of an experimental automation-assisted, goal-directed OHCA management protocol on EMS providers' resuscitation performance relative to standard protocols and equipment. Two-provider (emergency medical technicians (EMT)-B and EMT-I/C/P) teams were randomized to control or experimental group. Each team engaged in 3 simulations: baseline simulation (standard roles); repeat simulation (standard roles); and abbreviated repeat simulation (reversed roles, i.e., basic life support provider performing ALS tasks). Control teams used standard OHCA protocols and equipment (with high-performance cardiopulmonary resuscitation training intervention); for second and third simulations, experimental teams performed chest compression, defibrillation, airway, pulmonary ventilation, vascular access, medication, and transport tasks with goal-directed protocol and resuscitation-automating devices. Videorecorders and simulator logs collected resuscitation data. Ten control and 10 experimental teams comprised 20 EMT-B's; 1 EMT-I, 8 EMT-C's, and 11 EMT-P's; study groups were not fully matched. Both groups suboptimally performed chest compressions and ventilations at baseline. For their second simulations, control teams performed similarly except for reduced on-scene time, and experimental teams improved their chest compressions (P=0.03), pulmonary ventilations (P<0.01), and medication administration (P=0.02); changes in their performance of chest compression, defibrillation, airway, and transport tasks did not attain significance against control teams' changes. Experimental teams maintained performance improvements during reversed-role simulations. Simulation-based investigation into OHCA resuscitation revealed considerable variability and improvable deficiencies in small EMS teams. Goal-directed, automation-assisted OHCA management augmented select resuscitation bundle element performance without comprehensive improvement.
Estimation of network path segment delays
DOE Office of Scientific and Technical Information (OSTI.GOV)
Nichols, Kathleen Marie
A method for estimation of a network path segment delay includes determining a scaled time stamp for each packet of a plurality of packets by scaling a time stamp for each respective packet to minimize a difference of at least one of a frequency and a frequency drift between a transport protocol clock of a host and a monitoring point. The time stamp for each packet is provided by the transport protocol clock of the host. A corrected time stamp for each packet is determined by removing from the scaled time stamp for each respective packet, a temporal offset betweenmore » the transport protocol clock and the monitoring clock by minimizing a temporal delay variation of the plurality of packets traversing a segment between the host and the monitoring point.« less
Engelman, Glenn H; Carry, Patrick M; Kubes, Kyle M; Gleason, Michael J
2016-11-01
Patients presenting with ST-elevation myocardial infarction (STEMI) benefit from rapid cardiac reperfusion therapy. Emergency medical service (EMS) agencies can improve patient outcomes by calling STEMI alerts to the receiving facility. The aim of this study was to evaluate the use of pre-hospital activation systems for suspected ST-elevation myocardial infarctions (STEMI) throughout Colorado. A cross sectional, survey design was utilized to collect all data from EMS agencies in Colorado. A univariable logistic regression model was used to identify factors predictive of an agency reporting that they utilize a STEMI activation protocol. 84.5% [95% CI: 78.3 to 90.7%] of agencies included indicate that they utilize a STEMI activation protocol. Based on the logistic regression analysis, the number of EMT employees was significantly associated with whether or not an agency indicates that they utilize a STEMI activation protocol. For every 10% increase in the number of EMTs employed by an EMS agency, there was a 3.0 [95% CI: 1.5 to 6.0, p = 0.0012] fold increase in the odds of the agency indicating they utilize a STEMI activation protocol. Our study provides evidence that larger agencies are more likely to utilize a STEMI activation protocol. In areas without a STEMI system of care, improvements in smaller agencies that cover more ground (with longer transport times) should be the focus for protocol implementation. Based on the current prevalence of such training, competency based training in reading ST-elevations on ECG should be considered by EMS agencies.
DOT National Transportation Integrated Search
2017-01-01
This report summarizes the local calibration of the distress models for the Northeast (NE) region of the United States and the development of new design tables for new flexible pavement structures. Design, performance, and traffic data collected on t...
Brown, Kathleen M; Hirshon, Jon Mark; Alcorta, Richard; Weik, Tasmeen S; Lawner, Ben; Ho, Shiu; Wright, Joseph L
2014-01-01
In 2008, the National Highway Traffic Safety Administration funded the development of a model process for the development and implementation of evidence-based guidelines (EBGs) for emergency medical services (EMS). We report on the implementation and evaluation of an evidence-based prehospital pain management protocol developed using this model process. An evidence-based protocol for prehospital management of pain resulting from injuries and burns was reviewed by the Protocol Review Committee (PRC) of the Maryland Institute for Emergency Medical Services Systems (MIEMSS). The PRC recommended revisions to the Maryland protocol that reflected recommendations in the EBG: weight-based dosing and repeat dosing of morphine. A training curriculum was developed and implemented using Maryland's online Learning Management System and successfully accessed by 3,941 paramedics and 15,969 BLS providers. Field providers submitted electronic patient care reports to the MIEMSS statewide prehospital database. Inclusion criteria were injured or burned patients transported by Maryland ambulances to Maryland hospitals whose electronic patient care records included data for level of EMS provider training during a 12-month preimplementation period and a 12-month postimplementation period from September 2010 through March 2012. We compared the percentage of patients receiving pain scale assessments and morphine, as well as the dose of morphine administered and the use of naloxone as a rescue medication for opiate use, before and after the protocol change. No differences were seen in the percentage of patients who had a pain score documented or the percent of patients receiving morphine before and after the protocol change, but there was a significant increase in the total dose and dose in mg/kg administered per patient. During the postintervention phase, patients received an 18% higher total morphine dose and a 14.9% greater mg/kg dose. We demonstrated that the implementation of a revised statewide prehospital pain management protocol based on an EBG developed using the National Prehospital Evidence-based Guideline Model Process was associated with an increase in dosing of narcotic pain medication consistent with that recommended by the EBG. No differences were seen in the percentage of patients receiving opiate analgesia or in the documentation of pain scores.
AD HOC Networks for the Autonomous Car
NASA Astrophysics Data System (ADS)
Ron, Davidescu; Negrus, Eugen
2017-10-01
The future of the vehicle is made of cars, roads and infrastructures connected in a two way automated communication in a holistic system. It is a mandatory to use Encryption to maintain Confidentiality, Integrity and Availability in an ad hoc vehicle network. Vehicle to Vehicle communication, requires multichannel interaction between mobile, moving and changing parties to insure the full benefit from data sharing and real time decision making, a network of such users referred as mobile ad hoc network (MANET), however as ad hoc networks were not implemented in such a scale, it is not clear what is the best method and protocol to apply. Furthermore the visibility of secure preferred asymmetric encrypted ad hoc networks in a real time environment of dense moving autonomous vehicles has to be demonstrated, In order to evaluate the performance of Ad Hoc networks in changing conditions a simulation of multiple protocols was performed on large number of mobile nodes. The following common routing protocols were tested, DSDV is a proactive protocol, every mobile station maintains a routing table with all available destinations, DSR is a reactive routing protocol which allows nodes in the MANET to dynamically discover a source route across multiple network hops, AODV is a reactive routing protocol Instead of being proactive. It minimizes the number of broadcasts by creating routes based on demand, SAODV is a secure version of AODV, requires heavyweight asymmetric cryptographic, ARIANDE is a routing protocol that relies on highly efficient symmetric cryptography the concept is primarily based on DSR. A methodical evolution was performed in a various density of transportation, based on known communication bench mark parameters including, Throughput Vs. time, Routing Load per packets and bytes. Out of the none encrypted protocols, It is clear that in terms of performance of throughput and routing load DSR protocol has a clear advantage the high node number mode. The encrypted protocols show lower performance with ARIANDE being superior to SAODV and SRP. Nevertheless all protocol simulation proved it to match required real time performance.
The NTCIP guide : updated version 3
DOT National Transportation Integrated Search
2002-10-01
The transportation community has long needed transportation systems that could be built using devices and components that were interchangeable and interoperable. The National Transportation Communications for ITS Protocol (NTCIP) family of standards ...
Performance Analysis of TCP Enhancements in Satellite Data Networks
NASA Technical Reports Server (NTRS)
Broyles, Ren H.
1999-01-01
This research examines two proposed enhancements to the well-known Transport Control Protocol (TCP) in the presence of noisy communication links. The Multiple Pipes protocol is an application-level adaptation of the standard TCP protocol, where several TCP links cooperate to transfer data. The Space Communication Protocol Standard - Transport Protocol (SCPS-TP) modifies TCP to optimize performance in a satellite environment. While SCPS-TP has inherent advantages that allow it to deliver data more rapidly than Multiple Pipes, the protocol, when optimized for operation in a high-error environment, is not compatible with legacy TCP systems, and requires changes to the TCP specification. This investigation determines the level of improvement offered by SCPS-TP's Corruption Mode, which will help determine if migration to the protocol is appropriate in different environments. As the percentage of corrupted packets approaches 5 %, Multiple Pipes can take over five times longer than SCPS-TP to deliver data. At high error rates, SCPS-TP's advantage is primarily caused by Multiple Pipes' use of congestion control algorithms. The lack of congestion control, however, limits the systems in which SCPS-TP can be effectively used.
Emulation Platform for Cyber Analysis of Wireless Communication Network Protocols
DOE Office of Scientific and Technical Information (OSTI.GOV)
Van Leeuwen, Brian P.; Eldridge, John M.
Wireless networking and mobile communications is increasing around the world and in all sectors of our lives. With increasing use, the density and complexity of the systems increase with more base stations and advanced protocols to enable higher data throughputs. The security of data transported over wireless networks must also evolve with the advances in technologies enabling more capable wireless networks. However, means for analysis of the effectiveness of security approaches and implementations used on wireless networks are lacking. More specifically a capability to analyze the lower-layer protocols (i.e., Link and Physical layers) is a major challenge. An analysis approachmore » that incorporates protocol implementations without the need for RF emissions is necessary. In this research paper several emulation tools and custom extensions that enable an analysis platform to perform cyber security analysis of lower layer wireless networks is presented. A use case of a published exploit in the 802.11 (i.e., WiFi) protocol family is provided to demonstrate the effectiveness of the described emulation platform.« less
The Space Communications Protocol Standards Program
NASA Technical Reports Server (NTRS)
Jeffries, Alan; Hooke, Adrian J.
1994-01-01
In the fall of 1992 NASA and the Department of Defense chartered a technical team to explore the possibility of developing a common set of space data communications standards for potential dual-use across the U.S. national space mission support infrastructure. The team focused on the data communications needs of those activities associated with on-lined control of civil and military aircraft. A two-pronged approach was adopted: a top-down survey of representative civil and military space data communications requirements was conducted; and a bottom-up analysis of available standard data communications protocols was performed. A striking intersection of civil and military space mission requirements emerged, and an equally striking consensus on the approach towards joint civil and military space protocol development was reached. The team concluded that wide segments of the U.S. civil and military space communities have common needs for: (1) an efficient file transfer protocol; (2) various flavors of underlying data transport service; (3) an optional data protection mechanism to assure end-to-end security of message exchange; and (4) an efficient internetworking protocol. These recommendations led to initiating a program to develop a suite of protocols based on these findings. This paper describes the current status of this program.
NASA Technical Reports Server (NTRS)
Wagner, Raymond S.; Barton, Richard J.
2011-01-01
Standards-based wireless sensor network (WSN) protocols are promising candidates for spacecraft avionics systems, offering unprecedented instrumentation flexibility and expandability. Ensuring reliable data transport is key, however, when migrating from wired to wireless data gathering systems. In this paper, we conduct a rigorous laboratory analysis of the relative performances of the ZigBee Pro and ISA100.11a protocols in a representative crewed aerospace environment. Since both operate in the 2.4 GHz radio frequency (RF) band shared by systems such as Wi-Fi, they are subject at times to potentially debilitating RF interference. We compare goodput (application-level throughput) achievable by both under varying levels of 802.11g Wi-Fi traffic. We conclude that while the simpler, more inexpensive ZigBee Pro protocol performs well under moderate levels of interference, the more complex and costly ISA100.11a protocol is needed to ensure reliable data delivery under heavier interference. This paper represents the first published, rigorous analysis of WSN protocols in an aerospace environment that we are aware of and the first published head-to-head comparison of ZigBee Pro and ISA100.11a.
Scalable parallel communications
NASA Technical Reports Server (NTRS)
Maly, K.; Khanna, S.; Overstreet, C. M.; Mukkamala, R.; Zubair, M.; Sekhar, Y. S.; Foudriat, E. C.
1992-01-01
Coarse-grain parallelism in networking (that is, the use of multiple protocol processors running replicated software sending over several physical channels) can be used to provide gigabit communications for a single application. Since parallel network performance is highly dependent on real issues such as hardware properties (e.g., memory speeds and cache hit rates), operating system overhead (e.g., interrupt handling), and protocol performance (e.g., effect of timeouts), we have performed detailed simulations studies of both a bus-based multiprocessor workstation node (based on the Sun Galaxy MP multiprocessor) and a distributed-memory parallel computer node (based on the Touchstone DELTA) to evaluate the behavior of coarse-grain parallelism. Our results indicate: (1) coarse-grain parallelism can deliver multiple 100 Mbps with currently available hardware platforms and existing networking protocols (such as Transmission Control Protocol/Internet Protocol (TCP/IP) and parallel Fiber Distributed Data Interface (FDDI) rings); (2) scale-up is near linear in n, the number of protocol processors, and channels (for small n and up to a few hundred Mbps); and (3) since these results are based on existing hardware without specialized devices (except perhaps for some simple modifications of the FDDI boards), this is a low cost solution to providing multiple 100 Mbps on current machines. In addition, from both the performance analysis and the properties of these architectures, we conclude: (1) multiple processors providing identical services and the use of space division multiplexing for the physical channels can provide better reliability than monolithic approaches (it also provides graceful degradation and low-cost load balancing); (2) coarse-grain parallelism supports running several transport protocols in parallel to provide different types of service (for example, one TCP handles small messages for many users, other TCP's running in parallel provide high bandwidth service to a single application); and (3) coarse grain parallelism will be able to incorporate many future improvements from related work (e.g., reduced data movement, fast TCP, fine-grain parallelism) also with near linear speed-ups.
Wesołowska-Andersen, A; Borst, L; Dalgaard, M D; Yadav, R; Rasmussen, K K; Wehner, P S; Rasmussen, M; Ørntoft, T F; Nordentoft, I; Koehler, R; Bartram, C R; Schrappe, M; Sicheritz-Ponten, T; Gautier, L; Marquart, H; Madsen, H O; Brunak, S; Stanulla, M; Gupta, R; Schmiegelow, K
2015-02-01
Childhood acute lymphoblastic leukemia survival approaches 90%. New strategies are needed to identify the 10-15% who evade cure. We applied targeted, sequencing-based genotyping of 25 000 to 34 000 preselected potentially clinically relevant single-nucleotide polymorphisms (SNPs) to identify host genome profiles associated with relapse risk in 352 patients from the Nordic ALL92/2000 protocols and 426 patients from the German Berlin-Frankfurt-Munster (BFM) ALL2000 protocol. Patients were enrolled between 1992 and 2008 (median follow-up: 7.6 years). Eleven cross-validated SNPs were significantly associated with risk of relapse across protocols. SNP and biologic pathway level analyses associated relapse risk with leukemia aggressiveness, glucocorticosteroid pharmacology/response and drug transport/metabolism pathways. Classification and regression tree analysis identified three distinct risk groups defined by end of induction residual leukemia, white blood cell count and variants in myeloperoxidase (MPO), estrogen receptor 1 (ESR1), lamin B1 (LMNB1) and matrix metalloproteinase-7 (MMP7) genes, ATP-binding cassette transporters and glucocorticosteroid transcription regulation pathways. Relapse rates ranged from 4% (95% confidence interval (CI): 1.6-6.3%) for the best group (72% of patients) to 76% (95% CI: 41-90%) for the worst group (5% of patients, P<0.001). Validation of these findings and similar approaches to identify SNPs associated with toxicities may allow future individualized relapse and toxicity risk-based treatments adaptation.
Shahzad, Aamir; Lee, Malrey; Xiong, Neal Naixue; Jeong, Gisung; Lee, Young-Keun; Choi, Jae-Young; Mahesar, Abdul Wheed; Ahmad, Iftikhar
2016-01-01
In Industrial systems, Supervisory control and data acquisition (SCADA) system, the pseudo-transport layer of the distributed network protocol (DNP3) performs the functions of the transport layer and network layer of the open systems interconnection (OSI) model. This study used a simulation design of water pumping system, in-which the network nodes are directly and wirelessly connected with sensors, and are monitored by the main controller, as part of the wireless SCADA system. This study also intends to focus on the security issues inherent in the pseudo-transport layer of the DNP3 protocol. During disassembly and reassembling processes, the pseudo-transport layer keeps track of the bytes sequence. However, no mechanism is available that can verify the message or maintain the integrity of the bytes in the bytes received/transmitted from/to the data link layer or in the send/respond from the main controller/sensors. To properly and sequentially keep track of the bytes, a mechanism is required that can perform verification while bytes are received/transmitted from/to the lower layer of the DNP3 protocol or the send/respond to/from field sensors. For security and byte verification purposes, a mechanism needs to be proposed for the pseudo-transport layer, by employing cryptography algorithm. A dynamic choice security buffer (SB) is designed and employed during the security development. To achieve the desired goals of the proposed study, a pseudo-transport layer stack model is designed using the DNP3 protocol open library and the security is deployed and tested, without changing the original design. PMID:26950129
Shahzad, Aamir; Lee, Malrey; Xiong, Neal Naixue; Jeong, Gisung; Lee, Young-Keun; Choi, Jae-Young; Mahesar, Abdul Wheed; Ahmad, Iftikhar
2016-03-03
In Industrial systems, Supervisory control and data acquisition (SCADA) system, the pseudo-transport layer of the distributed network protocol (DNP3) performs the functions of the transport layer and network layer of the open systems interconnection (OSI) model. This study used a simulation design of water pumping system, in-which the network nodes are directly and wirelessly connected with sensors, and are monitored by the main controller, as part of the wireless SCADA system. This study also intends to focus on the security issues inherent in the pseudo-transport layer of the DNP3 protocol. During disassembly and reassembling processes, the pseudo-transport layer keeps track of the bytes sequence. However, no mechanism is available that can verify the message or maintain the integrity of the bytes in the bytes received/transmitted from/to the data link layer or in the send/respond from the main controller/sensors. To properly and sequentially keep track of the bytes, a mechanism is required that can perform verification while bytes are received/transmitted from/to the lower layer of the DNP3 protocol or the send/respond to/from field sensors. For security and byte verification purposes, a mechanism needs to be proposed for the pseudo-transport layer, by employing cryptography algorithm. A dynamic choice security buffer (SB) is designed and employed during the security development. To achieve the desired goals of the proposed study, a pseudo-transport layer stack model is designed using the DNP3 protocol open library and the security is deployed and tested, without changing the original design.
Carpinella, Ilaria; Cattaneo, Davide; Bertoni, Rita; Ferrarin, Maurizio
2012-05-01
In this pilot study, we compared two protocols for robot-based rehabilitation of upper limb in multiple sclerosis (MS): a protocol involving reaching tasks (RT) requiring arm transport only and a protocol requiring both objects' reaching and manipulation (RMT). Twenty-two MS subjects were assigned to RT or RMT group. Both protocols consisted of eight sessions. During RT training, subjects moved the handle of a planar robotic manipulandum toward circular targets displayed on a screen. RMT protocol required patients to reach and manipulate real objects, by moving the robotic arm equipped with a handle which left the hand free for distal tasks. In both trainings, the robot generated resistive and perturbing forces. Subjects were evaluated with clinical and instrumental tests. The results confirmed that MS patients maintained the ability to adapt to the robot-generated forces and that the rate of motor learning increased across sessions. Robot-therapy significantly reduced arm tremor and improved arm kinematics and functional ability. Compared to RT, RMT protocol induced a significantly larger improvement in movements involving grasp (improvement in Grasp ARAT sub-score: RMT 77.4%, RT 29.5%, p=0.035) but not precision grip. Future studies are needed to evaluate if longer trainings and the use of robotic handles would significantly improve also fine manipulation.
A Passive Testing Approach for Protocols in Wireless Sensor Networks
Che, Xiaoping; Maag, Stephane; Tan, Hwee-Xian; Tan, Hwee-Pink; Zhou, Zhangbing
2015-01-01
Smart systems are today increasingly developed with the number of wireless sensor devices drastically increasing. They are implemented within several contexts throughout our environment. Thus, sensed data transported in ubiquitous systems are important, and the way to carry them must be efficient and reliable. For that purpose, several routing protocols have been proposed for wireless sensor networks (WSN). However, one stage that is often neglected before their deployment is the conformance testing process, a crucial and challenging step. Compared to active testing techniques commonly used in wired networks, passive approaches are more suitable to the WSN environment. While some works propose to specify the protocol with state models or to analyze them with simulators and emulators, we here propose a logic-based approach for formally specifying some functional requirements of a novel WSN routing protocol. We provide an algorithm to evaluate these properties on collected protocol execution traces. Further, we demonstrate the efficiency and suitability of our approach by its application into common WSN functional properties, as well as specific ones designed from our own routing protocol. We provide relevant testing verdicts through a real indoor testbed and the implementation of our protocol. Furthermore, the flexibility, genericity and practicability of our approach have been proven by the experimental results. PMID:26610495
A Passive Testing Approach for Protocols in Wireless Sensor Networks.
Che, Xiaoping; Maag, Stephane; Tan, Hwee-Xian; Tan, Hwee-Pink; Zhou, Zhangbing
2015-11-19
Smart systems are today increasingly developed with the number of wireless sensor devices drastically increasing. They are implemented within several contexts throughout our environment. Thus, sensed data transported in ubiquitous systems are important, and the way to carry them must be efficient and reliable. For that purpose, several routing protocols have been proposed for wireless sensor networks (WSN). However, one stage that is often neglected before their deployment is the conformance testing process, a crucial and challenging step. Compared to active testing techniques commonly used in wired networks, passive approaches are more suitable to the WSN environment. While some works propose to specify the protocol with state models or to analyze them with simulators and emulators, we here propose a logic-based approach for formally specifying some functional requirements of a novel WSN routing protocol. We provide an algorithm to evaluate these properties on collected protocol execution traces. Further, we demonstrate the efficiency and suitability of our approach by its application into common WSN functional properties, as well as specific ones designed from our own routing protocol. We provide relevant testing verdicts through a real indoor testbed and the implementation of our protocol. Furthermore, the flexibility, genericity and practicability of our approach have been proven by the experimental results.
Implementation of a protocol for assembling DNA in a Teflon tube
NASA Astrophysics Data System (ADS)
Walsh, Edmond J.; Feuerborn, Alexander; Cook, Peter R.
2017-02-01
Droplet based microfluidics continues to grow as a platform for chemical and biological reactions using small quantities of fluids, however complex protocols are rarely possible in existing devices. This paper implements a new approach to merging of drops, combined with magnetic bead manipulation, for the creation of ligated double-stranded DNA molecule using "Gibson assembly" chemistry. DNA assembly is initially accomplished through the merging, and mixing, of five drops followed by a thermal cycle. Then, integrating this drop merging method with magnetic beads enable the implementation of amore complete protocol consisting of nine wash steps,merging of four drop, transport of selective reagents between twelve drops using magnetic particles, followed by a thermal cycle and finally the deposition of a purified drop into an Eppendorf for downstream analysis. Gel electrophoresis is used to confirm successful DNA assembly.
NASA Astrophysics Data System (ADS)
Zhao, Yongli; Zhang, Jie; Ji, Yuefeng; Li, Hui; Wang, Huitao; Ge, Chao
2015-10-01
The end-to-end tunability is important to provision elastic channel for the burst traffic of data center optical networks. Then, how to complete the end-to-end tunability based on elastic optical networks? Software defined networking (SDN) based end-to-end tunability solution is proposed for software defined data center optical networks, and the protocol extension and implementation procedure are designed accordingly. For the first time, the flexible grid all optical networks with Tbps end-to-end tunable transport and switch system have been online demonstrated for data center interconnection, which are controlled by OpenDayLight (ODL) based controller. The performance of the end-to-end tunable transport and switch system has been evaluated with wavelength number tuning, bit rate tuning, and transmit power tuning procedure.
Exploration of a Preflight Acuity Scale for Fixed Wing Air Ambulance Transport.
Phipps, Marcy; Conley, Virginia; Constantine, William H
Despite the prevalence of fixed wing medical flights for specialized care and repatriation, few acuity rating scales exist aimed at the prediction of adverse in-flight medical events. An acuity scoring system can provide information to flight crews, allowing for staffing enhancements, protocol modifications, and flight planning, with the aim of improving patient care, outcomes, and preventing losses to providers because of costly diversions. Our medical crew developed an acuity scale, which was applied retrospectively to 296 patients transported between January 2016 and March 2017. Patients received scores based on conditions identified during the preflight medical report, the initial patient assessment, demographics, and flight factors. Five patients were identified as high-risk transports based on our scale. Three patients suffered adverse events according to our defined criteria, 2 of which occurred before transport and 1 during transport. The 3 patients suffering adverse events did not receive a score that indicated adverse events in flight. Our scale was not predictive of adverse events in flight. However, it did illuminate factors worthy of consideration. Consideration of these factors may have prevented adverse events. Published by Elsevier Inc.
In Vitro Analysis of Metabolite Transport Proteins.
Roell, Marc-Sven; Kuhnert, Franziska; Zamani-Nour, Shirin; Weber, Andreas P M
2017-01-01
The photorespiratory cycle is distributed over four cellular compartments, the chloroplast, peroxisomes, cytoplasm, and mitochondria. Shuttling of photorespiratory intermediates between these compartments is essential to maintain the function of photorespiration. Specific transport proteins mediate the transport across biological membranes and represent important components of the cellular metabolism. Although significant progress was made in the last years on identifying and characterizing new transport proteins, the overall picture of intracellular metabolite transporters is still rather incomplete. The photorespiratory cycle requires at least 25 transmembrane transport steps; however to date only plastidic glycolate/glycerate transporter and the accessory 2-oxoglutarate/malate and glutamate/malate transporters as well as the mitochondrial transporter BOU1 have been identified. The characterization of transport proteins and defining their substrates and kinetics are still major challenges.Here we present a detailed set of protocols for the in vitro characterization of transport proteins. We provide protocols for the isolation of recombinant transport protein expressed in E. coli or Saccharomyces cerevisiae and the extraction of total leaf membrane protein for in vitro analysis of transporter proteins. Further we explain the process of reconstituting transport proteins in artificial lipid vesicles and elucidate the details of transport assays.
Decontamination and management of human remains following incidents of hazardous chemical release.
Hauschild, Veronique D; Watson, Annetta; Bock, Robert
2012-01-01
To provide specific guidance and resources for systematic and orderly decontamination of human remains resulting from a chemical terrorist attack or accidental chemical release. A detailed review and health-based decision criteria protocol is summarized. Protocol basis and logic are derived from analyses of compound-specific toxicological data and chemical/physical characteristics. Guidance is suitable for civilian or military settings where human remains potentially contaminated with hazardous chemicals may be present, such as sites of transportation accidents, terrorist operations, or medical examiner processing points. Guidance is developed from data-characterizing controlled experiments with laboratory animals, fabrics, and materiel. Logic and specific procedures for decontamination and management of remains, protection of mortuary affairs personnel, and decision criteria to determine when remains are sufficiently decontaminated are presented. Established procedures as well as existing materiel and available equipment for decontamination and verification provide reasonable means to mitigate chemical hazards from chemically exposed remains. Unique scenarios such as those involving supralethal concentrations of certain liquid chemical warfare agents may prove difficult to decontaminate but can be resolved in a timely manner by application of the characterized systematic approaches. Decision criteria and protocols to "clear" decontaminated remains for transport and processing are also provided. Once appropriate decontamination and verification have been accomplished, normal procedures for management of remains and release can be followed.
The use of prostaglandins in controlling estrous cycle of the ewe: a review.
Fierro, Sergio; Gil, Jorge; Viñoles, Carolina; Olivera-Muzante, Julio
2013-02-01
This review considers the use of prostaglandin F(2α) and its synthetic analogues (PG) for controlling the estrous cycle of the ewe. Aspects such as phase of the estrus cycle, PG analogues, PG doses, ovarian follicle development pattern, CL formation, progesterone synthesis, ovulation rate, sperm transport, embryo quality, and fertility rates after PG administration are reviewed. Furthermore, protocols for estrus synchronization and their success in timed AI programs are discussed. Based on available information, the ovine CL is refractory to PG treatment for up to 2 days after ovulation. All PG analogues are effective when an appropriate dose is given; in that regard, there is a positive association between the dose administered and the proportion of ewes detected in estrus. Follicular response after PG is dependent on the phase of the estrous cycle at treatment. Altered sperm transport and low pregnancy rates are generally reported. However, reports on alteration of the steroidogenic capacity of preovulatory follicles, ovulation rate, embryo quality, recovery rates, and prolificacy, are controversial. Although various PG-based protocols can be used for estrus synchronization, a second PG injection improves estrus response when the stage of the estrous cycle at the first injection is unknown. The estrus cycle after PG administration has a normal length. Prostaglandin-based protocols for timed AI achieved poor reproductive outcomes, but increasing the interval between PG injections might increase pregnancy rates. Attempts to improve reproductive outcomes have been directed to provide a synchronized LH surge: use of different routes of AI (cervical or intrauterine), different PG doses, and increased intervals between PG injections. Finally we present our point of view regarding future perspectives on the use of PG in programs of controlled sheep reproduction. Copyright © 2013 Elsevier Inc. All rights reserved.
Lu, Xiaoqi; Wang, Lei; Zhao, Jianfeng
2012-02-01
With the development of medical information, Picture Archiving and Communications System (PACS), Hospital Information System/Radiology Information System(HIS/RIS) and other medical information management system become popular and developed, and interoperability between these systems becomes more frequent. So, these enclosed systems will be open and regionalized by means of network, and this is inevitable. If the trend becomes true, the security of information transmission may be the first problem to be solved. Based on the need for network security, we investigated the Digital Imaging and Communications in Medicine (DICOM) Standard and Transport Layer Security (TLS) Protocol, and implemented the TLS transmission of the DICOM medical information with OpenSSL toolkit and DCMTK toolkit.
Internet Data Delivery for Future Space Missions
NASA Technical Reports Server (NTRS)
Rash, James; Hogie, Keith; Casasanta, Ralph; Hennessy, Joseph F. (Technical Monitor)
2002-01-01
This paper presents work being done at NASA/GSFC (Goddard Space Flight Center) on applying standard Internet applications and protocols to meet the technology challenge of future satellite missions. Internet protocols (IP) can provide seamless dynamic communication among heterogeneous instruments, spacecraft, ground stations, and constellations of spacecraft. A primary component of this work is to design and demonstrate automated end-to-end transport of files in a dynamic space environment using off-the-shelf, low-cost, commodity-level standard applications and protocols. These functions and capabilities will become increasingly significant in the years to come as both Earth and space science missions fly more sensors and the present labor-intensive, mission-specific techniques for processing and routing data become prohibitively expensive. This paper describes how an IP-based communication architecture can support existing operations concepts and how it will enable some new and complex communication and science concepts. The authors identify specific end-to-end file transfers all the way from instruments to control centers and scientists, and then describe how each data flow can be supported using standard Internet protocols and applications. The scenarios include normal data downlink and command uplink as well as recovery scenarios for both onboard and ground failures. The scenarios are based on an Earth orbiting spacecraft with data rates and downlink capabilities from 300 Kbps to 4 Mbps. Many examples are based on designs currently being investigated for the Global Precipitation Measurement (GPM) mission.
On the Transport of Viable but Non-Culturable (VBNC) E.coli O157:H7 in Soil and Groundwater
NASA Astrophysics Data System (ADS)
Kartz, C. R.; Kachanoski, G.; Dyck, M. F.
2010-12-01
The influence of the viable but non-culturable (VBNC) state on the expression of specific phenotypic traits of Enterohemorrhagic Escherichia coli O157:H7 as well as its transport behaviour in porous media has been examined in this study. E.coli O157:H7 is a human pathogen capable of entering a viable but non-culturable (VBNC) state following exposure to sublethal stress. In the VBNC state, E.coli O157:H7 is not detectable by standard culture techniques, yet is able to retain its virulence and ability to cause illness in humans. To date there is no in-depth information regarding the transport of VBNC E.coli species in soil or groundwater. Due to the public health risk, it becomes important to examine whether discrepancies exist between the transport behaviors of culturable and VBNC E.coli O157:H7 to help decide if current protocols for detecting this pathogen are accurate. This study identifies and contrasts transport-related properties of the two cell stages including hydrophobicity, extracellular polymeric substance (EPS) composition, and cell widths/lengths. Transport behaviors of the two cellular states are quantified and compared using column transport assays. Our results show that when E.coli O157:H7 cells enter into the VBNC state, there is an accompanied decrease in the hydrophobicity of the cells, shrinking of the cell profile from rod-shaped to coccoid, as well as a significant increase in tightly-bound surface proteins and sugars. Transport assays revealed a notable increase in mass flux when cells were in the VBNC state versus the culturable state. This research will contribute to the current knowledge-base describing E.coli O157:H7 cells in the VBNC state, spark dialogue concerning the accuracy of currently-used identification protocols, as well as add further evidence to the notion that bacteria transport in the subsurface is a truly dynamic process.
Monet, Michael; Birgy-Barelli, Eléonore; Léna, Isabelle; Counillon, Laurent
2015-01-01
Endosomal acidification is critical for a wide range of processes, such as protein recycling and degradation, receptor desensitization, and neurotransmitter loading in synaptic vesicles. This acidification is described to be mediated by proton ATPases, coupled to ClC chloride transporters. Highly-conserved electroneutral protons transporters, the Na+/H+ exchangers (NHE) 6, 7 and 9 are also expressed in these compartments. Mutations in their genes have been linked with human cognitive and neurodegenerative diseases. Paradoxically, their roles remain elusive, as their intracellular localization has prevented detailed functional characterization. This manuscript shows a method to solve this problem. This consists of the selection of mutant cell lines, capable of surviving acute cytosolic acidification by retaining intracellular NHEs at the plasma membrane. It then depicts two complementary protocols to measure the ion selectivity and activity of these exchangers: (i) one based on intracellular pH measurements using fluorescence video microscopy, and (ii) one based on the fast kinetics of lithium uptake. Such protocols can be extrapolated to measure other non-electrogenic transporters. Furthermore, the selection procedure presented here generates cells with an intracellular retention defective phenotype. Therefore these cells will also express other vesicular membrane proteins at the plasma membrane. The experimental strategy depicted here may therefore constitute a potentially powerful tool to study other intracellular proteins that will be then expressed at the plasma membrane together with the vesicular Na+/H+ exchangers used for the selection. PMID:25867523
Milosavljevic, Nina; Poët, Mallorie; Monet, Michael; Birgy-Barelli, Eléonore; Léna, Isabelle; Counillon, Laurent
2015-03-30
Endosomal acidification is critical for a wide range of processes, such as protein recycling and degradation, receptor desensitization, and neurotransmitter loading in synaptic vesicles. This acidification is described to be mediated by proton ATPases, coupled to ClC chloride transporters. Highly-conserved electroneutral protons transporters, the Na+/H+ exchangers (NHE) 6, 7 and 9 are also expressed in these compartments. Mutations in their genes have been linked with human cognitive and neurodegenerative diseases. Paradoxically, their roles remain elusive, as their intracellular localization has prevented detailed functional characterization. This manuscript shows a method to solve this problem. This consists of the selection of mutant cell lines, capable of surviving acute cytosolic acidification by retaining intracellular NHEs at the plasma membrane. It then depicts two complementary protocols to measure the ion selectivity and activity of these exchangers: (i) one based on intracellular pH measurements using fluorescence video microscopy, and (ii) one based on the fast kinetics of lithium uptake. Such protocols can be extrapolated to measure other non-electrogenic transporters. Furthermore, the selection procedure presented here generates cells with an intracellular retention defective phenotype. Therefore these cells will also express other vesicular membrane proteins at the plasma membrane. The experimental strategy depicted here may therefore constitute a potentially powerful tool to study other intracellular proteins that will be then expressed at the plasma membrane together with the vesicular Na+/H+ exchangers used for the selection.
Developing and Implementing Protocols for Arctic Sea Ice Observations
NASA Astrophysics Data System (ADS)
Perovich, Donald K.; Gerland, Sebastian
2009-05-01
Arctic Surface-Based Sea Ice Observations: Integrated Protocols and Coordinated Data Acquisition; Tromsø, Norway, 26-27 January 2009; The Arctic sea ice cover is diminishing. Over the past several years, not only has ice thinned but the extent of ice at the end of summer, and hence perennial ice, has declined markedly. These changes affect a wide range of issues and are important for a varied group of stakeholders, including Arctic coastal communities, policy makers, industry, the scientific community, and the public. Concerns range from the role of sea ice cover as an indicator and amplifier of climate change to marine transportation, resource extraction, and coastal erosion. To understand and respond to these ongoing changes, it is imperative to develop and implement consistent and robust observational protocols that can be used to describe the current state of the ice cover as well as future changes.
You, Ilsun; Kwon, Soonhyun; Choudhary, Gaurav; Sharma, Vishal; Seo, Jung Taek
2018-06-08
The Internet of Things (IoT) utilizes algorithms to facilitate intelligent applications across cities in the form of smart-urban projects. As the majority of devices in IoT are battery operated, their applications should be facilitated with a low-power communication setup. Such facility is possible through the Low-Power Wide-Area Network (LPWAN), but at a constrained bit rate. For long-range communication over LPWAN, several approaches and protocols are adopted. One such protocol is the Long-Range Wide Area Network (LoRaWAN), which is a media access layer protocol for long-range communication between the devices and the application servers via LPWAN gateways. However, LoRaWAN comes with fewer security features as a much-secured protocol consumes more battery because of the exorbitant computational overheads. The standard protocol fails to support end-to-end security and perfect forward secrecy while being vulnerable to the replay attack that makes LoRaWAN limited in supporting applications where security (especially end-to-end security) is important. Motivated by this, an enhanced LoRaWAN security protocol is proposed, which not only provides the basic functions of connectivity between the application server and the end device, but additionally averts these listed security issues. The proposed protocol is developed with two options, the Default Option (DO) and the Security-Enhanced Option (SEO). The protocol is validated through Burrows⁻Abadi⁻Needham (BAN) logic and the Automated Validation of Internet Security Protocols and Applications (AVISPA) tool. The proposed protocol is also analyzed for overheads through system-based and low-power device-based evaluations. Further, a case study on a smart factory-enabled parking system is considered for its practical application. The results, in terms of network latency with reliability fitting and signaling overheads, show paramount improvements and better performance for the proposed protocol compared with the two handshake options, Pre-Shared Key (PSK) and Elliptic Curve Cryptography (ECC), of Datagram Transport Layer Security (DTLS).
Remote direct memory access over datagrams
Grant, Ryan Eric; Rashti, Mohammad Javad; Balaji, Pavan; Afsahi, Ahmad
2014-12-02
A communication stack for providing remote direct memory access (RDMA) over a datagram network is disclosed. The communication stack has a user level interface configured to accept datagram related input and communicate with an RDMA enabled network interface card (NIC) via an NIC driver. The communication stack also has an RDMA protocol layer configured to supply one or more data transfer primitives for the datagram related input of the user level. The communication stack further has a direct data placement (DDP) layer configured to transfer the datagram related input from a user storage to a transport layer based on the one or more data transfer primitives by way of a lower layer protocol (LLP) over the datagram network.
Morphology evolution in high-performance polymer solar cells processed from nonhalogenated solvent
Cai, Wanzhu; Liu, Peng; Jin, Yaocheng; ...
2015-05-26
A new processing protocol based on non-halogenated solvent and additive is developed to produce polymer solar cells with power conversion efficiencies better than those processed from commonly used halogenated solvent-additive pair. Morphology studies show that good performance correlates with a finely distributed nanomorphology with a well-defined polymer fibril network structure, which leads to balanced charge transport in device operation.
Guseman, Alex J.; Miller, Kaliah; Kunkle, Grace; Dively, Galen P.; Pettis, Jeffrey S.; Evans, Jay D.; vanEngelsdorp, Dennis; Hawthorne, David J.
2016-01-01
Annual losses of honey bee colonies remain high and pesticide exposure is one possible cause. Dangerous combinations of pesticides, plant-produced compounds and antibiotics added to hives may cause or contribute to losses, but it is very difficult to test the many combinations of those compounds that bees encounter. We propose a mechanism-based strategy for simplifying the assessment of combinations of compounds, focusing here on compounds that interact with xenobiotic handling ABC transporters. We evaluate the use of ivermectin as a model substrate for these transporters. Compounds that increase sensitivity of bees to ivermectin may be inhibiting key transporters. We show that several compounds commonly encountered by honey bees (fumagillin, Pristine, quercetin) significantly increased honey bee mortality due to ivermectin and significantly reduced the LC50 of ivermectin suggesting that they may interfere with transporter function. These inhibitors also significantly increased honey bees sensitivity to the neonicotinoid insecticide acetamiprid. This mechanism-based strategy may dramatically reduce the number of tests needed to assess the possibility of adverse combinations among pesticides. We also demonstrate an in vivo transporter assay that provides physical evidence of transporter inhibition by tracking the dynamics of a fluorescent substrate of these transporters (Rhodamine B) in bee tissues. Significantly more Rhodamine B remains in the head and hemolymph of bees pretreated with higher concentrations of the transporter inhibitor verapamil. Mechanism-based strategies for simplifying the assessment of adverse chemical interactions such as described here could improve our ability to identify those combinations that pose significantly greater risk to bees and perhaps improve the risk assessment protocols for honey bees and similar sensitive species. PMID:26840460
Guseman, Alex J; Miller, Kaliah; Kunkle, Grace; Dively, Galen P; Pettis, Jeffrey S; Evans, Jay D; vanEngelsdorp, Dennis; Hawthorne, David J
2016-01-01
Annual losses of honey bee colonies remain high and pesticide exposure is one possible cause. Dangerous combinations of pesticides, plant-produced compounds and antibiotics added to hives may cause or contribute to losses, but it is very difficult to test the many combinations of those compounds that bees encounter. We propose a mechanism-based strategy for simplifying the assessment of combinations of compounds, focusing here on compounds that interact with xenobiotic handling ABC transporters. We evaluate the use of ivermectin as a model substrate for these transporters. Compounds that increase sensitivity of bees to ivermectin may be inhibiting key transporters. We show that several compounds commonly encountered by honey bees (fumagillin, Pristine, quercetin) significantly increased honey bee mortality due to ivermectin and significantly reduced the LC50 of ivermectin suggesting that they may interfere with transporter function. These inhibitors also significantly increased honey bees sensitivity to the neonicotinoid insecticide acetamiprid. This mechanism-based strategy may dramatically reduce the number of tests needed to assess the possibility of adverse combinations among pesticides. We also demonstrate an in vivo transporter assay that provides physical evidence of transporter inhibition by tracking the dynamics of a fluorescent substrate of these transporters (Rhodamine B) in bee tissues. Significantly more Rhodamine B remains in the head and hemolymph of bees pretreated with higher concentrations of the transporter inhibitor verapamil. Mechanism-based strategies for simplifying the assessment of adverse chemical interactions such as described here could improve our ability to identify those combinations that pose significantly greater risk to bees and perhaps improve the risk assessment protocols for honey bees and similar sensitive species.
Toward Composable Hardware Agnostic Communications Blocks Lessons Learned
2016-11-01
ad9361/products/product.html [12] Google. Protocol Buffers. [Online]. Available: https://developers.google.com/protocol-buffers/ [13] VITA, “ANSI/VITA 49.0 VITA Radio Transport ( VRT ) Standard,” VITA, Tech. Rep., 2015.
Handling, storage, and preparation of human tissues.
Dressler, L G; Visscher, D
2001-05-01
Human tissue for flow cytometry must be prepared as an adequate single-cell suspension. The appropriate methods for tissue collection, transport, storage, and dissociation depend on the cell parameters being measured and the localization of the markers. This unit includes a general method for collecting and transporting human tissue and preparing a tissue imprint. Protocols are supplied for tissue disaggregation by either mechanical or enzymatic means and for preparation of single-cell suspensions of whole cells from fine-needle aspirates, pleural effusions, abdominal fluids, or other body fluids. Other protocols detail preparation of intact nuclei from fresh, frozen, or paraffin-embedded tissue. Support protocols cover fixation, cryospin preparation, cryopreservation, and removal of debris.
Kokkonen, H T; Chin, H C; Töyräs, J; Jurvelin, J S; Quinn, T M
2017-04-01
Solute transport through the extracellular matrix (ECM) is crucial to chondrocyte metabolism. Cartilage injury affects solute transport in cartilage due to alterations in ECM structure and solute-matrix interactions. Therefore, cartilage injury may be detected by using contrast agent-based clinical imaging. In the present study, effects of mechanical injury on transport of negatively charged contrast agents in cartilage were characterized. Using cartilage plugs injured by mechanical compression protocol, effective partition coefficients and diffusion fluxes of iodine- and gadolinium-based contrast agents were measured using high resolution microCT imaging. For all contrast agents studied, effective diffusion fluxes increased significantly, particularly at early times during the diffusion process (38 and 33% increase after 4 min, P < 0.05 for iodine and Gd-DTPA; and 76% increase after 10 min for diatrizoate, P < 0.05). Effective partition coefficients were unaffected in mechanically injured cartilage. Mechanical injury reduced PG content and collagen integrity in cartilage superficial zone. This study suggests that alterations in contrast agent diffusion flux, a non-equilibrium transport parameter, provides a more sensitive indicator for assessment of cartilage matrix integrity than partition coefficient and the equilibrium distribution of solute. These findings may help in developing clinical methods of contrast agent-based imaging to detect cartilage injury.
Mn/ROAD testing protocols : vol. 1
DOT National Transportation Integrated Search
1997-12-01
This report presents a series of testing protocols used at the Minnesota Road Research Project (Mn/ROAD), the Minnesota Department of Transportation's (Mn/DOT) pavement testing facility. This report helps establish a history of the tests conducted an...
DOE Office of Scientific and Technical Information (OSTI.GOV)
Andre, J.M.; et al.
The data acquisition system (DAQ) of the CMS experiment at the CERN Large Hadron Collider assembles events at a rate of 100 kHz, transporting event data at an aggregate throughput of to the high-level trigger farm. The DAQ architecture is based on state-of-the-art network technologies for the event building. For the data concentration, 10/40 Gbit/s Ethernet technologies are used together with a reduced TCP/IP protocol implemented in FPGA for a reliable transport between custom electronics and commercial computing hardware. A 56 Gbit/s Infiniband FDR Clos network has been chosen for the event builder. This paper presents the implementation and performancemore » of the event-building system.« less
Dimitrov, Nikolay; Koenig, William; Bosson, Nichole; Song, Sarah; Saver, Jeffrey L; Mack, William J; Sanossian, Nerses
2015-09-01
Comprehensive stroke systems of care include routing to the nearest designated stroke center hospital, bypassing non-designated hospitals. Routing protocols are implemented at the state or county level and vary in qualification criteria and determination of destination hospital. We surveyed all counties in the state of California for presence and characteristics of their prehospital stroke routing protocols. Each county's local emergency medical services agency (LEMSA) was queried for the presence of a stroke routing protocol. We reviewed these protocols for method of stroke identification and criteria for patient transport to a stroke center. Thirty-three LEMSAs serve 58 counties in California with populations ranging from 1,175 to nearly 10 million. Fifteen LEMSAs (45%) had stroke routing protocols, covering 23 counties (40%) and 68% of the state population. Counties with protocols had higher population density (1,500 vs. 140 persons per square mile). In the six counties without designated stroke centers, patients meeting criteria were transported out of county. Stroke identification in the field was achieved using the Cincinnati Prehospital Stroke Screen in 72%, Los Angeles Prehospital Stroke Screen in 7% and a county-specific protocol in 22%. California EMS prehospital acute stroke routing protocols cover 68% of the state population and vary in characteristics including activation by symptom onset time and destination facility features, reflecting matching of system design to local geographic resources.
An optimal routing strategy on scale-free networks
NASA Astrophysics Data System (ADS)
Yang, Yibo; Zhao, Honglin; Ma, Jinlong; Qi, Zhaohui; Zhao, Yongbin
Traffic is one of the most fundamental dynamical processes in networked systems. With the traditional shortest path routing (SPR) protocol, traffic congestion is likely to occur on the hub nodes on scale-free networks. In this paper, we propose an improved optimal routing (IOR) strategy which is based on the betweenness centrality and the degree centrality of nodes in the scale-free networks. With the proposed strategy, the routing paths can accurately bypass hub nodes in the network to enhance the transport efficiency. Simulation results show that the traffic capacity as well as some other indexes reflecting transportation efficiency are further improved with the IOR strategy. Owing to the significantly improved traffic performance, this study is helpful to design more efficient routing strategies in communication or transportation systems.
A link-adding strategy for transport efficiency of complex networks
NASA Astrophysics Data System (ADS)
Ma, Jinlong; Han, Weizhan; Guo, Qing; Wang, Zhenyong; Zhang, Shuai
2016-12-01
The transport efficiency is one of the critical parameters to evaluate the performance of a network. In this paper, we propose an improved efficient (IE) strategy to enhance the network transport efficiency of complex networks by adding a fraction of links to an existing network based on the node’s local degree centrality and the shortest path length. Simulation results show that the proposed strategy can bring better traffic capacity and shorter average shortest path length than the low-degree-first (LDF) strategy under the shortest path routing protocol. It is found that the proposed strategy is beneficial to the improvement of overall traffic handling and delivering ability of the network. This study can alleviate the congestion in networks, and is helpful to design and optimize realistic networks.
Intelligent Transportation Infrastructure Deployment Analysis System
DOT National Transportation Integrated Search
1997-01-01
Much of the work on Intelligent Transportation Systems (ITS) to date has emphasized technologies, Standards/protocols, architecture, user services, core infrastructure requirements, and various other technical and institutional issues. ITS implementa...
From Wagons to Race Cars, At Least Now We Have A Chassis
NASA Astrophysics Data System (ADS)
Morrow, A. L.
2003-12-01
For the past 30 years Very-Long-Baseline Interferometry (VLBI) has provided astronomers with the most accurate measurements to date of both distant radio sources as well as the tectonic plates. The resolutions attainable through VLBI are orders of magnitude better than other instruments. In order to transmit radio signals collected at different sites to a correlator for processing the VLBI data was stored on magnetic tapes, and then the magnetic tapes were shipped through the mail to the central processing site. This was not only arduous and inefficient, it was also costly. Now this means of shipment can be replaced by global high speed networks. This means of transmission is called e-VLBI. New protocols must be developed so e-VLBI can become a proficient high bandwidth background user. The protocol agreed upon uses a Real-time Transport Protocol (RTP) framework to preserve timing information and synchronization. The RTP is then transported using the Internet User Datagram Protocol (UDP) with RTP Control Protocol (RTCP) monitoring the networks performance. When this protocol is fully functional astronomers will be able to observe all over the world and receive results in real time.
Solute transport across the articular surface of injured cartilage.
Chin, Hooi Chuan; Moeini, Mohammad; Quinn, Thomas M
2013-07-15
Solute transport through extracellular matrix (ECM) is important to physiology and contrast agent-based clinical imaging of articular cartilage. Mechanical injury is likely to have important effects on solute transport since it involves alteration of ECM structure. Therefore it is of interest to characterize effects of mechanical injury on solute transport in cartilage. Using cartilage explants injured by an established mechanical compression protocol, effective partition coefficients and diffusivities of solutes for transport across the articular surface were measured. A range of fluorescent solutes (fluorescein isothiocyanate, 4 and 40kDa dextrans, insulin, and chondroitin sulfate) and an X-ray contrast agent (sodium iodide) were used. Mechanical injury was associated with a significant increase in effective diffusivity versus uninjured explants for all solutes studied. On the other hand, mechanical injury had no effects on effective partition coefficients for most solutes tested, except for 40kDa dextran and chondroitin sulfate where small but significant changes in effective partition coefficient were observed in injured explants. Findings highlight enhanced diffusive transport across the articular surface of injured cartilage, which may have important implications for injury and repair situations. Results also support development of non-equilibrium methods for identification of focal cartilage lesions by contrast agent-based clinical imaging. Copyright © 2013 Elsevier Inc. All rights reserved.
Internet Technology for Future Space Missions
NASA Technical Reports Server (NTRS)
Hennessy, Joseph F. (Technical Monitor); Rash, James; Casasanta, Ralph; Hogie, Keith
2002-01-01
Ongoing work at National Aeronautics and Space Administration Goddard Space Flight Center (NASA/GSFC), seeks to apply standard Internet applications and protocols to meet the technology challenge of future satellite missions. Internet protocols and technologies are under study as a future means to provide seamless dynamic communication among heterogeneous instruments, spacecraft, ground stations, constellations of spacecraft, and science investigators. The primary objective is to design and demonstrate in the laboratory the automated end-to-end transport of files in a simulated dynamic space environment using off-the-shelf, low-cost, commodity-level standard applications and protocols. The demonstrated functions and capabilities will become increasingly significant in the years to come as both earth and space science missions fly more sensors and the present labor-intensive, mission-specific techniques for processing and routing data become prohibitively. This paper describes how an IP-based communication architecture can support all existing operations concepts and how it will enable some new and complex communication and science concepts. The authors identify specific end-to-end data flows from the instruments to the control centers and scientists, and then describe how each data flow can be supported using standard Internet protocols and applications. The scenarios include normal data downlink and command uplink as well as recovery scenarios for both onboard and ground failures. The scenarios are based on an Earth orbiting spacecraft with downlink data rates from 300 Kbps to 4 Mbps. Included examples are based on designs currently being investigated for potential use by the Global Precipitation Measurement (GPM) mission.
Arbabi, Vahid; Pouran, Behdad; Zadpoor, Amir A; Weinans, Harrie
2017-04-23
Osteoarthritis (OA) is a debilitating disease that is associated with degeneration of articular cartilage and subchondral bone. Degeneration of articular cartilage impairs its load-bearing function substantially as it experiences tremendous chemical degradation, i.e. proteoglycan loss and collagen fibril disruption. One promising way to investigate chemical damage mechanisms during OA is to expose the cartilage specimens to an external solute and monitor the diffusion of the molecules. The degree of cartilage damage (i.e. concentration and configuration of essential macromolecules) is associated with collisional energy loss of external solutes while moving across articular cartilage creates different diffusion characteristics compared to healthy cartilage. In this study, we introduce a protocol, which consists of several steps and is based on previously developed experimental micro-Computed Tomography (micro-CT) and finite element modeling. The transport of charged and uncharged iodinated molecules is first recorded using micro-CT, which is followed by applying biphasic-solute and multiphasic finite element models to obtain diffusion coefficients and fixed charge densities across cartilage zones.
De Biase, Pablo M.; Markosyan, Suren; Noskov, Sergei
2014-01-01
We developed a novel scheme based on the Grand-Canonical Monte-Carlo/Brownian Dynamics (GCMC/BD) simulations and have extended it to studies of ion currents across three nanopores with the potential for ssDNA sequencing: solid-state nanopore Si3N4, α-hemolysin, and E111N/M113Y/K147N mutant. To describe nucleotide-specific ion dynamics compatible with ssDNA coarse-grained model, we used the Inverse Monte-Carlo protocol, which maps the relevant ion-nucleotide distribution functions from an all-atom MD simulations. Combined with the previously developed simulation platform for Brownian Dynamic (BD) simulations of ion transport, it allows for microsecond- and millisecond-long simulations of ssDNA dynamics in nanopore with a conductance computation accuracy that equals or exceeds that of all-atom MD simulations. In spite of the simplifications, the protocol produces results that agree with the results of previous studies on ion conductance across open channels and provide direct correlations with experimentally measured blockade currents and ion conductances that have been estimated from all-atom MD simulations. PMID:24738152
NASA Technical Reports Server (NTRS)
Sanders, Felicia A.; Jones, Grailing, Jr.; Levesque, Michael
2006-01-01
The CCSDS File Delivery Protocol (CFDP) Standard could reshape ground support architectures by enabling applications to communicate over the space link using reliable-symmetric transport services. JPL utilized the CFDP standard to support the Deep Impact Mission. The architecture was based on layering the CFDP applications on top of the CCSDS Space Link Extension Services for data transport from the mission control centers to the ground stations. On July 4, 2005 at 1:52 A.M. EDT, the Deep Impact impactor successfully collided with comet Tempel 1. During the final 48 hours prior to impact, over 300 files were uplinked to the spacecraft, while over 6 thousand files were downlinked from the spacecraft using the CFDP. This paper uses the Deep Impact Mission as a case study in a discussion of the CFDP architecture, Deep Impact Mission requirements, and design for integrating the CFDP into the JPL deep space support services. Issues and recommendations for future missions using CFDP are also provided.
Internet Data Delivery for Future Space Missions
NASA Technical Reports Server (NTRS)
Rash, James; Casasanta, Ralph; Hogie, Keith; Hennessy, Joseph F. (Technical Monitor)
2002-01-01
Ongoing work at National Aeronautics and Space Administration Goddard Space Flight Center (NASA/GSFC), seeks to apply standard Internet applications and protocols to meet the technology challenge of future satellite missions. Internet protocols and technologies are under study as a future means to provide seamless dynamic communication among heterogeneous instruments, spacecraft, ground stations, constellations of spacecraft, and science investigators. The primary objective is to design and demonstrate in the laboratory the automated end-to-end transport of files in a simulated dynamic space environment using off-the-shelf, low-cost, commodity-level standard applications and protocols. The demonstrated functions and capabilities will become increasingly significant in the years to come as both earth and space science missions fly more sensors and as the need increases for more network-oriented mission operations. Another element of increasing significance will be the increased cost effectiveness of designing, building, integrating, and operating instruments and spacecraft that will come to the fore as more missions take up the approach of using commodity-level standard communications technologies. This paper describes how an IP (Internet Protocol)-based communication architecture can support all existing operations concepts and how it will enable some new and complex communication and science concepts. The authors identify specific end-to-end data flows from the instruments to the control centers and scientists, and then describe how each data flow can be supported using standard Internet protocols and applications. The scenarios include normal data downlink and command uplink as well as recovery scenarios for both onboard and ground failures. The scenarios are based on an Earth orbiting spacecraft with downlink data rates from 300 Kbps to 4 Mbps. Included examples are based on designs currently being investigated for potential use by the Global Precipitation Measurement (GPM) mission.
NASA Astrophysics Data System (ADS)
Lazar, Aurel A.; White, John S.
1987-07-01
Theoretical analysis of integrated local area network model of MAGNET, an integrated network testbed developed at Columbia University, shows that the bandwidth freed up during video and voice calls during periods of little movement in the images and periods of silence in the speech signals could be utilized efficiently for graphics and data transmission. Based on these investigations, an architecture supporting adaptive protocols that are dynamicaly controlled by the requirements of a fluctuating load and changing user environment has been advanced. To further analyze the behavior of the network, a real-time packetized video system has been implemented. This system is embedded in the real-time multimedia workstation EDDY, which integrates video, voice, and data traffic flows. Protocols supporting variable-bandwidth, fixed-quality packetized video transport are described in detail.
NASA Astrophysics Data System (ADS)
Lazar, Aurel A.; White, John S.
1986-11-01
Theoretical analysis of an ILAN model of MAGNET, an integrated network testbed developed at Columbia University, shows that the bandwidth freed up by video and voice calls during periods of little movement in the images and silence periods in the speech signals could be utilized efficiently for graphics and data transmission. Based on these investigations, an architecture supporting adaptive protocols that are dynamically controlled by the requirements of a fluctuating load and changing user environment has been advanced. To further analyze the behavior of the network, a real-time packetized video system has been implemented. This system is embedded in the real time multimedia workstation EDDY that integrates video, voice and data traffic flows. Protocols supporting variable bandwidth, constant quality packetized video transport are descibed in detail.
Weather Information Communications (WINCOMM) Overview and Status
NASA Technical Reports Server (NTRS)
Martzaklis, K.
2003-01-01
The second annual project review of Weather Information Communications (WINCOMM) is presented. The topics of discussion include: 1) In-Flight Weather Information; 2) System Elements; 3) Technology Investment Areas; 4) NAS Information Exchange; 5) FIS Datalink Architecture Analyses; 6) Hybrid FIS Datalink Architecture; 7) FIS Datalink Architecture Analyses; 8) Air Transport: Ground and Satellite-based Datalinks; 9) General Aviation: Ground and Satellite-based Datalinks; 10) Low Altitude AutoMET Reporting; 11) AutoMET: Airborne-based Datalinks; 12) Network Protocols Development; and 13) FAA/NASA Collaboration. A summary of WINCOMM is also included. This paper is in viewgraph form.
Abisa, Michael
2017-01-01
To explore the challenges Health Information Technology (HIT) vendors face to satisfy the requirements for Meaningful Use (MU) and Electronic Laboratory Reporting (ELR) of reportable diseases to the public health departments in Kentucky. A survey was conducted of Health Information Exchange (HIE) vendors in Kentucky through the Kentucky Health Information Exchange (KHIE). The survey was cross-sectional. Data were collected between February and March 2014. Participants were recruited from KHIE vendors. Participants received online survey link and by email and asked to submit their responses. Vendors' feedback were summarized and analyzed to identify their challenges. Out of the 55 vendors who received the survey, 35(63.64%) responded. Of the seven transport protocol options for ELR, vendors selected virtual private network (VPN) as the most difficult to implement (31.7%). Secure File Transfer Protocol (SFTP) was selected as preferred ELR transport protocol (31.4%). Most of the respondents, 80% responded that they do not have any challenge with the Health Level 7 (HL7) standard implementation guide required by MU for 2014 ELR certification. The study found that the most difficult transport protocol to implement for ELR is VPN and if vendors have preference, they would use SFTP for ELR over KHIE choice of VPN and Simple Object Access Protocol (SOAP). KHIE vendors do not see any variability in what is reportable by different jurisdiction and also it is not difficult for them to detect what is reportable from one jurisdiction verse the other.
A Geographical Heuristic Routing Protocol for VANETs
Urquiza-Aguiar, Luis; Tripp-Barba, Carolina; Aguilar Igartua, Mónica
2016-01-01
Vehicular ad hoc networks (VANETs) leverage the communication system of Intelligent Transportation Systems (ITS). Recently, Delay-Tolerant Network (DTN) routing protocols have increased their popularity among the research community for being used in non-safety VANET applications and services like traffic reporting. Vehicular DTN protocols use geographical and local information to make forwarding decisions. However, current proposals only consider the selection of the best candidate based on a local-search. In this paper, we propose a generic Geographical Heuristic Routing (GHR) protocol that can be applied to any DTN geographical routing protocol that makes forwarding decisions hop by hop. GHR includes in its operation adaptations simulated annealing and Tabu-search meta-heuristics, which have largely been used to improve local-search results in discrete optimization. We include a complete performance evaluation of GHR in a multi-hop VANET simulation scenario for a reporting service. Our study analyzes all of the meaningful configurations of GHR and offers a statistical analysis of our findings by means of MANOVA tests. Our results indicate that the use of a Tabu list contributes to improving the packet delivery ratio by around 5% to 10%. Moreover, if Tabu is used, then the simulated annealing routing strategy gets a better performance than the selection of the best node used with carry and forwarding (default operation). PMID:27669254
A Geographical Heuristic Routing Protocol for VANETs.
Urquiza-Aguiar, Luis; Tripp-Barba, Carolina; Aguilar Igartua, Mónica
2016-09-23
Vehicular ad hoc networks (VANETs) leverage the communication system of Intelligent Transportation Systems (ITS). Recently, Delay-Tolerant Network (DTN) routing protocols have increased their popularity among the research community for being used in non-safety VANET applications and services like traffic reporting. Vehicular DTN protocols use geographical and local information to make forwarding decisions. However, current proposals only consider the selection of the best candidate based on a local-search. In this paper, we propose a generic Geographical Heuristic Routing (GHR) protocol that can be applied to any DTN geographical routing protocol that makes forwarding decisions hop by hop. GHR includes in its operation adaptations simulated annealing and Tabu-search meta-heuristics, which have largely been used to improve local-search results in discrete optimization. We include a complete performance evaluation of GHR in a multi-hop VANET simulation scenario for a reporting service. Our study analyzes all of the meaningful configurations of GHR and offers a statistical analysis of our findings by means of MANOVA tests. Our results indicate that the use of a Tabu list contributes to improving the packet delivery ratio by around 5% to 10%. Moreover, if Tabu is used, then the simulated annealing routing strategy gets a better performance than the selection of the best node used with carry and forwarding (default operation).
2006-09-01
data transform set contains : the security protocol (AH and/or ESP, connection mode (tunnel or transport), encryption information (DES, 3DES, AES...Management Information Base, version 2) objects are variables that contain data about the system. They are defined as part of the Simple Network...Avon Park was configured for access on the concentrator. c. Security Association (SA) • A security association contains all of the information
Modelling optimal location for pre-hospital helicopter emergency medical services.
Schuurman, Nadine; Bell, Nathaniel J; L'Heureux, Randy; Hameed, Syed M
2009-05-09
Increasing the range and scope of early activation/auto launch helicopter emergency medical services (HEMS) may alleviate unnecessary injury mortality that disproportionately affects rural populations. To date, attempts to develop a quantitative framework for the optimal location of HEMS facilities have been absent. Our analysis used five years of critical care data from tertiary health care facilities, spatial data on origin of transport and accurate road travel time catchments for tertiary centres. A location optimization model was developed to identify where the expansion of HEMS would cover the greatest population among those currently underserved. The protocol was developed using geographic information systems (GIS) to measure populations, distances and accessibility to services. Our model determined Royal Inland Hospital (RIH) was the optimal site for an expanded HEMS - based on denominator population, distance to services and historical usage patterns. GIS based protocols for location of emergency medical resources can provide supportive evidence for allocation decisions - especially when resources are limited. In this study, we were able to demonstrate conclusively that a logical choice exists for location of additional HEMS. This protocol could be extended to location analysis for other emergency and health services.
A History of the Improvement of Internet Protocols Over Satellites Using ACTS
NASA Technical Reports Server (NTRS)
Allman, Mark; Kruse, Hans; Ostermann, Shawn
2000-01-01
This paper outlines the main results of a number of ACTS experiments on the efficacy of using standard Internet protocols over long-delay satellite channels. These experiments have been jointly conducted by NASAs Glenn Research Center and Ohio University over the last six years. The focus of our investigations has been the impact of long-delay networks with non-zero bit-error rates on the performance of the suite of Internet protocols. In particular, we have focused on the most widely used transport protocol, the Transmission Control Protocol (TCP), as well as several application layer protocols. This paper presents our main results, as well as references to more verbose discussions of our experiments.
Chesnut, Randall M; Temkin, Nancy; Dikmen, Sureyya; Rondina, Carlos; Videtta, Walter; Petroni, Gustavo; Lujan, Silvia; Alanis, Victor; Falcao, Antonio; de la Fuenta, Gustavo; Gonzalez, Luis; Jibaja, Manuel; Lavarden, Arturo; Sandi, Freddy; Mérida, Roberto; Romero, Ricardo; Pridgeon, Jim; Barber, Jason; Machamer, Joan; Chaddock, Kelley
2018-01-01
The imaging and clinical examination (ICE) algorithm used in the Benchmark Evidence from South American Trials: Treatment of Intracranial Pressure (BEST TRIP) randomized controlled trial is the only prospectively investigated clinical protocol for traumatic brain injury management without intracranial pressure (ICP) monitoring. As the default literature standard, it warrants careful evaluation. We present the ICE protocol in detail and analyze the demographics, outcome, treatment intensity, frequency of intervention usage, and related adverse events in the ICE-protocol cohort. The 167 ICE protocol patients were young (median 29 years) with a median Glasgow Coma Scale motor score of 4 but with anisocoria or abnormal pupillary reactivity in 40%. This protocol produced outcomes not significantly different from those randomized to the monitor-based protocol (favorable 6-month extended Glasgow Outcome Score in 39%; 41% mortality rate). Agents commonly employed to treat suspected intracranial hypertension included low-/moderate-dose hypertonic saline (72%) and mannitol (57%), mild hyperventilation (adjusted partial pressure of carbon dioxide 30-35 mm Hg in 73%), and pressors to maintain cerebral perfusion (62%). High-dose hyperosmotics or barbiturates were uncommonly used. Adverse event incidence was low and comparable to the BEST TRIP monitored group. Although this protocol should produce similar/acceptable results under circumstances comparable to those in the trial, influences such as longer pre-hospital times and non-specialist transport personnel, plus an intensive care unit model of aggressive physician-intensive care by small groups of neurotrauma-focused intensivists, which differs from most high-resource models, support caution in expecting the same results in dissimilar settings. Finally, this protocol's ICP-titration approach to suspected intracranial hypertension (vs. crisis management for monitored ICP) warrants further study.
49 CFR 579.29 - Manner of reporting.
Code of Federal Regulations, 2010 CFR
2010-10-01
... ADMINISTRATION, DEPARTMENT OF TRANSPORTATION (CONTINUED) REPORTING OF INFORMATION AND COMMUNICATIONS ABOUT... through 579.26 of this part may be submitted in digital form using a graphic compression protocol...) Graphic compression protocol. Not later than 30 days prior to the date of its first quarterly submission...
Design and Implementation of BDS RTCM SSR Message
NASA Astrophysics Data System (ADS)
Xiao, Xia; Cheng, Fang; Liu, Feng; Lu, XiaoChun
2017-09-01
Based on the real-time differential positioning system of Beidou wide area, a set of Beidou high-precision differential information transmission protocol is studied and designed. After the system generates satellite precise orbit and clock difference products, it needs to be sent to the users in a certain data format through C band GEO communication satellite. The transport protocol should be designed according to the data volume and update rate of the system. At the same time, it is necessary to combine the signal system, satellite resources and the restriction and restriction of the receiver implementation technology. It refers to the relevant fields and international similar systems of technology and standards to design. This paper establishes a set of technical indicators which can measure the pros and cons of differential message organization and broadcasting strategy. Through modeling, simulation and actual test, this paper makes a comprehensive comparison of different strategies. Finally, a transmission protocol design scheme which has good performance and meets the system service requirements is presented.
Performance of the CMS Event Builder
NASA Astrophysics Data System (ADS)
Andre, J.-M.; Behrens, U.; Branson, J.; Brummer, P.; Chaze, O.; Cittolin, S.; Contescu, C.; Craigs, B. G.; Darlea, G.-L.; Deldicque, C.; Demiragli, Z.; Dobson, M.; Doualot, N.; Erhan, S.; Fulcher, J. F.; Gigi, D.; Gładki, M.; Glege, F.; Gomez-Ceballos, G.; Hegeman, J.; Holzner, A.; Janulis, M.; Jimenez-Estupiñán, R.; Masetti, L.; Meijers, F.; Meschi, E.; Mommsen, R. K.; Morovic, S.; O'Dell, V.; Orsini, L.; Paus, C.; Petrova, P.; Pieri, M.; Racz, A.; Reis, T.; Sakulin, H.; Schwick, C.; Simelevicius, D.; Zejdl, P.
2017-10-01
The data acquisition system (DAQ) of the CMS experiment at the CERN Large Hadron Collider assembles events at a rate of 100 kHz, transporting event data at an aggregate throughput of {\\mathscr{O}}(100 {{GB}}/{{s}}) to the high-level trigger farm. The DAQ architecture is based on state-of-the-art network technologies for the event building. For the data concentration, 10/40 Gbit/s Ethernet technologies are used together with a reduced TCP/IP protocol implemented in FPGA for a reliable transport between custom electronics and commercial computing hardware. A 56 Gbit/s Infiniband FDR Clos network has been chosen for the event builder. This paper presents the implementation and performance of the event-building system.
RFID applications in transportation operation and intelligent transportation systems (ITS).
DOT National Transportation Integrated Search
2009-06-01
Radio frequency identification (RFID) transmits the identity of an object or a person wirelessly. It is grouped under : the broad category of automatic identification technologies with corresponding standards and established protocols. : RFID is suit...
Validation protocol for digital audio recorders used in aircraft-noise-certification testing
DOT National Transportation Integrated Search
2010-11-01
The U.S. Department of Transportation, Research and Innovative Technology Administra-tion, John A. Volpe National Transportation Systems Center, Environmental Measurement and Modeling Division (Volpe), is supporting the aircraft noise certification i...
Dukić, Lora; Kopčinović, Lara Milevoj; Dorotić, Adrijana; Baršić, Ivana
2016-10-15
Blood gas analysis (BGA) is exposed to risks of errors caused by improper sampling, transport and storage conditions. The Clinical and Laboratory Standards Institute (CLSI) generated documents with recommendations for avoidance of potential errors caused by sample mishandling. Two main documents related to BGA issued by the CLSI are GP43-A4 (former H11-A4) Procedures for the collection of arterial blood specimens; approved standard - fourth edition, and C46-A2 Blood gas and pH analysis and related measurements; approved guideline - second edition. Practices related to processing of blood gas samples are not standardized in the Republic of Croatia. Each institution has its own protocol for ordering, collection and analysis of blood gases. Although many laboratories use state of the art analyzers, still many preanalytical procedures remain unchanged. The objective of the Croatian Society of Medical Biochemistry and Laboratory Medicine (CSMBLM) is to standardize the procedures for BGA based on CLSI recommendations. The Working Group for Blood Gas Testing as part of the Committee for the Scientific Professional Development of the CSMBLM prepared a set of recommended protocols for sampling, transport, storage and processing of blood gas samples based on relevant CLSI documents, relevant literature search and on the results of Croatian survey study on practices and policies in acid-base testing. Recommendations are intended for laboratory professionals and all healthcare workers involved in blood gas processing.
Dukić, Lora; Kopčinović, Lara Milevoj; Dorotić, Adrijana; Baršić, Ivana
2016-01-01
Blood gas analysis (BGA) is exposed to risks of errors caused by improper sampling, transport and storage conditions. The Clinical and Laboratory Standards Institute (CLSI) generated documents with recommendations for avoidance of potential errors caused by sample mishandling. Two main documents related to BGA issued by the CLSI are GP43-A4 (former H11-A4) Procedures for the collection of arterial blood specimens; approved standard – fourth edition, and C46-A2 Blood gas and pH analysis and related measurements; approved guideline – second edition. Practices related to processing of blood gas samples are not standardized in the Republic of Croatia. Each institution has its own protocol for ordering, collection and analysis of blood gases. Although many laboratories use state of the art analyzers, still many preanalytical procedures remain unchanged. The objective of the Croatian Society of Medical Biochemistry and Laboratory Medicine (CSMBLM) is to standardize the procedures for BGA based on CLSI recommendations. The Working Group for Blood Gas Testing as part of the Committee for the Scientific Professional Development of the CSMBLM prepared a set of recommended protocols for sampling, transport, storage and processing of blood gas samples based on relevant CLSI documents, relevant literature search and on the results of Croatian survey study on practices and policies in acid-base testing. Recommendations are intended for laboratory professionals and all healthcare workers involved in blood gas processing. PMID:27812301
TCP Performance Enhancement Over Iridium
NASA Technical Reports Server (NTRS)
Torgerson, Leigh; Hutcherson, Joseph; McKelvey, James
2007-01-01
In support of iNET maturation, NASA-JPL has collaborated with NASA-Dryden to develop, test and demonstrate an over-the-horizon vehicle-to-ground networking capability, using Iridium as the vehicle-to-ground communications link for relaying critical vehicle telemetry. To ensure reliability concerns are met, the Space Communications Protocol Standards (SCPS) transport protocol was investigated for its performance characteristics in this environment. In particular, the SCPS-TP software performance was compared to that of the standard Transmission Control Protocol (TCP) over the Internet Protocol (IP). This paper will report on the results of this work.
Attribution of Recovery in Lower-Stratospheric Ozone
NASA Technical Reports Server (NTRS)
Yang, Eun-Su; Cunnold, Derek M.; Salawitch, Ross J.; McCormick, M. Patrick; Russell, James, III; Zawodny, Joseph M.; Oltmans, Samuel; Newchurch, Michael J.
2005-01-01
Multiple satellite and ground-based observations provide consistent evidence that the thickness of Earth's protective ozone layer has stopped declining since 1997, close to the time of peak stratospheric halogen loading. Regression analyses with Effective Equivalent Stratospheric Chlorine (EESC) in conjunction with further analyses using more sophisticated photochemical model calculations constrained by satellite data demonstrate that the cessation of ozone depletion between 18-25 km altitude is consistent with a leveling off of stratospheric abundances of chlorine and bromine, due to the Montreal Protocol and its amendments. However, ozone increases in the lowest part of the stratosphere, from the tropopause to 18 km, account for about half of the improvement in total column ozone during the past 9 years at northern hemisphere mid-latitudes. The increase in ozone for altitudes below 18 km is most likely driven by changes in transport, rather than driven by declining chlorine and bromine. Even with this evidence that the Montreal Protocol and its amendments are having the desired, positive effect on ozone above 18 km, total column ozone is recovering faster than expected due to the apparent transport driven changes at lower altitudes. Accurate prediction of future levels of stratospheric ozone will require comprehensive understanding of the factors that drive temporal changes at various altitudes, and partitioning of the recent transport-driven increases between natural variability and changes in atmospheric structure perhaps related to anthropogenic climate change.
Attribution of Recovery in Lower-stratospheric Ozone
NASA Technical Reports Server (NTRS)
Yang, Eun-Su; Cunnold, Derek M.; Salawitch, Ross J.; McCormick, M. Patrick; Russell, James, III; Zawodny, Joseph M.; Oltmans, Samuel; Newchurch, Michael J.
2006-01-01
Multiple satellite and ground-based observations provide consistent evidence that the thickness of Earth's protective ozone layer has stopped declining since 1997, close to the time of peak stratospheric halogen loading. Regression analyses with Effective Equivalent Stratospheric Chlorine (EESC) in conjunction with further analyses using more sophisticated photochemical model calculations constrained by satellite data demonstrate that the cessation of ozone depletion between 18-25 km altitude is consistent with a leveling off of stratospheric abundances of chlorine and bromine, due to the Montreal Protocol and its amendments. However, ozone increases in the lowest part of the stratosphere, from the tropopause to 18 km, account for about half of the improvement in total column ozone during the past 9 years at northern hemisphere mid-latitudes. The increase in ozone for altitudes below 18 km is most likely driven by changes in transport, rather than driven by declining chlorine and bromine. Even with this evidence that the Montreal Protocol and its amendments are having the desired, positive effect on ozone above 18 km, total column ozone is recovering faster than expected due to the apparent transport driven changes at lower altitudes. Accurate prediction of future levels of stratospheric ozone will require comprehensive understanding of the factors that drive temporal changes at various altitudes, and partitioning of the recent transport-driven increases between natural variability and changes in atmospheric structure perhaps related to anthropogenic climate change.
Zinc transporter 3 is involved in learned fear and extinction, but not in innate fear.
Martel, Guillaume; Hevi, Charles; Friebely, Olivia; Baybutt, Trevor; Shumyatsky, Gleb P
2010-11-01
Synaptically released Zn²+ is a potential modulator of neurotransmission and synaptic plasticity in fear-conditioning pathways. Zinc transporter 3 (ZnT3) knock-out (KO) mice are well suited to test the role of zinc in learned fear, because ZnT3 is colocalized with synaptic zinc, responsible for its transport to synaptic vesicles, highly enriched in the amygdala-associated neural circuitry, and ZnT3 KO mice lack Zn²+ in synaptic vesicles. However, earlier work reported no deficiency in fear memory in ZnT3 KO mice, which is surprising based on the effects of Zn²+ on amygdala synaptic plasticity. We therefore reexamined ZnT3 KO mice in various tasks for learned and innate fear. The mutants were deficient in a weak fear-conditioning protocol using single tone-shock pairing but showed normal memory when a stronger, five-pairing protocol was used. ZnT3 KO mice were deficient in memory when a tone was presented as complex auditory information in a discontinuous fashion. Moreover, ZnT3 KO mice showed abnormality in trace fear conditioning and in fear extinction. By contrast, ZnT3 KO mice had normal anxiety. Thus, ZnT3 is involved in associative fear memory and extinction, but not in innate fear, consistent with the role of synaptic zinc in amygdala synaptic plasticity.
Galaviz-Mosqueda, Alejandro; Villarreal-Reyes, Salvador; Galeana-Zapién, Hiram; Rubio-Loyola, Javier; Covarrubias-Rosales, David H.
2014-01-01
Vehicular ad hoc networks (VANETs) have been identified as a key technology to enable intelligent transport systems (ITS), which are aimed to radically improve the safety, comfort, and greenness of the vehicles in the road. However, in order to fully exploit VANETs potential, several issues must be addressed. Because of the high dynamic of VANETs and the impairments in the wireless channel, one key issue arising when working with VANETs is the multihop dissemination of broadcast packets for safety and infotainment applications. In this paper a reliable low-overhead multihop broadcast (RLMB) protocol is proposed to address the well-known broadcast storm problem. The proposed RLMB takes advantage of the hello messages exchanged between the vehicles and it processes such information to intelligently select a relay set and reduce the redundant broadcast. Additionally, to reduce the hello messages rate dependency, RLMB uses a point-to-zone link evaluation approach. RLMB performance is compared with one of the leading multihop broadcast protocols existing to date. Performance metrics show that our RLMB solution outperforms the leading protocol in terms of important metrics such as packet dissemination ratio, overhead, and delay. PMID:25133224
Design of a stateless low-latency router architecture for green software-defined networking
NASA Astrophysics Data System (ADS)
Saldaña Cercós, Silvia; Ramos, Ramon M.; Ewald Eller, Ana C.; Martinello, Magnos; Ribeiro, Moisés. R. N.; Manolova Fagertun, Anna; Tafur Monroy, Idelfonso
2015-01-01
Expanding software defined networking (SDN) to transport networks requires new strategies to deal with the large number of flows that future core networks will have to face. New south-bound protocols within SDN have been proposed to benefit from having control plane detached from the data plane offering a cost- and energy-efficient forwarding engine. This paper presents an overview of a new approach named KeyFlow to simultaneously reduce latency, jitter, and power consumption in core network nodes. Results on an emulation platform indicate that round trip time (RTT) can be reduced above 50% compared to the reference protocol OpenFlow, specially when flow tables are densely populated. Jitter reduction has been demonstrated experimentally on a NetFPGA-based platform, and 57.3% power consumption reduction has been achieved.
2017-01-01
Objectives To explore the challenges Health Information Technology (HIT) vendors face to satisfy the requirements for Meaningful Use (MU) and Electronic Laboratory Reporting (ELR) of reportable diseases to the public health departments in Kentucky. Methodology A survey was conducted of Health Information Exchange (HIE) vendors in Kentucky through the Kentucky Health Information Exchange (KHIE). The survey was cross-sectional. Data were collected between February and March 2014. Participants were recruited from KHIE vendors. Participants received online survey link and by email and asked to submit their responses. Vendors’ feedback were summarized and analyzed to identify their challenges. Out of the 55 vendors who received the survey, 35(63.64%) responded. Results Of the seven transport protocol options for ELR, vendors selected virtual private network (VPN) as the most difficult to implement (31.7%). Secure File Transfer Protocol (SFTP) was selected as preferred ELR transport protocol (31.4%). Most of the respondents, 80% responded that they do not have any challenge with the Health Level 7 (HL7) standard implementation guide required by MU for 2014 ELR certification. Conclusion The study found that the most difficult transport protocol to implement for ELR is VPN and if vendors have preference, they would use SFTP for ELR over KHIE choice of VPN and Simple Object Access Protocol (SOAP). KHIE vendors do not see any variability in what is reportable by different jurisdiction and also it is not difficult for them to detect what is reportable from one jurisdiction verse the other PMID:29403575
Protocol and Topology Issues for Wide-Area Satellite Interconnection of Terrestrial Optical LANs
NASA Astrophysics Data System (ADS)
Parraga, N.
2002-01-01
Apart from broadcasting, the satellite business is targeting niche markets. Wide area interconnection is considered as one of these niche markets, since it addresses operators and business LANs (B2B, business to business) in remote areas where terrestrial infrastructure is not available. These LANs - if high-speed - are typically based on optical networks such as SONET. One of the advantages of SONET is its architecture flexibility and capacity to transport all kind of applications including multimedia with a range of different transmission rates. The applications can be carried by different protocols among which the Internet Protocol (IP) or the Asynchronous Transfer Mode (ATM) are the most prominent ones. Thus, the question arises how these protocols can be interconnected via the satellite segment. The paper addresses several solutions for interworking with different protocols. For this investigation we distinguish first of all between the topology and the switching technology of the satellites. In case of a star network with transparent satellite, the satellite protocol consists of physical layer and data layer which can be directly interconnected with layer 2 interworking function to their terrestrial counterparts in the SONET backbone. For regenerative satellites the situation is more complex: here we need to distinguish the types of transport protocols being used in the terrestrial and satellite segment. Whereas IP, ATM, MPEG dominate in the terrestrial networks, satellite systems usually do not follow these standards. Some might employ minor additions (for instance, satellite specific packet headers), some might be completely proprietary. In general, interworking must be done for the data plane on top of layer 2 (data link layer), whereas for the signaling plane the interworking is on top of layer 3. In the paper we will discuss the protocol stacks for ATM, IP, and MPEG with a regenerative satellite system. As an example we will use the EuroSkyWay satellite system for multimedia services. EuroSkyWay uses a GEO satellite with onboard switching. It has its own proprietary protocol stack for data link control (DLC), logical link control (LLC) and layer 3 functions such as resource management, call admission control and authentication. Special attention is paid to the IP interworking with Layer 3 function since IP does not support connection set-up and session protocols, thus proper interworking functions with IP signaling protocols for resource reservation routing such as RSVP, BGP, and ICMP need to be developed. Whereas the EuroSkyWay system is an representative for a meshed topology, DVB-RCS systems have usually star configuration with a central hub station. Different data streams are distinguished by program identifiers (PIDs). Recent proposals aim at the evolution of DVB-RCS towards a fully meshed structure. The paper will also discuss the protocol architecture for interconnect SONET LANs over these systems. Finally, a performance comparison of the different solutions will be given in terms of cell overhead rate and signalling effort for selected scenarios.
GMPLS-based control plane for optical networks: early implementation experience
NASA Astrophysics Data System (ADS)
Liu, Hang; Pendarakis, Dimitrios; Komaee, Nooshin; Saha, Debanjan
2002-07-01
Generalized Multi-Protocol Label Switching (GMPLS) extends MPLS signaling and Internet routing protocols to provide a scalable, interoperable, distributed control plane, which is applicable to multiple network technologies such as optical cross connects (OXCs), photonic switches, IP routers, ATM switches, SONET and DWDM systems. It is intended to facilitate automatic service provisioning and dynamic neighbor and topology discovery across multi-vendor intelligent transport networks, as well as their clients. Efforts to standardize such a distributed common control plane have reached various stages in several bodies such as the IETF, ITU and OIF. This paper describes the design considerations and architecture of a GMPLS-based control plane that we have prototyped for core optical networks. Functional components of GMPLS signaling and routing are integrated in this architecture with an application layer controller module. Various requirements including bandwidth, network protection and survivability, traffic engineering, optimal utilization of network resources, and etc. are taken into consideration during path computation and provisioning. Initial experiments with our prototype demonstrate the feasibility and main benefits of GMPLS as a distributed control plane for core optical networks. In addition to such feasibility results, actual adoption and deployment of GMPLS as a common control plane for intelligent transport networks will depend on the successful completion of relevant standardization activities, extensive interoperability testing as well as the strengthening of appropriate business drivers.
Mobile-ip Aeronautical Network Simulation Study
NASA Technical Reports Server (NTRS)
Ivancic, William D.; Tran, Diepchi T.
2001-01-01
NASA is interested in applying mobile Internet protocol (mobile-ip) technologies to its space and aeronautics programs. In particular, mobile-ip will play a major role in the Advanced Aeronautic Transportation Technology (AATT), the Weather Information Communication (WINCOMM), and the Small Aircraft Transportation System (SATS) aeronautics programs. This report presents the results of a simulation study of mobile-ip for an aeronautical network. The study was performed to determine the performance of the transmission control protocol (TCP) in a mobile-ip environment and to gain an understanding of how long delays, handoffs, and noisy channels affect mobile-ip performance.
Romay-Tallon, Raquel; Rivera-Baltanas, Tania; Allen, Josh; Olivares, Jose M; Kalynchuk, Lisa E; Caruncho, Hector J
2017-01-01
The pattern of serotonin transporter clustering on the plasma membrane of lymphocytes extracted from human whole blood samples has been identified as a putative biomarker of therapeutic efficacy in major depression. Here we evaluated the possibility of performing a similar analysis using blood smears obtained from rats, and from control human subjects and depression patients. We hypothesized that we could optimize a protocol to make the analysis of serotonin protein clustering in blood smears comparable to the analysis of serotonin protein clustering using isolated lymphocytes. Our data indicate that blood smears require a longer fixation time and longer times of incubation with primary and secondary antibodies. In addition, one needs to optimize the image analysis settings for the analysis of smears. When these steps are followed, the quantitative analysis of both the number and size of serotonin transporter clusters on the plasma membrane of lymphocytes is similar using both blood smears and isolated lymphocytes. The development of this novel protocol will greatly facilitate the collection of appropriate samples by eliminating the necessity and cost of specialized personnel for drawing blood samples, and by being a less invasive procedure. Therefore, this protocol will help us advance the validation of membrane protein clustering in lymphocytes as a biomarker of therapeutic efficacy in major depression, and bring it closer to its clinical application.
NASA Astrophysics Data System (ADS)
LeRoy, S.; Segur, P.; Teyssedre, G.; Laurent, C.
2004-01-01
We present a conduction model aimed at describing bipolar transport and space charge phenomena in low density polyethylene under dc stress. In the first part we recall the basic requirements for the description of charge transport and charge storage in disordered media with emphasis on the case of polyethylene. A quick review of available conduction models is presented and our approach is compared with these models. Then, the bases of the model are described and related assumptions are discussed. Finally, results on external current, trapped and free space charge distributions, field distribution and recombination rate are presented and discussed, considering a constant dc voltage, a step-increase of the voltage, and a polarization-depolarization protocol for the applied voltage. It is shown that the model is able to describe the general features reported for external current, electroluminescence and charge distribution in polyethylene.
Hong, Eun-Mi; Park, Yongeun; Muirhead, Richard; Jeong, Jaehak; Pachepsky, Yakov A
2018-02-15
The Agricultural Policy/Environmental eXtender (APEX) is a watershed-scale water quality model that includes detailed representation of agricultural management. The objective of this work was to develop a process-based model for simulating the fate and transport of manure-borne bacteria on land and in streams with the APEX model. The bacteria model utilizes manure erosion rates to estimate the amount of edge-of-field bacteria export. Bacteria survival in manure is simulated as a two-stage process separately for each manure application event. In-stream microbial fate and transport processes include bacteria release from streambeds due to sediment resuspension during high flow events, active release from the streambed sediment during low flow periods, bacteria settling with sediment, and survival. Default parameter values were selected from published databases and evaluated based on field observations. The APEX model with the newly developed microbial fate and transport module was applied to simulate fate and transport of the fecal indicator bacterium Escherichia coli in the Toenepi watershed, New Zealand that was monitored for seven years. The stream network of the watershed ran through grazing lands with daily bovine waste deposition. Results show that the APEX with the bacteria module reproduced well the monitored pattern of E. coli concentrations at the watershed outlet. The APEX with the microbial fate and transport module will be utilized for predicting microbial quality of water as affected by various agricultural practices, evaluating monitoring protocols, and supporting the selection of management practices based on regulations that rely on fecal indicator bacteria concentrations. Published by Elsevier B.V.
Macro to microfluidics system for biological environmental monitoring.
Delattre, Cyril; Allier, Cédric P; Fouillet, Yves; Jary, Dorothée; Bottausci, Frederic; Bouvier, Denis; Delapierre, Guillaume; Quinaud, Manuelle; Rival, Arnaud; Davoust, Laurent; Peponnet, Christine
2012-01-01
Biological environmental monitoring (BEM) is a growing field of research which challenges both microfluidics and system automation. The aim is to develop a transportable system with analysis throughput which satisfies the requirements: (i) fully autonomous, (ii) complete protocol integration from sample collection to final analysis, (iii) detection of diluted molecules or biological species in a large real life environmental sample volume, (iv) robustness and (v) flexibility and versatility. This paper discusses all these specifications in order to define an original fluidic architecture based on three connected modules, a sampling module, a sample preparation module and a detection module. The sample preparation module highly concentrates on the pathogens present in a few mL samples of complex and unknown solutions and purifies the pathogens' nucleic acids into a few μL of a controlled buffer. To do so, a two-step concentration protocol based on magnetic beads is automated in a reusable macro-to-micro fluidic system. The detection module is a PCR based miniaturized platform using digital microfluidics, where reactions are performed in 64 nL droplets handled by electrowetting on dielectric (EWOD) actuation. The design and manufacture of the two modules are reported as well as their respective performances. To demonstrate the integration of the complete protocol in the same system, first results of pathogen detection are shown. Copyright © 2012 Elsevier B.V. All rights reserved.
Zhong, Guitao; Liu, Ronghe; Zhuang, Menglong; Wang, Hao
2017-01-01
Transient expression of chimeric fluorescent reporter proteins by biolistic bombardment is a quick and useful procedure for studying subcellular protein localization and dynamics in plants. It is especially beneficial in specific plant cells which are not suitable for protoplast-based and Agrobacterium-mediated protein transient expression. Polar protein secretion and vesicular trafficking play essential functions for cell polarization and tip growth. The growing pollen tube is regarded as an ideal model plant cell system to study the machinery and regulation of polar protein trafficking and targeting. A large amount of newly synthesized proteins are packed and polarly transported to the apical region to support the rapid and highly polarized tip growth. Here, we described a detailed step-by-step protocol for the transient expression of chimeric fluorescent reporter proteins in growing Arabidopsis and tobacco pollen tubes to study polar transportation logistics and mechanisms. In addition, we have optimized the Arabidopsis and tobacco in vitro pollen germination medium and the conditions to maximize the efficiency of protein expression. As a proof of concept, we have used this protocol to express actin microfilament and late endosomal fluorescent markers in Arabidopsis and tobacco pollen tubes.
1988-08-01
Interconnection (OSI) in years. It is felt even more urgent in the past few years, with the rapid evolution of communication technologies and the...services and protocols above the transport layer are usually implemented as user- callable utilities on the host computers, it is desirable to offer them...Networks, Prentice-hall, New Jersey, 1987 [ BOND 87] Bond , John, "Parallel-Processing Concepts Finally Come together in Real Systems", Computer Design
L2-LBMT: A Layered Load Balance Routing Protocol for underwater multimedia data transmission
NASA Astrophysics Data System (ADS)
Lv, Ze; Tang, Ruichun; Tao, Ye; Sun, Xin; Xu, Xiaowei
2017-12-01
Providing highly efficient underwater transmission of mass multimedia data is challenging due to the particularities of the underwater environment. Although there are many schemes proposed to optimize the underwater acoustic network communication protocols, from physical layer, data link layer, network layer to transport layer, the existing routing protocols for underwater wireless sensor network (UWSN) still cannot well deal with the problems in transmitting multimedia data because of the difficulties involved in high energy consumption, low transmission reliability or high transmission delay. It prevents us from applying underwater multimedia data to real-time monitoring of marine environment in practical application, especially in emergency search, rescue operation and military field. Therefore, the inefficient transmission of marine multimedia data has become a serious problem that needs to be solved urgently. In this paper, A Layered Load Balance Routing Protocol (L2-LBMT) is proposed for underwater multimedia data transmission. In L2-LBMT, we use layered and load-balance Ad Hoc Network to transmit data, and adopt segmented data reliable transfer (SDRT) protocol to improve the data transport reliability. And a 3-node variant of tornado (3-VT) code is also combined with the Ad Hoc Network to transmit little emergency data more quickly. The simulation results show that the proposed protocol can balance energy consumption of each node, effectively prolong the network lifetime and reduce transmission delay of marine multimedia data.
Contagious equine metritis: artificial reproduction changes the epidemiologic paradigm.
Schulman, Martin Lance; May, Catherine Edith; Keys, Bronwyn; Guthrie, Alan John
2013-11-29
Recent CEM outbreak reports reflect a novel epidemiologic manifestation with a markedly different risk association for transmission via artificial reproduction and subsequent to inadvertent importation of unapparent carrier stallions. Artificial breeding has an increased association with horizontal or fomite-associated transmission. Reported risk factors include inadequate biosecurity protocols at centralised breeding facilities associated with stallion management and methods of semen collection, processing and transport. Detection of carriers is based on traditional bacteriology from genital swabs and despite limitations inherent to Taylorella equigenitalis is currently the gold standard applied in all international trade and movement protocols. These limitations are reported to be overcome by PCR assays improving diagnostic sensitivity and specificity, practicality, turn-around times, through-put and cost efficacy. Molecular methods have increased understanding of the Taylorelleae, facilitate epidemiologic surveillance and outbreak control strategies. Validation and international regulatory acceptance of a robust PCR-based assay and the undefined risks in association with cryopreserved semen and embryos are future areas warranting further investigation. Copyright © 2013 Elsevier B.V. All rights reserved.
Achieving Reliable Communication in Dynamic Emergency Responses
Chipara, Octav; Plymoth, Anders N.; Liu, Fang; Huang, Ricky; Evans, Brian; Johansson, Per; Rao, Ramesh; Griswold, William G.
2011-01-01
Emergency responses require the coordination of first responders to assess the condition of victims, stabilize their condition, and transport them to hospitals based on the severity of their injuries. WIISARD is a system designed to facilitate the collection of medical information and its reliable dissemination during emergency responses. A key challenge in WIISARD is to deliver data with high reliability as first responders move and operate in a dynamic radio environment fraught with frequent network disconnections. The initial WIISARD system employed a client-server architecture and an ad-hoc routing protocol was used to exchange data. The system had low reliability when deployed during emergency drills. In this paper, we identify the underlying causes of unreliability and propose a novel peer-to-peer architecture that in combination with a gossip-based communication protocol achieves high reliability. Empirical studies show that compared to the initial WIISARD system, the redesigned system improves reliability by as much as 37% while reducing the number of transmitted packets by 23%. PMID:22195075
Towards building high performance medical image management system for clinical trials
NASA Astrophysics Data System (ADS)
Wang, Fusheng; Lee, Rubao; Zhang, Xiaodong; Saltz, Joel
2011-03-01
Medical image based biomarkers are being established for therapeutic cancer clinical trials, where image assessment is among the essential tasks. Large scale image assessment is often performed by a large group of experts by retrieving images from a centralized image repository to workstations to markup and annotate images. In such environment, it is critical to provide a high performance image management system that supports efficient concurrent image retrievals in a distributed environment. There are several major challenges: high throughput of large scale image data over the Internet from the server for multiple concurrent client users, efficient communication protocols for transporting data, and effective management of versioning of data for audit trails. We study the major bottlenecks for such a system, propose and evaluate a solution by using a hybrid image storage with solid state drives and hard disk drives, RESTfulWeb Services based protocols for exchanging image data, and a database based versioning scheme for efficient archive of image revision history. Our experiments show promising results of our methods, and our work provides a guideline for building enterprise level high performance medical image management systems.
On the Nets. Comparing Web Browsers: Mosaic, Cello, Netscape, WinWeb and InternetWorks Life.
ERIC Educational Resources Information Center
Notess, Greg R.
1995-01-01
World Wide Web browsers are compared by speed, setup, hypertext transport protocol (HTTP) handling, management of file transfer protocol (FTP), telnet, gopher, and wide area information server (WAIS); bookmark options; and communication functions. Netscape has the most features, the fastest retrieval, sophisticated bookmark capabilities. (JMV)
A new gold standard approach to characterize the transport of Si across cell membranes in animals.
Garneau, Alexandre P; Marcoux, Andrée-Anne; Frenette-Cotton, Rachelle; Bélanger, Richard; Isenring, Paul
2018-01-11
Silicon (Si) is increasingly recognized as an essential trace element in animals, especially since the identification of mammalian Si transport systems and Si responsive genes not long ago. During many years, however, efforts to gain substantial insight into the biological role of this element in animals have achieved partial success due in part to the unavailability of validated protocols to study Si movement across biological membranes. To circumvent such limitations, we have developed a general transport assay in which cellular Si content was determined by automated electrothermal atomic absorption spectrophotometry. We have found this assay to provide great analytic sensitivity with Si detection thresholds of less than 1 µM, that is, below or very close to the concentration range of animal cells. We have also found this assay to provide valid and cost-effective determinations in Si transport studies while requiring workable quantities of samples. The protocol described here should thus become gold standard toward accelerated progress in the field of Si transport. © 2018 Wiley Periodicals, Inc.
Validation and application of Acoustic Mapping Velocimetry
NASA Astrophysics Data System (ADS)
Baranya, Sandor; Muste, Marian
2016-04-01
The goal of this paper is to introduce a novel methodology to estimate bedload transport in rivers based on an improved bedform tracking procedure. The measurement technique combines components and processing protocols from two contemporary nonintrusive instruments: acoustic and image-based. The bedform mapping is conducted with acoustic surveys while the estimation of the velocity of the bedforms is obtained with processing techniques pertaining to image-based velocimetry. The technique is therefore called Acoustic Mapping Velocimetry (AMV). The implementation of this technique produces a whole-field velocity map associated with the multi-directional bedform movement. Based on the calculated two-dimensional bedform migration velocity field, the bedload transport estimation is done using the Exner equation. A proof-of-concept experiment was performed to validate the AMV based bedload estimation in a laboratory flume at IIHR-Hydroscience & Engineering (IIHR). The bedform migration was analysed at three different flow discharges. Repeated bed geometry mapping, using a multiple transducer array (MTA), provided acoustic maps, which were post-processed with a particle image velocimetry (PIV) method. Bedload transport rates were calculated along longitudinal sections using the streamwise components of the bedform velocity vectors and the measured bedform heights. The bulk transport rates were compared with the results from concurrent direct physical samplings and acceptable agreement was found. As a first field implementation of the AMV an attempt was made to estimate bedload transport for a section of the Ohio river in the United States, where bed geometry maps, resulted by repeated multibeam echo sounder (MBES) surveys, served as input data. Cross-sectional distributions of bedload transport rates from the AMV based method were compared with the ones obtained from another non-intrusive technique (due to the lack of direct samplings), ISSDOTv2, developed by the US Army Corps of Engineers. The good agreement between the results from the two different methods is encouraging and suggests further field tests in varying hydro-morphological situations.
Data Relay Board with Protocol for High-Speed, Free-Space Optical Communications
NASA Technical Reports Server (NTRS)
Wright, Malcolm; Clare, Loren; Gould, Gary; Pedyash, Maxim
2004-01-01
In a free-space optical communication system, the mitigation of transient outages through the incorporation of error-control methods is of particular concern, the outages being caused by scintillation fades and obscurants. The focus of this innovative technology is the development of a data relay system for a reliable high-data-rate free-spacebased optical-transport network. The data relay boards will establish the link, maintain synchronous connection, group the data into frames, and provide for automatic retransmission (ARQ) of lost or erred frames. A certain Quality of Service (QoS) can then be ensured, compatible with the required data rate. The protocol to be used by the data relay system is based on the draft CCSDS standard data-link protocol Proximity-1, selected by orbiters to multiple lander assets in the Mars network, for example. In addition to providing data-link protocol capabilities for the free-space optical link and buffering the data, the data relay system will interface directly with user applications over Gigabit Ethernet and/or with highspeed storage resources via Fibre Channel. The hardware implementation is built on a network-processor-based architecture. This technology combines the power of a hardware switch capable of data switching and packet routing at Gbps rates, with the flexibility of a software- driven processor that can host highly adaptive and reconfigurable protocols used, for example, in wireless local-area networks (LANs). The system will be implemented in a modular multi-board fashion. The main hardware elements of the data relay system are the new data relay board developed by Rockwell Scientific, a COTS Gigabit Ethernet board for user interface, and a COTS Fibre Channel board that connects to local storage. The boards reside in a cPCI back plane, and can be housed in a VME-type enclosure.
Dueñas, A.; González, M. A.; Muñoz, A.; Salvador, C. H.
1994-01-01
The objective of this proposal is to provide solutions for the necessities of teleconsultation or telediagnosis among medical professionals, using work stations within the X-Windows environment and applicable in communication lines with an extensive range of bandwidths and operating system independence. Among the advantages sought are savings in transportation, improvement in the quality of the medical attention provided and continued training for the medical professional. Images Fig. 1 PMID:7949963
D'Aiuto, Leonardo; Zhi, Yun; Kumar Das, Dhanjit; Wilcox, Madeleine R; Johnson, Jon W; McClain, Lora; MacDonald, Matthew L; Di Maio, Roberto; Schurdak, Mark E; Piazza, Paolo; Viggiano, Luigi; Sweet, Robert; Kinchington, Paul R; Bhattacharjee, Ayantika G; Yolken, Robert; Nimgaonka, Vishwajit L; Nimgaonkar, Vishwajit L
2014-01-01
Induced pluripotent stem cell (iPSC)-based technologies offer an unprecedented opportunity to perform high-throughput screening of novel drugs for neurological and neurodegenerative diseases. Such screenings require a robust and scalable method for generating large numbers of mature, differentiated neuronal cells. Currently available methods based on differentiation of embryoid bodies (EBs) or directed differentiation of adherent culture systems are either expensive or are not scalable. We developed a protocol for large-scale generation of neuronal stem cells (NSCs)/early neural progenitor cells (eNPCs) and their differentiation into neurons. Our scalable protocol allows robust and cost-effective generation of NSCs/eNPCs from iPSCs. Following culture in neurobasal medium supplemented with B27 and BDNF, NSCs/eNPCs differentiate predominantly into vesicular glutamate transporter 1 (VGLUT1) positive neurons. Targeted mass spectrometry analysis demonstrates that iPSC-derived neurons express ligand-gated channels and other synaptic proteins and whole-cell patch-clamp experiments indicate that these channels are functional. The robust and cost-effective differentiation protocol described here for large-scale generation of NSCs/eNPCs and their differentiation into neurons paves the way for automated high-throughput screening of drugs for neurological and neurodegenerative diseases.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Christy, J. E.; Nickless, W. K.; Thiede, D. R.
The Transport version 3 (T3) system uses the Network News Transfer Protocol (NNTP) to move data from sources to a Data Reporisoty (DR). Interested recipients subscribe to newsgroups to retrieve data. Data in transport is protected by AES-256 and RSA cryptographic services provided by the external OpenSSL cryptographic libraries.
Barbhuiya, F A; Agarwal, Mayank; Purwar, Sanketh; Biswas, Santosh; Nandi, Sukumar
2015-09-01
TCP is the most widely accepted transport layer protocol. The major emphasis during the development of TCP was its functionality and efficiency. However, not much consideration was given on studying the possibility of attackers exploiting the protocol, which has lead to several attacks on TCP. This paper deals with the induced low rate TCP attack. Since the attack is relatively new, only a few schemes have been proposed to mitigate it. However, the main issues with these schemes are scalability, change in TCP header, lack of formal frameworks, etc. In this paper, we have adapted the stochastic DES framework for detecting the attack, which addresses most of these issues. We have successfully deployed and tested the proposed DES based IDS on a test bed. Copyright © 2015 ISA. Published by Elsevier Ltd. All rights reserved.
Samoborec, Stella; Ruseckaite, Rasa; Romero, Lorena; Evans, Sue M
2017-09-03
Globally, road transport accidents contribute substantially to the number of deaths and also to the burden of disability. Up to 50 million people suffer a transport-related non-fatal injury each year, which often leads to long-term disability. It has been shown that substantial number of people with minor injuries struggle to recover and the reasons are still not well explored.Despite the high prevalence, little is known about the factors hindering recovery following minor traffic-related injuries. The aim of this paper is to present a protocol for the systematic review aiming to understand biopsychosocial factors related to non-recovery and identify current gaps in the literature. The review will be conducted in compliance with the Preferred Reporting Items for Systematic Reviews and Meta-Analysis Protocol guidelines. A search of the electronic databases, MEDLINE, EMBASE, Cochrane Central Register of Controlled trials, will be undertaken, in addition to Google Scholar and grey literature to identify studies in period from 2006 to 2016. Quantitative and qualitative research articles describing and identifying biopsychosocial factors associated with non-recovery and health outcomes such as pain, disability, functional recovery, health-related quality of life, post-traumatic stress disorder, depression, anxiety and return to work will be included. A conceptual framework developed to identify biopsychosocial factors will be applied to assure defined criterion.At present, there is little anticipation for meta-analyses due to the heterogeneity of factors and outcomes assessed. Therefore, a narrative synthesis based on study findings will be conducted. Ethical approval is not required as primary data will not be collected. Review results will be published as a part of thesis, peer-reviewed journal and conferences. PROSPEROregistration number: CRD42016052276. © Article author(s) (or their employer(s) unless otherwise stated in the text of the article) 2017. All rights reserved. No commercial use is permitted unless otherwise expressly granted.
Authentication Binding between SSL/TLS and HTTP
NASA Astrophysics Data System (ADS)
Saito, Takamichi; Sekiguchi, Kiyomi; Hatsugai, Ryosuke
While the Secure Socket Layer or Transport Layer Security (SSL/TLS) is assumed to provide secure communications over the Internet, many web applications utilize basic or digest authentication of Hyper Text Transport Protocol (HTTP) over SSL/TLS. Namely, in the scheme, there are two different authentication schemes in a session. Since they are separated by a layer, these are not convenient for a web application. Moreover, the scheme may also cause problems in establishing secure communication. Then we provide a scheme of authentication binding between SSL/TLS and HTTP without modifying SSL/TLS protocols and its implementation, and we show the effectiveness of our proposed scheme.
Immunoelectron Microscopy of Cryofixed Freeze-Substituted Yeast Saccharomyces cerevisiae.
Fišerová, Jindřiška; Richardson, Christine; Goldberg, Martin W
2016-01-01
Immunolabeling electron microscopy is a challenging technique with demands for perfect ultrastructural and antigen preservation. High-pressure freezing offers an excellent way to fix cellular structure. However, its use for immunolabeling has remained limited because of the low frequency of labeling due to loss of protein antigenicity or accessibility. Here we present a protocol for immunogold labeling of the yeast Saccharomyces cerevisiae that gives specific and multiple labeling while keeping the finest structural details. We use the protocol to reveal the organization of individual nuclear pore complex proteins and the position of transport factors in the yeast Saccharomyces cerevisiae in relation to actual transport events.
Accuracy of Pediatric Trauma Field Triage: A Systematic Review.
van der Sluijs, Rogier; van Rein, Eveline A J; Wijnand, Joep G J; Leenen, Luke P H; van Heijl, Mark
2018-05-16
Field triage of pediatric patients with trauma is critical for transporting the right patient to the right hospital. Mortality and lifelong disabilities are potentially attributable to erroneously transporting a patient in need of specialized care to a lower-level trauma center. To quantify the accuracy of field triage and associated diagnostic protocols used to identify children in need of specialized trauma care. MEDLINE, Embase, PsycINFO, and Cochrane Register of Controlled Trials were searched from database inception to November 6, 2017, for studies describing the accuracy of diagnostic tests to identify children in need of specialized trauma care in a prehospital setting. Identified articles with a study population including patients not transported by emergency medical services were excluded. Quality assessment was performed using a modified version of the Quality Assessment of Diagnostic Accuracy Studies-2. After deduplication, 1430 relevant articles were assessed, a full-text review of 38 articles was conducted, and 5 of those articles were included. All studies were observational, published between 1996 and 2017, and conducted in the United States, and data collection was prospective in 1 study. Three different protocols were studied that analyzed a combined total of 1222 children in need of specialized trauma care. One protocol was specifically developed for a pediatric out-of-hospital cohort. The percentage of pediatric patients requiring specialized trauma care in each study varied between 2.6% (110 of 4197) and 54.7% (58 of 106). The sensitivity of the prehospital triage tools ranged from 49.1% to 87.3%, and the specificity ranged from 41.7% to 84.8%. No prehospital triage protocol alone complied with the international standard of 95% or greater sensitivity. Undertriage and overtriage rates, representative of the quality of the full diagnostic strategy to transport a patient to the right hospital, were not reported for inclusive trauma systems or emergency medical services regions. It is crucial to transport the right patient to the right hospital. Yet the quality of the full diagnostic strategy to determine the optimal receiving hospital is unknown. None of the investigated field triage protocols complied with current sensitivity targets. Improved efforts are needed to develop accurate child-specific tools to prevent undertriage and its potential life-threatening consequences.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Malathi Veeraraghavan
2007-10-31
A high-speed optical circuit network is one that offers users rate-guaranteed connectivity between two endpoints, unlike today’s IP-routed Internet in which the rate available to a pair of users fluctuates based on the volume of competing traffic. This particular research project advanced our understanding of circuit networks in two ways. First, transport protocols were developed for circuit networks. In a circuit network, since bandwidth resources are reserved for each circuit on an end-to-end basis (much like how a person reserves a seat on every leg of a multi-segment flight), and the sender is limited to send at the rate ofmore » the circuit, there is no possibility of congestion during data transfer. Therefore, no congestion control functions are necessary in a transport protocol designed for circuits. However, error control and flow control are still required because bits can become errored due to noise and interference even on highly reliable optical links, and receivers can, due to multitasking or other reasons, not deplete the receive buffer fast enough to keep up with the sending rate (e.g., if the receiving host is multitasking between receiving a file transfer and some other computation). In this work, we developed two transport protocols for circuits, both of which are described below. Second, this project developed techniques for internetworking different types of connection-oriented networks, which are of two types: circuit-switched or packet-switched. In circuit-switched networks, multiplexing on links is “position based,” where “position” refers to the frequency, time slot, and port (fiber), while connection-oriented packet-switched networks use packet header information to demultiplex packets and switch them from node to node. The latter are commonly referred to as virtual circuit networks. Examples of circuit networks are time-division multiplexed Synchronous Optical Network/Synchronous Digital Hierarchy (SONET/SDH) and Wavelength Division Multiplexing (WDM) networks, while examples of virtual-circuit networks are MultiProtocol Label Switched (MPLS) networks and Ethernet Virtual Local Area Network (VLAN) networks. A series of new technologies have been developed to carry Ethernet VLAN tagged frames on SONET/SDH and WDM networks, such as Generic Framing Procedure (GFP) and ITU G.709, respectively. These technologies form the basis of our solution for connection-oriented internetworking. The benefit of developing such an architecture is that it allows different providers to choose different connection-oriented networking technologies for their networks, and yet be able to allow their customers to connect to those of other providers. As Metcalfe, the inventor of Ethernet, noted, the value of a network service grows exponentially with the number of endpoints to which any single endpoint can connect. Therefore internetworking solutions are key to commercial success. The technical effectiveness of our solutions was measured with proof-of-concept prototypes and experiments. These solutions were shown to be highly effective. Economic feasibility requires business case analyses that were beyond the scope of this project. The project results are beneficial to the public as they demonstrate the viability of simultaneously supporting different types of networks and data communication services much like the variety of services available for the transportation of people and goods. For example, Fedex service offers a deadline based delivery while the USPS offers basic package delivery service. Similarly, a circuit network can offer a deadline based delivery of a data file while the IP-routed network offers only basic delivery service with no guarantees. Two project Web sites, 13 publications, 7 software programs, 21 presentations resulted from this work. This report provides the complete list of publications, software programs and presentations. As for student education and training (human resources), this DOE project, along with an NSF project, jointly supported two postdoctoral fellowships, three PhDs, three Masters, and two undergraduate students. Specifically, two of the Masters students were directly funded on this DOE project.« less
The SHIP: A SIP to HTTP Interaction Protocol
NASA Astrophysics Data System (ADS)
Zeiß, Joachim; Gabner, Rene; Bessler, Sandford; Happenhofer, Marco
IMS is capable of providing a wide range of services. As a result, terminal software becomes more and more complex to deliver network intelligence to user applications. Currently mobile terminal software needs to be permanently updated so that the latest network services and functionality can be delivered to the user. In the Internet, browser based user interfaces assure that an interface is made available to the user which offers the latest services in the net immediately. Our approach combines the benefits of the Session Initiation Protocol (SIP) and those of the HTTP protocol to bring the same type of user interfacing to IMS. SIP (IMS) realizes authentication, session management, charging and Quality of Service (QoS), HTTP provides access to Internet services and allows the user interface of an application to run on a mobile terminal while processing and orchestration is done on the server. A SHIP enabled IMS client only needs to handle data transport and session management via SIP, HTTP and RTP and render streaming media, HTML and Javascript. SHIP allows new kinds of applications, which combine audio, video and data within a single multimedia session.
1999-09-01
application, a complete specification will require one or more companion documents, as follows. 1. Profile Specification Documents A Profile...Rio de Janeiro - RJ - Brazil 21. Diretoria de Sistemas de Armas da Marinha Rua Primeiro de Marco, 118 Rio de Janeiro - RJ - Brazil CEP 20010 22
Allen, Kyle R; Hazelett, Susan E; Radwany, Steven; Ertle, Denise; Fosnight, Susan M; Moore, Pamela S
2012-04-01
Practice guidelines are available for hospice and palliative medicine specialists and geriatricians. However, these guidelines do not adequately address the needs of patients who straddle the 2 specialties: homebound chronically ill patients. The purpose of this article is to describe the theoretical basis for the Promoting Effective Advance Care for Elders (PEACE) randomized pilot study. PEACE is an ongoing 2-group randomized pilot study (n=80) to test an in-home interdisciplinary care management intervention that combines palliative care approaches to symptom management, psychosocial and emotional support, and advance care planning with geriatric medicine approaches to optimizing function and addressing polypharmacy. The population comprises new enrollees into PASSPORT, Ohio's community-based, long-term care Medicaid waiver program. All PASSPORT enrollees have geriatric/palliative care crossover needs because they are nursing home eligible. The intervention is based on Wagner's Chronic Care Model and includes comprehensive interdisciplinary care management for these low-income frail elders with chronic illnesses, uses evidence-based protocols, emphasizes patient activation, and integrates with community-based long-term care and other community agencies. Our model, with its standardized, evidence-based medical and psychosocial intervention protocols, will transport easily to other sites that are interested in optimizing outcomes for community-based, chronically ill older adults. © Mary Ann Liebert, Inc.
Kaddis, John S.; Hanson, Matthew S.; Cravens, James; Qian, Dajun; Olack, Barbara; Antler, Martha; Papas, Klearchos K.; Iglesias, Itzia; Barbaro, Barbara; Fernandez, Luis; Powers, Alvin C.; Niland, Joyce C.
2013-01-01
Preservation of cell quality during shipment of human pancreatic islets for use in laboratory research is a crucial, but neglected, topic. Mammalian cells, including islets, have been shown to be adversely affected by temperature changes in vitro and in vivo, yet protocols that control for thermal fluctuations during cell transport are lacking. To evaluate an optimal method of shipping human islets, an initial assessment of transportation conditions was conducted using standardized materials and operating procedures in 48 shipments sent to a central location by 8 pancreas-processing laboratories using a single commercial airline transporter. Optimization of preliminary conditions was conducted, and human islet quality was then evaluated in 2,338 shipments pre- and post-implementation of a finalized transportation container and standard operating procedures. The initial assessment revealed that the outside temperature ranged from a mean of −4.6±10.3°C to 20.9±4.8°C. Within-container temperature drops to or below 15°C occurred in 16 shipments (36%), while the temperature was found to be stabilized between 15–29°C in 29 shipments (64%). Implementation of an optimized transportation container and operating procedure reduced the number of within-container temperature drops (≤15°C) to 13% (n=37 of 289 winter shipments), improved the number desirably maintained between 15–29°C to 86% (n=250), but also increased the number reaching or exceeding 29°C to 1% (n=2; overall p<0.0001). Additionally, post-receipt quality ratings of excellent to good improved pre- vs. post- implementation of the standardized protocol, adjusting for pre-shipment purity/viability levels (p<0.0001). Our results show that extreme temperature fluctuations during transport of human islets, occurring when using a commercial airline transporter for long distance shipping, can be controlled using standardized containers, materials, and operating procedures. This cost-effective and pragmatic standardized protocol for the transportation of human islets can potentially be adapted for use with other mammalian cell systems, and is available online at: http://iidp.coh.org/sops.aspx. PMID:22889479
Analytical approach to cross-layer protocol optimization in wireless sensor networks
NASA Astrophysics Data System (ADS)
Hortos, William S.
2008-04-01
In the distributed operations of route discovery and maintenance, strong interaction occurs across mobile ad hoc network (MANET) protocol layers. Quality of service (QoS) requirements of multimedia service classes must be satisfied by the cross-layer protocol, along with minimization of the distributed power consumption at nodes and along routes to battery-limited energy constraints. In previous work by the author, cross-layer interactions in the MANET protocol are modeled in terms of a set of concatenated design parameters and associated resource levels by multivariate point processes (MVPPs). Determination of the "best" cross-layer design is carried out using the optimal control of martingale representations of the MVPPs. In contrast to the competitive interaction among nodes in a MANET for multimedia services using limited resources, the interaction among the nodes of a wireless sensor network (WSN) is distributed and collaborative, based on the processing of data from a variety of sensors at nodes to satisfy common mission objectives. Sensor data originates at the nodes at the periphery of the WSN, is successively transported to other nodes for aggregation based on information-theoretic measures of correlation and ultimately sent as information to one or more destination (decision) nodes. The "multimedia services" in the MANET model are replaced by multiple types of sensors, e.g., audio, seismic, imaging, thermal, etc., at the nodes; the QoS metrics associated with MANETs become those associated with the quality of fused information flow, i.e., throughput, delay, packet error rate, data correlation, etc. Significantly, the essential analytical approach to MANET cross-layer optimization, now based on the MVPPs for discrete random events occurring in the WSN, can be applied to develop the stochastic characteristics and optimality conditions for cross-layer designs of sensor network protocols. Functional dependencies of WSN performance metrics are described in terms of the concatenated protocol parameters. New source-to-destination routes are sought that optimize cross-layer interdependencies to achieve the "best available" performance in the WSN. The protocol design, modified from a known reactive protocol, adapts the achievable performance to the transient network conditions and resource levels. Control of network behavior is realized through the conditional rates of the MVPPs. Optimal cross-layer protocol parameters are determined by stochastic dynamic programming conditions derived from models of transient packetized sensor data flows. Moreover, the defining conditions for WSN configurations, grouping sensor nodes into clusters and establishing data aggregation at processing nodes within those clusters, lead to computationally tractable solutions to the stochastic differential equations that describe network dynamics. Closed-form solution characteristics provide an alternative to the "directed diffusion" methods for resource-efficient WSN protocols published previously by other researchers. Performance verification of the resulting cross-layer designs is found by embedding the optimality conditions for the protocols in actual WSN scenarios replicated in a wireless network simulation environment. Performance tradeoffs among protocol parameters remain for a sequel to the paper.
DTS: The NOAO Data Transport System
NASA Astrophysics Data System (ADS)
Fitzpatrick, M.; Semple, T.
2014-05-01
The NOAO Data Transport System (DTS) provides high-throughput, reliable, data transfer between telescopes, pipelines and archive centers located in the Northern and Southern hemispheres. It is a distributed application using XML-RPC for command and control, and either parallel-TCP or UDT protocols for bulk data transport. The system is data-agnostic, allowing arbitrary files or directories to be moved using the same infrastructure. Data paths are configurable in the system by connecting nodes as the source or destination of data in a queue. Each leg of a data path may be configured independently based on the network environment between the sites. A queueing model is currently implemented to manage the automatic movement of data, a streaming model is planned to support arbitrarily large transfers (e.g. as in a disk recovery scenario) or to provide a 'pass-thru' interface to minize overheads. A web-based monitor allows anyone to get a graphical overview of the DTS system as it runs, operators will be able to control individual nodes in the system. Through careful tuning of the network paths DTS is able to achieve in excess of 80-percent of the nominal wire speed using only commodity networks, making it ideal for long-haul transport of large volumes of data.
Using the ACR/NEMA standard with TCP/IP and Ethernet
NASA Astrophysics Data System (ADS)
Chimiak, William J.; Williams, Rodney C.
1991-07-01
There is a need for a consolidated picture archival and communications system (PACS) in hospitals. At the Bowman Gray School of Medicine of Wake Forest University (BGSM), the authors are enhancing the ACR/NEMA Version 2 protocol using UNIX sockets and TCP/IP to greatly improve connectivity. Initially, nuclear medicine studies using gamma cameras are to be sent to PACS. The ACR/NEMA Version 2 protocol provides the functionality of the upper three layers of the open system interconnection (OSI) model in this implementation. The images, imaging equipment information, and patient information are then sent in ACR/NEMA format to a software socket. From there it is handed to the TCP/IP protocol, which provides the transport and network service. TCP/IP, in turn, uses the services of IEEE 802.3 (Ethernet) to complete the connectivity. The advantage of this implementation is threefold: (1) Only one I/O port is consumed by numerous nuclear medicine cameras, instead of a physical port for each camera. (2) Standard protocols are used which maximize interoperability with ACR/NEMA compliant PACSs. (3) The use of sockets allows a migration path to the transport and networking services of OSIs TP4 and connectionless network service as well as the high-performance protocol being considered by the American National Standards Institute (ANSI) and the International Standards Organization (ISO) -- the Xpress Transfer Protocol (XTP). The use of sockets also gives access to ANSI's Fiber Distributed Data Interface (FDDI) as well as other high-speed network standards.
A software defined RTU multi-protocol automatic adaptation data transmission method
NASA Astrophysics Data System (ADS)
Jin, Huiying; Xu, Xingwu; Wang, Zhanfeng; Ma, Weijun; Li, Sheng; Su, Yong; Pan, Yunpeng
2018-02-01
Remote terminal unit (RTU) is the core device of the monitor system in hydrology and water resources. Different devices often have different communication protocols in the application layer, which results in the difficulty in information analysis and communication networking. Therefore, we introduced the idea of software defined hardware, and abstracted the common feature of mainstream communication protocols of RTU application layer, and proposed a uniformed common protocol model. Then, various communication protocol algorithms of application layer are modularized according to the model. The executable codes of these algorithms are labeled by the virtual functions and stored in the flash chips of embedded CPU to form the protocol stack. According to the configuration commands to initialize the RTU communication systems, it is able to achieve dynamic assembling and loading of various application layer communication protocols of RTU and complete the efficient transport of sensor data from RTU to central station when the data acquisition protocol of sensors and various external communication terminals remain unchanged.
Interactive MPEG-4 low-bit-rate speech/audio transmission over the Internet
NASA Astrophysics Data System (ADS)
Liu, Fang; Kim, JongWon; Kuo, C.-C. Jay
1999-11-01
The recently developed MPEG-4 technology enables the coding and transmission of natural and synthetic audio-visual data in the form of objects. In an effort to extend the object-based functionality of MPEG-4 to real-time Internet applications, architectural prototypes of multiplex layer and transport layer tailored for transmission of MPEG-4 data over IP are under debate among Internet Engineering Task Force (IETF), and MPEG-4 systems Ad Hoc group. In this paper, we present an architecture for interactive MPEG-4 speech/audio transmission system over the Internet. It utilities a framework of Real Time Streaming Protocol (RTSP) over Real-time Transport Protocol (RTP) to provide controlled, on-demand delivery of real time speech/audio data. Based on a client-server model, a couple of low bit-rate bit streams (real-time speech/audio, pre- encoded speech/audio) are multiplexed and transmitted via a single RTP channel to the receiver. The MPEG-4 Scene Description (SD) and Object Descriptor (OD) bit streams are securely sent through the RTSP control channel. Upon receiving, an initial MPEG-4 audio- visual scene is constructed after de-multiplexing, decoding of bit streams, and scene composition. A receiver is allowed to manipulate the initial audio-visual scene presentation locally, or interactively arrange scene changes by sending requests to the server. A server may also choose to update the client with new streams and list of contents for user selection.
A protocol for conducting rainfall simulation to study soil runoff
USDA-ARS?s Scientific Manuscript database
Rainfall is a driving force for the transport of environmental contaminants from agricultural soils to surficial water bodies via surface runoff. The objective of this study was to characterize the effects of antecedent soil moisture content on the fate and transport of surface applied commercial ur...
Does water transport scale universally with tree size?
F.C. Meinzer; B.J. Bond; J.M. Warren; D.R. Woodruff
2005-01-01
1. We employed standardized measurement techniques and protocols to describe the size dependence of whole-tree water use and cross-sectional area of conducting xylem (sapwood) among several species of angiosperms and conifers. 2. The results were not inconsistent with previously proposed 314-power scaling of water transport with estimated above-...
Networking for large-scale science: infrastructure, provisioning, transport and application mapping
NASA Astrophysics Data System (ADS)
Rao, Nageswara S.; Carter, Steven M.; Wu, Qishi; Wing, William R.; Zhu, Mengxia; Mezzacappa, Anthony; Veeraraghavan, Malathi; Blondin, John M.
2005-01-01
Large-scale science computations and experiments require unprecedented network capabilities in the form of large bandwidth and dynamically stable connections to support data transfers, interactive visualizations, and monitoring and steering operations. A number of component technologies dealing with the infrastructure, provisioning, transport and application mappings must be developed and/or optimized to achieve these capabilities. We present a brief account of the following technologies that contribute toward achieving these network capabilities: (a) DOE UltraScienceNet and NSF CHEETAH network testbeds that provide on-demand and scheduled dedicated network connections; (b) experimental results on transport protocols that achieve close to 100% utilization on dedicated 1Gbps wide-area channels; (c) a scheme for optimally mapping a visualization pipeline onto a network to minimize the end-to-end delays; and (d) interconnect configuration and protocols that provides multiple Gbps flows from Cray X1 to external hosts.
Kelly-Cirino, Cassandra D; Curry, Patricia S; Marola, Jamie L; Helstrom, Niels K; Salfinger, Max
2016-11-01
OMNIgene®•SPUTUM (OM-S) is a sputum transport reagent designed to work with all tuberculosis diagnostics and eliminate the need for cold chain. The aim of this preliminary study was to assess the compatibility of OM-S-treated sputum with the Xpert® MTB/RIF assay. Fifty-five characterized sputa from the FIND TB Specimen Bank were used. Compatibility of OM-S was assessed for both Xpert sample preparation methods: H.1 protocol (sediment, n=25) and H.2 protocol (direct expectorate, n=30). All controls were prepared using the H.2 protocol. Results revealed 100% concordance of MTB/RIF results for all except the low-positive group in the H.1 study arm (n=10; 88% concordance). OM-S-treated sputa were successful in both protocols; if the Xpert buffer is not added during the H.2 procedure, sample viscosity may require repeat testing. Using OM-S could offer users flexibility in clinical testing algorithms. Larger compatibility studies are warranted, particularly with respect to MTB/RIF results for low-positive samples. Copyright © 2016 Elsevier Inc. All rights reserved.
ACR/NEMA Digital Image Interface Standard (An Illustrated Protocol Overview)
NASA Astrophysics Data System (ADS)
Lawrence, G. Robert
1985-09-01
The American College of Radiologists (ACR) and the National Electrical Manufacturers Association (NEMA) have sponsored a joint standards committee mandated to develop a universal interface standard for the transfer of radiology images among a variety of PACS imaging devicesl. The resulting standard interface conforms to the ISO/OSI standard reference model for network protocol layering. The standard interface specifies the lower layers of the reference model (Physical, Data Link, Transport and Session) and implies a requirement of the Network Layer should a requirement for a network exist. The message content has been considered and a flexible message and image format specified. The following Imaging Equipment modalities are supported by the standard interface... CT Computed Tomograpy DS Digital Subtraction NM Nuclear Medicine US Ultrasound MR Magnetic Resonance DR Digital Radiology The following data types are standardized over the transmission interface media.... IMAGE DATA DIGITIZED VOICE HEADER DATA RAW DATA TEXT REPORTS GRAPHICS OTHERS This paper consists of text supporting the illustrated protocol data flow. Each layer will be individually treated. Particular emphasis will be given to the Data Link layer (Frames) and the Transport layer (Packets). The discussion utilizes a finite state sequential machine model for the protocol layers.
Protocol independent transmission method in software defined optical network
NASA Astrophysics Data System (ADS)
Liu, Yuze; Li, Hui; Hou, Yanfang; Qiu, Yajun; Ji, Yuefeng
2016-10-01
With the development of big data and cloud computing technology, the traditional software-defined network is facing new challenges (e.i., ubiquitous accessibility, higher bandwidth, more flexible management and greater security). Using a proprietary protocol or encoding format is a way to improve information security. However, the flow, which carried by proprietary protocol or code, cannot go through the traditional IP network. In addition, ultra- high-definition video transmission service once again become a hot spot. Traditionally, in the IP network, the Serial Digital Interface (SDI) signal must be compressed. This approach offers additional advantages but also bring some disadvantages such as signal degradation and high latency. To some extent, HD-SDI can also be regard as a proprietary protocol, which need transparent transmission such as optical channel. However, traditional optical networks cannot support flexible traffics . In response to aforementioned challenges for future network, one immediate solution would be to use NFV technology to abstract the network infrastructure and provide an all-optical switching topology graph for the SDN control plane. This paper proposes a new service-based software defined optical network architecture, including an infrastructure layer, a virtualization layer, a service abstract layer and an application layer. We then dwell on the corresponding service providing method in order to implement the protocol-independent transport. Finally, we experimentally evaluate that proposed service providing method can be applied to transmit the HD-SDI signal in the software-defined optical network.
Performance Evaluation of FAST TCP Traffic-Flows in Multihomed MANETs
NASA Astrophysics Data System (ADS)
Mudassir, Mumajjed Ul; Akram, Adeel
In Mobile Ad hoc Networks (MANETs) an efficient communication protocol is required at the transport layer. Mobile nodes moving around will have temporary and rather short-lived connectivity with each other and the Internet, thus requiring efficient utilization of network resources. Moreover the problems arising due to high mobility, collision and congestion must also be considered. Multihoming allows higher reliability and enhancement of network throughput. FAST TCP is a new promising transport layer protocol developed for high-speed high-latency networks. In this paper, we have analyzed the performance of FAST TCP traffic flows in multihomed MANETs and compared it with standard TCP (TCP Reno) traffic flows in non-multihomed MANETs.
Analysis of NASA communications (Nascom) II network protocols and performance
NASA Technical Reports Server (NTRS)
Omidyar, Guy C.; Butler, Thomas E.
1991-01-01
The NASA Communications (Nascom) Division of the Mission Operations and Data Systems Directorate is to undertake a major initiative to develop the Nascom II (NII) network to achieve its long-range service objectives for operational data transport to support the Space Station Freedom Program, the Earth Observing System, and other projects. NII is the Nascom ground communications network being developed to accommodate the operational traffic of the mid-1990s and beyond. The authors describe various baseline protocol architectures based on current and evolving technologies. They address the internetworking issues suggested for reliable transfer of data over heterogeneous segments. They also describe the NII architecture, topology, system components, and services. A comparative evaluation of the current and evolving technologies was made, and suggestions for further study are described. It is shown that the direction of the NII configuration and the subsystem component design will clearly depend on the advances made in the area of broadband integrated services.
Temporal Precedence Checking for Switched Models and its Application to a Parallel Landing Protocol
NASA Technical Reports Server (NTRS)
Duggirala, Parasara Sridhar; Wang, Le; Mitra, Sayan; Viswanathan, Mahesh; Munoz, Cesar A.
2014-01-01
This paper presents an algorithm for checking temporal precedence properties of nonlinear switched systems. This class of properties subsume bounded safety and capture requirements about visiting a sequence of predicates within given time intervals. The algorithm handles nonlinear predicates that arise from dynamics-based predictions used in alerting protocols for state-of-the-art transportation systems. It is sound and complete for nonlinear switch systems that robustly satisfy the given property. The algorithm is implemented in the Compare Execute Check Engine (C2E2) using validated simulations. As a case study, a simplified model of an alerting system for closely spaced parallel runways is considered. The proposed approach is applied to this model to check safety properties of the alerting logic for different operating conditions such as initial velocities, bank angles, aircraft longitudinal separation, and runway separation.
Exploratory Disposal and Reuse Feasibility Analysis of Winter Maintenance Wash Water.
Ullinger, Heather L; Kennedy, Marla J; Schneider, William H; Miller, Christopher M
2016-01-01
The Ohio Department of Transportation has more than 60 facilities without sewer access generating approximately 19 million gallons of winter maintenance wash water. Off-site disposal is costly, creating the need for sustainable management strategies. The objective of this study was to conduct an exploratory feasibility analysis to assess wash water disposal and potential reuse as brine. Based on a comprehensive literature review and relevant environmental chemistry, a sampling protocol consisting of 31 water quality constituents was utilized for monthly sampling at three geographically distinct Ohio Department of Transportation garages during the winter of 2012. Results were compared to local disposal and reuse guidance limits. Three constituents, including a maximum copper concentration of 858 ppb, exceeded disposal limits, and many constituents also failed to meet reuse limits. Some concentrations were orders of magnitude higher than reuse limits and suggest pre-treatment would be necessary if wash water were reused as brine. These water quality results, in conjunction with copper chemical equilibrium modeling, show pH and dissolved carbon both significantly impact the total dissolved copper concentration and should be measured to assess reuse potential. The sampling protocol and specific obstacles highlighted in this paper aid in the future development of sustainable wash water management strategies.
Exploratory Disposal and Reuse Feasibility Analysis of Winter Maintenance Wash Water
2016-01-01
The Ohio Department of Transportation has more than 60 facilities without sewer access generating approximately 19 million gallons of winter maintenance wash water. Off-site disposal is costly, creating the need for sustainable management strategies. The objective of this study was to conduct an exploratory feasibility analysis to assess wash water disposal and potential reuse as brine. Based on a comprehensive literature review and relevant environmental chemistry, a sampling protocol consisting of 31 water quality constituents was utilized for monthly sampling at three geographically distinct Ohio Department of Transportation garages during the winter of 2012. Results were compared to local disposal and reuse guidance limits. Three constituents, including a maximum copper concentration of 858 ppb, exceeded disposal limits, and many constituents also failed to meet reuse limits. Some concentrations were orders of magnitude higher than reuse limits and suggest pre-treatment would be necessary if wash water were reused as brine. These water quality results, in conjunction with copper chemical equilibrium modeling, show pH and dissolved carbon both significantly impact the total dissolved copper concentration and should be measured to assess reuse potential. The sampling protocol and specific obstacles highlighted in this paper aid in the future development of sustainable wash water management strategies. PMID:26908148
Bosson, Nichole; Baruch, Terrence; French, William J; Fang, Andrea; Kaji, Amy H; Gausche-Hill, Marianne; Rock, Alisa; Shavelle, David; Thomas, Joseph L; Niemann, James T
2017-12-23
We evaluated the first-medical-contact-to-balloon (FMC2B) time after implementation of a "Call 911" protocol for ST-segment-elevation myocardial infarction (STEMI) interfacility transfers in a regional system. This is a retrospective cohort study of consecutive patients with STEMI requiring interfacility transfer from a STEMI referring hospital, to one of 35 percutaneous coronary intervention-capable STEMI receiving centers (SRCs). The Call 911 protocol allows the referring physician to activate 911 to transport a patient with STEMI to the nearest SRC for primary percutaneous coronary intervention. Patients with interfacility transfers were identified over a 4-year period (2011-2014) from a registry to which SRCs report treatment and outcomes for all patients with STEMI transported via 911. The primary outcomes were median FMC2B time and the proportion of patients achieving the 120-minute goal. FMC2B for primary 911 transports were calculated to serve as a system reference. There were 2471 patients with STEMI transferred to SRCs by 911 transport during the study period, of whom 1942 (79%) had emergent coronary angiography and 1410 (73%) received percutaneous coronary intervention. The median age was 61 years (interquartile range [IQR] 52-71) and 73% were men. The median FMC2B time was 111 minutes (IQR 88-153) with 56% of patients meeting the 120-minute goal. The median STEMI referring hospital door-in-door-out time was 53 minutes (IQR 37-89), emergency medical services transport time was 9 minutes (IQR 7-12), and SRC door-to-balloon time was 44 minutes (IQR 32-60). For primary 911 patients (N=4827), the median FMC2B time was 81 minutes (IQR 67-97). Using a Call 911 protocol in this regional cardiac care system, patients with STEMI requiring interfacility transfers had a median FMC2B time of 111 minutes, with 56% meeting the 120-minute goal. © 2017 The Authors. Published on behalf of the American Heart Association, Inc., by Wiley.
Patel, Saumya K; Khedkar, Vijay M; Jha, Prakash C; Jasrai, Yogesh T; Pandya, Himanshu A; George, Linz-Buoy; Highland, Hyacinth N; Skelton, Adam A
2016-01-01
Phytochemicals of Catharanthus roseus Linn. and Tylophora indica have been known for their inhibition of malarial parasite, Plasmodium falciparum in cell culture. Resistance to chloroquine (CQ), a widely used antimalarial drug, is due to the CQ resistance transporter (CRT) system. The present study deals with computational modeling of Plasmodium falciparum chloroquine resistance transporter (PfCRT) protein and development of charged environment to mimic a condition of resistance. The model of PfCRT was developed using Protein homology/analogy engine (PHYRE ver 0.2) and was validated based on the results obtained using PSI-PRED. Subsequently, molecular interactions of selected phytochemicals extracted from C. roseus Linn. and T. indica were studied using multiple-iterated genetic algorithm-based docking protocol in order to investigate the translocation of these legends across the PfCRT protein. Further, molecular dynamics studies exhibiting interaction energy estimates of these compounds within the active site of the protein showed that compounds are more selective toward PfCRT. Clusters of conformations with the free energy of binding were estimated which clearly demonstrated the potential channel and by this means the translocation across the PfCRT is anticipated.
Optimizing the ASC WAN: evaluating network performance tools for comparing transport protocols.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Lydick, Christopher L.
2007-07-01
The Advanced Simulation & Computing Wide Area Network (ASC WAN), which is a high delay-bandwidth network connection between US Department of Energy National Laboratories, is constantly being examined and evaluated for efficiency. One of the current transport-layer protocols which is used, TCP, was developed for traffic demands which are different from that on the ASC WAN. The Stream Control Transport Protocol (SCTP), on the other hand, has shown characteristics which make it more appealing to networks such as these. Most important, before considering a replacement for TCP on any network, a testing tool that performs well against certain criteria needsmore » to be found. In order to try to find such a tool, two popular networking tools (Netperf v.2.4.3 & v.2.4.6 (OpenSS7 STREAMS), and Iperf v.2.0.6) were tested. These tools implement both TCP and SCTP and were evaluated using four metrics: (1) How effectively can the tool reach a throughput near the bandwidth? (2) How much of the CPU does the tool utilize during operation? (3) Is the tool freely and widely available? And, (4) Is the tool actively developed? Following the analysis of those tools, this paper goes further into explaining some recommendations and ideas for future work.« less
[Global Atmospheric Chemistry/Transport Modeling and Data-Analysis
NASA Technical Reports Server (NTRS)
Prinn, Ronald G.
1999-01-01
This grant supported a global atmospheric chemistry/transport modeling and data- analysis project devoted to: (a) development, testing, and refining of inverse methods for determining regional and global transient source and sink strengths for trace gases; (b) utilization of these inverse methods which use either the Model for Atmospheric Chemistry and Transport (MATCH) which is based on analyzed observed winds or back- trajectories calculated from these same winds for determining regional and global source and sink strengths for long-lived trace gases important in ozone depletion and the greenhouse effect; (c) determination of global (and perhaps regional) average hydroxyl radical concentrations using inverse methods with multiple "titrating" gases; and (d) computation of the lifetimes and spatially resolved destruction rates of trace gases using 3D models. Important ultimate goals included determination of regional source strengths of important biogenic/anthropogenic trace gases and also of halocarbons restricted by the Montreal Protocol and its follow-on agreements, and hydrohalocarbons now used as alternatives to the above restricted halocarbons.
OSI for hardware/software interoperability
NASA Astrophysics Data System (ADS)
Wood, Richard J.; Harvey, Donald L.; Linderman, Richard W.; Gardener, Gary A.; Capraro, Gerard T.
1994-03-01
There is a need in public safety for real-time data collection and transmission from one or more sensors. The Rome Laboratory and the Ballistic Missile Defense Organization are pursuing an effort to bring the benefits of Open System Architectures (OSA) to embedded systems within the Department of Defense. When developed properly OSA provides interoperability, commonality, graceful upgradeability, survivability and hardware/software transportability to greatly minimize life cycle costs, integration and supportability. Architecture flexibility can be achieved to take advantage of commercial accomplishments by basing these developments on vendor-neutral commercially accepted standards and protocols.
Use of NTRIP for optimizing the decoding algorithm for real-time data streams.
He, Zhanke; Tang, Wenda; Yang, Xuhai; Wang, Liming; Liu, Jihua
2014-10-10
As a network transmission protocol, Networked Transport of RTCM via Internet Protocol (NTRIP) is widely used in GPS and Global Orbiting Navigational Satellite System (GLONASS) Augmentation systems, such as Continuous Operational Reference System (CORS), Wide Area Augmentation System (WAAS) and Satellite Based Augmentation Systems (SBAS). With the deployment of BeiDou Navigation Satellite system(BDS) to serve the Asia-Pacific region, there are increasing needs for ground monitoring of the BeiDou Navigation Satellite system and the development of the high-precision real-time BeiDou products. This paper aims to optimize the decoding algorithm of NTRIP Client data streams and the user authentication strategies of the NTRIP Caster based on NTRIP. The proposed method greatly enhances the handling efficiency and significantly reduces the data transmission delay compared with the Federal Agency for Cartography and Geodesy (BKG) NTRIP. Meanwhile, a transcoding method is proposed to facilitate the data transformation from the BINary EXchange (BINEX) format to the RTCM format. The transformation scheme thus solves the problem of handing real-time data streams from Trimble receivers in the BeiDou Navigation Satellite System indigenously developed by China.
Study of Tranexamic Acid During Air Medical Prehospital Transport Trial (STAAMP trial)
2015-10-01
AWARD NUMBER: W81XWH-13-2-0080 TITLE: Study of Tranexamic Acid During Air Medical Prehospital Transport Trial (STAAMP trial) PRINCIPAL INVESTIGATOR...TITLE AND SUBTITLE 5a. CONTRACT NUMBER Study of Tranexamic Acid During Air Medical Prehospital Transport Trial (STAAMP trial) 5b. GRANT NUMBER W81XWH...IRB approval regarding changes to the protocol language. 15. SUBJECT TERMS Prehospital; Tranexamic acid 16. SECURITY CLASSIFICATION OF: 17. LIMITATION
Research on tactical information display technology for interactive virtual cockpit
NASA Astrophysics Data System (ADS)
Sun, Zhongyun; Tian, Tao; Su, Feng
2018-04-01
Based on a fact that traditional tactical information display technology suffers from disadvantages of a large number of data to be transferred and low plotting efficiency in an interactive virtual cockpit, a GID protocol-based simulation has been designed. This method dissolves complex tactical information screens into basic plotting units. The indication of plotting units is controlled via the plotting commands, which solves the incompatibility between the tactical information display in traditional simulation and the desktop-based virtual simulation training system. Having been used in desktop systems for helicopters, fighters, and transporters, this method proves to be scientific and reasonable in design and simple and efficient in usage, which exerts a significant value in establishing aviation equipment technology support training products.
Security Proof for Password Authentication in TLS-Verifier-based Three-Party Group Diffie-Hellman
DOE Office of Scientific and Technical Information (OSTI.GOV)
Chevassut, Olivier; Milner, Joseph; Pointcheval, David
2008-04-21
The internet has grown greatly in the past decade, by some numbers exceeding 47 million active web sites and a total aggregate exceeding100 million web sites. What is common practice today on the Internet is that servers have public keys, but clients are largely authenticated via short passwords. Protecting these passwords by not storing them in the clear on institutions's servers has become a priority. This paper develops password-based ciphersuites for the Transport Layer Security (TLS) protocol that are: (1) resistant to server compromise; (2) provably secure; (3) believed to be free from patent and licensing restrictions based on anmore » analysis of relevant patents in the area.« less
Characteristics and Outcomes of Blood Product Transfusion During Critical Care Transport.
Mena-Munoz, Jorge; Srivastava, Udayan; Martin-Gill, Christian; Suffoletto, Brian; Callaway, Clifton W; Guyette, Francis X
2016-01-01
Civilian out-of-hospital transfusions have not been adequately studied. This study seeks to characterize patients receiving out-of-hospital blood product transfusion during critical care transport. We studied patients transported by a regional critical care air-medical service who received blood products during transport. This service carries two units of uncrossmatched packed Red Blood Cells (pRBCs) on every transport in addition to blood obtained from referring facilities. The pRBC are administered according to a protocol for the treatment of hemorrhagic shock or based on medical command physician order. Transfusion amount was categorized into three groups based on the volume transfused (<350 mL, 350-700 mL, >700 mL). The association between prehospital transfusion and in-hospital outcomes (mortality, subsequent blood transfusion and emergent surgery) was estimated using logistic regression models, controlling for age, first systolic blood pressure, first heart rate, Glasgow Coma Score, time of transfer, and length of hospital admission. Among the 1,440 critical care transports with transfusions examined, 81% were for medical patients, being gastrointestinal hemorrhage the most common indication (26%, CI 24-28%). pRBC transfusions were associated with emergent surgery (OR = 1.81, 95% CI = 1.31-2.52) and in-hospital transfusions (OR = 2.00, 95% CI = 1.46-2.76). Those with transfusions >700 mL were associated with emergent surgery (OR = 1.79, 95% CI = 1.10-2.92) and mortality (OR = 2.11; 95% CI = 1.21-3.69). In this sample, the majority of patients receiving blood products during air-medical transport were transfused for medic conditions; gastrointestinal hemorrhage was the most common chief complaint. The pRBC transfusions were associated with emergent surgery and in-hospital transfusion. Transfusions of >700 mL were associated with mortality.
Palacio-Bielsa, Ana; Cubero, Jaime; Cambra, Miguel A; Collados, Raquel; Berruete, Isabel M; López, María M
2011-01-01
Xanthomonas arboricola pv. pruni, the causal agent of bacterial spot disease of stone fruit, is considered a quarantine organism by the European Union and the European and Mediterranean Plant Protection Organization (EPPO). The bacterium can undergo an epiphytic phase and/or be latent and can be transmitted by plant material, but currently, only visual inspections are used to certify plants as being X. arboricola pv. pruni free. A novel and highly sensitive real-time TaqMan PCR detection protocol was designed based on a sequence of a gene for a putative protein related to an ABC transporter ATP-binding system in X. arboricola pv. pruni. Pathogen detection can be completed within a few hours with a sensitivity of 10(2) CFU ml(-1), thus surpassing the sensitivity of the existing conventional PCR. Specificity was assessed for X. arboricola pv. pruni strains from different origins as well as for closely related Xanthomonas species, non-Xanthomonas species, saprophytic bacteria, and healthy Prunus samples. The efficiency of the developed protocol was evaluated with field samples of 14 Prunus species and rootstocks. For symptomatic leaf samples, the protocol was very efficient even when washed tissues of the leaves were directly amplified without any previous DNA extraction. For samples of 117 asymptomatic leaves and 285 buds, the protocol was more efficient after a simple DNA extraction, and X. arboricola pv. pruni was detected in 9.4% and 9.1% of the 402 samples analyzed, respectively, demonstrating its frequent epiphytic or endophytic phase. This newly developed real-time PCR protocol can be used as a quantitative assay, offers a reliable and sensitive test for X. arboricola pv. pruni, and is suitable as a screening test for symptomatic as well as asymptomatic plant material.
A new Information publishing system Based on Internet of things
NASA Astrophysics Data System (ADS)
Zhu, Li; Ma, Guoguang
2018-03-01
A new information publishing system based on Internet of things is proposed, which is composed of four level hierarchical structure, including the screen identification layer, the network transport layer, the service management layer and the publishing application layer. In the architecture, the screen identification layer has realized the internet of screens in which geographically dispersed independent screens are connected to the internet by the customized set-top boxes. The service management layer uses MQTT protocol to implement a lightweight broker-based publish/subscribe messaging mechanism in constrained environments such as internet of things to solve the bandwidth bottleneck. Meanwhile the cloud-based storage technique is used to storage and manage the promptly increasing multimedia publishing information. The paper has designed and realized a prototype SzIoScreen, and give some related test results.
IP access networks with QoS support
NASA Astrophysics Data System (ADS)
Sargento, Susana; Valadas, Rui J. M. T.; Goncalves, Jorge; Sousa, Henrique
2001-07-01
The increasing demand of new services and applications is pushing for drastic changes on the design of access networks targeted mainly for residential and SOHO users. Future access networks will provide full service integration (including multimedia), resource sharing at the packet level and QoS support. It is expected that using IP as the base technology, the ideal plug-and-play scenario, where the management actions of the access network operator are kept to a minimum, will be achieved easily. This paper proposes an architecture for access networks based on layer 2 or layer 3 multiplexers that allows a number of simplifications in the network elements and protocols (e.g. in the routing and addressing functions). We discuss two possible steps in the evolution of access networks towards a more efficient support of IP based services. The first one still provides no QoS support and was designed with the goal of reusing as much as possible current technologies; it is based on tunneling to transport PPP sessions. The second one introduces QoS support through the use of emerging technologies and protocols. We illustrate the different phases of a multimedia Internet access session, when using SIP for session initiation, COPS for the management of QoS policies including the AAA functions and RSVP for resource reservation.
Asymmetries in the spectral density of an interaction-quenched Luttinger liquid
NASA Astrophysics Data System (ADS)
Calzona, A.; Gambetta, F. M.; Carrega, M.; Cavaliere, F.; Sassetti, M.
2018-03-01
The spectral density of an interaction-quenched one-dimensional system is investigated. Both direct and inverse quench protocols are considered and it is found that the former leads to stronger effects on the spectral density with respect to the latter. Such asymmetry is directly reflected on transport properties of the system, namely the charge and energy current flowing to the system from a tunnel coupled biased probe. In particular, the injection of particles from the probe to the right-moving channel of the system is considered. The resulting fractionalization phenomena are strongly affected by the quench protocol and display asymmetries in the case of direct and inverse quench. Transport properties therefore emerge as natural probes for the observation of this quench-induced behavior.
Pediatric Critical Care Transport as a Conduit to Terminal Extubation at Home: A Case Series.
Noje, Corina; Bernier, Meghan L; Costabile, Philomena M; Klein, Bruce L; Kudchadkar, Sapna R
2017-01-01
To present our single-center's experience with three palliative critical care transports home from the PICU for terminal extubation. We performed a retrospective chart review of patients transported between January 1, 2012, and December 31, 2014. All cases were identified from our institutional pediatric transport database. Patients were terminally ill children unable to separate from mechanical ventilation in the PICU, who were transported home for terminal extubation and end-of-life care according to their families' wishes. Patients underwent palliative care transport home for terminal extubation. The rate of palliative care transports home for terminal extubation during the study period was 2.6 per 100 deaths. The patients were 7 months, 6 years, and 18 years old and had complex chronic conditions. The transfer process was protocolized. The families were approached by the PICU staff during multidisciplinary goals-of-care meetings. Parental expectations were clarified, and home hospice care was arranged pretransfer. All transports were performed by our pediatric critical care transport team, and all terminal extubations were performed by physicians. All patients had unstable medical conditions and urgent needs for transport to comply with the families' wishes for withdrawal of life support and death at home. As such, all three cases presented similar logistic challenges, including establishing do-not-resuscitate status pretransport, having limited time to organize the transport, and coordinating home palliative care services with available community resources. Although a relatively infrequent practice in pediatric critical care, transport home for terminal extubation represents a feasible alternative for families seeking out-of-hospital end-of-life care for their critically ill technology-dependent children. Our single-center experience supports the need for development of formal programs for end-of-life critical care transports to include patient screening tools, palliative care home discharge algorithms, transport protocols, and resource utilization and cost analyses.
Use of luciferase probes to measure ATP in living cells and animals.
Morciano, Giampaolo; Sarti, Alba Clara; Marchi, Saverio; Missiroli, Sonia; Falzoni, Simonetta; Raffaghello, Lizzia; Pistoia, Vito; Giorgi, Carlotta; Di Virgilio, Francesco; Pinton, Paolo
2017-08-01
ATP, the energy exchange factor that connects anabolism and catabolism, is required for major reactions and processes that occur in living cells, such as muscle contraction, phosphorylation and active transport. ATP is also the key molecule in extracellular purinergic signaling mechanisms, with an established crucial role in inflammation and several additional disease conditions. Here, we describe detailed protocols to measure the ATP concentration in isolated living cells and animals using luminescence techniques based on targeted luciferase probes. In the presence of magnesium, oxygen and ATP, the protein luciferase catalyzes oxidation of the substrate luciferin, which is associated with light emission. Recombinantly expressed wild-type luciferase is exclusively cytosolic; however, adding specific targeting sequences can modify its cellular localization. Using this strategy, we have constructed luciferase chimeras targeted to the mitochondrial matrix and the outer surface of the plasma membrane. Here, we describe optimized protocols for monitoring ATP concentrations in the cytosol, mitochondrial matrix and pericellular space in living cells via an overall procedure that requires an average of 3 d. In addition, we present a detailed protocol for the in vivo detection of extracellular ATP in mice using luciferase-transfected reporter cells. This latter procedure may require up to 25 d to complete.
Reddy, Alavalapati Goutham; Das, Ashok Kumar; Odelu, Vanga; Yoo, Kee-Young
2016-01-01
Biometric based authentication protocols for multi-server architectures have gained momentum in recent times due to advancements in wireless technologies and associated constraints. Lu et al. recently proposed a robust biometric based authentication with key agreement protocol for a multi-server environment using smart cards. They claimed that their protocol is efficient and resistant to prominent security attacks. The careful investigation of this paper proves that Lu et al.'s protocol does not provide user anonymity, perfect forward secrecy and is susceptible to server and user impersonation attacks, man-in-middle attacks and clock synchronization problems. In addition, this paper proposes an enhanced biometric based authentication with key-agreement protocol for multi-server architecture based on elliptic curve cryptography using smartcards. We proved that the proposed protocol achieves mutual authentication using Burrows-Abadi-Needham (BAN) logic. The formal security of the proposed protocol is verified using the AVISPA (Automated Validation of Internet Security Protocols and Applications) tool to show that our protocol can withstand active and passive attacks. The formal and informal security analyses and performance analysis demonstrates that the proposed protocol is robust and efficient compared to Lu et al.'s protocol and existing similar protocols.
2015-10-01
situ RNA hybridization staining of a TMA set and tissue sections from Roswell Park Cancer Institute (RPCI) and PCaP, respectively; 2) completion of...Facility at Roswell Park Cancer Institute (RPCI). Three Subtasks were proposed: Subtask 1 (months 1-3): Obtain approval for IRB protocol and request...Resource Network (PRN) at Roswell Park Cancer Institute (RPCI). The predominantly expressed SLCO transporters in AA or EA, and the transporters with
Speech transport for packet telephony and voice over IP
NASA Astrophysics Data System (ADS)
Baker, Maurice R.
1999-11-01
Recent advances in packet switching, internetworking, and digital signal processing technologies have converged to allow realizable practical implementations of packet telephony systems. This paper provides a tutorial on transmission engineering for packet telephony covering the topics of speech coding/decoding, speech packetization, packet data network transport, and impairments which may negatively impact end-to-end system quality. Particular emphasis is placed upon Voice over Internet Protocol given the current popularity and ubiquity of IP transport.
Multiple Path Static Routing Protocols for Packet Switched Networks.
1983-09-01
model are: (1) Physical Layer (2) Data Link Layer (3) Network Layer (4) Transport Layer (5) Session Layer (6) Presentation Layer (7) pplication Layer The...The transport layer, also known as the host-host layer, accepts data from the session layer, splits it into smaller units if needed, passes these to...the network layer, and ensures that all the pieces arrive correctly at the other end. It creates a distinct network connection for each transport
Innovative mathematical modeling in environmental remediation.
Yeh, Gour-Tsyh; Gwo, Jin-Ping; Siegel, Malcolm D; Li, Ming-Hsu; Fang, Yilin; Zhang, Fan; Luo, Wensui; Yabusaki, Steve B
2013-05-01
There are two different ways to model reactive transport: ad hoc and innovative reaction-based approaches. The former, such as the Kd simplification of adsorption, has been widely employed by practitioners, while the latter has been mainly used in scientific communities for elucidating mechanisms of biogeochemical transport processes. It is believed that innovative mechanistic-based models could serve as protocols for environmental remediation as well. This paper reviews the development of a mechanistically coupled fluid flow, thermal transport, hydrologic transport, and reactive biogeochemical model and example-applications to environmental remediation problems. Theoretical bases are sufficiently described. Four example problems previously carried out are used to demonstrate how numerical experimentation can be used to evaluate the feasibility of different remediation approaches. The first one involved the application of a 56-species uranium tailing problem to the Melton Branch Subwatershed at Oak Ridge National Laboratory (ORNL) using the parallel version of the model. Simulations were made to demonstrate the potential mobilization of uranium and other chelating agents in the proposed waste disposal site. The second problem simulated laboratory-scale system to investigate the role of natural attenuation in potential off-site migration of uranium from uranium mill tailings after restoration. It showed inadequacy of using a single Kd even for a homogeneous medium. The third example simulated laboratory experiments involving extremely high concentrations of uranium, technetium, aluminum, nitrate, and toxic metals (e.g., Ni, Cr, Co). The fourth example modeled microbially-mediated immobilization of uranium in an unconfined aquifer using acetate amendment in a field-scale experiment. The purposes of these modeling studies were to simulate various mechanisms of mobilization and immobilization of radioactive wastes and to illustrate how to apply reactive transport models for environmental remediation. Copyright © 2011 Elsevier Ltd. All rights reserved.
Strauch, Ulrich; Bergmans, Dennis C J J; Habers, Joachim; Jansen, Jochen; Winkens, Bjorn; Veldman, Dirk J; Roekaerts, Paul M H J; Beckers, Stefan K
2017-03-10
It is widely accepted that transportation of critically ill patients is high risk. Unfortunately, however, there are currently no evidence-based criteria with which to determine the quality of various interhospital transport systems and their impact on the outcomes for patients. We aim to rectify this by assessing 2 scores which were developed in our hospital in a prospective, observational study. Primarily, we will be examining the Quality of interhospital critical care transportation in the Euregion Meuse-Rhine (QUIT EMR) score, which focuses on the quality of the transport system, and secondarily the SEMROS (Simplified EMR outcome score) which detects changes in the patient's clinical condition in the 24 hours following their transportation. A web-based application will be used to document around 150 pretransport, intratransport and post-transport items of each patient case.To be included, patients must be at least 18-years of age and should have been supervised by a physician during an interhospital transport which was started in the study region.The quality of the QUIT EMR score will be assessed by comparing 3 predefined levels of transport facilities: the high, medium and low standards. Subsequently, SEMROS will be used to determine the effect of transport quality on the morbidity 24 hours after transportation.It is estimated that there will be roughly 3000 appropriate cases suitable for inclusion in this study per year. Cases shall be collected from 1 April 2015 until 31 December 2017. This trial was approved by the Ethics committees of the university hospitals of Maastricht (Netherlands) and Aachen (Germany). The study results will be published in a peer reviewed journal. Results of this study will determine if a prospective randomised trial involving patients of various categories being randomly assigned to different levels of transportation system shall be conducted. NTR4937. Published by the BMJ Publishing Group Limited. For permission to use (where not already granted under a licence) please go to http://www.bmj.com/company/products-services/rights-and-licensing/.
Developing a Complete and Effective ACT-R Architecture
2008-01-01
of computational primitives , as contrasted with the predominant “one-off” and “grab-bag” cognitive models in the field. These architectures have...transport/ semaphore protocols connected via a glue script. Both protocols rely on the fact that file rename and file remove operations are atomic...the Trial Log file until just prior to processing the next input request. Thus, to perform synchronous identifications it is necessary to run an
Ground-state-entanglement bound for quantum energy teleportation of general spin-chain models
NASA Astrophysics Data System (ADS)
Hotta, Masahiro
2013-03-01
Many-body quantum systems in the ground states have zero-point energy due to the uncertainty relation. In many cases, the system in the ground state accompanies spatially entangled energy density fluctuation via the noncommutativity of the energy density operators, though the total energy takes a fixed value, i.e., the lowest eigenvalue of the Hamiltonian. Quantum energy teleportation (QET) is a protocol for the extraction of the zero-point energy out of one subsystem using information of a remote measurement of another subsystem. From an operational viewpoint of protocol users, QET can be regarded as an effective rapid energy transportation without breaking all physical laws, including causality and local energy conservation. In the protocol, the ground-state entanglement plays a crucial role. In this paper, we show analytically for a general class of spin-chain systems that the entanglement entropy is lower bounded by a positive quadratic function of the teleported energy between the regions of a QET protocol. This supports a general conjecture that ground-state entanglement is an evident physical resource for energy transportation in the context of QET. The result may also deepen our understanding of the energy density fluctuation in condensed-matter systems from a perspective of quantum information theory.
A toxicity cost function approach to optimal CPA equilibration in tissues.
Benson, James D; Higgins, Adam Z; Desai, Kunjan; Eroglu, Ali
2018-02-01
There is growing need for cryopreserved tissue samples that can be used in transplantation and regenerative medicine. While a number of specific tissue types have been successfully cryopreserved, this success is not general, and there is not a uniform approach to cryopreservation of arbitrary tissues. Additionally, while there are a number of long-established approaches towards optimizing cryoprotocols in single cell suspensions, and even plated cell monolayers, computational approaches in tissue cryopreservation have classically been limited to explanatory models. Here we develop a numerical approach to adapt cell-based CPA equilibration damage models for use in a classical tissue mass transport model. To implement this with real-world parameters, we measured CPA diffusivity in three human-sourced tissue types, skin, fibroid and myometrium, yielding propylene glycol diffusivities of 0.6 × 10 -6 cm 2 /s, 1.2 × 10 -6 cm 2 /s and 1.3 × 10 -6 cm 2 /s, respectively. Based on these results, we numerically predict and compare optimal multistep equilibration protocols that minimize the cell-based cumulative toxicity cost function and the damage due to excessive osmotic gradients at the tissue boundary. Our numerical results show that there are fundamental differences between protocols designed to minimize total CPA exposure time in tissues and protocols designed to minimize accumulated CPA toxicity, and that "one size fits all" stepwise approaches are predicted to be more toxic and take considerably longer than needed. Copyright © 2017 Elsevier Inc. All rights reserved.
Pediatric Critical Care Transport as a Conduit to Terminal Extubation at Home: A Case Series
Noje, Corina; Bernier, Meghan L.; Costabile, Philomena M.; Klein, Bruce L.; Kudchadkar, Sapna R.
2016-01-01
Objective To present our single-center’s experience with three palliative critical care transports home from the pediatric intensive care unit (PICU) for terminal extubation. Design, Setting, Patients All cases were identified from our institutional Pediatric Transport database. Patients in the case series were terminally ill children unable to separate from mechanical ventilation in the PICU, who were transported home between January 1, 2012 and December 31, 2014 for terminal extubation and end-of-life care according to their families’ wishes. Interventions, Measurements, Main Results The rate of palliative care transports home for terminal extubation during the study period was 2.6 per 100 deaths. The patients were 7 months, 6 years, and 18 years old and had complex chronic conditions. The transfer process was protocolized. The families were approached by the PICU staff during multidisciplinary goals-of-care meetings. Parental expectations were clarified and home hospice care was arranged pre-transfer. All transports were performed by our pediatric critical care transport team, and all terminal extubations were performed by physicians. All patients had unstable medical conditions and urgent needs for transport to comply with the families’ wishes for withdrawal of life-support and death at home. As such, all three cases presented similar logistical challenges, including establishing do-not-resuscitate status pre-transport, having limited time to organize the transport, and coordinating home palliative care services with available community resources. Conclusions Though a relatively infrequent practice in pediatric critical care, transport home for terminal extubation represents a feasible alternative for families seeking out-of-hospital end-of-life care for their critically ill technology-dependent children. Our single-center experience supports the need for development of formal programs for end-of-life critical care transports to include patient screening tools, palliative care home discharge algorithms, transport protocols, and resource utilization and cost analyses. PMID:27801708
Scalable Multicast Protocols for Overlapped Groups in Broker-Based Sensor Networks
NASA Astrophysics Data System (ADS)
Kim, Chayoung; Ahn, Jinho
In sensor networks, there are lots of overlapped multicast groups because of many subscribers, associated with their potentially varying specific interests, querying every event to sensors/publishers. And gossip based communication protocols are promising as one of potential solutions providing scalability in P(Publish)/ S(Subscribe) paradigm in sensor networks. Moreover, despite the importance of both guaranteeing message delivery order and supporting overlapped multicast groups in sensor or P2P networks, there exist little research works on development of gossip-based protocols to satisfy all these requirements. In this paper, we present two versions of causally ordered delivery guaranteeing protocols for overlapped multicast groups. The one is based on sensor-broker as delegates and the other is based on local views and delegates representing subscriber subgroups. In the sensor-broker based protocol, sensor-broker might lead to make overlapped multicast networks organized by subscriber's interests. The message delivery order has been guaranteed consistently and all multicast messages are delivered to overlapped subscribers using gossip based protocols by sensor-broker. Therefore, these features of the sensor-broker based protocol might be significantly scalable rather than those of the protocols by hierarchical membership list of dedicated groups like traditional committee protocols. And the subscriber-delegate based protocol is much stronger rather than fully decentralized protocols guaranteeing causally ordered delivery based on only local views because the message delivery order has been guaranteed consistently by all corresponding members of the groups including delegates. Therefore, this feature of the subscriber-delegate protocol is a hybrid approach improving the inherent scalability of multicast nature by gossip-based technique in all communications.
Reddy, Alavalapati Goutham; Das, Ashok Kumar; Odelu, Vanga; Yoo, Kee-Young
2016-01-01
Biometric based authentication protocols for multi-server architectures have gained momentum in recent times due to advancements in wireless technologies and associated constraints. Lu et al. recently proposed a robust biometric based authentication with key agreement protocol for a multi-server environment using smart cards. They claimed that their protocol is efficient and resistant to prominent security attacks. The careful investigation of this paper proves that Lu et al.’s protocol does not provide user anonymity, perfect forward secrecy and is susceptible to server and user impersonation attacks, man-in-middle attacks and clock synchronization problems. In addition, this paper proposes an enhanced biometric based authentication with key-agreement protocol for multi-server architecture based on elliptic curve cryptography using smartcards. We proved that the proposed protocol achieves mutual authentication using Burrows-Abadi-Needham (BAN) logic. The formal security of the proposed protocol is verified using the AVISPA (Automated Validation of Internet Security Protocols and Applications) tool to show that our protocol can withstand active and passive attacks. The formal and informal security analyses and performance analysis demonstrates that the proposed protocol is robust and efficient compared to Lu et al.’s protocol and existing similar protocols. PMID:27163786
Provably Secure Password-based Authentication in TLS
DOE Office of Scientific and Technical Information (OSTI.GOV)
Abdalla, Michel; Emmanuel, Bresson; Chevassut, Olivier
2005-12-20
In this paper, we show how to design an efficient, provably secure password-based authenticated key exchange mechanism specifically for the TLS (Transport Layer Security) protocol. The goal is to provide a technique that allows users to employ (short) passwords to securely identify themselves to servers. As our main contribution, we describe a new password-based technique for user authentication in TLS, called Simple Open Key Exchange (SOKE). Loosely speaking, the SOKE ciphersuites are unauthenticated Diffie-Hellman ciphersuites in which the client's Diffie-Hellman ephemeral public value is encrypted using a simple mask generation function. The mask is simply a constant value raised tomore » the power of (a hash of) the password.The SOKE ciphersuites, in advantage over previous pass-word-based authentication ciphersuites for TLS, combine the following features. First, SOKE has formal security arguments; the proof of security based on the computational Diffie-Hellman assumption is in the random oracle model, and holds for concurrent executions and for arbitrarily large password dictionaries. Second, SOKE is computationally efficient; in particular, it only needs operations in a sufficiently large prime-order subgroup for its Diffie-Hellman computations (no safe primes). Third, SOKE provides good protocol flexibility because the user identity and password are only required once a SOKE ciphersuite has actually been negotiated, and after the server has sent a server identity.« less
A randomized trial of protocol-based care for early septic shock.
Yealy, Donald M; Kellum, John A; Huang, David T; Barnato, Amber E; Weissfeld, Lisa A; Pike, Francis; Terndrup, Thomas; Wang, Henry E; Hou, Peter C; LoVecchio, Frank; Filbin, Michael R; Shapiro, Nathan I; Angus, Derek C
2014-05-01
In a single-center study published more than a decade ago involving patients presenting to the emergency department with severe sepsis and septic shock, mortality was markedly lower among those who were treated according to a 6-hour protocol of early goal-directed therapy (EGDT), in which intravenous fluids, vasopressors, inotropes, and blood transfusions were adjusted to reach central hemodynamic targets, than among those receiving usual care. We conducted a trial to determine whether these findings were generalizable and whether all aspects of the protocol were necessary. In 31 emergency departments in the United States, we randomly assigned patients with septic shock to one of three groups for 6 hours of resuscitation: protocol-based EGDT; protocol-based standard therapy that did not require the placement of a central venous catheter, administration of inotropes, or blood transfusions; or usual care. The primary end point was 60-day in-hospital mortality. We tested sequentially whether protocol-based care (EGDT and standard-therapy groups combined) was superior to usual care and whether protocol-based EGDT was superior to protocol-based standard therapy. Secondary outcomes included longer-term mortality and the need for organ support. We enrolled 1341 patients, of whom 439 were randomly assigned to protocol-based EGDT, 446 to protocol-based standard therapy, and 456 to usual care. Resuscitation strategies differed significantly with respect to the monitoring of central venous pressure and oxygen and the use of intravenous fluids, vasopressors, inotropes, and blood transfusions. By 60 days, there were 92 deaths in the protocol-based EGDT group (21.0%), 81 in the protocol-based standard-therapy group (18.2%), and 86 in the usual-care group (18.9%) (relative risk with protocol-based therapy vs. usual care, 1.04; 95% confidence interval [CI], 0.82 to 1.31; P=0.83; relative risk with protocol-based EGDT vs. protocol-based standard therapy, 1.15; 95% CI, 0.88 to 1.51; P=0.31). There were no significant differences in 90-day mortality, 1-year mortality, or the need for organ support. In a multicenter trial conducted in the tertiary care setting, protocol-based resuscitation of patients in whom septic shock was diagnosed in the emergency department did not improve outcomes. (Funded by the National Institute of General Medical Sciences; ProCESS ClinicalTrials.gov number, NCT00510835.).
Location Management in a Transport Layer Mobility Architecture
NASA Technical Reports Server (NTRS)
Eddy, Wesley M.; Ishac, Joseph
2005-01-01
Mobility architectures that place complexity in end nodes rather than in the network interior have many advantageous properties and are becoming popular research topics. Such architectures typically push mobility support into higher layers of the protocol stack than network layer approaches like Mobile IP. The literature is ripe with proposals to provide mobility services in the transport, session, and application layers. In this paper, we focus on a mobility architecture that makes the most significant changes to the transport layer. A common problem amongst all mobility protocols at various layers is location management, which entails translating some form of static identifier into a mobile node's dynamic location. Location management is required for mobile nodes to be able to provide globally-reachable services on-demand to other hosts. In this paper, we describe the challenges of location management in a transport layer mobility architecture, and discuss the advantages and disadvantages of various solutions proposed in the literature. Our conclusion is that, in principle, secure dynamic DNS is most desirable, although it may have current operational limitations. We note that this topic has room for further exploration, and we present this paper largely as a starting point for comparing possible solutions.
Bennin, Charles-Lwanga K; Ibrahim, Saif; Al-Saffar, Farah; Box, Lyndon C; Strom, Joel A
2016-10-01
ST-elevation myocardial infarction (STEMI) guidelines recommend reperfusion by primary percutaneous coronary intervention (PCI) ≤ 90 min from time of first medical contact (FMC). This strategy is challenging in rural areas lacking a nearby PCI-capable hospital. Recommended reperfusion times can be achieved for STEMI patients presenting in rural areas without a nearby PCI-capable hospital by ground transportation to a central PCI-capable hospital by use of protocol-driven emergency medical service (EMS) STEMI field triage protocol. Sixty STEMI patients directly transported by EMS from three rural counties (Nassau, Camden and Charlton Counties) within a 50-mile radius of University of Florida Health-Jacksonville (UFHJ) from 01/01/2009 to 12/31/2013 were identified from its PCI registry. The STEMI field triage protocol incorporated three elements: (1) a cooperative agreement between each of the rural emergency medical service (EMS) agency and UFHJ; (2) performance of a pre-hospital ECG to facilitate STEMI identification and laboratory activation; and (3) direct transfer by ground transportation to the UFHJ cardiac catheterization laboratory. FMC-to-device (FMC2D), door-to-device (D2D), and transit times, the day of week, time of day, and EMS shift times were recorded, and odds ratio (OR) of achieving FMC2D times was calculated. FMC2D times were shorter for in-state STEMIs (81 ± 17 vs . 87 ± 19 min), but D2D times were similar (37 ± 18 vs . 39 ± 21 min). FMC2D ≤ 90 min were achieved in 82.7% in-state STEMIs compared to 52.2% for out-of-state STEMIs (OR = 4.4, 95% CI: 1.24-15.57; P = 0.018). FMC2D times were homogenous after adjusting for weekday vs . weekend, EMS shift times. Nine patients did not meet FMC2D ≤ 90 min. Six were within 10 min of target; all patient achieved FMC2D ≤ 120 min. Guideline-compliant FMC2D ≤ 90 min is achievable for rural STEMI patients within a 50 mile radius of a PCI-capable hospital by use of protocol-driven EMS ground transportation. As all patients achieved a FMC2D time ≤ 120 min, bypass of non-PCI capable hospitals may be reasonable in this situation.
Aeronautical Related Applications Using ATN and TCP/IP Research Report
NASA Technical Reports Server (NTRS)
Dhas, C.; Mulkerin, T.; Wargo, C.; Nielsen, R.; Gaughan, T.; Griner, James H., Jr. (Technical Monitor)
2000-01-01
The course for the future aeronautical communications architecture has been defined for more than 10 years and is known as the Aeronautical Telecommunication Network (ATN). However, the operational implementations of making use of the ATN remain 3-5 years away, and these implementations are still only in the early phases of long-range projects. Thus, it is an objective of this effort to consider what the potential outcome within the air transport industry may be, given the rapid growth in commercial-off-the-shelf (COTS) products, networks, and services that are based upon the Internet TCP/IP protocol suite.
Time-reversal-symmetric single-photon wave packets for free-space quantum communication.
Trautmann, N; Alber, G; Agarwal, G S; Leuchs, G
2015-05-01
Readout and retrieval processes are proposed for efficient, high-fidelity quantum state transfer between a matter qubit, encoded in the level structure of a single atom or ion, and a photonic qubit, encoded in a time-reversal-symmetric single-photon wave packet. They are based on controlling spontaneous photon emission and absorption of a matter qubit on demand in free space by stimulated Raman adiabatic passage. As these processes do not involve mode selection by high-finesse cavities or photon transport through optical fibers, they offer interesting perspectives as basic building blocks for free-space quantum-communication protocols.
A land mobile satellite data system
NASA Technical Reports Server (NTRS)
Kent, John D. B.
1990-01-01
The Telesat Mobile Incorporated (TMI) Mobile Data System (MDS) was developed to apply satellite technology to the transportation industry's requirement for a fleet management system. It will provide two-way messaging and automatic position reporting capabilities between dispatch centers and customers' fleets of trucks. The design was based on the Inmarsat L-Band space segment with system link parameters and margins adjusted to meet the land mobile satellite channel characteristics. The system interfaces with the Teleglobe Des Laurentides earth station at Weir, Quebec. The signaling protocols were derived from the Inmarsat Standard C packet signalling system with unique trucking requirements incorporated where necessary.
Berger, Andrew J; Page, Michael R; Jacob, Jan; Young, Justin R; Lewis, Jim; Wenzel, Lothar; Bhallamudi, Vidya P; Johnston-Halperin, Ezekiel; Pelekhov, Denis V; Hammel, P Chris
2014-12-01
Understanding the complex properties of electronic and spintronic devices at the micro- and nano-scale is a topic of intense current interest as it becomes increasingly important for scientific progress and technological applications. In operando characterization of such devices by scanning probe techniques is particularly well-suited for the microscopic study of these properties. We have developed a scanning probe microscope (SPM) which is capable of both standard force imaging (atomic, magnetic, electrostatic) and simultaneous electrical transport measurements. We utilize flexible and inexpensive FPGA (field-programmable gate array) hardware and a custom software framework developed in National Instrument's LabVIEW environment to perform the various aspects of microscope operation and device measurement. The FPGA-based approach enables sensitive, real-time cantilever frequency-shift detection. Using this system, we demonstrate electrostatic force microscopy of an electrically biased graphene field-effect transistor device. The combination of SPM and electrical transport also enables imaging of the transport response to a localized perturbation provided by the scanned cantilever tip. Facilitated by the broad presence of LabVIEW in the experimental sciences and the openness of our software solution, our system permits a wide variety of combined scanning and transport measurements by providing standardized interfaces and flexible access to all aspects of a measurement (input and output signals, and processed data). Our system also enables precise control of timing (synchronization of scanning and transport operations) and implementation of sophisticated feedback protocols, and thus should be broadly interesting and useful to practitioners in the field.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Berger, Andrew J., E-mail: berger.156@osu.edu; Page, Michael R.; Young, Justin R.
Understanding the complex properties of electronic and spintronic devices at the micro- and nano-scale is a topic of intense current interest as it becomes increasingly important for scientific progress and technological applications. In operando characterization of such devices by scanning probe techniques is particularly well-suited for the microscopic study of these properties. We have developed a scanning probe microscope (SPM) which is capable of both standard force imaging (atomic, magnetic, electrostatic) and simultaneous electrical transport measurements. We utilize flexible and inexpensive FPGA (field-programmable gate array) hardware and a custom software framework developed in National Instrument's LabVIEW environment to perform themore » various aspects of microscope operation and device measurement. The FPGA-based approach enables sensitive, real-time cantilever frequency-shift detection. Using this system, we demonstrate electrostatic force microscopy of an electrically biased graphene field-effect transistor device. The combination of SPM and electrical transport also enables imaging of the transport response to a localized perturbation provided by the scanned cantilever tip. Facilitated by the broad presence of LabVIEW in the experimental sciences and the openness of our software solution, our system permits a wide variety of combined scanning and transport measurements by providing standardized interfaces and flexible access to all aspects of a measurement (input and output signals, and processed data). Our system also enables precise control of timing (synchronization of scanning and transport operations) and implementation of sophisticated feedback protocols, and thus should be broadly interesting and useful to practitioners in the field.« less
NASA Astrophysics Data System (ADS)
Hong, E.; Park, Y.; Muirhead, R.; Jeong, J.; Pachepsky, Y. A.
2017-12-01
Pathogenic microorganisms in recreational and irrigation waters remain the subject of concern. Water quality models are used to estimate microbial quality of water sources, to evaluate microbial contamination-related risks, to guide the microbial water quality monitoring, and to evaluate the effect of agricultural management on the microbial water quality. The Agricultural Policy/Environmental eXtender (APEX) is the watershed-scale water quality model that includes highly detailed representation of agricultural management. The APEX currently does not have microbial fate and transport simulation capabilities. The objective of this work was to develop the first APEX microbial fate and transport module that could use the APEX conceptual model of manure removal together with recently introduced conceptualizations of the in-stream microbial fate and transport. The module utilizes manure erosion rates found in the APEX. Bacteria survival in soil-manure mixing layer was simulated with the two-stage survival model. Individual survival patterns were simulated for each manure application date. Simulated in-stream microbial fate and transport processes included the reach-scale passive release of bacteria with resuspended bottom sediment during high flow events, the transport of bacteria from bottom sediment due to the hyporheic exchange during low flow periods, the deposition with settling sediment, and the two-stage survival. Default parameter values were available from recently published databases. The APEX model with the newly developed microbial fate and transport module was applied to simulate seven years of monitoring data for the Toenepi watershed in New Zealand. Based on calibration and testing results, the APEX with the microbe module reproduced well the monitored pattern of E. coli concentrations at the watershed outlet. The APEX with the microbial fate and transport module will be utilized for predicting microbial quality of water under various agricultural practices, evaluating monitoring protocols, and supporting the selection of management practices based on regulations that rely on fecal indicator bacteria concentrations.
NASA Technical Reports Server (NTRS)
Amonlirdviman, Keith; Farley, Todd C.; Hansman, R. John, Jr.; Ladik, John F.; Sherer, Dana Z.
1998-01-01
A distributed real-time simulation of the civil air traffic environment developed to support human factors research in advanced air transportation technology is presented. The distributed environment is based on a custom simulation architecture designed for simplicity and flexibility in human experiments. Standard Internet protocols are used to create the distributed environment, linking all advanced cockpit simulator, all Air Traffic Control simulator, and a pseudo-aircraft control and simulation management station. The pseudo-aircraft control station also functions as a scenario design tool for coordinating human factors experiments. This station incorporates a pseudo-pilot interface designed to reduce workload for human operators piloting multiple aircraft simultaneously in real time. The application of this distributed simulation facility to support a study of the effect of shared information (via air-ground datalink) on pilot/controller shared situation awareness and re-route negotiation is also presented.
Hirshon, Jon Mark; Galvagno, Samuel M; Comer, Angela; Millin, Michael G; Floccare, Douglas J; Alcorta, Richard L; Lawner, Benjamin J; Margolis, Asa M; Nable, Jose V; Bass, Robert R
2016-03-01
Helicopter emergency medical services (EMS) has become a well-established component of modern trauma systems. It is an expensive, limited resource with potential safety concerns. Helicopter EMS activation criteria intended to increase efficiency and reduce inappropriate use remain elusive and difficult to measure. This study evaluates the effect of statewide field trauma triage changes on helicopter EMS use and patient outcomes. Data were extracted from the helicopter EMS computer-aided dispatch database for in-state scene flights and from the state Trauma Registry for all trauma patients directly admitted from the scene or transferred to trauma centers from July 1, 2000, to June 30, 2011. Computer-aided dispatch flights were analyzed for periods corresponding to field triage protocol modifications intended to improve system efficiency. Outcomes were separately analyzed for trauma registry patients by mode of transport. The helicopter EMS computer-aided dispatch data set included 44,073 transports. There was a statewide decrease in helicopter EMS usage for trauma patients of 55.9%, differentially affecting counties closer to trauma centers. The Trauma Registry data set included 182,809 patients (37,407 helicopter transports, 128,129 ambulance transports, and 17,273 transfers). There was an increase of 21% in overall annual EMS scene trauma patients transported; ground transports increased by 33%, whereas helicopter EMS transports decreased by 49%. Helicopter EMS patient acuity increased, with an attendant increase in patient mortality. However, when standardized with W statistics, both helicopter EMS- and ground-transported trauma patients showed sustained improvement in mortality. Modifications to state protocols were associated with decreased helicopter EMS use and overall improved trauma patient outcomes. Copyright © 2015 American College of Emergency Physicians. Published by Elsevier Inc. All rights reserved.
Telecommunications Protocol Processing Subsystem Using Reconfigurable Interoperable Gate Arrays
NASA Technical Reports Server (NTRS)
Pang, Jackson; Pingree, Paula; Torgerson, J. Leigh
2006-01-01
Deep Space Telecommunications Requirements: 1) Automated file transfer across inter-planetary distances; 2) Limited communication periods; 3) Reliable transport; 4) Delay and Disruption Tolerant; and 5) Asymmetric Data Channels.
Livestock transport from the perspective of the pre-slaughter logistic chain: a review.
Miranda-de la Lama, G C; Villarroel, M; María, G A
2014-09-01
New developments in livestock transport within the pre-slaughter chain are discussed in terms of three logistic nodes: origin, stopovers and slaughterhouse. Factors as transport cost, haulier, truck specifications, micro-environment conditions, loading density, route planning, vehicle accidents and journey length are discussed as well as causes of morbidity, mortality, live weight and carcass damage. Taking into account current trends towards increased transport times, logistics stopovers and mixed transport, there is a need to develop systems of evaluation and decision-making that provide tools and protocols that can minimize the biological cost to animals, which may have been underestimated in the past. Copyright © 2014 Elsevier Ltd. All rights reserved.
Smart Collision Avoidance and Hazard Routing Mechanism for Intelligent Transport Network
NASA Astrophysics Data System (ADS)
Singh, Gurpreet; Gupta, Pooja; Wahab, Mohd Helmy Abd
2017-08-01
The smart vehicular ad-hoc network is the network that consists of vehicles for smooth movement and better management of the vehicular connectivity across the given network. This research paper aims to propose a set of solution for the VANETs consisting of the automatic driven vehicles, also called as the autonomous car. Such vehicular networks are always prone to collision due to the natural or un-natural reasons which must be solved before the large-scale deployment of the autonomous transport systems. The newly designed intelligent transport movement control mechanism is based upon the intelligent data propagation along with the vehicle collision and traffic jam prevention schema [8], which may help the future designs of smart cities to become more robust and less error-prone. In the proposed model, the focus is on designing a new dynamic and robust hazard routing protocol for intelligent vehicular networks for improvement of the overall performance in various aspects. It is expected to improve the overall transmission delay as well as the number of collisions or adversaries across the vehicular network zone.
Metro Optical Networks for Homeland Security
NASA Astrophysics Data System (ADS)
Bechtel, James H.
Metro optical networks provide an enticing opportunity for strengthening homeland security. Many existing and emerging fiber-optic networks can be adapted for enhanced security applications. Applications include airports, theme parks, sports venues, and border surveillance systems. Here real-time high-quality video and captured images can be collected, transported, processed, and stored for security applications. Video and data collection are important also at correctional facilities, courts, infrastructure (e.g., dams, bridges, railroads, reservoirs, power stations), and at military and other government locations. The scaling of DWDM-based networks allows vast amounts of data to be collected and transported including biometric features of individuals at security check points. Here applications will be discussed along with potential solutions and challenges. Examples of solutions to these problems are given. This includes a discussion of metropolitan aggregation platforms for voice, video, and data that are SONET compliant for use in SONET networks and the use of DWDM technology for scaling and transporting a variety of protocols. Element management software allows not only network status monitoring, but also provides optimized allocation of network resources through the use of optical switches or electrical cross connects.
Rethinking the NTCIP Design and Protocols - Analyzing the Issues
DOT National Transportation Integrated Search
1998-03-03
This working paper discusses the issues involved in changing the current draft NTCIP standard from an X.25-based protocol stack to an Internet-based protocol stack. It contains a methodology which could be used to change NTCIP's base protocols. This ...
Espina, Miguel; Jülke, Henriette; Brehm, Walter; Ribitsch, Iris; Winter, Karsten
2016-01-01
Background. Mesenchymal stromal cells (MSCs) are increasingly used for clinical applications in equine patients. For MSC isolation and expansion, a laboratory step is mandatory, after which the cells are sent back to the attending veterinarian. Preserving the biological properties of MSCs during this transport is paramount. The goal of the study was to compare transport-related parameters (transport container, media, temperature, time, cell concentration) that potentially influence characteristics of culture expanded equine MSCs. Methods. The study was arranged in three parts comparing (I) five different transport containers (cryotube, two types of plastic syringes, glass syringe, CellSeal), (II) seven different transport media, four temperatures (4 °C vs. room temperature; −20 °C vs. −80 °C), four time frames (24 h vs. 48 h; 48 h vs. 72 h), and (III) three MSC concentrations (5 × 106, 10 × 106, 20 × 106 MSC/ml). Cell viability (Trypan Blue exclusion; percent and total number viable cell), proliferation and trilineage differentiation capacity were assessed for each test condition. Further, the recovered volume of the suspension was determined in part I. Each condition was evaluated using samples of six horses (n = 6) and differentiation protocols were performed in duplicates. Results. In part I of the study, no significant differences in any of the parameters were found when comparing transport containers at room temperature. The glass syringe was selected for all subsequent evaluations (highest recoverable volume of cell suspension and cell viability). In part II, media, temperatures, or time frames had also no significant influence on cell viability, likely due to the large number of comparisons and small sample size. Highest cell viability was observed using autologous bone marrow supernatant as transport medium, and “transport” at 4 °C for 24 h (70.6% vs. control group 75.3%); this was not significant. Contrary, viability was unacceptably low (<40%) for all freezing protocols at −20 °C or −80 °C, particularly with bone marrow supernatant or plasma and DMSO. In part III, various cell concentrations also had no significant influence on any of the evaluated parameters. Chondrogenic differentiation showed a trend towards being decreased for all transport conditions, compared to control cells. Discussion. In this study, transport conditions were not found to impact viability, proliferation or ability for trilineage differentiation of MSCs, most likely due to the small sample size and large number of comparisons. The unusual low viability after all freezing protocols is in contrast to previous equine studies. Potential causes are differences in the freezing, but also in thawing method. Also, the selected container (glass syringe) may have impacted viability. Future research may be warranted into the possibly negative effect of transport on chondrogenic differentiation. PMID:27019778
CERN alerter—RSS based system for information broadcast to all CERN offices
NASA Astrophysics Data System (ADS)
Otto, R.
2008-07-01
Nearly every large organization uses a tool to broadcast messages and information across the internal campus (messages like alerts announcing interruption in services or just information about upcoming events). These tools typically allow administrators (operators) to send 'targeted' messages which are sent only to specific groups of users or computers, e/g only those located in a specified building or connected to a particular computing service. CERN has a long history of such tools: CERNVMS's SPM_quotMESSAGE command, Zephyr [2] and the most recent the NICE Alerter based on the NNTP protocol. The NICE Alerter used on all Windows-based computers had to be phased out as a consequence of phasing out NNTP at CERN. The new solution to broadcast information messages on the CERN campus continues to provide the service based on cross-platform technologies, hence minimizing custom developments and relying on commercial software as much as possible. The new system, called CERN Alerter, is based on RSS (Really Simple Syndication) [9] for the transport protocol and uses Microsoft SharePoint as the backend for database and posting interface. The windows-based client relies on Internet Explorer 7.0 with custom code to trigger the window pop-ups and the notifications for new events. Linux and Mac OS X clients could also rely on any RSS readers to subscribe to targeted notifications. The paper covers the architecture and implementation aspects of the new system.
Zhao, Yongli; He, Ruiying; Chen, Haoran; Zhang, Jie; Ji, Yuefeng; Zheng, Haomian; Lin, Yi; Wang, Xinbo
2014-04-21
Software defined networking (SDN) has become the focus in the current information and communication technology area because of its flexibility and programmability. It has been introduced into various network scenarios, such as datacenter networks, carrier networks, and wireless networks. Optical transport network is also regarded as an important application scenario for SDN, which is adopted as the enabling technology of data communication networks (DCN) instead of general multi-protocol label switching (GMPLS). However, the practical performance of SDN based DCN for large scale optical networks, which is very important for the technology selection in the future optical network deployment, has not been evaluated up to now. In this paper we have built a large scale flexi-grid optical network testbed with 1000 virtual optical transport nodes to evaluate the performance of SDN based DCN, including network scalability, DCN bandwidth limitation, and restoration time. A series of network performance parameters including blocking probability, bandwidth utilization, average lightpath provisioning time, and failure restoration time have been demonstrated under various network environments, such as with different traffic loads and different DCN bandwidths. The demonstration in this work can be taken as a proof for the future network deployment.
Cruz-Piris, Luis; Rivera, Diego; Marsa-Maestre, Ivan; de la Hoz, Enrique; Velasco, Juan R
2018-03-20
Internet growth has generated new types of services where the use of sensors and actuators is especially remarkable. These services compose what is known as the Internet of Things (IoT). One of the biggest current challenges is obtaining a safe and easy access control scheme for the data managed in these services. We propose integrating IoT devices in an access control system designed for Web-based services by modelling certain IoT communication elements as resources. This would allow us to obtain a unified access control scheme between heterogeneous devices (IoT devices, Internet-based services, etc.). To achieve this, we have analysed the most relevant communication protocols for these kinds of environments and then we have proposed a methodology which allows the modelling of communication actions as resources. Then, we can protect these resources using access control mechanisms. The validation of our proposal has been carried out by selecting a communication protocol based on message exchange, specifically Message Queuing Telemetry Transport (MQTT). As an access control scheme, we have selected User-Managed Access (UMA), an existing Open Authorization (OAuth) 2.0 profile originally developed for the protection of Internet services. We have performed tests focused on validating the proposed solution in terms of the correctness of the access control system. Finally, we have evaluated the energy consumption overhead when using our proposal.
2018-01-01
Internet growth has generated new types of services where the use of sensors and actuators is especially remarkable. These services compose what is known as the Internet of Things (IoT). One of the biggest current challenges is obtaining a safe and easy access control scheme for the data managed in these services. We propose integrating IoT devices in an access control system designed for Web-based services by modelling certain IoT communication elements as resources. This would allow us to obtain a unified access control scheme between heterogeneous devices (IoT devices, Internet-based services, etc.). To achieve this, we have analysed the most relevant communication protocols for these kinds of environments and then we have proposed a methodology which allows the modelling of communication actions as resources. Then, we can protect these resources using access control mechanisms. The validation of our proposal has been carried out by selecting a communication protocol based on message exchange, specifically Message Queuing Telemetry Transport (MQTT). As an access control scheme, we have selected User-Managed Access (UMA), an existing Open Authorization (OAuth) 2.0 profile originally developed for the protection of Internet services. We have performed tests focused on validating the proposed solution in terms of the correctness of the access control system. Finally, we have evaluated the energy consumption overhead when using our proposal. PMID:29558406
Transit signal priority research tools
DOT National Transportation Integrated Search
2008-05-01
This report presents the results of a research project that addresses Transit Signal Priority (TSP) deployment issues. The report reviews National Transportation Communications for ITS Protocol (NTCIP) 1211 Signal Control and Prioritization (SCP) sta...
Use of CCSDS and OSI Protocols on the Advanced Communications Technology Satellite
NASA Technical Reports Server (NTRS)
Chirieleison, Don
1996-01-01
Although ACTS (Advanced Communications Technology Satellite) provides an almost error-free channel during much of the day and under most conditions, there are times when it is not suitable for reliably error-free data communications when operating in the uncoded mode. Because coded operation is not always available to every earth station, measures must be taken in the end system to maintain adequate throughput when transferring data under adverse conditions. The most effective approach that we tested to improve performance was the addition of an 'outer' Reed-Solomon code through use of CCSDS (Consultative Committee for Space Data Systems) GOS 2 (a forward error correcting code). This addition can benefit all users of an ACTS channel including those applications that do not require totally reliable transport, but it is somewhat expensive because additional hardware is needed. Although we could not characterize the link noise statistically (it appeared to resemble uncorrelated white noise, the type that block codes are least effective in correcting), we did find that CCSDS GOS 2 gave an essentially error-free link at BER's (bit error rate) as high as 6x10(exp -4). For users that demand reliable transport, an ARQ (Automatic Repeat Queuing) protocol such as TCP (Transmission Control Protocol) or TP4 (Transport Protocol, Class 4) will probably be used. In this category, it comes as no surprise that the best choice of the protocol suites tested over ACTS was TP4 using CCSDS GOS 2. TP4 behaves very well over an error-free link which GOS 2 provides up to a point. Without forward error correction, however, TP4 service begins to degrade in the 10(exp -7)-10(exp -6) range and by 4x10(exp -6), it barely gives any throughput at all. If Congestion Avoidance is used in TP4, the degradation is even more pronounced. Fortunately, as demonstrated here, this effect can be more than compensated for by choosing the Selective Acknowledgment option. In fact, this option can enable TP4 to deliver some throughput at error rates as high as 10(exp -5).
Innovative approach to facilitate reuse of nonhazardous industrial solid waste as building material
DOE Office of Scientific and Technical Information (OSTI.GOV)
St-Laurent, S.G.; Boutin, A.
1997-12-31
The steel industry generates large volumes of inorganic nonhazardous solid waste. During the last five years, Quebec`s steel industry has developed new technologies to recover metal from slags and tailings. Since these processes recover 10 to 30 percent of the metal, large volumes of nonhazardous residues still need to be recycled or disposed of. In order to encourage recycling initiatives, le Ministere de l`Environnement et de la Faune du Quebec (MEF) (Quebec`s Ministry of Environment and Wildlife) established guidelines for the management of nonhazardous industrial solid waste. The aim of these guidelines is to propose a test procedure to evaluatemore » the quality of the material and to define material classes based on their potential for reuse. The evaluation procedure is based on standard tests, generally used for the evaluation of stabilized and solidified hazardous waste. The protocol includes an analysis of the total content of metals in the residue, the determination of the acid neutralization capacity and the prediction of the acid generation potential when the residue contains significant levels of sulfides. The protocol includes three different leachate tests in order to evaluate the mobility of contaminants present in the residue. The leaching procedures are: (1) an equilibrium extraction with water, (2) a modified TCLP extraction, and (3) an acid rain simulation effect extraction. A method is actually under development to collect leachate from a material pile subject to 18 months of rainfall. Materials are categorized into different classes according to their test results. Various potential reuse options are associated with material classes. Evaluation criteria were defined by using water quality standards and results obtained by testing reference construction material supplied by the Quebec`s Ministere des Transports (Ministry of Transportation).« less
Communication techniques and challenges for wireless food quality monitoring
Jedermann, Reiner; Pötsch, Thomas; Lloyd, Chanaka
2014-01-01
Remote measurement of product core temperature is an important prerequisite to improve the cool chain of food products and reduce losses. This paper examines and shows possible solutions to technical challenges that still hinder practical applications of wireless sensor networks in the field of food transport supervision. The high signal attenuation by water-containing products limits the communication range to less than 0.5 m for the commonly used 2.4 GHz radio chips. By theoretical analysis of the dependency of signal attenuation on the operating frequency, we show that the signal attenuation can be largely reduced by the use of 433 MHz or 866 MHz devices, but forwarding of messages over multiple hops inside a sensor network is mostly unavoidable to guarantee full coverage of a packed container. Communication protocols have to provide compatibility with widely accepted standards for integration into the global Internet, which has been achieved by programming an implementation of the constrained application protocol for wireless sensor nodes and integrating into IPv6-based networks. The sensor's battery lifetime can be extended by optimizing communication protocols and by in-network pre-processing of the sensor data. The feasibility of remote freight supervision was demonstrated by our full-scale ‘Intelligent Container’ prototype. PMID:24797133
Communication techniques and challenges for wireless food quality monitoring.
Jedermann, Reiner; Pötsch, Thomas; Lloyd, Chanaka
2014-06-13
Remote measurement of product core temperature is an important prerequisite to improve the cool chain of food products and reduce losses. This paper examines and shows possible solutions to technical challenges that still hinder practical applications of wireless sensor networks in the field of food transport supervision. The high signal attenuation by water-containing products limits the communication range to less than 0.5 m for the commonly used 2.4 GHz radio chips. By theoretical analysis of the dependency of signal attenuation on the operating frequency, we show that the signal attenuation can be largely reduced by the use of 433 MHz or 866 MHz devices, but forwarding of messages over multiple hops inside a sensor network is mostly unavoidable to guarantee full coverage of a packed container. Communication protocols have to provide compatibility with widely accepted standards for integration into the global Internet, which has been achieved by programming an implementation of the constrained application protocol for wireless sensor nodes and integrating into IPv6-based networks. The sensor's battery lifetime can be extended by optimizing communication protocols and by in-network pre-processing of the sensor data. The feasibility of remote freight supervision was demonstrated by our full-scale 'Intelligent Container' prototype.
Deposition and Characterization of Thin Films on Metallic Substrates
NASA Technical Reports Server (NTRS)
Gatica, Jorge E.
2005-01-01
A CVD method was successfully developed to produce conversion coatings on aluminum alloys surfaces with reproducible results with a variety of precursors. A well defined protocol to prepare the precursor solutions formulated in a previous research was extended to other additives. It was demonstrated that solutions prepared following such a protocol could be used to systematically generate protective coatings onto aluminum surfaces. Experiments with a variety of formulations revealed that a refined deposition protocol yields reproducible conversion coatings of controlled composition. A preliminary correlation between solution formulations and successful precursors was derived. Coatings were tested for adhesion properties enhancement for commercial paints. A standard testing method was followed and clear trends were identified. Only one precursors was tested systematically. Anticipated work on other precursors should allow a better characterization of the effect of intermetallics on the production of conversion/protective coatings on metals and ceramics. The significance of this work was the practical demonstration that chemical vapor deposition (CVD) techniques can be used to systematically generate protective/conversion coating on non-ferrous surfaces. In order to become an effective approach to replace chromate-based pre- treatment processes, namely in the aerospace or automobile industry, the process parameters must be defined more precisely. Moreover, the feasibility of scale-up designs necessitates a more comprehensive characterization of the fluid flow, transport phenomena, and chemical kinetics interacting in the process. Kinetic characterization showed a significantly different effect of magnesium-based precursors when compared to iron-based precursors. Future work will concentrate on refining the process through computer simulations and further experimental studies on the effect of other transition metals to induce deposition of conversion/protective films on aluminum and other metallic substrates.
Assuring bridge safety and serviceability in Europe
DOT National Transportation Integrated Search
2010-08-01
U.S. engineers need advanced tools and protocols to better assess and assure safety and serviceability of bridges. The Federal Highway Administration, American Association of State Highway and Transportation Officials, and National Cooperative Highwa...
SPP: A data base processor data communications protocol
NASA Technical Reports Server (NTRS)
Fishwick, P. A.
1983-01-01
The design and implementation of a data communications protocol for the Intel Data Base Processor (DBP) is defined. The protocol is termed SPP (Service Port Protocol) since it enables data transfer between the host computer and the DBP service port. The protocol implementation is extensible in that it is explicitly layered and the protocol functionality is hierarchically organized. Extensive trace and performance capabilities have been supplied with the protocol software to permit optional efficient monitoring of the data transfer between the host and the Intel data base processor. Machine independence was considered to be an important attribute during the design and implementation of SPP. The protocol source is fully commented and is included in Appendix A of this report.
Experimental purification of two-atom entanglement.
Reichle, R; Leibfried, D; Knill, E; Britton, J; Blakestad, R B; Jost, J D; Langer, C; Ozeri, R; Seidelin, S; Wineland, D J
2006-10-19
Entanglement is a necessary resource for quantum applications--entanglement established between quantum systems at different locations enables private communication and quantum teleportation, and facilitates quantum information processing. Distributed entanglement is established by preparing an entangled pair of quantum particles in one location, and transporting one member of the pair to another location. However, decoherence during transport reduces the quality (fidelity) of the entanglement. A protocol to achieve entanglement 'purification' has been proposed to improve the fidelity after transport. This protocol uses separate quantum operations at each location and classical communication to distil high-fidelity entangled pairs from lower-fidelity pairs. Proof-of-principle experiments distilling entangled photon pairs have been carried out. However, these experiments obtained distilled pairs with a low probability of success and required destruction of the entangled pairs, rendering them unavailable for further processing. Here we report efficient and non-destructive entanglement purification with atomic quantum bits. Two noisy entangled pairs were created and distilled into one higher-fidelity pair available for further use. Success probabilities were above 35 per cent. The many applications of entanglement purification make it one of the most important techniques in quantum information processing.
Turner, D; Levine, A; Weiss, B; Hirsh, A; Shamir, R; Shaoul, R; Berkowitz, D; Bujanover, Y; Cohen, S; Eshach-Adiv, O; Jamal, Gera; Kori, M; Lerner, A; On, A; Rachman, L; Rosenbach, Y; Shamaly, H; Shteyer, E; Silbermintz, A; Yerushalmi, B
2010-12-01
There are no current recommendations for bowel cleansing before colonoscopy in children. The Israeli Society of Pediatric Gastroenterology and Nutrition (ISPGAN) established an iterative working group to formulate evidence-based guidelines for bowel cleansing in children prior to colonoscopy. Data were collected by systematic review of the literature and via a national-based survey of all endoscopy units in Israel. Based on the strength of evidence, the Committee reached consensus on six recommended protocols in children. Guidelines were finalized after an open audit of ISPGAN members. Data on 900 colonoscopies per year were accrued, which represents all annual pediatric colonoscopies performed in Israel. Based on the literature review, the national survey, and the open audit, several age-stratified pediatric cleansing protocols were proposed: two PEG-ELS protocols (polyethylene-glycol with electrolyte solution); Picolax-based protocol (sodium picosulphate with magnesium citrate); sodium phosphate protocol (only in children over the age of 12 years who are at low risk for renal damage); stimulant laxative-based protocol (e. g. bisacodyl); and a PEG 3350-based protocol. A population-based analysis estimated that the acute toxicity rate of oral sodium phosphate is at most 3/7320 colonoscopies (0.041 %). Recommendations on diet and enema use are provided in relation to each proposed protocol. There is no ideal bowel cleansing regimen and, thus, various protocols are in use. We propose several evidence-based protocols to optimize bowel cleansing in children prior to colonoscopy and minimize adverse events. © Georg Thieme Verlag KG Stuttgart · New York.
Efficiency and security problems of anonymous key agreement protocol based on chaotic maps
NASA Astrophysics Data System (ADS)
Yoon, Eun-Jun
2012-07-01
In 2011, Niu-Wang proposed an anonymous key agreement protocol based on chaotic maps in [Niu Y, Wang X. An anonymous key agreement protocol based on chaotic maps. Commun Nonlinear Sci Simulat 2011;16(4):1986-92]. Niu-Wang's protocol not only achieves session key agreement between a server and a user, but also allows the user to anonymously interact with the server. Nevertheless, this paper points out that Niu-Wang's protocol has the following efficiency and security problems: (1) The protocol has computational efficiency problem when a trusted third party decrypts the user sending message. (2) The protocol is vulnerable to Denial of Service (DoS) attack based on illegal message modification by an attacker.
Comment on "flexible protocol for quantum private query based on B92 protocol"
NASA Astrophysics Data System (ADS)
Chang, Yan; Zhang, Shi-Bin; Zhu, Jing-Min
2017-03-01
In a recent paper (Quantum Inf Process 13:805-813, 2014), a flexible quantum private query (QPQ) protocol based on B92 protocol is presented. Here we point out that the B92-based QPQ protocol is insecure in database security when the channel has loss, that is, the user (Alice) will know more records in Bob's database compared with she has bought.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Bubanja, Vladimir, E-mail: vladimir.bubanja@callaghaninnovation.govt.nz
2015-06-15
We present schemes for quantum teleportation and entanglement swapping of electronic spin states in hybrid superconductor–normal-metal systems. The proposed schemes employ subgap transport whereby the lowest order processes involve Cooper pair-electron and double Cooper-pair cotunneling in quantum teleportation and entanglement swapping protocols, respectively. The competition between elastic cotunneling and Cooper-pair splitting results in the success probability of 25% in both cases. Described implementations of these protocols are within reach of present-day experimental techniques.
A Novel Quantum Solution to Privacy-Preserving Nearest Neighbor Query in Location-Based Services
NASA Astrophysics Data System (ADS)
Luo, Zhen-yu; Shi, Run-hua; Xu, Min; Zhang, Shun
2018-04-01
We present a cheating-sensitive quantum protocol for Privacy-Preserving Nearest Neighbor Query based on Oblivious Quantum Key Distribution and Quantum Encryption. Compared with the classical related protocols, our proposed protocol has higher security, because the security of our protocol is based on basic physical principles of quantum mechanics, instead of difficulty assumptions. Especially, our protocol takes single photons as quantum resources and only needs to perform single-photon projective measurement. Therefore, it is feasible to implement this protocol with the present technologies.
Cho, Kyu-Hyang; Do, Jun-Young; Park, Jong-Won; Yoon, Kyung-Woo; Kim, Yong-Lim
2013-01-01
Several studies have reported benefits for human peritoneal mesothelial cell function of a neutral-pH dialysate low in glucose degradation products (GDPs). However, the effects of low-GDP solution on ultrafiltration (UF), transport of solutes, and control of body water remain elusive. We therefore investigated the effect of low-GDP solution on UF, solute transport, and control of body water. Among 79 new continuous ambulatory peritoneal dialysis (CAPD) patients, 60 completed a 12-month protocol (28 in a lactate-based high-GDP solution group, 32 in a lactate-based low-GDP solution group). Clinical indices--including 24-hour UF volume (UFV), 24-hour urine volume (UV), residual renal function, and dialysis adequacy--were measured at months 1, 6, and 12. At months 1, 6, and 12, UFV, glucose absorption, 4-hour dialysate-to-plasma (D/P) creatinine, and 1-hour D/P Na(+) were assessed during a modified 4.25% peritoneal equilibration test (PET). Body composition by bioelectric impedance analysis was measured at months 1 and 12 in 26 CAPD patients. Daily UFV was lower in the low-GDP group. Despite similar solute transport and aquaporin function, the low-GDP group also showed lower UFV and higher glucose absorption during the PET. Factors associated with UFV during the PET were lactate-based high-GDP solution and 1-hour D/P Na(+). No differences in volume status and obesity at month 12 were observed, and improvements in hypervolemia were equal in both groups. Compared with the high-GDP group, the low-GDP group had a lower UFV during a PET and a lower daily UFV during the first year after peritoneal dialysis initiation. Although the low-GDP group had a lower daily UFV, no difficulties in controlling edema were encountered.
Florida's wet weather demonstration project : final report, January 2009.
DOT National Transportation Integrated Search
2008-11-01
The Florida Department of Transportation (FDOT) established a wet-weather pavement marking demonstration project with goals to gather performance data, evaluate various wet-weather marking systems, and develop a measurement protocol for measuring ret...
A Telecommunications Industry Primer: A Systems Model.
ERIC Educational Resources Information Center
Obermier, Timothy R.; Tuttle, Ronald H.
2003-01-01
Describes the Telecommunications Systems Model to help technical educators and students understand the increasingly complex telecommunications infrastructure. Specifically looks at ownership and regulatory status, service providers, transport medium, network protocols, and end-user services. (JOW)
Development of a safety management protocol.
DOT National Transportation Integrated Search
2008-09-01
The UC Berkeley Traffic Safety Center (TSC) has produced this report under a contract from the California Department of Transportation : (Caltrans). The aim is to address workplace injuries and accidents among Caltrans employees and develop recommend...
NASA Astrophysics Data System (ADS)
Zhao, Yongli; Hu, Liyazhou; Wang, Wei; Li, Yajie; Zhang, Jie
2017-01-01
With the continuous opening of resource acquisition and application, there are a large variety of network hardware appliances deployed as the communication infrastructure. To lunch a new network application always implies to replace the obsolete devices and needs the related space and power to accommodate it, which will increase the energy and capital investment. Network function virtualization1 (NFV) aims to address these problems by consolidating many network equipment onto industry standard elements such as servers, switches and storage. Many types of IT resources have been deployed to run Virtual Network Functions (vNFs), such as virtual switches and routers. Then how to deploy NFV in optical transport networks is a of great importance problem. This paper focuses on this problem, and gives an implementation architecture of NFV-enabled optical transport networks based on Software Defined Optical Networking (SDON) with the procedure of vNFs call and return. Especially, an implementation solution of NFV-enabled optical transport node is designed, and a parallel processing method for NFV-enabled OTN nodes is proposed. To verify the performance of NFV-enabled SDON, the protocol interaction procedures of control function virtualization and node function virtualization are demonstrated on SDON testbed. Finally, the benefits and challenges of the parallel processing method for NFV-enabled OTN nodes are simulated and analyzed.
Ramanan, B; Holmes, W M; Sloan, W T; Phoenix, V R
2012-01-03
Quantifying nanoparticle (NP) transport inside saturated porous geological media is imperative for understanding their fate in a range of natural and engineered water systems. While most studies focus upon finer grained systems representative of soils and aquifers, very few examine coarse-grained systems representative of riverbeds and gravel based sustainable urban drainage systems. In this study, we investigated the potential of magnetic resonance imaging (MRI) to image transport behaviors of nanoparticles (NPs) through a saturated coarse-grained system. MRI successfully imaged the transport of superparamagnetic NPs, inside a porous column composed of quartz gravel using T(2)-weighted images. A calibration protocol was then used to convert T(2)-weighted images into spatially resolved quantitative concentration maps of NPs at different time intervals. Averaged concentration profiles of NPs clearly illustrates that transport of a positively charged amine-functionalized NP within the column was slower compared to that of a negatively charged carboxyl-functionalized NP, due to electrostatic attraction between positively charged NP and negatively charged quartz grains. Concentration profiles of NPs were then compared with those of a convection-dispersion model to estimate coefficients of dispersivity and retardation. For the amine functionalized NPs (which exhibited inhibited transport), a better model fit was obtained when permanent attachment (deposition) was incorporated into the model as opposed to nonpermanent attachment (retardation). This technology can be used to further explore transport processes of NPs inside coarse-grained porous media, either by using the wide range of commercially available (super)paramagnetically tagged NPs or by using custom-made tagged NPs.
Adiabatic transport of qubits around a black hole
NASA Astrophysics Data System (ADS)
Viennot, David; Moro, Olivia
2017-03-01
We consider localized qubits evolving around a black hole following a quantum adiabatic dynamics. We develop a geometric structure (based on fibre bundles) permitting to describe the quantum states of a qubit and the spacetime geometry in a single framework. The quantum decoherence induced by the black hole on the qubit is analysed in this framework (the role of the dynamical and geometric phases in this decoherence is treated), especially for the quantum teleportation protocol when one qubit falls to the event horizon. A simple formula to compute the fidelity of the teleportation is derived. The case of a Schwarzschild black hole is analysed.
Vergara-Jaque, Ariela; Fenollar-Ferrer, Cristina; Kaufmann, Desirée; Forrest, Lucy R.
2015-01-01
Secondary active transporters are critical for neurotransmitter clearance and recycling during synaptic transmission and uptake of nutrients. These proteins mediate the movement of solutes against their concentration gradients, by using the energy released in the movement of ions down pre-existing concentration gradients. To achieve this, transporters conform to the so-called alternating-access hypothesis, whereby the protein adopts at least two conformations in which the substrate binding sites are exposed to one or other side of the membrane, but not both simultaneously. Structures of a bacterial homolog of neuronal glutamate transporters, GltPh, in several different conformational states have revealed that the protein structure is asymmetric in the outward- and inward-open states, and that the conformational change connecting them involves a elevator-like movement of a substrate binding domain across the membrane. The structural asymmetry is created by inverted-topology repeats, i.e., structural repeats with similar overall folds whose transmembrane topologies are related to each other by two-fold pseudo-symmetry around an axis parallel to the membrane plane. Inverted repeats have been found in around three-quarters of secondary transporter folds. Moreover, the (a)symmetry of these systems has been successfully used as a bioinformatic tool, called “repeat-swap modeling” to predict structural models of a transporter in one conformation using the known structure of the transporter in the complementary conformation as a template. Here, we describe an updated repeat-swap homology modeling protocol, and calibrate the accuracy of the method using GltPh, for which both inward- and outward-facing conformations are known. We then apply this repeat-swap homology modeling procedure to a concentrative nucleoside transporter, VcCNT, which has a three-dimensional arrangement related to that of GltPh. The repeat-swapped model of VcCNT predicts that nucleoside transport also occurs via an elevator-like mechanism. PMID:26388773
Relativistic quantum private database queries
NASA Astrophysics Data System (ADS)
Sun, Si-Jia; Yang, Yu-Guang; Zhang, Ming-Ou
2015-04-01
Recently, Jakobi et al. (Phys Rev A 83, 022301, 2011) suggested the first practical private database query protocol (J-protocol) based on the Scarani et al. (Phys Rev Lett 92, 057901, 2004) quantum key distribution protocol. Unfortunately, the J-protocol is just a cheat-sensitive private database query protocol. In this paper, we present an idealized relativistic quantum private database query protocol based on Minkowski causality and the properties of quantum information. Also, we prove that the protocol is secure in terms of the user security and the database security.
Biometrics based authentication scheme for session initiation protocol.
Xie, Qi; Tang, Zhixiong
2016-01-01
Many two-factor challenge-response based session initiation protocol (SIP) has been proposed, but most of them are vulnerable to smart card stolen attacks and password guessing attacks. In this paper, we propose a novel three-factor SIP authentication scheme using biometrics, password and smart card, and utilize the pi calculus-based formal verification tool ProVerif to prove that the proposed protocol achieves security and authentication. Furthermore, our protocol is highly efficient when compared to other related protocols.
The upgraded HADES trigger and data acquisition system
NASA Astrophysics Data System (ADS)
Michel, J.; Böhmer, M.; Kajetanowicz, M.; Korcyl, G.; Maier, L.; Palka, M.; Stroth, J.; Tarantola, A.; Traxler, M.; Ugur, C.; Yurevich, S.
2011-12-01
The HADES experiment is a High Acceptance Di-Electron Spectrometer located at GSI in Darmstadt, Germany. Recently, its trigger and data acquisition system was upgraded. The main goal was to substantially increase the event rate capability by a factor of up to 20 to reach 100 kHz in light and 20 kHz in heavy ion reaction systems. The total data rate written to storage is about 400 MByte/s in peak. In this context, the complete read-out system was exchanged to FPGA-based platforms using optical communication. For data transport a general-purpose real-time network protocol was developed to meet the strong requirements of the system. In particular, trigger information has to reach all front-end modules with latencies of less than 5 μs through up to 10 intermediate hubs in a star-like network setup. Monitoring and slow control features as well as readout and trigger distribution were joined in a single network protocol made up by three virtual channels with inherent arbitration by priority and a typical switching time of 100 ns. The full DAQ system includes about 550 FPGAs distributed over the complete detector system. For control and monitoring a virtual address space spanning the whole network is provided. Data are merged by the network hubs into data streams and passed on to a server farm using an Ethernet infrastructure. Due to the electromagnetic noise environment, several transmission error detection and correction features were included. In collaboration with groups from experiments of the FAIR accelerator complex, further developments based on the versatile hardware and communication protocol are being pursued.
Innovative mathematical modeling in environmental remediation
DOE Office of Scientific and Technical Information (OSTI.GOV)
Yeh, Gour T.; National Central Univ.; Univ. of Central Florida
2013-05-01
There are two different ways to model reactive transport: ad hoc and innovative reaction-based approaches. The former, such as the Kd simplification of adsorption, has been widely employed by practitioners, while the latter has been mainly used in scientific communities for elucidating mechanisms of biogeochemical transport processes. It is believed that innovative mechanistic-based models could serve as protocols for environmental remediation as well. This paper reviews the development of a mechanistically coupled fluid flow, thermal transport, hydrologic transport, and reactive biogeochemical model and example-applications to environmental remediation problems. Theoretical bases are sufficiently described. Four example problems previously carried out aremore » used to demonstrate how numerical experimentation can be used to evaluate the feasibility of different remediation approaches. The first one involved the application of a 56-species uranium tailing problem to the Melton Branch Subwatershed at Oak Ridge National Laboratory (ORNL) using the parallel version of the model. Simulations were made to demonstrate the potential mobilization of uranium and other chelating agents in the proposed waste disposal site. The second problem simulated laboratory-scale system to investigate the role of natural attenuation in potential off-site migration of uranium from uranium mill tailings after restoration. It showed inadequacy of using a single Kd even for a homogeneous medium. The third example simulated laboratory experiments involving extremely high concentrations of uranium, technetium, aluminum, nitrate, and toxic metals (e.g.,Ni, Cr, Co).The fourth example modeled microbially-mediated immobilization of uranium in an unconfined aquifer using acetate amendment in a field-scale experiment. The purposes of these modeling studies were to simulate various mechanisms of mobilization and immobilization of radioactive wastes and to illustrate how to apply reactive transport models for environmental remediation.The second problem simulated laboratory-scale system to investigate the role of natural attenuation in potential off-site migration of uranium from uranium mill tailings after restoration. It showed inadequacy of using a single Kd even for a homogeneous medium.« less
Quantifying the ozone and ultraviolet benefits already achieved by the Montreal Protocol.
Chipperfield, M P; Dhomse, S S; Feng, W; McKenzie, R L; Velders, G J M; Pyle, J A
2015-05-26
Chlorine- and bromine-containing ozone-depleting substances (ODSs) are controlled by the 1987 Montreal Protocol. In consequence, atmospheric equivalent chlorine peaked in 1993 and has been declining slowly since then. Consistent with this, models project a gradual increase in stratospheric ozone with the Antarctic ozone hole expected to disappear by ∼2050. However, we show that by 2013 the Montreal Protocol had already achieved significant benefits for the ozone layer. Using a 3D atmospheric chemistry transport model, we demonstrate that much larger ozone depletion than observed has been avoided by the protocol, with beneficial impacts on surface ultraviolet. A deep Arctic ozone hole, with column values <120 DU, would have occurred given meteorological conditions in 2011. The Antarctic ozone hole would have grown in size by 40% by 2013, with enhanced loss at subpolar latitudes. The decline over northern hemisphere middle latitudes would have continued, more than doubling to ∼15% by 2013.
Quantifying the ozone and ultraviolet benefits already achieved by the Montreal Protocol
NASA Astrophysics Data System (ADS)
Chipperfield, M. P.; Dhomse, S. S.; Feng, W.; McKenzie, R. L.; Velders, G. J. M.; Pyle, J. A.
2015-05-01
Chlorine- and bromine-containing ozone-depleting substances (ODSs) are controlled by the 1987 Montreal Protocol. In consequence, atmospheric equivalent chlorine peaked in 1993 and has been declining slowly since then. Consistent with this, models project a gradual increase in stratospheric ozone with the Antarctic ozone hole expected to disappear by ~2050. However, we show that by 2013 the Montreal Protocol had already achieved significant benefits for the ozone layer. Using a 3D atmospheric chemistry transport model, we demonstrate that much larger ozone depletion than observed has been avoided by the protocol, with beneficial impacts on surface ultraviolet. A deep Arctic ozone hole, with column values <120 DU, would have occurred given meteorological conditions in 2011. The Antarctic ozone hole would have grown in size by 40% by 2013, with enhanced loss at subpolar latitudes. The decline over northern hemisphere middle latitudes would have continued, more than doubling to ~15% by 2013.
Quantum key distribution protocol based on contextuality monogamy
NASA Astrophysics Data System (ADS)
Singh, Jaskaran; Bharti, Kishor; Arvind
2017-06-01
The security of quantum key distribution (QKD) protocols hinges upon features of physical systems that are uniquely quantum in nature. We explore the role of quantumness, as qualified by quantum contextuality, in a QKD scheme. A QKD protocol based on the Klyachko-Can-Binicioğlu-Shumovsky (KCBS) contextuality scenario using a three-level quantum system is presented. We explicitly show the unconditional security of the protocol by a generalized contextuality monogamy relationship based on the no-disturbance principle. This protocol provides a new framework for QKD which has conceptual and practical advantages over other protocols.
On implementation of DCTCP on three-tier and fat-tree data center network topologies.
Zafar, Saima; Bashir, Abeer; Chaudhry, Shafique Ahmad
2016-01-01
A data center is a facility for housing computational and storage systems interconnected through a communication network called data center network (DCN). Due to a tremendous growth in the computational power, storage capacity and the number of inter-connected servers, the DCN faces challenges concerning efficiency, reliability and scalability. Although transmission control protocol (TCP) is a time-tested transport protocol in the Internet, DCN challenges such as inadequate buffer space in switches and bandwidth limitations have prompted the researchers to propose techniques to improve TCP performance or design new transport protocols for DCN. Data center TCP (DCTCP) emerge as one of the most promising solutions in this domain which employs the explicit congestion notification feature of TCP to enhance the TCP congestion control algorithm. While DCTCP has been analyzed for two-tier tree-based DCN topology for traffic between servers in the same rack which is common in cloud applications, it remains oblivious to the traffic patterns common in university and private enterprise networks which traverse the complete network interconnect spanning upper tier layers. We also recognize that DCTCP performance cannot remain unaffected by the underlying DCN architecture hence there is a need to test and compare DCTCP performance when implemented over diverse DCN architectures. Some of the most notable DCN architectures are the legacy three-tier, fat-tree, BCube, DCell, VL2, and CamCube. In this research, we simulate the two switch-centric DCN architectures; the widely deployed legacy three-tier architecture and the promising fat-tree architecture using network simulator and analyze the performance of DCTCP in terms of throughput and delay for realistic traffic patterns. We also examine how DCTCP prevents incast and outcast congestion when realistic DCN traffic patterns are employed in above mentioned topologies. Our results show that the underlying DCN architecture significantly impacts DCTCP performance. We find that DCTCP gives optimal performance in fat-tree topology and is most suitable for large networks.
Transportation users' views of quality
DOT National Transportation Integrated Search
2012-11-01
Harmonization Task Groups 1 and 3 (HTG1 and 3) were established by the EU-US International Standards Harmonization Working Group to attempt to harmonize standards (including ISO, CEN, ETSI, IEEE) on security (HTG1) and communications protocols (HTG3)...
Synthesizing Existing CSMA and TDMA Based MAC Protocols for VANETs
Huang, Jiawei; Li, Qi; Zhong, Shaohua; Liu, Lianhai; Zhong, Ping; Wang, Jianxin; Ye, Jin
2017-01-01
Many Carrier Sense Multiple Access (CSMA) and Time Division Multiple Access (TDMA) based medium access control (MAC) protocols for vehicular ad hoc networks (VANETs) have been proposed recently. Contrary to the common perception that they are competitors, we argue that the underlying strategies used in these MAC protocols are complementary. Based on this insight, we design CTMAC, a MAC protocol that synthesizes existing strategies; namely, random accessing channel (used in CSMA-style protocols) and arbitral reserving channel (used in TDMA-based protocols). CTMAC swiftly changes its strategy according to the vehicle density, and its performance is better than the state-of-the-art protocols. We evaluate CTMAC using at-scale simulations. Our results show that CTMAC reduces the channel completion time and increases the network goodput by 45% for a wide range of application workloads and network settings. PMID:28208590
Analysis of the conductivity of plasmodesmata by microinjection.
Kragler, Friedrich
2015-01-01
Pressure microinjection can be used to introduce fluorescent dyes and labeled macromolecules into single cells. The method allows measuring transport activity of macromolecules such as proteins and RNA molecules within and between cells. Routinely, plant mesophyll cells are injected with fluorescent dextran molecules of specific sizes to measure an increase of the size exclusion limit of plasmodesmata in the presence of a co-injected or expressed protein. The mobility of a macromolecule can also be addressed directly by injecting a recombinant protein that itself is labeled with fluorescent dye and following its transport to neighboring cells. This chapter describes a pressure microinjection protocol successfully applied to Nicotiana leaves. This protocol requires basic skills and experience in handling a microscope equipped with an imaging system, a micromanipulator, and a microinjection system attached to an upright microscope. Using this equipment, a trained person can inject approximately 10-20 mesophyll cells per hour.
Wong, Anthony F; Pielmeier, Ulrike; Haug, Peter J; Andreassen, Steen
2016-01-01
Objective Develop an efficient non-clinical method for identifying promising computer-based protocols for clinical study. An in silico comparison can provide information that informs the decision to proceed to a clinical trial. The authors compared two existing computer-based insulin infusion protocols: eProtocol-insulin from Utah, USA, and Glucosafe from Denmark. Materials and Methods The authors used eProtocol-insulin to manage intensive care unit (ICU) hyperglycemia with intravenous (IV) insulin from 2004 to 2010. Recommendations accepted by the bedside clinicians directly link the subsequent blood glucose values to eProtocol-insulin recommendations and provide a unique clinical database. The authors retrospectively compared in silico 18 984 eProtocol-insulin continuous IV insulin infusion rate recommendations from 408 ICU patients with those of Glucosafe, the candidate computer-based protocol. The subsequent blood glucose measurement value (low, on target, high) was used to identify if the insulin recommendation was too high, on target, or too low. Results Glucosafe consistently provided more favorable continuous IV insulin infusion rate recommendations than eProtocol-insulin for on target (64% of comparisons), low (80% of comparisons), or high (70% of comparisons) blood glucose. Aggregated eProtocol-insulin and Glucosafe continuous IV insulin infusion rates were clinically similar though statistically significantly different (Wilcoxon signed rank test P = .01). In contrast, when stratified by low, on target, or high subsequent blood glucose measurement, insulin infusion rates from eProtocol-insulin and Glucosafe were statistically significantly different (Wilcoxon signed rank test, P < .001), and clinically different. Discussion This in silico comparison appears to be an efficient nonclinical method for identifying promising computer-based protocols. Conclusion Preclinical in silico comparison analytical framework allows rapid and inexpensive identification of computer-based protocol care strategies that justify expensive and burdensome clinical trials. PMID:26228765
A Survey on the Taxonomy of Cluster-Based Routing Protocols for Homogeneous Wireless Sensor Networks
Naeimi, Soroush; Ghafghazi, Hamidreza; Chow, Chee-Onn; Ishii, Hiroshi
2012-01-01
The past few years have witnessed increased interest among researchers in cluster-based protocols for homogeneous networks because of their better scalability and higher energy efficiency than other routing protocols. Given the limited capabilities of sensor nodes in terms of energy resources, processing and communication range, the cluster-based protocols should be compatible with these constraints in either the setup state or steady data transmission state. With focus on these constraints, we classify routing protocols according to their objectives and methods towards addressing the shortcomings of clustering process on each stage of cluster head selection, cluster formation, data aggregation and data communication. We summarize the techniques and methods used in these categories, while the weakness and strength of each protocol is pointed out in details. Furthermore, taxonomy of the protocols in each phase is given to provide a deeper understanding of current clustering approaches. Ultimately based on the existing research, a summary of the issues and solutions of the attributes and characteristics of clustering approaches and some open research areas in cluster-based routing protocols that can be further pursued are provided. PMID:22969350
Naeimi, Soroush; Ghafghazi, Hamidreza; Chow, Chee-Onn; Ishii, Hiroshi
2012-01-01
The past few years have witnessed increased interest among researchers in cluster-based protocols for homogeneous networks because of their better scalability and higher energy efficiency than other routing protocols. Given the limited capabilities of sensor nodes in terms of energy resources, processing and communication range, the cluster-based protocols should be compatible with these constraints in either the setup state or steady data transmission state. With focus on these constraints, we classify routing protocols according to their objectives and methods towards addressing the shortcomings of clustering process on each stage of cluster head selection, cluster formation, data aggregation and data communication. We summarize the techniques and methods used in these categories, while the weakness and strength of each protocol is pointed out in details. Furthermore, taxonomy of the protocols in each phase is given to provide a deeper understanding of current clustering approaches. Ultimately based on the existing research, a summary of the issues and solutions of the attributes and characteristics of clustering approaches and some open research areas in cluster-based routing protocols that can be further pursued are provided.
McDade, Thomas W; Williams, Sharon; Snodgrass, J Josh
2007-11-01
Logistical constraints associated with the collection and analysis of biological samples in community-based settings have been a significant impediment to integrative, multilevel bio-demographic and biobehavioral research. However recent methodological developments have overcome many of these constraints and have also expanded the options for incorporating biomarkers into population-based health research in international as well as domestic contexts. In particular using dried blood spot (DBS) samples-drops of whole blood collected on filter paper from a simple finger prick-provides a minimally invasive method for collecting blood samples in nonclinical settings. After a brief discussion of biomarkers more generally, we review procedures for collecting, handling, and analyzing DBS samples. Advantages of using DBS samples-compared with venipuncture include the relative ease and low cost of sample collection, transport, and storage. Disadvantages include requirements for assay development and validation as well as the relatively small volumes of sample. We present the results of a comprehensive literature review of published protocols for analysis of DBS samples, and we provide more detailed analysis of protocols for 45 analytes likely to be of particular relevance to population-level health research. Our objective is to provide investigators with the information they need to make informed decisions regarding the appropriateness of blood spot methods for their research interests.
Transport Protocols for Wireless Mesh Networks
NASA Astrophysics Data System (ADS)
Eddie Law, K. L.
Transmission control protocol (TCP) provides reliable connection-oriented services between any two end systems on the Internet. With TCP congestion control algorithm, multiple TCP connections can share network and link resources simultaneously. These TCP congestion control mechanisms have been operating effectively in wired networks. However, performance of TCP connections degrades rapidly in wireless and lossy networks. To sustain the throughput performance of TCP connections in wireless networks, design modifications may be required accordingly in the TCP flow control algorithm, and potentially, in association with other protocols in other layers for proper adaptations. In this chapter, we explain the limitations of the latest TCP congestion control algorithm, and then review some popular designs for TCP connections to operate effectively in wireless mesh network infrastructure.
Simple proof of security of the BB84 quantum key distribution protocol
Shor; Preskill
2000-07-10
We prove that the 1984 protocol of Bennett and Brassard (BB84) for quantum key distribution is secure. We first give a key distribution protocol based on entanglement purification, which can be proven secure using methods from Lo and Chau's proof of security for a similar protocol. We then show that the security of this protocol implies the security of BB84. The entanglement purification based protocol uses Calderbank-Shor-Steane codes, and properties of these codes are used to remove the use of quantum computation from the Lo-Chau protocol.
Salmon, Paul Matthew; Goode, Natassia; Spiertz, Antje; Thomas, Miles; Grant, Eryn; Clacy, Amanda
2017-06-01
Questions have been raised regarding the impact that providing concurrent verbal protocols has on task performance in various settings; however, there has been little empirical testing of this in road transport. The aim of this study was to examine the impact of providing concurrent verbal protocols on driving performance. Participants drove an instrumented vehicle around a set route, twice whilst providing a concurrent verbal protocol, and twice without. A comparison revealed no differences in behaviour related to speed, braking and steering wheel angle when driving mid-block, but a significant difference in aspects of braking and acceleration at roundabouts. When not providing a verbal protocol, participants were found to brake harder on approach to a roundabout and accelerate more heavily coming out of roundabouts. It is concluded that providing verbal protocols may have a positive effect on braking and accelerating. Practical implications related to driver training and future research are discussed. Practitioner Summary: Verbal protocol analysis is used by ergonomists to understand aspects of cognition and decision-making during complex tasks such as driving and control room operation. This study examines the impact that it has on driving performance, providing evidence to support its continued use in ergonomics applications.
On the security of a simple three-party key exchange protocol without server's public keys.
Nam, Junghyun; Choo, Kim-Kwang Raymond; Park, Minkyu; Paik, Juryon; Won, Dongho
2014-01-01
Authenticated key exchange protocols are of fundamental importance in securing communications and are now extensively deployed for use in various real-world network applications. In this work, we reveal major previously unpublished security vulnerabilities in the password-based authenticated three-party key exchange protocol according to Lee and Hwang (2010): (1) the Lee-Hwang protocol is susceptible to a man-in-the-middle attack and thus fails to achieve implicit key authentication; (2) the protocol cannot protect clients' passwords against an offline dictionary attack; and (3) the indistinguishability-based security of the protocol can be easily broken even in the presence of a passive adversary. We also propose an improved password-based authenticated three-party key exchange protocol that addresses the security vulnerabilities identified in the Lee-Hwang protocol.
On the Security of a Simple Three-Party Key Exchange Protocol without Server's Public Keys
Nam, Junghyun; Choo, Kim-Kwang Raymond; Park, Minkyu; Paik, Juryon; Won, Dongho
2014-01-01
Authenticated key exchange protocols are of fundamental importance in securing communications and are now extensively deployed for use in various real-world network applications. In this work, we reveal major previously unpublished security vulnerabilities in the password-based authenticated three-party key exchange protocol according to Lee and Hwang (2010): (1) the Lee-Hwang protocol is susceptible to a man-in-the-middle attack and thus fails to achieve implicit key authentication; (2) the protocol cannot protect clients' passwords against an offline dictionary attack; and (3) the indistinguishability-based security of the protocol can be easily broken even in the presence of a passive adversary. We also propose an improved password-based authenticated three-party key exchange protocol that addresses the security vulnerabilities identified in the Lee-Hwang protocol. PMID:25258723
A secure RFID-based WBAN for healthcare applications.
Ullah, Sana; Alamri, Atif
2013-10-01
A Wireless Body Area Network (WBAN) allows the seamless integration of small and intelligent invasive or non-invasive sensor nodes in, on or around a human body for continuous health monitoring. These nodes are expected to use different power-efficient protocols in order to extend the WBAN lifetime. This paper highlights the power consumption and security issues of WBAN for healthcare applications. Numerous power saving mechanisms are discussed and a secure RFID-based protocol for WBAN is proposed. The performance of the proposed protocol is analyzed and compared with that of IEEE 802.15.6-based CSMA/CA and preamble-based TDMA protocols using extensive simulations. It is shown that the proposed protocol is power-efficient and protects patients' data from adversaries. It is less vulnerable to different attacks compared to that of IEEE 802.15.6-based CSMA/CA and preamble-based TDMA protocols. For a low traffic load and a single alkaline battery of capacity 2.6 Ah, the proposed protocol could extend the WBAN lifetime, when deployed on patients in hospitals or at homes, to approximately five years.
National ITS Architecture and Standards Resource Guide
DOT National Transportation Integrated Search
1998-09-01
The Transportation Equity Act for the 21st Century (TEA-21) encourages the use of the National ITS Architecture and the adoption of ITS standards and protocols. This guide provides field personnel with guidance and resources necessary for implementin...
O'Neill-Kerr, Alex; Yassin, Anhar; Rogers, Stephen; Cornish, Janie
2017-09-01
The aim of this study was to test the proposition that adoption of a dose titration protocol may be associated with better patient outcomes, at lower treatment dose, and with comparable cumulative dose to that in patients treated using an age-based stimulus dosing protocol. This was an analysis of data assembled from archived records and based on cohorts of patients treated respectively on an age-based stimulus dosing protocol and on a dose titration protocol in the National Health Service in England. We demonstrated a significantly better response in the patient cohort treated with dose titration than with age-based stimulus dosing. Peak doses were less and the total cumulative dose was less in the dose titration group than in the age-based stimulus dosing group. Our findings are consistent with superior outcomes in patients treated using a dose titration protocol when compared with age-based stimulus dosing in a similar cohort of patients.
Zhou, Y; Murata, T; Defanti, T A
2000-01-01
Despite their attractive properties, networked virtual environments (net-VEs) are notoriously difficult to design, implement, and test due to the concurrency, real-time and networking features in these systems. Net-VEs demand high quality-of-service (QoS) requirements on the network to maintain natural and real-time interactions among users. The current practice for net-VE design is basically trial and error, empirical, and totally lacks formal methods. This paper proposes to apply a Petri net formal modeling technique to a net-VE-NICE (narrative immersive constructionist/collaborative environment), predict the net-VE performance based on simulation, and improve the net-VE performance. NICE is essentially a network of collaborative virtual reality systems called the CAVE-(CAVE automatic virtual environment). First, we introduce extended fuzzy-timing Petri net (EFTN) modeling and analysis techniques. Then, we present EFTN models of the CAVE, NICE, and transport layer protocol used in NICE: transmission control protocol (TCP). We show the possibility analysis based on the EFTN model for the CAVE. Then, by using these models and design/CPN as the simulation tool, we conducted various simulations to study real-time behavior, network effects and performance (latencies and jitters) of NICE. Our simulation results are consistent with experimental data.
Multicasting in Wireless Communications (Ad-Hoc Networks): Comparison against a Tree-Based Approach
NASA Astrophysics Data System (ADS)
Rizos, G. E.; Vasiliadis, D. C.
2007-12-01
We examine on-demand multicasting in ad hoc networks. The Core Assisted Mesh Protocol (CAMP) is a well-known protocol for multicast routing in ad-hoc networks, generalizing the notion of core-based trees employed for internet multicasting into multicast meshes that have much richer connectivity than trees. On the other hand, wireless tree-based multicast routing protocols use much simpler structures for determining route paths, using only parent-child relationships. In this work, we compare the performance of the CAMP protocol against the performance of wireless tree-based multicast routing protocols, in terms of two important factors, namely packet delay and ratio of dropped packets.
An Architecture for SCADA Network Forensics
NASA Astrophysics Data System (ADS)
Kilpatrick, Tim; Gonzalez, Jesus; Chandia, Rodrigo; Papa, Mauricio; Shenoi, Sujeet
Supervisory control and data acquisition (SCADA) systems are widely used in industrial control and automation. Modern SCADA protocols often employ TCP/IP to transport sensor data and control signals. Meanwhile, corporate IT infrastructures are interconnecting with previously isolated SCADA networks. The use of TCP/IP as a carrier protocol and the interconnection of IT and SCADA networks raise serious security issues. This paper describes an architecture for SCADA network forensics. In addition to supporting forensic investigations of SCADA network incidents, the architecture incorporates mechanisms for monitoring process behavior, analyzing trends and optimizing plant performance.
1992-12-01
DATA DES . ELEMENT NAME ATlNPUTES Conditional TD401 152 Special Handling Code C ID 2/3 Code specifying special transportation handling instructions. HAN...Executhre Age"t for Eketronic Conmnerce/Electmnlc Dots lnterchange/Protection of Logistica Undaasslfled/Serssltlve Systerr Executive Agent for EC/EDI...PRICEISALES CATALOG ANSI ASC X12 VERSIONIRELEASE 003030DOD_ 7 Communications Transport Protocol ISA /_Interchange Control Header GS/ Functional Group Header
DOE Office of Scientific and Technical Information (OSTI.GOV)
S.G. Johnson; K.L. Lively; C.C. Dwight
Radioisotope power systems have been used for over 50 years to enable missions in remote or hostile environments. They are a convenient means of supplying a few milliwatts up to a few hundred watts of useable, long-term electrical power. With regard to use of a radioisotope power system, the transportation, ground support and implementation of nuclear safety protocols in the field is a complex process that requires clear identification of needed technical and regulatory requirements. The appropriate care must be taken to provide high quality treatment of the item to be moved so it arrives in a condition to fulfillmore » its missions in space. Similarly it must be transported and managed in a manner compliant with requirements for shipment and handling of special nuclear material. This presentation describes transportation, ground support operations and implementation of nuclear safety and security protocols for a radioisotope power system using recent experience involving the Multi-Mission Radioisotope Thermoelectric Generator for National Aeronautics and Space Administration’s Mars Science Laboratory, which launched in November of 2011.« less
1992-12-21
in preparation). Foundations of artificial intelligence. Cambridge, MA: MIT Press. O’Reilly, R. C. (1991). X3DNet: An X- Based Neural Network ...2.2.3 Trace based protocol analysis 19 2.2A Summary of important data features 21 2.3 Tools related to process model testing 23 2.3.1 Tools for building...algorithm 57 3. Requirements for testing process models using trace based protocol 59 analysis 3.1 Definition of trace based protocol analysis (TBPA) 59
Generalized Teleportation and Entanglement Recycling
NASA Astrophysics Data System (ADS)
Strelchuk, Sergii; Horodecki, Michał; Oppenheim, Jonathan
2013-01-01
We introduce new teleportation protocols which are generalizations of the original teleportation protocols that use the Pauli group and the port-based teleportation protocols, introduced by Hiroshima and Ishizaka, that use the symmetric permutation group. We derive sufficient conditions for a set of operations, which in general need not form a group, to give rise to a teleportation protocol and provide examples of such schemes. This generalization leads to protocols with novel properties and is needed to push forward new schemes of computation based on them. Port-based teleportation protocols and our generalizations use a large resource state consisting of N singlets to teleport only a single qubit state reliably. We provide two distinct protocols which recycle the resource state to teleport multiple states with error linearly increasing with their number. The first protocol consists of sequentially teleporting qubit states, and the second teleports them in a bulk.
Generalized teleportation and entanglement recycling.
Strelchuk, Sergii; Horodecki, Michał; Oppenheim, Jonathan
2013-01-04
We introduce new teleportation protocols which are generalizations of the original teleportation protocols that use the Pauli group and the port-based teleportation protocols, introduced by Hiroshima and Ishizaka, that use the symmetric permutation group. We derive sufficient conditions for a set of operations, which in general need not form a group, to give rise to a teleportation protocol and provide examples of such schemes. This generalization leads to protocols with novel properties and is needed to push forward new schemes of computation based on them. Port-based teleportation protocols and our generalizations use a large resource state consisting of N singlets to teleport only a single qubit state reliably. We provide two distinct protocols which recycle the resource state to teleport multiple states with error linearly increasing with their number. The first protocol consists of sequentially teleporting qubit states, and the second teleports them in a bulk.
DeLoid, Glen M.; Cohen, Joel M.; Pyrgiotakis, Georgios; Demokritou, Philip
2018-01-01
Summary Evidence continues to grow of the importance of in vitro and in vivo dosimetry in the hazard assessment and ranking of engineered nanomaterials (ENMs). Accurate dose metrics are particularly important for in vitro cellular screening to assess the potential health risks or bioactivity of ENMs. In order to ensure meaningful and reproducible quantification of in vitro dose, with consistent measurement and reporting between laboratories, it is necessary to adopt standardized and integrated methodologies for 1) generation of stable ENM suspensions in cell culture media, 2) colloidal characterization of suspended ENMs, particularly properties that determine particle kinetics in an in vitro system (size distribution and formed agglomerate effective density), and 3) robust numerical fate and transport modeling for accurate determination of ENM dose delivered to cells over the course of the in vitro exposure. Here we present such an integrated comprehensive protocol based on such a methodology for in vitro dosimetry, including detailed standardized procedures for each of these three critical steps. The entire protocol requires approximately 6-12 hours to complete. PMID:28102836
Vocal Fold Surface Hydration: A review
Leydon, Ciara; Sivasankar, Mahalakshmi; Falciglia, Danielle Lodewyck; Atkins, Christopher; Fisher, Kimberly V.
2009-01-01
Vocal fold surface liquid homeostasis contributes to optimal vocal physiology. In this paper we review emerging evidence that vocal fold surface liquid is maintained in part by salt and water fluxes across the epithelium. Based on recent immunolocalization and electrophysiological findings, we describe a transcellular pathway as one mechanism for regulating superficial vocal fold hydration. We propose that the pathway includes the sodium-potassium pump, sodium-potassium-chloride cotransporter, epithelial sodium channels, cystic fibrosis transmembrane regulator chloride channels, and aquaporin water channels. By integrating knowledge of the regulating mechanisms underlying ion and fluid transport with observations from hydration challenges and treatments using in vitro and in vivo studies, we provide a theoretical basis for understanding how environmental and behavioral challenges and clinical interventions may modify vocal fold surface liquid composition. We present converging evidence that clinical protocols directed at facilitating vocal fold epithelial ion and fluid transport may benefit healthy speakers, those with voice disorders, and those at risk for voice disorders. PMID:19111440
Interpretation of Trace Gas Data Using Inverse Methods and Global Chemical Transport Models
NASA Technical Reports Server (NTRS)
Prinn, Ronald G.
1997-01-01
This is a theoretical research project aimed at: (1) development, testing, and refining of inverse methods for determining regional and global transient source and sink strengths for long lived gases important in ozone depletion and climate forcing, (2) utilization of inverse methods to determine these source/sink strengths which use the NCAR/Boulder CCM2-T42 3-D model and a global 3-D Model for Atmospheric Transport and Chemistry (MATCH) which is based on analyzed observed wind fields (developed in collaboration by MIT and NCAR/Boulder), (3) determination of global (and perhaps regional) average hydroxyl radical concentrations using inverse methods with multiple titrating gases, and, (4) computation of the lifetimes and spatially resolved destruction rates of trace gases using 3-D models. Important goals include determination of regional source strengths of methane, nitrous oxide, and other climatically and chemically important biogenic trace gases and also of halocarbons restricted by the Montreal Protocol and its follow-on agreements and hydrohalocarbons used as alternatives to the restricted halocarbons.
Lightweight SIP/SDP compression scheme (LSSCS)
NASA Astrophysics Data System (ADS)
Wu, Jian J.; Demetrescu, Cristian
2001-10-01
In UMTS new IP based services with tight delay constraints will be deployed over the W-CDMA air interface such as IP multimedia and interactive services. To integrate the wireline and wireless IP services, 3GPP standard forum adopted the Session Initiation Protocol (SIP) as the call control protocol for the UMTS Release 5, which will implement next generation, all IP networks for real-time QoS services. In the current form the SIP protocol is not suitable for wireless transmission due to its large message size which will need either a big radio pipe for transmission or it will take far much longer to transmit than the current GSM Call Control (CC) message sequence. In this paper we present a novel compression algorithm called Lightweight SIP/SDP Compression Scheme (LSSCS), which acts at the SIP application layer and therefore removes the information redundancy before it is sent to the network and transport layer. A binary octet-aligned header is added to the compressed SIP/SDP message before sending it to the network layer. The receiver uses this binary header as well as the pre-cached information to regenerate the original SIP/SDP message. The key features of the LSSCS compression scheme are presented in this paper along with implementation examples. It is shown that this compression algorithm makes SIP transmission efficient over the radio interface without losing the SIP generality and flexibility.
A review of tags anti-collision and localization protocols in RFID networks.
Ullah, S; Alsalih, W; Alsehaim, A; Alsadhan, N
2012-12-01
Radio Frequency IDentification (RFID) has allowed the realization of ubiquitous tracking and monitoring of physical objects wirelessly with minimum human interactions. It plays a key role in a wide range of applications including asset tracking, contactless payment, access control, transportation and logistics, and other industrial applications. On the other side, RFID systems face several technical challenges that need to be overcome in order to achieve their potential benefits; tags collisions and localization of tagged objects are two important challenges. Numerous anti-collision and localization protocols have been proposed to address these challenges. This paper reviews the state-of-art tags' anti-collision and localization protocols, and provides a deep insight into technical issues of these protocols. The probabilistic and deterministic anti-collision protocols are critically studied and compared in terms of different parameters. We further review distance estimation, scene analysis, and proximity localization schemes and provide useful suggestions. We also introduce a new hybrid direction that utilizes power control to spatially partition the interrogation range of a reader for more efficient anti-collision and localization. Finally, we present the applications of RFID systems in healthcare sectors.
A secured authentication protocol for wireless sensor networks using elliptic curves cryptography.
Yeh, Hsiu-Lien; Chen, Tien-Ho; Liu, Pin-Chuan; Kim, Tai-Hoo; Wei, Hsin-Wen
2011-01-01
User authentication is a crucial service in wireless sensor networks (WSNs) that is becoming increasingly common in WSNs because wireless sensor nodes are typically deployed in an unattended environment, leaving them open to possible hostile network attack. Because wireless sensor nodes are limited in computing power, data storage and communication capabilities, any user authentication protocol must be designed to operate efficiently in a resource constrained environment. In this paper, we review several proposed WSN user authentication protocols, with a detailed review of the M.L Das protocol and a cryptanalysis of Das' protocol that shows several security weaknesses. Furthermore, this paper proposes an ECC-based user authentication protocol that resolves these weaknesses. According to our analysis of security of the ECC-based protocol, it is suitable for applications with higher security requirements. Finally, we present a comparison of security, computation, and communication costs and performances for the proposed protocols. The ECC-based protocol is shown to be suitable for higher security WSNs.
A Secured Authentication Protocol for Wireless Sensor Networks Using Elliptic Curves Cryptography
Yeh, Hsiu-Lien; Chen, Tien-Ho; Liu, Pin-Chuan; Kim, Tai-Hoo; Wei, Hsin-Wen
2011-01-01
User authentication is a crucial service in wireless sensor networks (WSNs) that is becoming increasingly common in WSNs because wireless sensor nodes are typically deployed in an unattended environment, leaving them open to possible hostile network attack. Because wireless sensor nodes are limited in computing power, data storage and communication capabilities, any user authentication protocol must be designed to operate efficiently in a resource constrained environment. In this paper, we review several proposed WSN user authentication protocols, with a detailed review of the M.L Das protocol and a cryptanalysis of Das’ protocol that shows several security weaknesses. Furthermore, this paper proposes an ECC-based user authentication protocol that resolves these weaknesses. According to our analysis of security of the ECC-based protocol, it is suitable for applications with higher security requirements. Finally, we present a comparison of security, computation, and communication costs and performances for the proposed protocols. The ECC-based protocol is shown to be suitable for higher security WSNs. PMID:22163874
NASA Astrophysics Data System (ADS)
Qian, Jun
This research work contains two main parts: the theoretical study of confined phonon modes and electron states in confined graphene nanostructures; the experimental part including two topics about fabricating a graphene-FET aptamer-sensor for cocaine detection and the study of the electronic transport properties of dsDNA. In the theory part, we study the confined optical phonon modes in graphene nanoribbons (GNR) and rectangular graphene quantum dots (RGQD) by the elastic continuum model. The carrier states are studied by effective mass approximation. The phonon bottleneck effect is expected in general for RGQDs. The scattering rates are calculated for specific RGQDs with carefully chosen dimensions to fulfill the momentum and energy conservation conditions. In the experimental part, we have developed a combined technique of semiconductor processes and molecular biological protocols to fabricate a signal-off graphene-FET aptamer-sensor for cocaine. In addition, DNA transport properties were studied by STM on GNP-dsDNA-Au conjugates in atmospheric condition. The dsDNA-complexes exhibit as a slightly n-type semiconductor by simulated with a Landauer-type model. A geometrical model is proposed to explain the distinct I-V spectra.
Kalra, Sanjay; Ghosh, Sujoy; Aamir, A. H.; Ahmed, Md. Tofail; Amin, Mohammod Feroz; Bajaj, Sarita; Baruah, Manash P.; Bulugahapitiya, Uditha; Das, A. K.; Giri, Mimi; Gunatilake, Sonali; Mahar, Saeed A.; Pathan, Md. Faruque; Qureshi, Nazmul Kabir; Raza, S. Abbas; Sahay, Rakesh; Shakya, Santosh; Shreshta, Dina; Somasundaram, Noel; Sumanatilleke, Manilka; Unnikrishnan, A. G.; Wijesinghe, Achini Madushani
2017-01-01
Diabetes prevalence shows a continuous increasing trend in South Asia. Although well-established treatment modalities exist for type 2 diabetes mellitus (T2DM) management, they are limited by their side effect profile. Sodium–glucose co-transporter 2 inhibitors (SGLT2i) with their novel insulin-independent renal action provide improved glycemic control, supplemented by reduction in weight and blood pressure, and cardiovascular safety. Based on the clinical outcomes with SGLT2i in patients with T2DM, treatment strategies that make a “good clinical sense” are desirable. Considering the peculiar lifestyle, body types, dietary patterns (long duration religious fasts), and the hot climate of the South Asian population, a unanimous decision was taken to design specific, customized guidelines for T2DM treatment strategies in these regions. The panel met for a discussion three times so as to get a consensus for the guidelines, and only unanimous consensus was included. After careful consideration of the quality and strength of the available evidence, the executive summary of this consensus statement was developed based on the American Association of Clinical Endocrinologists/American College of Endocrinology protocol. PMID:28217523
``Magical'' fluid pathways: inspired airflow corridors for optimal drug delivery to human sinuses
NASA Astrophysics Data System (ADS)
Basu, Saikat; Farzal, Zainab; Kimbell, Julia S.
2017-11-01
Topical delivery methods like nasal sprays are an important therapeutic component for sinusitis (inflammation and clogging of the paranasal sinuses). The sinuses are air-filled sacs, identified as: maxillaries (under the eyes and deep to cheeks bilaterally; largest in volume), frontals (above and medial to the eyes, behind forehead area), ethmoids (between the eyes, inferior to the frontal sinuses), and sphenoids (superior and posterior to ethmoids). We develop anatomic CT-based 3D reconstructions of the human nasal cavity for multiple subjects. Through CFD simulations on Fluent for measured breathing rates, we track inspiratory airflow in all the models and the corresponding sprayed drug transport (for a commercially available sprayer, with experimentally tested particle size distributions). The protocol is implemented for a wide array of spray release points. We make the striking observation that the same release points in each subject provide better particle deposition in all the sinuses, despite the sinuses being located at different portions of the nasal cavity. This leads to the conjecture that the complicated anatomy-based flow physics artifacts in the nasal canal generate certain ``magical'' streamlines, providing passage for improved drug transport to all sinus targets. Supported by NIH Grant R01 HL122154.
A native IP satellite communications system
NASA Astrophysics Data System (ADS)
Koudelka, O.; Schmidt, M.; Ebert, J.; Schlemmer, H.; Kastner-Puschl, S.; Riedler, W.
2004-08-01
≪ In the framework of ESA's ARTES-5 program the Institute of Applied Systems Technology (Joanneum Research) in cooperation with the Department of Communications and Wave Propagation has developed a novel meshed satellite communications system which is optimised for Internet traffic and applications (L*IP—Local Network Interconnection via Satellite Systems Using the IP Protocol Suite). Both symmetrical and asymmetrical connections are supported. Bandwidth on demand and guaranteed quality of service are key features of the system. A novel multi-frequency TDMA access scheme utilises efficient methods of IP encapsulation. In contrast to other solutions it avoids legacy transport network techniques. While the DVB-RCS standard is based on ATM or MPEG transport cells, the solution of the L*IP system uses variable-length cells which reduces the overhead significantly. A flexible and programmable platform based on Linux machines was chosen to allow the easy implementation and adaptation to different standards. This offers the possibility to apply the system not only to satellite communications, but provides seamless integration with terrestrial fixed broadcast wireless access systems. The platform is also an ideal test-bed for a variety of interactive broadband communications systems. The paper describes the system architecture and the key features of the system.
Evaluation of TxDOT'S traffic data collection and load forecasting process
DOT National Transportation Integrated Search
2001-01-01
This study had two primary objectives: (1) compare current Texas Department of Transportation (TxDOT) procedures and protocols with the state-of-the-practice and the needs of its data customers; and (2) develop enhanced traffic collection, archival, ...
TEST CELL STUDIES OF RADON ENTRY
The report gives results of a study to contrast the effectiveness of slab-in-stem wall (SSW) with floating slab (FS) construction practices, to measure radon transport and entry for model testing, to develop protocols relevant to depressurized radon measurements, and to determine...
New Protocol for Skin Landmark Registration in Image-Guided Neurosurgery: Technical Note.
Gerard, Ian J; Hall, Jeffery A; Mok, Kelvin; Collins, D Louis
2015-09-01
Newer versions of the commercial Medtronic StealthStation allow the use of only 8 landmark pairs for patient-to-image registration as opposed to 9 landmarks in older systems. The choice of which landmark pair to drop in these newer systems can have an effect on the quality of the patient-to-image registration. To investigate 4 landmark registration protocols based on 8 landmark pairs and compare the resulting registration accuracy with a 9-landmark protocol. Four different protocols were tested on both phantoms and patients. Two of the protocols involved using 4 ear landmarks and 4 facial landmarks and the other 2 involved using 3 ear landmarks and 5 facial landmarks. Both the fiducial registration error and target registration error were evaluated for each of the different protocols to determine any difference between them and the 9-landmark protocol. No difference in fiducial registration error was found between any of the 8-landmark protocols and the 9-landmark protocol. A significant decrease (P < .05) in target registration error was found when using a protocol based on 4 ear landmarks and 4 facial landmarks compared with the other protocols based on 3 ear landmarks. When using 8 landmarks to perform the patient-to-image registration, the protocol using 4 ear landmarks and 4 facial landmarks greatly outperformed the other 8-landmark protocols and 9-landmark protocol, resulting in the lowest target registration error.
NASA Technical Reports Server (NTRS)
Carek, David Andrew
2003-01-01
This presentation covers the design of a command and control architecture developed by the author for the Combustion Module-2 microgravity experiment, which flew aboard the STS-107 Shuttle mission, The design was implemented to satisfy a hybrid network that utilized TCP/IP for both the onboard segment and ground segment, with an intermediary unreliable transport for the space to ground segment. With the infusion of Internet networking technologies into Space Shuttle, Space Station, and spacecraft avionics systems, comes the need for robust methodologies for ground command and control. Considerations of high bit error links, and unreliable transport over intermittent links must be considered in such systems. Internet protocols applied to these systems, coupled with the appropriate application layer protections, can provide adequate communication architectures for command and control. However, there are inherent limitations and additional complexities added by the use of Internet protocols that must be considered during the design. This presentation will discuss the rationale for the: framework and protocol algorithms developed by the author. A summary of design considerations, implantation issues, and learned lessons will be will be presented. A summary of mission results using this communications architecture will be presented. Additionally, areas of further needed investigation will be identified.
A Simple XML Producer-Consumer Protocol
NASA Technical Reports Server (NTRS)
Smith, Warren; Gunter, Dan; Quesnel, Darcy
2000-01-01
This document describes a simple XML-based protocol that can be used for producers of events to communicate with consumers of events. The protocol described here is not meant to be the most efficient protocol, the most logical protocol, or the best protocol in any way. This protocol was defined quickly and it's intent is to give us a reasonable protocol that we can implement relatively easily and then use to gain experience in distributed event services. This experience will help us evaluate proposals for event representations, XML-based encoding of information, and communication protocols. The next section of this document describes how we represent events in this protocol and then defines the two events that we choose to use for our initial experiments. These definitions are made by example so that they are informal and easy to understand. The following section then proceeds to define the producer-consumer protocol we have agreed upon for our initial experiments.
NASA Astrophysics Data System (ADS)
Wang, D.; Jia, W.; Olsen, S. C.; Wuebbles, D. J.; Dubey, M. K.; Rockett, A. A.
2012-08-01
The prospective future adoption of hydrogen to power the road transportation sector could greatly improve tropospheric air quality but also raises the question whether the adoption would have adverse effects on stratospheric ozone. The possibility of these undesirable impacts must be fully evaluated to guide future policy decisions. Here we evaluate the possible impact of a future (2050) H2-based road transportation sector on stratospheric composition and chemistry, especially on stratospheric ozone, with the MOZART chemical transport model. Since future growth is highly uncertain we evaluate the impact for two world evolution scenarios, one based on a high emitting scenario (IPCC A1FI) and the other on a low emitting scenario (IPCC B1), as well as two technological options: H2 fuel cells and H2 internal combustion engines. We assume a H2 leakage rate of 2.5% and a complete market penetration of H2 vehicles in 2050. The model simulations show that a H2-based road transportation sector would reduce stratospheric ozone concentrations as a result of perturbed catalytic ozone destruction cycles. The magnitude of the impact depends on which growth scenario the world evolves and which H2 technology option is applied. For the same world evolution scenario, stratospheric ozone decreases more in the H2 fuel cell scenarios than in the H2 internal combustion engine scenarios because of the NOx emissions in the latter case. If the same technological option is applied, the impact is larger in the A1FI emission scenario. The largest impact, a 0.54% decrease in annual average global mean stratospheric column ozone, is found with a H2 fuel cell type road transportation sector in the A1FI scenario; whereas the smallest impact, a 0.04% increase in stratospheric ozone, is found with applications of H2 internal combustion engine vehicles in the B1 scenario. The impacts of the other two scenarios fall between the above two bounding scenarios. However, the magnitude of these changes is much smaller than the increases in 2050 stratospheric ozone expected as stratospheric ozone recovers due to the limits in ozone depleting substance emissions imposed in the Montreal Protocol.
Quantum Private Query Based on Bell State and Single Photons
NASA Astrophysics Data System (ADS)
Gao, Xiang; Chang, Yan; Zhang, Shi-Bin; Yang, Fan; Zhang, Yan
2018-03-01
Quantum private query (QPQ) can protect both user's and database holder's privacy. In this paper, we propose a novel quantum private query protocol based on Bell state and single photons. As far as we know, no one has ever proposed the QPQ based on Bell state. By using the decoherence-free (DF) states, our protocol can resist the collective noise. Besides that, our protocol is a one-way quantum protocol, which can resist the Trojan horse attack and reduce the communication complexity. Our protocol can not only guarantee the participants' privacy but also stand against an external eavesdropper.
Benson, Charles T.; Critser, John K.
2014-01-01
Optimization of cryopreservation protocols for cells and tissues requires accurate models of heat and mass transport. Model selection often depends on the configuration of the tissue. Here, a mathematical and conceptual model of water and solute transport for whole hamster pancreatic islets has been developed and experimentally validated incorporating fundamental biophysical data from previous studies on individual hamster islet cells while retaining whole-islet structural information. It describes coupled transport of water and solutes through the islet by three methods: intracellularly, intercellularly, and in combination. In particular we use domain decomposition techniques to couple a transmembrane flux model with an interstitial mass transfer model. The only significant undetermined variable is the cellular surface area which is in contact with the intercellularly transported solutes, Ais. The model was validated and Ais determined using a 3 × 3 factorial experimental design blocked for experimental day. Whole islet physical experiments were compared with model predictions at three temperatures, three perfusing solutions, and three islet size groups. A mean of 4.4 islets were compared at each of the 27 experimental conditions and found to correlate with a coefficient of determination of 0.87 ± 0.06 (mean ± S.D.). Only the treatment variable of perfusing solution was found to be significant (p < 0.05). We have devised a model that retains much of the intrinsic geometric configuration of the system, and thus fewer laboratory experiments are needed to determine model parameters and thus to develop new optimized cryopreservation protocols. Additionally, extensions to ovarian follicles and other concentric tissue structures may be made. PMID:24950195
A protocol for conducting rainfall simulation to study soil runoff.
Kibet, Leonard C; Saporito, Louis S; Allen, Arthur L; May, Eric B; Kleinman, Peter J A; Hashem, Fawzy M; Bryant, Ray B
2014-04-03
Rainfall is a driving force for the transport of environmental contaminants from agricultural soils to surficial water bodies via surface runoff. The objective of this study was to characterize the effects of antecedent soil moisture content on the fate and transport of surface applied commercial urea, a common form of nitrogen (N) fertilizer, following a rainfall event that occurs within 24 hr after fertilizer application. Although urea is assumed to be readily hydrolyzed to ammonium and therefore not often available for transport, recent studies suggest that urea can be transported from agricultural soils to coastal waters where it is implicated in harmful algal blooms. A rainfall simulator was used to apply a consistent rate of uniform rainfall across packed soil boxes that had been prewetted to different soil moisture contents. By controlling rainfall and soil physical characteristics, the effects of antecedent soil moisture on urea loss were isolated. Wetter soils exhibited shorter time from rainfall initiation to runoff initiation, greater total volume of runoff, higher urea concentrations in runoff, and greater mass loadings of urea in runoff. These results also demonstrate the importance of controlling for antecedent soil moisture content in studies designed to isolate other variables, such as soil physical or chemical characteristics, slope, soil cover, management, or rainfall characteristics. Because rainfall simulators are designed to deliver raindrops of similar size and velocity as natural rainfall, studies conducted under a standardized protocol can yield valuable data that, in turn, can be used to develop models for predicting the fate and transport of pollutants in runoff.
A Protocol for Conducting Rainfall Simulation to Study Soil Runoff
Kibet, Leonard C.; Saporito, Louis S.; Allen, Arthur L.; May, Eric B.; Kleinman, Peter J. A.; Hashem, Fawzy M.; Bryant, Ray B.
2014-01-01
Rainfall is a driving force for the transport of environmental contaminants from agricultural soils to surficial water bodies via surface runoff. The objective of this study was to characterize the effects of antecedent soil moisture content on the fate and transport of surface applied commercial urea, a common form of nitrogen (N) fertilizer, following a rainfall event that occurs within 24 hr after fertilizer application. Although urea is assumed to be readily hydrolyzed to ammonium and therefore not often available for transport, recent studies suggest that urea can be transported from agricultural soils to coastal waters where it is implicated in harmful algal blooms. A rainfall simulator was used to apply a consistent rate of uniform rainfall across packed soil boxes that had been prewetted to different soil moisture contents. By controlling rainfall and soil physical characteristics, the effects of antecedent soil moisture on urea loss were isolated. Wetter soils exhibited shorter time from rainfall initiation to runoff initiation, greater total volume of runoff, higher urea concentrations in runoff, and greater mass loadings of urea in runoff. These results also demonstrate the importance of controlling for antecedent soil moisture content in studies designed to isolate other variables, such as soil physical or chemical characteristics, slope, soil cover, management, or rainfall characteristics. Because rainfall simulators are designed to deliver raindrops of similar size and velocity as natural rainfall, studies conducted under a standardized protocol can yield valuable data that, in turn, can be used to develop models for predicting the fate and transport of pollutants in runoff. PMID:24748061
NASA Technical Reports Server (NTRS)
Wagner, Raymond S.; Barton, Richard J.
2011-01-01
Wireless Sensor Networks (WSNs) can provide a substantial benefit in spacecraft systems, reducing launch weight and providing unprecedented flexibility by allowing instrumentation capabilities to grow and change over time. Achieving data transport reliability on par with that of wired systems, however, can prove extremely challenging in practice. Fortunately, much progress has been made in developing standard WSN radio protocols for applications from non-critical home automation to mission-critical industrial process control. The relative performances of candidate protocols must be compared in representative aerospace environments, however, to determine their suitability for spaceflight applications. In this paper, we will present the results of a rigorous laboratory analysis of the performance of two standards-based, low power, low data rate WSN protocols: ZigBee Pro and ISA100.11a. Both are based on IEEE 802.15.4 and augment that standard's specifications to build complete, multi-hop networking stacks. ZigBee Pro targets primarily the home and office automation markets, providing an ad-hoc protocol that is computationally lightweight and easy to implement in inexpensive system-on-a-chip components. As a result of this simplicity, however, ZigBee Pro can be susceptible to radio frequency (RF) interference. ISA100.11a, on the other hand, targets the industrial process control market, providing a robust, centrally-managed protocol capable of tolerating a significant amount of RF interference. To achieve these gains, a coordinated channel hopping mechanism is employed, which entails a greater computational complexity than ZigBee and requires more sophisticated and costly hardware. To guide future aerospace deployments, we must understand how well these standards relatively perform in analog environments under expected operating conditions. Specifically, we are interested in evaluating goodput -- application level throughput -- in a representative crewed environment in the presence of varying levels of 802.11g Wi-Fi traffic. To do so, we use the NASA Johnson Space Center Wireless Habitat Testbed (WHT), a metallic, habitation-sized module designed for co-existence testing of wireless systems. In its quiescent state, the sealed WHT provides an RF-quiet environment to which we can selectively add interfering systems; it also provides a realistic level of multi-path self-interference for systems under investigation. In our test, we deploy two representative five node networks, configured in a star topology with all nodes reporting directly to a WSN gateway. Each ZigBee network WSN node is built using a Texas Instruments (TI) CC2530 system-on-a-chip radio running TI's ZigBee Pro Z-stack. Each ISA100.11a network node is built using a Nivis VersaNode 210 system-on-a-chip radio. In both cases, radios interface with TI MSP430-F5438 microcontroller implementing a common test application. Interference is provided by a D-link 802.11g Wi-Fi router transporting traffic generated using the Iperf network testing tool. For the single-channel ZigBee network, effects of both direct and indirect Wi-Fi interference are evaluated. For the channel-hopping ISA100.11a network, effects of interference from multiple Wi-Fi routers configured in non-overlapping 802.11g channels are evaluated. Our results show that, in general, the more lightweight ZigBee network performs well at low interference levels, but performance degrades as interference increases. Conversely, the more complex and costly ISA100.11a network continues to perform well as Wi-Fi interference levels increase.
Protocol for fermionic positive-operator-valued measures
NASA Astrophysics Data System (ADS)
Arvidsson-Shukur, D. R. M.; Lepage, H. V.; Owen, E. T.; Ferrus, T.; Barnes, C. H. W.
2017-11-01
In this paper we present a protocol for the implementation of a positive-operator-valued measure (POVM) on massive fermionic qubits. We present methods for implementing nondispersive qubit transport, spin rotations, and spin polarizing beam-splitter operations. Our scheme attains linear opticslike control of the spatial extent of the qubits by considering ground-state electrons trapped in the minima of surface acoustic waves in semiconductor heterostructures. Furthermore, we numerically simulate a high-fidelity POVM that carries out Procrustean entanglement distillation in the framework of our scheme, using experimentally realistic potentials. Our protocol can be applied not only to pure ensembles with particle pairs of known identical entanglement, but also to realistic ensembles of particle pairs with a distribution of entanglement entropies. This paper provides an experimentally realizable design for future quantum technologies.
Efficient protocols for Stirling heat engines at the micro-scale
NASA Astrophysics Data System (ADS)
Muratore-Ginanneschi, Paolo; Schwieger, Kay
2015-10-01
We investigate the thermodynamic efficiency of sub-micro-scale Stirling heat engines operating under the conditions described by overdamped stochastic thermodynamics. We show how to construct optimal protocols such that at maximum power the efficiency attains for constant isotropic mobility the universal law η=2 ηC/(4-ηC) , where ηC is the efficiency of an ideal Carnot cycle. We show that these protocols are specified by the solution of an optimal mass transport problem. Such solution can be determined explicitly using well-known Monge-Ampère-Kantorovich reconstruction algorithms. Furthermore, we show that the same law describes the efficiency of heat engines operating at maximum work over short time periods. Finally, we illustrate the straightforward extension of these results to cases when the mobility is anisotropic and temperature dependent.
Assays of mitochondrial Ca2+ transport and Ca2+ efflux via the MPTP.
Ben-Hail, Danya; Shoshan-Barmatz, Varda
2014-02-01
Studying Ca(2+) transport in mitochondria in connection with energy production, as well as cell death, is of great importance. Ca(2+) activates several key enzymes in the mitochondrial matrix to enhance ATP production. This provides an important mechanism for synchronizing energy production with the energy demands of Ca(2+)-activated processes, such as contraction, allowing important feedback effects to help shape cytosolic Ca(2+) signals. A rise in mitochondrial Ca(2+) can convey both apoptotic and necrotic death signals by inducing opening of the mitochondrial permeability transition pore (MPTP). Here, we present a protocol for measuring Ca(2+) transport and release in isolated mitochondria.
Mohr, Nicholas M; Pelaez Gil, Carlos A; Harland, Karisa K; Faine, Brett; Stoltze, Andrew; Pearson, Kent; Ahmed, Azeemuddin
2015-08-01
The purpose of the study was to test the hypothesis that prehospital oral chlorhexidine administered to intubated trauma patients will decrease the Clinical Pulmonary Infection Score (CPIS) during the first 2 days of hospitalization. Prospective interventional concurrent-control study of all intubated adult trauma patients transported by air ambulance to a 711-bed Midwestern academic trauma center over a 1-year period. Patients transported by 2 university-based helicopters were treated with oral chlorhexidine after intubation, and the control group was patients transported by other air transport services. Sixty-seven patients were enrolled, of which 23 received chlorhexidine (9 patients allocated to the intervention were not treated). The change in CPIS score was no different between the intervention and control groups by intention to treat (1.06- vs 1.40-point reduction, P = .520), and no difference was observed in tracheal colonization (29.0% vs 36.7%, P = .586). No differences were observed in the rate of clinical pneumonia (8.7% vs 8.6%, P = .987) or mortality (P = .196) in the per-protocol chlorhexidine group. The prehospital administration of oral chlorhexidine does not reduce the CPIS score over the first 48 hours of admission for intubated trauma patients. Further study should explore other prehospital strategies of reducing complications of critical illness. Copyright © 2015 Elsevier Inc. All rights reserved.
Zepeda, Angélica; Arias, Clorinda; Flores-Jasso, Fabian; Vaca, Luis
2013-01-01
RNAs are present within eukaryotic cells and are involved in several biological processes. RNA transport within cell compartments is important for proper cell function. To understand in depth the cellular processes in which RNA is involved requires a method that reveals RNA localization in real time in a sub-cellular context in living cells. In this protocol we describe a method for imaging RNA in living cells and in particular in neuronal cultures based on cell microinjection of molecular beacons in conjunction with confocal microscopy. This methodology overcomes some of the main obstacles for imaging RNA in live cells since microinjection allows the delivery of the probe to a desired cellular compartment and MBs bind with high specificity to its target RNA without inhibiting its function. The proper design of the MBs is essential to obtain RNA-MB association at the temperature of the cell cytosol. MBs design with other purposes in mind (such as PCR experiments) have a design that facilitates association to its target at high temperatures, rendering them unsuitable for live cell imaging. Using the methodology described in this chapter allows the study of RNA transport to different regions of neurons and may be combined with the tagging of proteins of interest to measure co-transport of the protein and the RNA to different cellular regions. Copyright © 2013 Elsevier Inc. All rights reserved.
Enquiry into the Topology of Plasma Membrane-Localized PIN Auxin Transport Components.
Nodzyński, Tomasz; Vanneste, Steffen; Zwiewka, Marta; Pernisová, Markéta; Hejátko, Jan; Friml, Jiří
2016-11-07
Auxin directs plant ontogenesis via differential accumulation within tissues depending largely on the activity of PIN proteins that mediate auxin efflux from cells and its directional cell-to-cell transport. Regardless of the developmental importance of PINs, the structure of these transporters is poorly characterized. Here, we present experimental data concerning protein topology of plasma membrane-localized PINs. Utilizing approaches based on pH-dependent quenching of fluorescent reporters combined with immunolocalization techniques, we mapped the membrane topology of PINs and further cross-validated our results using available topology modeling software. We delineated the topology of PIN1 with two transmembrane (TM) bundles of five α-helices linked by a large intracellular loop and a C-terminus positioned outside the cytoplasm. Using constraints derived from our experimental data, we also provide an updated position of helical regions generating a verisimilitude model of PIN1. Since the canonical long PINs show a high degree of conservation in TM domains and auxin transport capacity has been demonstrated for Arabidopsis representatives of this group, this empirically enhanced topological model of PIN1 will be an important starting point for further studies on PIN structure-function relationships. In addition, we have established protocols that can be used to probe the topology of other plasma membrane proteins in plants. Copyright © 2016 The Authors. Published by Elsevier Inc. All rights reserved.
Saksvig, Brit Irene; Brachman, Micah L.; Durand, Casey P.
2018-01-01
Approximately two-thirds of adults and youth in Prince George’s County, Maryland, a suburb of Washington, D.C. are overweight or obese and less than half are achieving daily physical activity recommendations. Active transportation (AT), such as walking, biking or using public transportation (PT), is a strategic pathway to improving physical activity levels and thus reducing excess weight. Utilizing an expansion of the Washington, D.C. area transportation system with a new light rail line, the Purple Line Outcomes on Transportation (PLOT) Study will exam pre- and post-Purple Line PT use, AT behaviors and attitudes and physical activity among Prince George’s County adults and youth. The PLOT Study will take advantage of this natural experiment in an area enduring significant racial/ethnic and gender-based overweight or obesity and physical inactivity disparities. While similar natural experiments on AT have been conducted in other U.S. cities, those studies lacked diverse and representative samples. To effectively evaluate these physical activity outcomes among this population, efforts will be used to recruit African American and Latino populations, the first and second most common racial/ethnic groups in Prince George’s County. Finally, the PLOT Study will also examine how contextual effects (e.g., neighborhood built environment) impact PT, AT and physical activity.
NASA Astrophysics Data System (ADS)
Brunner, Dominik; Henne, Stephan; Keller, Christoph A.; Reimann, Stefan; Vollmer, Martin K.; O'Doherty, Simon
2010-05-01
Halogenated hydrocarbons in the atmosphere are mostly synthetic products of the chemical industry designed for a wide range of applications. The first generation of compounds, the bromine- and chlorine-containing halons and chlorofluorocarbons (CFCs), were shown to be harmful to the stratospheric ozone layer. This motivated the international community to initiate the Montreal Protocol in 1987 to phase out their production globally. In the industrialized countries CFCs were consequently replaced by the shorter-lived hydrochlorofluorocarbons (HCFCs) during the 1990s and thereafter by the completely chlorine-free HFCs. Although not harmful to the ozone layer anymore, some of the HFCs are potent greenhouse gases and are therefore regulated under the Kyoto Protocol. The high-alpine station Jungfraujoch and the coastal station Mace Head are two of only four sites of the European SOGE network (System for Observation of Halogenated Greenhouse Gases in Europe) with high-frequency measurements of halogenated compounds. Based on observations at these two sites, we here present a combined measurement - model analysis of the distribution of European emissions for a selection of compounds, and trace their evolution with time since measurements started in 2000. For the spatial allocation of sources, the measurements were combined with detailed transport simulations. For a qualitative allocation of sources in Europe we employed the trajectory statistics method of Seibert et al. (1994) and Stohl (1996). For Mace Head trajectories were computed with the FLEXPART model driven by ECMWF analyzed winds at 1°x1° resolution. For the station Jungfraujoch, however, we used the model COSMO-TRAJ driven by high-resolution wind fields (7 km x 7 km) of the weather forecast model COSMO of MeteoSwiss in order to better represent the transport in complex topography over the Alps. The method allows identifying the major source regions of the different compounds in Western and Central Europe. The pesticide methyl bromide (CH3Br), for example, was applied primarily in southern Europe to protect vegetable and strawberry plantations. Its production was banned by the Montreal Protocol which is reflected by a strong reduction in emissions between 2003 and 2008 as seen from Jungfraujoch. A contrasting example is the cooling agent HFC-125 belonging to the second generation of replacement compounds not regulated under the Montreal Protocol. During the same period, HFC-125 exhibited a marked increase with sources more homogeneously spread over Europe than those of CH3Br. For a more quantitative analysis for the years 2007-2009, we applied the Lagrangian Particle Dispersion Model FLEXPART using meteorological input data of the IFS model of ECMWF at 0.2° x 0.2° resolution, together with a new source inversion method based on sequential Kalman filtering. Different from other approaches the method is essentially independent of an a-priori and adjusts both the emission field and the trace gas background levels in an iterative fashion. In this study, we will contrast results of the trajectory statistics method with the more advanced source inversion, address uncertainties in the methods, and show the evolution of European emissions of a selection of compounds in comparison to official numbers reported by the individual countries to the Montreal and Kyoto protocols, respectively.
A Public-Key Based Authentication and Key Establishment Protocol Coupled with a Client Puzzle.
ERIC Educational Resources Information Center
Lee, M. C.; Fung, Chun-Kan
2003-01-01
Discusses network denial-of-service attacks which have become a security threat to the Internet community and suggests the need for reliable authentication protocols in client-server applications. Presents a public-key based authentication and key establishment protocol coupled with a client puzzle protocol and validates it through formal logic…
Review of the transportation planning process in the Denver metropolitan area
DOT National Transportation Integrated Search
2012-11-01
Harmonization Task Groups 1 and 3 (HTG1 and 3) were established by the EU-US International Standards Harmonization Working Group to attempt to harmonize standards (including ISO, CEN, ETSI, IEEE) on security (HTG1) and communications protocols (HTG3)...
Technical noise supplement : TeNS : a technical supplement to the Traffic Noise Analysis Protocol.
DOT National Transportation Integrated Search
1998-10-01
The purpose of this Technical Noise Supplement (TeNS) is to provide technical background : information on transportation-related noise in general and highway traffic noise in : particular. It is designed to elaborate on technical concepts and procedu...
Review of the transportation planning process in the Pittsburgh metropolitan area
DOT National Transportation Integrated Search
2012-11-12
Harmonization Task Groups 1 and 3 (HTG1 and 3) were established by the EU-US International Standards Harmonization Working Group to attempt to harmonize standards (including ISO, CEN, ETSI, IEEE) on security (HTG1) and communications protocols (HTG3)...
Bulk data transfer distributer: a high performance multicast model in ALMA ACS
NASA Astrophysics Data System (ADS)
Cirami, R.; Di Marcantonio, P.; Chiozzi, G.; Jeram, B.
2006-06-01
A high performance multicast model for the bulk data transfer mechanism in the ALMA (Atacama Large Millimeter Array) Common Software (ACS) is presented. The ALMA astronomical interferometer will consist of at least 50 12-m antennas operating at millimeter wavelength. The whole software infrastructure for ALMA is based on ACS, which is a set of application frameworks built on top of CORBA. To cope with the very strong requirements for the amount of data that needs to be transported by the software communication channels of the ALMA subsystems (a typical output data rate expected from the Correlator is of the order of 64 MB per second) and with the potential CORBA bottleneck due to parameter marshalling/de-marshalling, usage of IIOP protocol, etc., a transfer mechanism based on the ACE/TAO CORBA Audio/Video (A/V) Streaming Service has been developed. The ACS Bulk Data Transfer architecture bypasses the CORBA protocol with an out-of-bound connection for the data streams (transmitting data directly in TCP or UDP format), using at the same time CORBA for handshaking and leveraging the benefits of ACS middleware. Such a mechanism has proven to be capable of high performances, of the order of 800 Mbits per second on a 1Gbit Ethernet network. Besides a point-to-point communication model, the ACS Bulk Data Transfer provides a multicast model. Since the TCP protocol does not support multicasting and all the data must be correctly delivered to all ALMA subsystems, a distributer mechanism has been developed. This paper focuses on the ACS Bulk Data Distributer, which mimics a multicast behaviour managing data dispatching to all receivers willing to get data from the same sender.
Duchez, Pascale; Chevaleyre, Jean; Brunet de la Grange, Philippe; Vlaski, Marija; Boiron, Jean-Michel; Wouters, Guy; Ivanovic, Zoran
2013-09-01
Our ex vivo expansion procedure starting from cord blood (CB) CD34+ cells enabled expansion of committed progenitors (CPs) without a negative impact on hematopoietic stem cells (HSCs) exhibiting both short- and long-term repopulating capacity. Upgraded to clinical scale (Macopharma HP01 in the presence of stem cell factor, FLT3-L [100 ng/mL each], granulocyte-colony-stimulating factor [10 ng/mL], and thrombopoietin [20 ng/mL]), it is being used for an ongoing clinical trial (adult allogeneic context) yielding promising preliminary results. Transplantation of ex vivo expanded CB cells is becoming a reality, while the issue of expanded cells' cryopreservation emerges as an option that allows the conservation of the product for transportation and future use. Here, we investigated whether it is possible to maintain the functional HSC and CP properties after freezing and thawing of expanded cells. We compared cryopreservation efficiency of the ex vivo expanded CB cells using the standard protocol (freezing solution human serum albumin (HSA)-dimethyl sulfoxide [DMSO]) with the newly designed protocol based on an enriched freezing solution (HP01-DMSO) with respect to the viability index, number of CD34+ and total cells, and recovery of CPs (colony-forming units) and HSCs (NOG/Scid/gamma-null mice engraftment). Cryopreservation and thawing of expanded CB cells using the "standard" procedure (HSA-DMSO) reduced recovery of the CPs (40%) and HSCs (drastically decreasing engraftment capacity). HP01-based protocol resulted in improvement of preservation of both CPs (>60%) and HSCs (nonaltered engraftment capacities). Functional maintenance of the expanded graft by cryopreservation is feasible in conditions compatible with human cell therapy requirements. © 2012 American Association of Blood Banks.
Developing an evidence-based practice protocol: implications for midwifery practice.
Carr, K C
2000-01-01
Evidence-based practice is defined and its importance to midwifery practice is presented. Guidelines are provided for the development of an evidence-based practice protocol. These include: identifying the clinical question, obtaining the evidence, evaluating the validity and importance of the evidence, synthesizing the evidence and applying it to the development of a protocol or clinical algorithm, and, finally, developing an evaluation plan or measurement strategy to see if the new protocol is effective.
NASA Astrophysics Data System (ADS)
Jiang, Dong-Huan; Xu, Guang-Bao
2018-07-01
Based on locally indistinguishable orthogonal product states, we propose a novel multiparty quantum key agreement (QKA) protocol. In this protocol, the private key information of each party is encoded as some orthogonal product states that cannot be perfectly distinguished by local operations and classical communications. To ensure the security of the protocol with small amount of decoy particles, the different particles of each product state are transmitted separately. This protocol not only can make each participant fairly negotiate a shared key, but also can avoid information leakage in the maximum extent. We give a detailed security proof of this protocol. From comparison result with the existing QKA protocols, we can know that the new protocol is more efficient.
Odaka, Mizuho; Minakata, Kenji; Toyokuni, Hideaki; Yamazaki, Kazuhiro; Yonezawa, Atsushi; Sakata, Ryuzo; Matsubara, Kazuo
2015-08-01
This study aimed to develop and assess the effectiveness of a protocol for antibiotic prophylaxis based on preoperative kidney function in patients undergoing open heart surgery. We established a protocol for antibiotic prophylaxis based on preoperative kidney function in patients undergoing open heart surgery. This novel protocol was assessed by comparing patients undergoing open heart surgery before (control group; n = 30) and after its implementation (protocol group; n = 31) at Kyoto University Hospital between July 2012 and January 2013. Surgical site infections (SSIs) were observed in 4 control group patients (13.3 %), whereas no SSIs were observed in the protocol group patients (P < 0.05). The total duration of antibiotic use decreased significantly from 80.7 ± 17.6 h (mean ± SD) in the control group to 55.5 ± 14.9 h in the protocol group (P < 0.05). Similarly, introduction of the protocol significantly decreased the total antibiotic dose used in the perioperative period (P < 0.05). Furthermore, antibiotic regimens were changed under suspicion of infection in 5 of 30 control group patients, whereas none of the protocol group patients required this additional change in the antibiotic regimen (P < 0.05). Our novel antibiotic prophylaxis protocol based on preoperative kidney function effectively prevents SSIs in patients undergoing open heart surgery.
Asynchronous Message Service Reference Implementation
NASA Technical Reports Server (NTRS)
Burleigh, Scott C.
2011-01-01
This software provides a library of middleware functions with a simple application programming interface, enabling implementation of distributed applications in conformance with the CCSDS AMS (Consultative Committee for Space Data Systems Asynchronous Message Service) specification. The AMS service, and its protocols, implement an architectural concept under which the modules of mission systems may be designed as if they were to operate in isolation, each one producing and consuming mission information without explicit awareness of which other modules are currently operating. Communication relationships among such modules are self-configuring; this tends to minimize complexity in the development and operations of modular data systems. A system built on this model is a society of generally autonomous, inter-operating modules that may fluctuate freely over time in response to changing mission objectives, modules functional upgrades, and recovery from individual module failure. The purpose of AMS, then, is to reduce mission cost and risk by providing standard, reusable infrastructure for the exchange of information among data system modules in a manner that is simple to use, highly automated, flexible, robust, scalable, and efficient. The implementation is designed to spawn multiple threads of AMS functionality under the control of an AMS application program. These threads enable all members of an AMS-based, distributed application to discover one another in real time, subscribe to messages on specific topics, and to publish messages on specific topics. The query/reply (client/server) communication model is also supported. Message exchange is optionally subject to encryption (to support confidentiality) and authorization. Fault tolerance measures in the discovery protocol minimize the likelihood of overall application failure due to any single operational error anywhere in the system. The multi-threaded design simplifies processing while enabling application nodes to operate at high speeds; linked lists protected by mutex semaphores and condition variables are used for efficient, inter-thread communication. Applications may use a variety of transport protocols underlying AMS itself, including TCP (Transmission Control Protocol), UDP (User Datagram Protocol), and message queues.
Quantifying the ozone and ultraviolet benefits already achieved by the Montreal Protocol
Chipperfield, M. P.; Dhomse, S. S.; Feng, W.; McKenzie, R. L.; Velders, G.J.M.; Pyle, J. A.
2015-01-01
Chlorine- and bromine-containing ozone-depleting substances (ODSs) are controlled by the 1987 Montreal Protocol. In consequence, atmospheric equivalent chlorine peaked in 1993 and has been declining slowly since then. Consistent with this, models project a gradual increase in stratospheric ozone with the Antarctic ozone hole expected to disappear by ∼2050. However, we show that by 2013 the Montreal Protocol had already achieved significant benefits for the ozone layer. Using a 3D atmospheric chemistry transport model, we demonstrate that much larger ozone depletion than observed has been avoided by the protocol, with beneficial impacts on surface ultraviolet. A deep Arctic ozone hole, with column values <120 DU, would have occurred given meteorological conditions in 2011. The Antarctic ozone hole would have grown in size by 40% by 2013, with enhanced loss at subpolar latitudes. The decline over northern hemisphere middle latitudes would have continued, more than doubling to ∼15% by 2013. PMID:26011106
Multiple protocol fluorometer and method
Kolber, Zbigniew S.; Falkowski, Paul G.
2000-09-19
A multiple protocol fluorometer measures photosynthetic parameters of phytoplankton and higher plants using actively stimulated fluorescence protocols. The measured parameters include spectrally-resolved functional and optical absorption cross sections of PSII, extent of energy transfer between reaction centers of PSII, F.sub.0 (minimal), F.sub.m (maximal) and F.sub.v (variable) components of PSII fluorescence, photochemical and non-photochemical quenching, size of the plastoquinone (PQ) pool, and the kinetics of electron transport between Q.sub.a and PQ pool and between PQ pool and PSI. The multiple protocol fluorometer, in one embodiment, is equipped with an excitation source having a controlled spectral output range between 420 nm and 555 nm and capable of generating flashlets having a duration of 0.125-32 .mu.s, an interval between 0.5 .mu.s and 2 seconds, and peak optical power of up to 2 W/cm.sup.2. The excitation source is also capable of generating, simultaneous with the flashlets, a controlled continuous, background illumination.
Qiu, Shuming; Xu, Guoai; Ahmad, Haseeb; Guo, Yanhui
2018-01-01
The Session Initiation Protocol (SIP) is an extensive and esteemed communication protocol employed to regulate signaling as well as for controlling multimedia communication sessions. Recently, Kumari et al. proposed an improved smart card based authentication scheme for SIP based on Farash's scheme. Farash claimed that his protocol is resistant against various known attacks. But, we observe some accountable flaws in Farash's protocol. We point out that Farash's protocol is prone to key-compromise impersonation attack and is unable to provide pre-verification in the smart card, efficient password change and perfect forward secrecy. To overcome these limitations, in this paper we present an enhanced authentication mechanism based on Kumari et al.'s scheme. We prove that the proposed protocol not only overcomes the issues in Farash's scheme, but it can also resist against all known attacks. We also provide the security analysis of the proposed scheme with the help of widespread AVISPA (Automated Validation of Internet Security Protocols and Applications) software. At last, comparing with the earlier proposals in terms of security and efficiency, we conclude that the proposed protocol is efficient and more secure.
Multiparty Quantum Key Agreement Based on Quantum Search Algorithm
Cao, Hao; Ma, Wenping
2017-01-01
Quantum key agreement is an important topic that the shared key must be negotiated equally by all participants, and any nontrivial subset of participants cannot fully determine the shared key. To date, the embed modes of subkey in all the previously proposed quantum key agreement protocols are based on either BB84 or entangled states. The research of the quantum key agreement protocol based on quantum search algorithms is still blank. In this paper, on the basis of investigating the properties of quantum search algorithms, we propose the first quantum key agreement protocol whose embed mode of subkey is based on a quantum search algorithm known as Grover’s algorithm. A novel example of protocols with 5 – party is presented. The efficiency analysis shows that our protocol is prior to existing MQKA protocols. Furthermore it is secure against both external attack and internal attacks. PMID:28332610
Study on Cloud Security Based on Trust Spanning Tree Protocol
NASA Astrophysics Data System (ADS)
Lai, Yingxu; Liu, Zenghui; Pan, Qiuyue; Liu, Jing
2015-09-01
Attacks executed on Spanning Tree Protocol (STP) expose the weakness of link layer protocols and put the higher layers in jeopardy. Although the problems have been studied for many years and various solutions have been proposed, many security issues remain. To enhance the security and credibility of layer-2 network, we propose a trust-based spanning tree protocol aiming at achieving a higher credibility of LAN switch with a simple and lightweight authentication mechanism. If correctly implemented in each trusted switch, the authentication of trust-based STP can guarantee the credibility of topology information that is announced to other switch in the LAN. To verify the enforcement of the trusted protocol, we present a new trust evaluation method of the STP using a specification-based state model. We implement a prototype of trust-based STP to investigate its practicality. Experiment shows that the trusted protocol can achieve security goals and effectively avoid STP attacks with a lower computation overhead and good convergence performance.
A simple method for imaging axonal transport in aging neurons using the adult Drosophila wing.
Vagnoni, Alessio; Bullock, Simon L
2016-09-01
There is growing interest in the link between axonal cargo transport and age-associated neuronal dysfunction. The study of axonal transport in neurons of adult animals requires intravital or ex vivo imaging approaches, which are laborious and expensive in vertebrate models. We describe simple, noninvasive procedures for imaging cargo motility within axons using sensory neurons of the translucent Drosophila wing. A key aspect is a method for mounting the intact fly that allows detailed imaging of transport in wing neurons. Coupled with existing genetic tools in Drosophila, this is a tractable system for studying axonal transport over the life span of an animal and thus for characterization of the relationship between cargo dynamics, neuronal aging and disease. Preparation of a sample for imaging takes ∼5 min, with transport typically filmed for 2-3 min per wing. We also document procedures for the quantification of transport parameters from the acquired images and describe how the protocol can be adapted to study other cell biological processes in aging neurons.
Education of pediatric subspecialty fellows in transport medicine: a national survey.
Mickells, Geoffrey E; Goodman, Denise M; Rozenfeld, Ranna A
2017-01-13
The transport of critically ill patients to children's hospitals is essential to current practice. The AAP Section on Transport Medicine has raised concerns about future leadership in the field as trainees receive less exposure to transport medicine. This study identifies the priorities of pediatric subspecialty fellows, fellowship directors and nursing directors in transport medicine education. Internet based surveys were distributed to fellows, fellowship directors and nursing directors of transport teams affiliated with ACGME-approved fellowships in Neonatal-Perinatal Medicine (NPM), Pediatric Critical Care Medicine (PCCM), and Pediatric Emergency Medicine (PEM). Data collection occurred November 2013 to March 2014. Four hundred and sixty-six responses were collected (357 fellows, 82 directors, 27 nursing directors): Six curricular elements were ranked by respondents: Transport Physiology (TP), Medical Control (MC), Vehicle Safety (VS), Medicolegal Issues (ML), Medical Protocols (MP) and State and Federal Regulations (SFR). Fellows and fellowship directors were not significantly different: TP (p = 0.63), VS (p = 0.45), SFR (p = 0.58), ML (p = 0.07), MP (p = 0.98), and MC (p = 0.36). Comparison of subspecialties found significant differences: PEM considered TP less important than NPM and PCCM (p < 0.001, p < 0.001), VS less important than NPM (p = 0.001). PEM viewed SFR and MC more important than PCCM (p = 0.006, p = 0.002); ML more important than PCCM and NPM (p = 0.001, p < 0.001). PCCM ranked MC more important than NPM (p = 0.004). Nursing directors considered TP less important than NPM and PCCM (p < 0.001, p = 0.002). When ranking curricular elements in transport medicine, fellows and fellowship directors do not differ, but comparison of subspecialties notes significant differences. A fellow curriculum in transport medicine will utilize these results.
MDP: Reliable File Transfer for Space Missions
NASA Technical Reports Server (NTRS)
Rash, James; Criscuolo, Ed; Hogie, Keith; Parise, Ron; Hennessy, Joseph F. (Technical Monitor)
2002-01-01
This paper presents work being done at NASA/GSFC by the Operating Missions as Nodes on the Internet (OMNI) project to demonstrate the application of the Multicast Dissemination Protocol (MDP) to space missions to reliably transfer files. This work builds on previous work by the OMNI project to apply Internet communication technologies to space communication. The goal of this effort is to provide an inexpensive, reliable, standard, and interoperable mechanism for transferring files in the space communication environment. Limited bandwidth, noise, delay, intermittent connectivity, link asymmetry, and one-way links are all possible issues for space missions. Although these are link-layer issues, they can have a profound effect on the performance of transport and application level protocols. MDP, a UDP-based reliable file transfer protocol, was designed for multicast environments which have to address these same issues, and it has done so successfully. Developed by the Naval Research Lab in the mid 1990's, MDP is now in daily use by both the US Post Office and the DoD. This paper describes the use of MDP to provide automated end-to-end data flow for space missions. It examines the results of a parametric study of MDP in a simulated space link environment and discusses the results in terms of their implications for space missions. Lessons learned are addressed, which suggest minor enhancements to the MDP user interface to add specific features for space mission requirements, such as dynamic control of data rate, and a checkpoint/resume capability. These are features that are provided for in the protocol, but are not implemented in the sample MDP application that was provided. A brief look is also taken at the status of standardization. A version of MDP known as NORM (Neck Oriented Reliable Multicast) is in the process of becoming an IETF standard.
Fisher, Paige H; Masia-Warner, Carrie; Klein, Rachel G
2004-12-01
This paper describes Skills for Academic and Social Success (SASS), a cognitive-behavioral, school-based intervention for adolescents with social anxiety disorder. Clinic-based treatment studies for socially anxious youth are reviewed, and a strong rationale for transporting empirically-based interventions into schools, such as SASS, is provided. The SASS program consists of 12, 40-min group sessions that emphasize social skills and in-vivo exposure. In addition to group sessions, students are seen individually at least twice and participate in 4 weekend social events with prosocial peers from their high schools. Meetings with teachers provide information about social anxiety and facilitate classroom exposures for socially anxious participants. Parents attend 2 psychoeducational meetings about social anxiety, its treatment, and approaches for managing their child's anxiety. Initial findings regarding the program's effectiveness are presented. We conclude by discussing the challenges involved in implementing treatment protocols in schools and provide suggestions to address these issues.
Deng, Xudong; Smeets, Niels M B; Sicard, Clémence; Wang, Jingyun; Brennan, John D; Filipe, Carlos D M; Hoare, Todd
2014-09-17
The passivation of nonspecific protein adsorption to paper is a major barrier to the use of paper as a platform for microfluidic bioassays. Herein we describe a simple, scalable protocol based on adsorption and cross-linking of poly(oligoethylene glycol methacrylate) (POEGMA) derivatives that reduces nonspecific adsorption of a range of proteins to filter paper by at least 1 order of magnitude without significantly changing the fiber morphology or paper macroporosity. A lateral-flow test strip coated with POEGMA facilitates effective protein transport while also confining the colorimetric reporting signal for easier detection, giving improved performance relative to bovine serum albumin (BSA)-blocked paper. Enzyme-linked immunosorbent assays based on POEGMA-coated paper also achieve lower blank values, higher sensitivities, and lower detection limits relative to ones based on paper blocked with BSA or skim milk. We anticipate that POEGMA-coated paper can function as a platform for the design of portable, disposable, and low-cost paper-based biosensors.
KeyWare: an open wireless distributed computing environment
NASA Astrophysics Data System (ADS)
Shpantzer, Isaac; Schoenfeld, Larry; Grindahl, Merv; Kelman, Vladimir
1995-12-01
Deployment of distributed applications in the wireless domain lack equivalent tools, methodologies, architectures, and network management that exist in LAN based applications. A wireless distributed computing environment (KeyWareTM) based on intelligent agents within a multiple client multiple server scheme was developed to resolve this problem. KeyWare renders concurrent application services to wireline and wireless client nodes encapsulated in multiple paradigms such as message delivery, database access, e-mail, and file transfer. These services and paradigms are optimized to cope with temporal and spatial radio coverage, high latency, limited throughput and transmission costs. A unified network management paradigm for both wireless and wireline facilitates seamless extensions of LAN- based management tools to include wireless nodes. A set of object oriented tools and methodologies enables direct asynchronous invocation of agent-based services supplemented by tool-sets matched to supported KeyWare paradigms. The open architecture embodiment of KeyWare enables a wide selection of client node computing platforms, operating systems, transport protocols, radio modems and infrastructures while maintaining application portability.
Satellite Communications Using Commercial Protocols
NASA Technical Reports Server (NTRS)
Ivancic, William D.; Griner, James H.; Dimond, Robert; Frantz, Brian D.; Kachmar, Brian; Shell, Dan
2000-01-01
NASA Glenn Research Center has been working with industry, academia, and other government agencies in assessing commercial communications protocols for satellite and space-based applications. In addition, NASA Glenn has been developing and advocating new satellite-friendly modifications to existing communications protocol standards. This paper summarizes recent research into the applicability of various commercial standard protocols for use over satellite and space- based communications networks as well as expectations for future protocol development. It serves as a reference point from which the detailed work can be readily accessed. Areas that will be addressed include asynchronous-transfer-mode quality of service; completed and ongoing work of the Internet Engineering Task Force; data-link-layer protocol development for unidirectional link routing; and protocols for aeronautical applications, including mobile Internet protocol routing for wireless/mobile hosts and the aeronautical telecommunications network protocol.
Development of Research-Based Protocol Aligned to Predict High Levels of Teaching Quality
ERIC Educational Resources Information Center
Schumacher, Gary; Grigsby, Bettye; Vesey, Winona
2011-01-01
This study proposes a research-based teacher selection protocol. The protocol is intended to offer school district hiring authorities a tool to identify teacher candidates with the behaviors expected to predict effective teaching. It is hypothesized that a particular series of research-based interview questions focusing on teaching behaviors in…
A lightweight neighbor-info-based routing protocol for no-base-station taxi-call system.
Zhu, Xudong; Wang, Jinhang; Chen, Yunchao
2014-01-01
Since the quick topology change and short connection duration, the VANET has had unstable routing and wireless signal quality. This paper proposes a kind of lightweight routing protocol-LNIB for call system without base station, which is applicable to the urban taxis. LNIB maintains and predicts neighbor information dynamically, thus finding the reliable path between the source and the target. This paper describes the protocol in detail and evaluates the performance of this protocol by simulating under different nodes density and speed. The result of evaluation shows that the performance of LNIB is better than AODV which is a classic protocol in taxi-call scene.
NASA Astrophysics Data System (ADS)
Guo, Rui; Zhou, Lan; Gu, Shi-Pu; Wang, Xing-Fu; Sheng, Yu-Bo
2017-03-01
The concatenated Greenberger-Horne-Zeilinger (C-GHZ) state is a new type of multipartite entangled state, which has potential application in future quantum information. In this paper, we propose a protocol of constructing arbitrary C-GHZ entangled state approximatively. Different from previous protocols, each logic qubit is encoded in the coherent state. This protocol is based on the linear optics, which is feasible in experimental technology. This protocol may be useful in quantum information based on the C-GHZ state.
A Model Based Security Testing Method for Protocol Implementation
Fu, Yu Long; Xin, Xiao Long
2014-01-01
The security of protocol implementation is important and hard to be verified. Since the penetration testing is usually based on the experience of the security tester and the specific protocol specifications, a formal and automatic verification method is always required. In this paper, we propose an extended model of IOLTS to describe the legal roles and intruders of security protocol implementations, and then combine them together to generate the suitable test cases to verify the security of protocol implementation. PMID:25105163
A model based security testing method for protocol implementation.
Fu, Yu Long; Xin, Xiao Long
2014-01-01
The security of protocol implementation is important and hard to be verified. Since the penetration testing is usually based on the experience of the security tester and the specific protocol specifications, a formal and automatic verification method is always required. In this paper, we propose an extended model of IOLTS to describe the legal roles and intruders of security protocol implementations, and then combine them together to generate the suitable test cases to verify the security of protocol implementation.
Universal real-time highway information system development program : final report phase II.
DOT National Transportation Integrated Search
2009-01-01
The final phase of a two phase effort was undertaken to establish data forms and communication protocols to provide the New York State Department of Transportation access to the unique highway data resource, HIVIS developed in the initial phase of th...
40 CFR 52.2039 - Interstate transport.
Code of Federal Regulations, 2013 CFR
2013-07-01
... Portland shall comply with the following requirements: (1) Perform air modeling to demonstrate that... the effective date of the section 126 finding, submit to the EPA a modeling protocol that is... that includes all units at the Portland Generating Station in the modeling. (ii) Within 15 business...
40 CFR 52.2039 - Interstate transport.
Code of Federal Regulations, 2014 CFR
2014-07-01
... Portland shall comply with the following requirements: (1) Perform air modeling to demonstrate that... the effective date of the section 126 finding, submit to the EPA a modeling protocol that is... that includes all units at the Portland Generating Station in the modeling. (ii) Within 15 business...
40 CFR 52.2039 - Interstate transport.
Code of Federal Regulations, 2012 CFR
2012-07-01
... Portland shall comply with the following requirements: (1) Perform air modeling to demonstrate that... the effective date of the section 126 finding, submit to the EPA a modeling protocol that is... that includes all units at the Portland Generating Station in the modeling. (ii) Within 15 business...
Review of the transportation planning process in the Portland, Orgeon, metropolitan area
DOT National Transportation Integrated Search
2012-11-01
Harmonization Task Groups 1 and 3 (HTG1 and 3) were established by the EU-US International Standards Harmonization Working Group to attempt to harmonize standards (including ISO, CEN, ETSI, IEEE) on security (HTG1) and communications protocols (HTG3)...
Review of the transportation planning process in the southern California metropolitan area
DOT National Transportation Integrated Search
2012-11-01
Harmonization Task Groups 1 and 3 (HTG1 and 3) were established by the EU-US International Standards Harmonization Working Group to attempt to harmonize standards (including ISO, CEN, ETSI, IEEE) on security (HTG1) and communications protocols (HTG3)...
Review of the transportation planning process in the Minneapolis-St. Paul metropolitan area
DOT National Transportation Integrated Search
2012-11-01
Harmonization Task Groups 1 and 3 (HTG1 and 3) were established by the EU-US International Standards Harmonization Working Group to attempt to harmonize standards (including ISO, CEN, ETSI, IEEE) on security (HTG1) and communications protocols (HTG3)...
DOT National Transportation Integrated Search
2018-01-01
With the release of the Bitcoin concept into the public domain in late 2008, the world of cryptocurrency (electronic currency such as Bitcoin, Ethereum, and hundreds of others) and distributed computing gained a new kind of trust protocol called b...
Sefuba, Maria; Walingo, Tom; Takawira, Fambirai
2015-09-18
This paper presents an Energy Efficient Medium Access Control (MAC) protocol for clustered wireless sensor networks that aims to improve energy efficiency and delay performance. The proposed protocol employs an adaptive cross-layer intra-cluster scheduling and an inter-cluster relay selection diversity. The scheduling is based on available data packets and remaining energy level of the source node (SN). This helps to minimize idle listening on nodes without data to transmit as well as reducing control packet overhead. The relay selection diversity is carried out between clusters, by the cluster head (CH), and the base station (BS). The diversity helps to improve network reliability and prolong the network lifetime. Relay selection is determined based on the communication distance, the remaining energy and the channel quality indicator (CQI) for the relay cluster head (RCH). An analytical framework for energy consumption and transmission delay for the proposed MAC protocol is presented in this work. The performance of the proposed MAC protocol is evaluated based on transmission delay, energy consumption, and network lifetime. The results obtained indicate that the proposed MAC protocol provides improved performance than traditional cluster based MAC protocols.
Sefuba, Maria; Walingo, Tom; Takawira, Fambirai
2015-01-01
This paper presents an Energy Efficient Medium Access Control (MAC) protocol for clustered wireless sensor networks that aims to improve energy efficiency and delay performance. The proposed protocol employs an adaptive cross-layer intra-cluster scheduling and an inter-cluster relay selection diversity. The scheduling is based on available data packets and remaining energy level of the source node (SN). This helps to minimize idle listening on nodes without data to transmit as well as reducing control packet overhead. The relay selection diversity is carried out between clusters, by the cluster head (CH), and the base station (BS). The diversity helps to improve network reliability and prolong the network lifetime. Relay selection is determined based on the communication distance, the remaining energy and the channel quality indicator (CQI) for the relay cluster head (RCH). An analytical framework for energy consumption and transmission delay for the proposed MAC protocol is presented in this work. The performance of the proposed MAC protocol is evaluated based on transmission delay, energy consumption, and network lifetime. The results obtained indicate that the proposed MAC protocol provides improved performance than traditional cluster based MAC protocols. PMID:26393608
Adapting End Host Congestion Control for Mobility
NASA Technical Reports Server (NTRS)
Eddy, Wesley M.; Swami, Yogesh P.
2005-01-01
Network layer mobility allows transport protocols to maintain connection state, despite changes in a node's physical location and point of network connectivity. However, some congestion-controlled transport protocols are not designed to deal with these rapid and potentially significant path changes. In this paper we demonstrate several distinct problems that mobility-induced path changes can create for TCP performance. Our premise is that mobility events indicate path changes that require re-initialization of congestion control state at both connection end points. We present the application of this idea to TCP in the form of a simple solution (the Lightweight Mobility Detection and Response algorithm, that has been proposed in the IETF), and examine its effectiveness. In general, we find that the deficiencies presented are both relatively easily and painlessly fixed using this solution. We also find that this solution has the counter-intuitive property of being both more friendly to competing traffic, and simultaneously more aggressive in utilizing newly available capacity than unmodified TCP.
HCI∧2 framework: a software framework for multimodal human-computer interaction systems.
Shen, Jie; Pantic, Maja
2013-12-01
This paper presents a novel software framework for the development and research in the area of multimodal human-computer interface (MHCI) systems. The proposed software framework, which is called the HCI∧2 Framework, is built upon publish/subscribe (P/S) architecture. It implements a shared-memory-based data transport protocol for message delivery and a TCP-based system management protocol. The latter ensures that the integrity of system structure is maintained at runtime. With the inclusion of bridging modules, the HCI∧2 Framework is interoperable with other software frameworks including Psyclone and ActiveMQ. In addition to the core communication middleware, we also present the integrated development environment (IDE) of the HCI∧2 Framework. It provides a complete graphical environment to support every step in a typical MHCI system development process, including module development, debugging, packaging, and management, as well as the whole system management and testing. The quantitative evaluation indicates that our framework outperforms other similar tools in terms of average message latency and maximum data throughput under a typical single PC scenario. To demonstrate HCI∧2 Framework's capabilities in integrating heterogeneous modules, we present several example modules working with a variety of hardware and software. We also present an example of a full system developed using the proposed HCI∧2 Framework, which is called the CamGame system and represents a computer game based on hand-held marker(s) and low-cost camera(s).
ERIC Educational Resources Information Center
Paez-Blarrina, Marisa; Luciano, Carmen; Gutierrez-Martinez, Olga; Valdivia, Sonsoles; Rodriguez-Valverde, Miguel; Ortega, Jose
2008-01-01
This study compares the effect of an acceptance-based protocol (ACT) and a cognitive control-based (CONT) protocol on three measures of pain coping: tolerance, self-report, and believability. Specific methodological controls were employed to further isolate the role of the value of participating in a pain task, compared to previous investigations…
De Nisco, Giuseppe; Zhang, Peng; Calò, Karol; Liu, Xiao; Ponzini, Raffaele; Bignardi, Cristina; Rizzo, Giovanna; Deng, Xiaoyan; Gallo, Diego; Morbiducci, Umberto
2018-02-08
Personalized computational hemodynamics (CH) is a promising tool to clarify/predict the link between low density lipoproteins (LDL) transport in aorta, disturbed shear and atherogenesis. However, CH uses simplifying assumptions that represent sources of uncertainty. In particular, modelling blood-side to wall LDL transfer is challenged by the cumbersomeness of protocols needed to obtain reliable LDL concentration profile estimations. This paucity of data is limiting the establishment of rigorous CH protocols able to balance the trade-offs among the variety of in vivo data to be acquired, and the accuracy required by biological/clinical applications. In this study, we analyze the impact of LDL concentration initialization (initial conditions, ICs) and inflow boundary conditions (BCs) on CH models of LDL blood-to-wall transfer in aorta. Technically, in an image-based model of human aorta, two different inflow BCs are generated imposing subject-specific inflow 3D PC-MRI measured or idealized (flat) velocity profiles. For each simulated BC, four different ICs for LDL concentration are applied, imposing as IC the LDL distribution resulting from steady-state simulations with average conditions, or constant LDL concentration values. Based on CH results, we conclude that: (1) the imposition of realistic 3D velocity profiles as inflow BC reduces the uncertainty affecting the representation of LDL transfer; (2) different LDL concentration ICs lead to markedly different patterns of LDL transfer. Given that it is not possible to verify in vivo the proper LDL concentration initialization to be applied, we suggest to carefully set and unambiguously declare the imposed BCs and LDL concentration IC when modelling LDL transfer in aorta, in order to obtain reproducible and ultimately comparable results among different laboratories. Copyright © 2017 Elsevier Ltd. All rights reserved.
EON: a component-based approach to automation of protocol-directed therapy.
Musen, M A; Tu, S W; Das, A K; Shahar, Y
1996-01-01
Provision of automated support for planning protocol-directed therapy requires a computer program to take as input clinical data stored in an electronic patient-record system and to generate as output recommendations for therapeutic interventions and laboratory testing that are defined by applicable protocols. This paper presents a synthesis of research carried out at Stanford University to model the therapy-planning task and to demonstrate a component-based architecture for building protocol-based decision-support systems. We have constructed general-purpose software components that (1) interpret abstract protocol specifications to construct appropriate patient-specific treatment plans; (2) infer from time-stamped patient data higher-level, interval-based, abstract concepts; (3) perform time-oriented queries on a time-oriented patient database; and (4) allow acquisition and maintenance of protocol knowledge in a manner that facilitates efficient processing both by humans and by computers. We have implemented these components in a computer system known as EON. Each of the components has been developed, evaluated, and reported independently. We have evaluated the integration of the components as a composite architecture by implementing T-HELPER, a computer-based patient-record system that uses EON to offer advice regarding the management of patients who are following clinical trial protocols for AIDS or HIV infection. A test of the reuse of the software components in a different clinical domain demonstrated rapid development of a prototype application to support protocol-based care of patients who have breast cancer. PMID:8930854
Cho, Kyu-Hyang; Do, Jun-Young; Park, Jong-Won; Yoon, Kyung-Woo; Kim, Yong-Lim
2013-01-01
♦ Background: Several studies have reported benefits for human peritoneal mesothelial cell function of a neutral-pH dialysate low in glucose degradation products (GDPs). However, the effects of low-GDP solution on ultrafiltration (UF), transport of solutes, and control of body water remain elusive. We therefore investigated the effect of low-GDP solution on UF, solute transport, and control of body water. ♦ Methods: Among 79 new continuous ambulatory peritoneal dialysis (CAPD) patients, 60 completed a 12-month protocol (28 in a lactate-based high-GDP solution group, 32 in a lactate-based low-GDP solution group). Clinical indices—including 24-hour UF volume (UFV), 24-hour urine volume (UV), residual renal function, and dialysis adequacy—were measured at months 1, 6, and 12. At months 1, 6, and 12, UFV, glucose absorption, 4-hour dialysate-to-plasma (D/P) creatinine, and 1-hour D/P Na+ were assessed during a modified 4.25% peritoneal equilibration test (PET). Body composition by bioelectric impedance analysis was measured at months 1 and 12 in 26 CAPD patients. ♦ Results: Daily UFV was lower in the low-GDP group. Despite similar solute transport and aquaporin function, the low-GDP group also showed lower UFV and higher glucose absorption during the PET. Factors associated with UFV during the PET were lactate-based high-GDP solution and 1-hour D/P Na+. No differences in volume status and obesity at month 12 were observed, and improvements in hypervolemia were equal in both groups. ♦ Conclusions: Compared with the high-GDP group, the low-GDP group had a lower UFV during a PET and a lower daily UFV during the first year after peritoneal dialysis initiation. Although the low-GDP group had a lower daily UFV, no difficulties in controlling edema were encountered. PMID:23284074
Knight, Patrick H; Maheshwari, Neelabh; Hussain, Jafar; Scholl, Michael; Hughes, Michael; Papadimos, Thomas J; Guo, Weidun Alan; Cipolla, James; Stawicki, Stanislaw P; Latchana, Nicholas
2015-01-01
Intrahospital transportation of critically ill patients is associated with significant complications. In order to reduce overall risk to the patient, such transports should well organized, efficient, and accompanied by the proper monitoring, equipment, and personnel. Protocols and guidelines for patient transfers should be utilized universally across all healthcare facilities. Care delivered during transport and at the site of diagnostic testing or procedure should be equivalent to the level of care provided in the originating environment. Here we review the most common problems encountered during transport in the hospital setting, including various associated adverse outcomes. Our objective is to make medical practitioners, nurses, and ancillary health care personnel more aware of the potential for various complications that may occur during patient movement from the intensive care unit to other locations within a healthcare facility, focusing on risk reduction and preventive strategies. PMID:26807395
NASA Astrophysics Data System (ADS)
Chen, Xi; Jiang, Ruan-Lei; Li, Jing; Ban, Yue; Sherman, E. Ya.
2018-01-01
We investigate fast transport and spin manipulation of tunable spin-orbit-coupled Bose-Einstein condensates in a moving harmonic trap. Motivated by the concept of shortcuts to adiabaticity, we design inversely the time-dependent trap position and spin-orbit-coupling strength. By choosing appropriate boundary conditions we obtain fast transport and spin flip simultaneously. The nonadiabatic transport and relevant spin dynamics are illustrated with numerical examples and compared with the adiabatic transport with constant spin-orbit-coupling strength and velocity. Moreover, the influence of nonlinearity induced by interatomic interaction is discussed in terms of the Gross-Pitaevskii approach, showing the robustness of the proposed protocols. With the state-of-the-art experiments, such an inverse engineering technique paves the way for coherent control of spin-orbit-coupled Bose-Einstein condensates in harmonic traps.
Transport of spin qubits with donor chains under realistic experimental conditions
NASA Astrophysics Data System (ADS)
Mohiyaddin, Fahd A.; Kalra, Rachpon; Laucht, Arne; Rahman, Rajib; Klimeck, Gerhard; Morello, Andrea
2016-07-01
The ability to transport quantum information across some distance can facilitate the design and operation of a quantum processor. One-dimensional spin chains provide a compact platform to realize scalable spin transport for a solid-state quantum computer. Here, we model odd-sized donor chains in silicon under a range of experimental nonidealities, including variability of donor position within the chain. We show that the tolerance against donor placement inaccuracies is greatly improved by operating the spin chain in a mode where the electrons are confined at the Si-SiO2 interface. We then estimate the required time scales and exchange couplings, and the level of noise that can be tolerated to achieve high-fidelity transport. We also propose a protocol to calibrate and initialize the chain, thereby providing a complete guideline for realizing a functional donor chain and utilizing it for spin transport.
Transport of spin qubits with donor chains under realistic experimental conditions
Mohiyaddin, Fahd A.; Kalra, Rachpon; Laucht, Arne; ...
2016-07-25
The ability to transport quantum information across some distance can facilitate the design and operation of a quantum processor. One-dimensional spin chains provide a compact platform to realize scalable spin transport for a solid-state quantum computer. Here, we model odd-sized donor chains in silicon under a range of experimental nonidealities, including variability of donor position within the chain. We show that the tolerance against donor placement inaccuracies is greatly improved by operating the spin chain in a mode where the electrons are confined at the Si-SiO 2 interface. We then estimate the required time scales and exchange couplings, and themore » level of noise that can be tolerated to achieve high-fidelity transport. As a result, we also propose a protocol to calibrate and initialize the chain, thereby providing a complete guideline for realizing a functional donor chain and utilizing it for spin transport.« less
Kubitscheck, U; Pratsch, L; Passow, H; Peters, R
1995-07-01
The activity of the plasma membrane calcium pump was measured in single cells. Human red blood cell ghosts were loaded with a fluorescent calcium indicator and either caged calcium and ATP (protocol A) or caged ATP and calcium (protocol B). In a suitably modified laser scanning microscope either calcium or ATP were released by a short UV light pulse. The time-dependent fluorescence intensity of the calcium indicator was then followed in single ghosts by repetitive confocal imaging. The fluorescence intensity was converted into calcium concentration, which in turn was used to derive the kinetic parameters of the calcium pump, the Michaelis-Menten constant Km, and the maximal transport rate vmax. Km and vmax values derived in this manner were 24 +/- 14 microM and 1.0 +/- 0.6 microM/(ghost s) for protocol A, and 4 +/- 3 microM and 1.0 +/- 0.6 microM/(ghost s) for protocol B, respectively. The difference between A and B is presumably caused by calmodulin, which is inactive in the experiments with protocol A. The possibilities to extend the new method to living nucleus-containing cells transiently transfected with mutants of the plasma membrane calcium pump are discussed.
Purification of a Multidrug Resistance Transporter for Crystallization Studies
Alegre, Kamela O.; Law, Christopher J.
2015-01-01
Crystallization of integral membrane proteins is a challenging field and much effort has been invested in optimizing the overexpression and purification steps needed to obtain milligram amounts of pure, stable, monodisperse protein sample for crystallography studies. Our current work involves the structural and functional characterization of the Escherichia coli multidrug resistance transporter MdtM, a member of the major facilitator superfamily (MFS). Here we present a protocol for isolation of MdtM to increase yields of recombinant protein to the milligram quantities necessary for pursuit of structural studies using X-ray crystallography. Purification of MdtM was enhanced by introduction of an elongated His-tag, followed by identification and subsequent removal of chaperonin contamination. For crystallization trials of MdtM, detergent screening using size exclusion chromatography determined that decylmaltoside (DM) was the shortest-chain detergent that maintained the protein in a stable, monodispersed state. Crystallization trials of MdtM performed using the hanging-drop diffusion method with commercially available crystallization screens yielded 3D protein crystals under several different conditions. We contend that the purification protocol described here may be employed for production of high-quality protein of other multidrug efflux members of the MFS, a ubiquitous, physiologically and clinically important class of membrane transporters. PMID:27025617
A native Bayesian classifier based routing protocol for VANETS
NASA Astrophysics Data System (ADS)
Bao, Zhenshan; Zhou, Keqin; Zhang, Wenbo; Gong, Xiaolei
2016-12-01
Geographic routing protocols are one of the most hot research areas in VANET (Vehicular Ad-hoc Network). However, there are few routing protocols can take both the transmission efficient and the usage of ratio into account. As we have noticed, different messages in VANET may ask different quality of service. So we raised a Native Bayesian Classifier based routing protocol (Naive Bayesian Classifier-Greedy, NBC-Greedy), which can classify and transmit different messages by its emergency degree. As a result, we can balance the transmission efficient and the usage of ratio with this protocol. Based on Matlab simulation, we can draw a conclusion that NBC-Greedy is more efficient and stable than LR-Greedy and GPSR.
DEVELOPMENT OF PROTOCOLS AND DECISION SUPPORT TOOLS FOR ASSESSING WATERSHED SYSTEM ASSIMILATIVE
Investigations are underway on Lake Texoma, a Corps of Engineers lake on the Oklahoma/Texas border, to develop decision support tools and information to evaluate the transport and attenuation of contaminants and stressors in a lake ecosystem, and link them to observable ecologica...
DOT National Transportation Integrated Search
1993-04-14
In 2005, the US Department of Transportation (DOT) initiated a program to develop and test a 5.9GHzbased Vehicle Infrastructure Integration (VII) proof of concept (POC). The POC was implemented in the northwest suburbs of Detroit, Michigan. This r...
Federal Register 2010, 2011, 2012, 2013, 2014
2010-11-29
... Collection Activity Under OMB Review: Pipeline Corporate Security Review AGENCY: Transportation Security.... Information Collection Requirement Title: Pipeline Corporate Security Review (PCSR). Type of Request: New collection. OMB Control Number: Not yet assigned. Form(s): Pipeline Corporate Security Review (PCSR) Protocol...
Gabr, Mahmoud M; Zakaria, Mahmoud M; Refaie, Ayman F; Khater, Sherry M; Ashamallah, Sylvia A; Ismail, Amani M; El-Badri, Nagwa; Ghoneim, Mohamed A
2014-01-01
Many protocols were utilized for directed differentiation of mesenchymal stem cells (MSCs) to form insulin-producing cells (IPCs). We compared the relative efficiency of three differentiation protocols. Human bone marrow-derived MSCs (HBM-MSCs) were obtained from three insulin-dependent type 2 diabetic patients. Differentiation into IPCs was carried out by three protocols: conophylline-based (one-step protocol), trichostatin-A-based (two-step protocol), and β -mercaptoethanol-based (three-step protocol). At the end of differentiation, cells were evaluated by immunolabeling for insulin production, expression of pancreatic endocrine genes, and release of insulin and c-peptide in response to increasing glucose concentrations. By immunolabeling, the proportion of generated IPCs was modest ( ≃ 3%) in all the three protocols. All relevant pancreatic endocrine genes, insulin, glucagon, and somatostatin, were expressed. There was a stepwise increase in insulin and c-peptide release in response to glucose challenge, but the released amounts were low when compared with those of pancreatic islets. The yield of functional IPCs following directed differentiation of HBM-MSCs was modest and was comparable among the three tested protocols. Protocols for directed differentiation of MSCs need further optimization in order to be clinically meaningful. To this end, addition of an extracellular matrix and/or a suitable template should be attempted.
2018-01-01
The Session Initiation Protocol (SIP) is an extensive and esteemed communication protocol employed to regulate signaling as well as for controlling multimedia communication sessions. Recently, Kumari et al. proposed an improved smart card based authentication scheme for SIP based on Farash’s scheme. Farash claimed that his protocol is resistant against various known attacks. But, we observe some accountable flaws in Farash’s protocol. We point out that Farash’s protocol is prone to key-compromise impersonation attack and is unable to provide pre-verification in the smart card, efficient password change and perfect forward secrecy. To overcome these limitations, in this paper we present an enhanced authentication mechanism based on Kumari et al.’s scheme. We prove that the proposed protocol not only overcomes the issues in Farash’s scheme, but it can also resist against all known attacks. We also provide the security analysis of the proposed scheme with the help of widespread AVISPA (Automated Validation of Internet Security Protocols and Applications) software. At last, comparing with the earlier proposals in terms of security and efficiency, we conclude that the proposed protocol is efficient and more secure. PMID:29547619
Multi-Hop Teleportation of an Unknown Qubit State Based on W States
NASA Astrophysics Data System (ADS)
Zhou, Xiang-Zhen; Yu, Xu-Tao; Zhang, Zai-Chen
2018-04-01
Quantum teleportation is important in quantum communication networks. Considering that quantum state information is also transmitted between two distant nodes, intermediated nodes are employed and two multi-hop teleportation protocols based on W state are proposed. One is hop-by-hop teleportation protocol and the other is the improved multi-hop teleportation protocol with centralized unitary transformation. In hop-by-hop protocol, the transmitted quantum state needs to be recovered at every node on the route. In improved multi-hop teleportation protocol with centralized unitary transformation, intermediate nodes need not to recover the transmitted quantum state. Compared to the hop-by-hop protocol, the improved protocol can reduce the transmission delay and improve the transmission efficiency.
Quantum private query based on single-photon interference
NASA Astrophysics Data System (ADS)
Xu, Sheng-Wei; Sun, Ying; Lin, Song
2016-08-01
Quantum private query (QPQ) has become a research hotspot recently. Specially, the quantum key distribution (QKD)-based QPQ attracts lots of attention because of its practicality. Various such kind of QPQ protocols have been proposed based on different technologies of quantum communications. Single-photon interference is one of such technologies, on which the famous QKD protocol GV95 is just based. In this paper, we propose two QPQ protocols based on single-photon interference. The first one is simpler and easier to realize, and the second one is loss tolerant and flexible, and more practical than the first one. Furthermore, we analyze both the user privacy and the database privacy in the proposed protocols.
Benson, James D; Benson, Charles T; Critser, John K
2014-08-01
Optimization of cryopreservation protocols for cells and tissues requires accurate models of heat and mass transport. Model selection often depends on the configuration of the tissue. Here, a mathematical and conceptual model of water and solute transport for whole hamster pancreatic islets has been developed and experimentally validated incorporating fundamental biophysical data from previous studies on individual hamster islet cells while retaining whole-islet structural information. It describes coupled transport of water and solutes through the islet by three methods: intracellularly, intercellularly, and in combination. In particular we use domain decomposition techniques to couple a transmembrane flux model with an interstitial mass transfer model. The only significant undetermined variable is the cellular surface area which is in contact with the intercellularly transported solutes, Ais. The model was validated and Ais determined using a 3×3 factorial experimental design blocked for experimental day. Whole islet physical experiments were compared with model predictions at three temperatures, three perfusing solutions, and three islet size groups. A mean of 4.4 islets were compared at each of the 27 experimental conditions and found to correlate with a coefficient of determination of 0.87±0.06 (mean ± SD). Only the treatment variable of perfusing solution was found to be significant (p<0.05). We have devised a model that retains much of the intrinsic geometric configuration of the system, and thus fewer laboratory experiments are needed to determine model parameters and thus to develop new optimized cryopreservation protocols. Additionally, extensions to ovarian follicles and other concentric tissue structures may be made. Copyright © 2014 Elsevier Inc. All rights reserved.
Coexistence of WiFi and WiMAX systems based on PS-request protocols.
Kim, Jongwoo; Park, Suwon; Rhee, Seung Hyong; Choi, Yong-Hoon; Chung, Young-uk; Hwang, Ho Young
2011-01-01
We introduce both the coexistence zone within the WiMAX frame structure and a PS-Request protocol for the coexistence of WiFi and WiMAX systems sharing a frequency band. Because we know that the PS-Request protocol has drawbacks, we propose a revised PS-Request protocol to improve the performance. Two PS-Request protocols are based on the time division operation (TDO) of WiFi system and WiMAX system to avoid the mutual interference, and use the vestigial power management (PwrMgt) bit within the Frame Control field of the frames transmitted by a WiFi AP. The performance of the revised PS-Request protocol is evaluated by computer simulation, and compared to those of the cases without a coexistence protocol and to the original PS-Request protocol.
Efficient model checking of network authentication protocol based on SPIN
NASA Astrophysics Data System (ADS)
Tan, Zhi-hua; Zhang, Da-fang; Miao, Li; Zhao, Dan
2013-03-01
Model checking is a very useful technique for verifying the network authentication protocols. In order to improve the efficiency of modeling and verification on the protocols with the model checking technology, this paper first proposes a universal formalization description method of the protocol. Combined with the model checker SPIN, the method can expediently verify the properties of the protocol. By some modeling simplified strategies, this paper can model several protocols efficiently, and reduce the states space of the model. Compared with the previous literature, this paper achieves higher degree of automation, and better efficiency of verification. Finally based on the method described in the paper, we model and verify the Privacy and Key Management (PKM) authentication protocol. The experimental results show that the method of model checking is effective, which is useful for the other authentication protocols.
Furberg, Robert D; Ortiz, Alexa M; Zulkiewicz, Brittany A; Hudson, Jordan P; Taylor, Olivia M; Lewis, Megan A
2016-06-27
Tablet-based health care interventions have the potential to encourage patient care in a timelier manner, allow physicians convenient access to patient records, and provide an improved method for patient education. However, along with the continued adoption of tablet technologies, there is a concomitant need to develop protocols focusing on the configuration, management, and maintenance of these devices within the health care setting to support the conduct of clinical research. Develop three protocols to support tablet configuration, tablet management, and tablet maintenance. The Configurator software, Tile technology, and current infection control recommendations were employed to develop three distinct protocols for tablet-based digital health interventions. Configurator is a mobile device management software specifically for iPhone operating system (iOS) devices. The capabilities and current applications of Configurator were reviewed and used to develop the protocol to support device configuration. Tile is a tracking tag associated with a free mobile app available for iOS and Android devices. The features associated with Tile were evaluated and used to develop the Tile protocol to support tablet management. Furthermore, current recommendations on preventing health care-related infections were reviewed to develop the infection control protocol to support tablet maintenance. This article provides three protocols: the Configurator protocol, the Tile protocol, and the infection control protocol. These protocols can help to ensure consistent implementation of tablet-based interventions, enhance fidelity when employing tablets for research purposes, and serve as a guide for tablet deployments within clinical settings.
Expression and Purification of Rat Glucose Transporter 1 in Pichia pastoris.
Venskutonytė, Raminta; Elbing, Karin; Lindkvist-Petersson, Karin
2018-01-01
Large amounts of pure and homogenous protein are a prerequisite for several biochemical and biophysical analyses, and in particular if aiming at resolving the three-dimensional protein structure. Here we describe the production of the rat glucose transporter 1 (GLUT1), a membrane protein facilitating the transport of glucose in cells. The protein is recombinantly expressed in the yeast Pichia pastoris. It is easily maintained and large-scale protein production in shaker flasks, as commonly performed in academic research laboratories, results in relatively high yields of membrane protein. The purification protocol describes all steps needed to obtain a pure and homogenous GLUT1 protein solution, including cell growth, membrane isolation, and chromatographic purification methods.
One Step Quantum Key Distribution Based on EPR Entanglement.
Li, Jian; Li, Na; Li, Lei-Lei; Wang, Tao
2016-06-30
A novel quantum key distribution protocol is presented, based on entanglement and dense coding and allowing asymptotically secure key distribution. Considering the storage time limit of quantum bits, a grouping quantum key distribution protocol is proposed, which overcomes the vulnerability of first protocol and improves the maneuverability. Moreover, a security analysis is given and a simple type of eavesdropper's attack would introduce at least an error rate of 46.875%. Compared with the "Ping-pong" protocol involving two steps, the proposed protocol does not need to store the qubit and only involves one step.
A neural networks-based hybrid routing protocol for wireless mesh networks.
Kojić, Nenad; Reljin, Irini; Reljin, Branimir
2012-01-01
The networking infrastructure of wireless mesh networks (WMNs) is decentralized and relatively simple, but they can display reliable functioning performance while having good redundancy. WMNs provide Internet access for fixed and mobile wireless devices. Both in urban and rural areas they provide users with high-bandwidth networks over a specific coverage area. The main problems affecting these networks are changes in network topology and link quality. In order to provide regular functioning, the routing protocol has the main influence in WMN implementations. In this paper we suggest a new routing protocol for WMN, based on good results of a proactive and reactive routing protocol, and for that reason it can be classified as a hybrid routing protocol. The proposed solution should avoid flooding and creating the new routing metric. We suggest the use of artificial logic-i.e., neural networks (NNs). This protocol is based on mobile agent technologies controlled by a Hopfield neural network. In addition to this, our new routing metric is based on multicriteria optimization in order to minimize delay and blocking probability (rejected packets or their retransmission). The routing protocol observes real network parameters and real network environments. As a result of artificial logic intelligence, the proposed routing protocol should maximize usage of network resources and optimize network performance.
A Neural Networks-Based Hybrid Routing Protocol for Wireless Mesh Networks
Kojić, Nenad; Reljin, Irini; Reljin, Branimir
2012-01-01
The networking infrastructure of wireless mesh networks (WMNs) is decentralized and relatively simple, but they can display reliable functioning performance while having good redundancy. WMNs provide Internet access for fixed and mobile wireless devices. Both in urban and rural areas they provide users with high-bandwidth networks over a specific coverage area. The main problems affecting these networks are changes in network topology and link quality. In order to provide regular functioning, the routing protocol has the main influence in WMN implementations. In this paper we suggest a new routing protocol for WMN, based on good results of a proactive and reactive routing protocol, and for that reason it can be classified as a hybrid routing protocol. The proposed solution should avoid flooding and creating the new routing metric. We suggest the use of artificial logic—i.e., neural networks (NNs). This protocol is based on mobile agent technologies controlled by a Hopfield neural network. In addition to this, our new routing metric is based on multicriteria optimization in order to minimize delay and blocking probability (rejected packets or their retransmission). The routing protocol observes real network parameters and real network environments. As a result of artificial logic intelligence, the proposed routing protocol should maximize usage of network resources and optimize network performance. PMID:22969360
A Family of ACO Routing Protocols for Mobile Ad Hoc Networks.
Rupérez Cañas, Delfín; Sandoval Orozco, Ana Lucila; García Villalba, Luis Javier; Kim, Tai-Hoon
2017-05-22
In this work, an ACO routing protocol for mobile ad hoc networks based on AntHocNet is specified. As its predecessor, this new protocol, called AntOR, is hybrid in the sense that it contains elements from both reactive and proactive routing. Specifically, it combines a reactive route setup process with a proactive route maintenance and improvement process. Key aspects of the AntOR protocol are the disjoint-link and disjoint-node routes, separation between the regular pheromone and the virtual pheromone in the diffusion process and the exploration of routes, taking into consideration the number of hops in the best routes. In this work, a family of ACO routing protocols based on AntOR is also specified. These protocols are based on protocol successive refinements. In this work, we also present a parallelized version of AntOR that we call PAntOR. Using programming multiprocessor architectures based on the shared memory protocol, PAntOR allows running tasks in parallel using threads. This parallelization is applicable in the route setup phase, route local repair process and link failure notification. In addition, a variant of PAntOR that consists of having more than one interface, which we call PAntOR-MI (PAntOR-Multiple Interface), is specified. This approach parallelizes the sending of broadcast messages by interface through threads.
Multigranular integrated services optical network
NASA Astrophysics Data System (ADS)
Yu, Oliver; Yin, Leping; Xu, Huan; Liao, Ming
2006-12-01
Based on all-optical switches without requiring fiber delay lines and optical-electrical-optical interfaces, the multigranular optical switching (MGOS) network integrates three transport services via unified core control to efficiently support bursty and stream traffic of subwavelength to multiwavelength bandwidth. Adaptive robust optical burst switching (AR-OBS) aggregates subwavelength burst traffic into asynchronous light-rate bursts, transported via slotted-time light paths established by fast two-way reservation with robust blocking recovery control. Multiwavelength optical switching (MW-OS) decomposes multiwavelength stream traffic into a group of timing-related light-rate streams, transported via a light-path group to meet end-to-end delay-variation requirements. Optical circuit switching (OCS) simply converts wavelength stream traffic from an electrical-rate into a light-rate stream. The MGOS network employs decoupled routing, wavelength, and time-slot assignment (RWTA) and novel group routing and wavelength assignment (GRWA) to select slotted-time light paths and light-path groups, respectively. The selected resources are reserved by the unified multigranular robust fast optical reservation protocol (MG-RFORP). Simulation results show that elastic traffic is efficiently supported via AR-OBS in terms of loss rate and wavelength utilization, while connection-oriented wavelength traffic is efficiently supported via wavelength-routed OCS in terms of connection blocking and wavelength utilization. The GRWA-tuning result for MW-OS is also shown.
Effect of various practical warm-up protocols on acute lower-body power.
Buttifant, David; Hrysomallis, Con
2015-03-01
The purpose of this study was to compare the acute effect of box squats with barbell (BBSquat), box squats with elastic resistance bands (BandSquat), and static stretches (SStretch) on external power during a 20-kg weighted jump squat. Twelve male athletes performed each of the 3 warm-up protocols on separate occasions in a randomized order. Weighted jump squat power was assessed using a linear position transducer attached to the bar of a Smith machine. Jump power was measured pre-warm-up and 5 and 10 minutes post-warm-up protocol. The BBSquat protocol involved 3 sets of 3RM, BandSquat involved 3 sets of 3 repetitions using highest resistance elastic bands, and the SStretch protocol comprises two 30-second stretches for muscles of the lower limbs. Jump power significantly increased from pre-warm-up to 5 and 10 minutes post-warm-up for both the BandSquat and BBSquat protocols. There was no statistical difference in power values between BandSquat and BBSquat. Power output significantly decreased from pre-warm-up to 5 and 10 minutes post-warm-up for the SStretch protocol. The BandSquat was just as effective as BBSquat in augmenting acute jump power. The SStretch was detrimental to jump performance. A practical warm-up using relatively inexpensive and portable equipment such as elastic resistance bands was just as effective as a warm-up protocol that requires more substantial and less transportable equipment such as a squat rack and associated free weights. The BandSquat warm-up may be considered more accessible for athletes at various competition levels.
NASA Astrophysics Data System (ADS)
Wang, Shuang; Yin, Zhen-Qiang; Chau, H. F.; Chen, Wei; Wang, Chao; Guo, Guang-Can; Han, Zheng-Fu
2018-04-01
In comparison to qubit-based protocols, qudit-based quantum key distribution ones generally allow two cooperative parties to share unconditionally secure keys under a higher channel noise. However, it is very hard to prepare and measure the required quantum states in qudit-based protocols in general. One exception is the recently proposed highly error tolerant qudit-based protocol known as the Chau15 (Chau 2015 Phys. Rev. A 92 062324). Remarkably, the state preparation and measurement in this protocol can be done relatively easily since the required states are phase encoded almost like the diagonal basis states of a qubit. Here we report the first proof-of-principle demonstration of the Chau15 protocol. One highlight of our experiment is that its post-processing is based on practical one-way manner, while the original proposal in Chau (2015 Phys. Rev. A 92 062324) relies on complicated two-way post-processing, which is a great challenge in experiment. In addition, by manipulating time-bin qudit and measurement with a variable delay interferometer, our realization is extensible to qudit with high-dimensionality and confirms the experimental feasibility of the Chau15 protocol.
Ilott, Irene; Booth, Andrew; Rick, Jo; Patterson, Malcolm
2010-06-01
To explore how nurses, midwives and health visitors contribute to the development, implementation and audit of protocol-based care. Protocol-based care refers to the use of documents that set standards for clinical care processes with the intent of reducing unacceptable variations in practice. Documents such as protocols, clinical guidelines and care pathways underpin evidence-based practice throughout the world. An interpretative review using the five-stage systematic literature review process. The data sources were the British Nursing Index, CINAHL, EMBASE, MEDLINE and Web of Science from onset to 2005. The Journal of Integrated Care Pathways was hand searched (1997-June 2006). Thirty three studies about protocol-based care in the United Kingdom were appraised using the Qualitative Assessment and Review Instrument (QARI version 2). The literature was synthesized inductively and deductively, using an official 12-step guide for development as a framework for the deductive synthesis. Most papers were descriptive, offering practitioner knowledge and positive findings about a locally developed and owned protocol-based care. The majority were instigated in response to clinical need or service re-design. Development of protocol-based care was a non-linear, idiosyncratic process, with steps omitted, repeated or completed in a different order. The context and the multiple purposes of protocol-based care influenced the development process. Implementation and sustainability were rarely mentioned, or theorised as a change. The roles and activities of nurses were so understated as to be almost invisible. There were notable gaps in the literature about the resource use costs, the engagement of patients in the decision-making process, leadership and the impact of formalisation and new roles on inter-professional relations. Documents that standardise clinical care are part of the history of nursing as well as contemporary evidence-based care and expanded roles. Considering the proliferation and contested nature of protocol-based care, the dearth of literature about the contribution, experience and outcomes for nurses, midwives and health visitors is noteworthy and requires further investigation. (c) 2010 Elsevier Ltd. All rights reserved.
Yang, Li; Zheng, Zhiming
2018-01-01
According to advancements in the wireless technologies, study of biometrics-based multi-server authenticated key agreement schemes has acquired a lot of momentum. Recently, Wang et al. presented a three-factor authentication protocol with key agreement and claimed that their scheme was resistant to several prominent attacks. Unfortunately, this paper indicates that their protocol is still vulnerable to the user impersonation attack, privileged insider attack and server spoofing attack. Furthermore, their protocol cannot provide the perfect forward secrecy. As a remedy of these aforementioned problems, we propose a biometrics-based authentication and key agreement scheme for multi-server environments. Compared with various related schemes, our protocol achieves the stronger security and provides more functionality properties. Besides, the proposed protocol shows the satisfactory performances in respect of storage requirement, communication overhead and computational cost. Thus, our protocol is suitable for expert systems and other multi-server architectures. Consequently, the proposed protocol is more appropriate in the distributed networks.
Zheng, Zhiming
2018-01-01
According to advancements in the wireless technologies, study of biometrics-based multi-server authenticated key agreement schemes has acquired a lot of momentum. Recently, Wang et al. presented a three-factor authentication protocol with key agreement and claimed that their scheme was resistant to several prominent attacks. Unfortunately, this paper indicates that their protocol is still vulnerable to the user impersonation attack, privileged insider attack and server spoofing attack. Furthermore, their protocol cannot provide the perfect forward secrecy. As a remedy of these aforementioned problems, we propose a biometrics-based authentication and key agreement scheme for multi-server environments. Compared with various related schemes, our protocol achieves the stronger security and provides more functionality properties. Besides, the proposed protocol shows the satisfactory performances in respect of storage requirement, communication overhead and computational cost. Thus, our protocol is suitable for expert systems and other multi-server architectures. Consequently, the proposed protocol is more appropriate in the distributed networks. PMID:29534085
Wilson, Patrick B
2015-07-01
The concept of multiple transportable carbohydrates (MTC) refers to a combination of saccharides that rely on distinct transporters for intestinal absorption. Ingestion of MTC during prolonged exercise has been purported to increase carbohydrate absorption efficiency, increase exogenous carbohydrate oxidation, reduce gastrointestinal (GI) distress, and improve athletic performance when carbohydrate intake is high (>50-60 g·h⁻¹). Although reviews of MTC research have been published previously, a comprehensive literature evaluation underscoring methodological limitations has not been conducted to guide future work. Accordingly, this review outlined the plausible mechanisms of MTC and subsequently evaluated MTC research based on several factors, including participant characteristics, exercise modality, exercise task, treatment formulation, treatment blinding, and pre-exercise nutrition status. A total of 27 articles examining MTC during exercise were identified and reviewed. Overall, ingestion of MTC led to increased exogenous carbohydrate oxidation, reduced GI distress, and improved performance during cycling lasting ≥2.5 hours, particularly when carbohydrate was ingested at ≥1.2 g·min⁻¹. Despite the apparent benefits, several limitations in the literature were apparent, including that only 3 studies used running, only 2 studies were conducted in the field, most participants were fasted, and women and adolescents were underrepresented. In addition, the majority of the studies fed carbohydrate at ≥1.2 g·min⁻¹, which may have inflated levels of GI distress and exaggerated performance decrements with single-saccharide feedings. Based on these limitations, future MTC investigations should consider focusing on running, examining team-based sports, including women and adolescents, conducting experiments under field conditions, examining the modifying effects of pre-exercise nutrition, and using modest feeding protocols (1.0-1.2 g·min⁻¹).
Chen, Xiao-bo; Chen, Chen; Liang, Yu-hong
2016-02-18
To evaluate the efficacy and security of two type of rotary nickel titanium system (Twisted File and ProTaper Universal) for root canal preparation based on micro-computed tomography(micro-CT). Twenty extracted molars (including 62 canals) were divided into two experimental groups and were respectively instrumented using Twisted File rotary nickel titanium system (TF) and ProTaper Universal rotary nickel titanium system (PU) to #25/0.08 following recommended protocol. Time for root canal instrumentation (accumulation of time for every single file) was recorded. The 0-3 mm root surface from apex was observed under an optical stereomicroscope at 25 × magnification. The presence of crack line was noted. The root canals were scanned with micro-CT before and after root canal preparation. Three-dimensional shape images of canals were reconstructed, calculated and evaluated. The amount of canal central transportation of the two groups was calculated and compared. The shorter preparation time [(0.53 ± 0.14) min] was observed in TF group, while the preparation time of PU group was (2.06 ± 0.39) min (P<0.05). In mid-root level, TF group shaping resulted in less canal center transportation than PU group [(0.070 ± 0.056) mm vs. (0.097 ± 0.084) mm, P<0.05]. No instrument separation was observed in both the groups. Cracks were not found in both the groups either based in micro-CT images or observation under an optical stereomicroscope at 25 × magnification. Compared with ProTaper Universal, Twisted File took less time in root canal preparation and exhibited better shaping ability, and less canal transportation.
A Survey on Underwater Acoustic Sensor Network Routing Protocols.
Li, Ning; Martínez, José-Fernán; Meneses Chaus, Juan Manuel; Eckert, Martina
2016-03-22
Underwater acoustic sensor networks (UASNs) have become more and more important in ocean exploration applications, such as ocean monitoring, pollution detection, ocean resource management, underwater device maintenance, etc. In underwater acoustic sensor networks, since the routing protocol guarantees reliable and effective data transmission from the source node to the destination node, routing protocol design is an attractive topic for researchers. There are many routing algorithms have been proposed in recent years. To present the current state of development of UASN routing protocols, we review herein the UASN routing protocol designs reported in recent years. In this paper, all the routing protocols have been classified into different groups according to their characteristics and routing algorithms, such as the non-cross-layer design routing protocol, the traditional cross-layer design routing protocol, and the intelligent algorithm based routing protocol. This is also the first paper that introduces intelligent algorithm-based UASN routing protocols. In addition, in this paper, we investigate the development trends of UASN routing protocols, which can provide researchers with clear and direct insights for further research.
A Survey on Underwater Acoustic Sensor Network Routing Protocols
Li, Ning; Martínez, José-Fernán; Meneses Chaus, Juan Manuel; Eckert, Martina
2016-01-01
Underwater acoustic sensor networks (UASNs) have become more and more important in ocean exploration applications, such as ocean monitoring, pollution detection, ocean resource management, underwater device maintenance, etc. In underwater acoustic sensor networks, since the routing protocol guarantees reliable and effective data transmission from the source node to the destination node, routing protocol design is an attractive topic for researchers. There are many routing algorithms have been proposed in recent years. To present the current state of development of UASN routing protocols, we review herein the UASN routing protocol designs reported in recent years. In this paper, all the routing protocols have been classified into different groups according to their characteristics and routing algorithms, such as the non-cross-layer design routing protocol, the traditional cross-layer design routing protocol, and the intelligent algorithm based routing protocol. This is also the first paper that introduces intelligent algorithm-based UASN routing protocols. In addition, in this paper, we investigate the development trends of UASN routing protocols, which can provide researchers with clear and direct insights for further research. PMID:27011193
Zhao, Kuiwen; Wu, Huiying
2015-04-28
Determining water structure in nanopores and its influence on water transport behaviour is of great importance for understanding and regulating the transport across nanopores. Here we report an ultrafast-slow flow transition phenomenon for water transport across nanopores of carbon nanotubes owing to the change in water structure in nanopores induced by temperature. By performing extensive molecular dynamics simulations, we show the dependence of water transport behaviours on water structures. Our results indicate that owing to the change in water structure in nanopores, water flux across nanopores with certain pore sizes decreases sharply (nearly 3 orders of magnitude) with the decreasing temperature. This phenomenon is very sensitive to the pore size. The threshold temperatures for the occurrence of the ultrafast-slow flow transition for water transport are also determined for various pore sizes. These findings suggest a novel protocol for selective gating of water and proton conduction across nanopores and temperature-controlled drug release.
Prehospital traumatic cardiac arrest: the cost of futility.
Rosemurgy, A S; Norris, P A; Olson, S M; Hurst, J M; Albrink, M H
1993-09-01
Of 12,462 trauma patients cared for by prehospital services from October 1, 1989 to March 31, 1991, 138 patients underwent CPR at the scene or during transport because of the absence of blood pressure, pulse, and respiration. Ninety-six (70%) suffered blunt trauma, 42 (30%) suffered penetrating trauma. Sixty (43%) were transported by air utilizing county-wide transport protocols. None of the patients survived. Aggregate care cost $871,186.00. In 11 cases (8%), tissue for transplantation was procured (only corneas). Trauma patients who require CPR at the scene or in transport die. Infrequent organ procurement does not seem to justify the cost (primarily borne by hospitals), consumption of resources, and exposure of health care providers to occupational health hazards. The wisdom of transporting trauma victims suffering cardiopulmonary arrest at the scene or during transport must be questioned. Allocation of resources to these patients is not an insular medical issue, but a broad concern for our society, and society should decide if the "cost of futility" is excessive.
Azan, Antoine; Gailliègue, Florian; Mir, Lluis M; Breton, Marie
2017-01-01
The transport of substances across the cell membrane is complex because the main physiological role of the membrane is the control of the substances that would enter or exit the cells. Life would not be possible without this control. Cell electropulsation corresponds to the delivery of electric pulses to the cells and comprises cell electroporation and cell electropermeabilization. Cell electropulsation allows for the transport of non-permeant molecules across the membrane, bypassing the physiological limitations. In this chapter we discuss the changes occurring in the cell membrane during electroporation or electropermeabilization as they allow to understand which molecules can be transported as well as when and how their transport can occur. Electrophoretic or diffusive transports across the cell membrane can be distinguished. This understanding has a clear impact on the choice of the electrical parameters to be applied to the cells as well as on other aspects of the experimental protocols that have to be set to load the cells with non-permeant molecules.
Real-Time QoS Routing Protocols in Wireless Multimedia Sensor Networks: Study and Analysis.
Alanazi, Adwan; Elleithy, Khaled
2015-09-02
Many routing protocols have been proposed for wireless sensor networks. These routing protocols are almost always based on energy efficiency. However, recent advances in complementary metal-oxide semiconductor (CMOS) cameras and small microphones have led to the development of Wireless Multimedia Sensor Networks (WMSN) as a class of wireless sensor networks which pose additional challenges. The transmission of imaging and video data needs routing protocols with both energy efficiency and Quality of Service (QoS) characteristics in order to guarantee the efficient use of the sensor nodes and effective access to the collected data. Also, with integration of real time applications in Wireless Senor Networks (WSNs), the use of QoS routing protocols is not only becoming a significant topic, but is also gaining the attention of researchers. In designing an efficient QoS routing protocol, the reliability and guarantee of end-to-end delay are critical events while conserving energy. Thus, considerable research has been focused on designing energy efficient and robust QoS routing protocols. In this paper, we present a state of the art research work based on real-time QoS routing protocols for WMSNs that have already been proposed. This paper categorizes the real-time QoS routing protocols into probabilistic and deterministic protocols. In addition, both categories are classified into soft and hard real time protocols by highlighting the QoS issues including the limitations and features of each protocol. Furthermore, we have compared the performance of mobility-aware query based real-time QoS routing protocols from each category using Network Simulator-2 (NS2). This paper also focuses on the design challenges and future research directions as well as highlights the characteristics of each QoS routing protocol.
Real-Time QoS Routing Protocols in Wireless Multimedia Sensor Networks: Study and Analysis
Alanazi, Adwan; Elleithy, Khaled
2015-01-01
Many routing protocols have been proposed for wireless sensor networks. These routing protocols are almost always based on energy efficiency. However, recent advances in complementary metal-oxide semiconductor (CMOS) cameras and small microphones have led to the development of Wireless Multimedia Sensor Networks (WMSN) as a class of wireless sensor networks which pose additional challenges. The transmission of imaging and video data needs routing protocols with both energy efficiency and Quality of Service (QoS) characteristics in order to guarantee the efficient use of the sensor nodes and effective access to the collected data. Also, with integration of real time applications in Wireless Senor Networks (WSNs), the use of QoS routing protocols is not only becoming a significant topic, but is also gaining the attention of researchers. In designing an efficient QoS routing protocol, the reliability and guarantee of end-to-end delay are critical events while conserving energy. Thus, considerable research has been focused on designing energy efficient and robust QoS routing protocols. In this paper, we present a state of the art research work based on real-time QoS routing protocols for WMSNs that have already been proposed. This paper categorizes the real-time QoS routing protocols into probabilistic and deterministic protocols. In addition, both categories are classified into soft and hard real time protocols by highlighting the QoS issues including the limitations and features of each protocol. Furthermore, we have compared the performance of mobility-aware query based real-time QoS routing protocols from each category using Network Simulator-2 (NS2). This paper also focuses on the design challenges and future research directions as well as highlights the characteristics of each QoS routing protocol. PMID:26364639
Performance of the High Sensitivity Open Source Multi-GNSS Assisted GNSS Reference Server.
NASA Astrophysics Data System (ADS)
Sarwar, Ali; Rizos, Chris; Glennon, Eamonn
2015-06-01
The Open Source GNSS Reference Server (OSGRS) exploits the GNSS Reference Interface Protocol (GRIP) to provide assistance data to GPS receivers. Assistance can be in terms of signal acquisition and in the processing of the measurement data. The data transfer protocol is based on Extensible Mark-up Language (XML) schema. The first version of the OSGRS required a direct hardware connection to a GPS device to acquire the data necessary to generate the appropriate assistance. Scenarios of interest for the OSGRS users are weak signal strength indoors, obstructed outdoors or heavy multipath environments. This paper describes an improved version of OSGRS that provides alternative assistance support from a number of Global Navigation Satellite Systems (GNSS). The underlying protocol to transfer GNSS assistance data from global casters is the Networked Transport of RTCM (Radio Technical Commission for Maritime Services) over Internet Protocol (NTRIP), and/or the RINEX (Receiver Independent Exchange) format. This expands the assistance and support model of the OSGRS to globally available GNSS data servers connected via internet casters. A variety of formats and versions of RINEX and RTCM streams become available, which strengthens the assistance provisioning capability of the OSGRS platform. The prime motivation for this work was to enhance the system architecture of the OSGRS to take advantage of globally available GNSS data sources. Open source software architectures and assistance models provide acquisition and data processing assistance for GNSS receivers operating in weak signal environments. This paper describes test scenarios to benchmark the OSGRSv2 performance against other Assisted-GNSS solutions. Benchmarking devices include the SPOT satellite messenger, MS-Based & MS-Assisted GNSS, HSGNSS (SiRFstar-III) and Wireless Sensor Networks Assisted-GNSS. Benchmarked parameters include the number of tracked satellites, the Time to Fix First (TTFF), navigation availability and accuracy. Three different configurations of Multi-GNSS assistance servers were used, namely Cloud-Client-Server, the Demilitarized Zone (DMZ) Client-Server and PC-Client-Server; with respect to the connectivity location of client and server. The impact on the performance based on server and/or client initiation, hardware capability, network latency, processing delay and computation times with their storage, scalability, processing and load sharing capabilities, were analysed. The performance of the OSGRS is compared against commercial GNSS, Assisted-GNSS and WSN-enabled GNSS devices. The OSGRS system demonstrated lower TTFF and higher availability.
Thermostabilisation of membrane proteins for structural studies
Magnani, Francesca; Serrano-Vega, Maria J.; Shibata, Yoko; Abdul-Hussein, Saba; Lebon, Guillaume; Miller-Gallacher, Jennifer; Singhal, Ankita; Strege, Annette; Thomas, Jennifer A.; Tate, Christopher G.
2017-01-01
The thermostability of an integral membrane protein in detergent solution is a key parameter that dictates the likelihood of obtaining well-diffracting crystals suitable for structure determination. However, many mammalian membrane proteins are too unstable for crystallisation. We developed a thermostabilisation strategy based on systematic mutagenesis coupled to a radioligand-binding thermostability assay that can be applied to receptors, ion channels and transporters. It takes approximately 6-12 months to thermostabilise a G protein-coupled receptor (GPCR) containing 300 amino acid residues. The resulting thermostabilised membrane proteins are more easily crystallised and result in high-quality structures. This methodology has facilitated structure-based drug design applied to GPCRs, because it is possible to determine multiple structures of the thermostabilised receptors bound to low affinity ligands. Protocols and advice are given on how to develop thermostability assays for membrane proteins and how to combine mutations to make an optimally stable mutant suitable for structural studies. PMID:27466713
Bharadwaj, Manish S.; Tyrrell, Daniel J.; Lyles, Mary F.; Demons, Jamehl L.; Rogers, George W.; Molina, Anthony J. A.
2015-01-01
Respirometric profiling of isolated mitochondria is commonly used to investigate electron transport chain function. We describe a method for obtaining samples of human Vastus lateralis, isolating mitochondria from minimal amounts of skeletal muscle tissue, and plate based respirometric profiling using an extracellular flux (XF) analyzer. Comparison of respirometric profiles obtained using 1.0, 2.5 and 5.0 μg of mitochondria indicate that 1.0 μg is sufficient to measure respiration and that 5.0 μg provides most consistent results based on comparison of standard errors. Western blot analysis of isolated mitochondria for mitochondrial marker COX IV and non-mitochondrial tissue marker GAPDH indicate that there is limited non-mitochondrial contamination using this protocol. The ability to study mitochondrial respirometry in as little as 20 mg of muscle tissue allows users to utilize individual biopsies for multiple study endpoints in clinical research projects. PMID:25741892
Conditioning laboratory cats to handling and transport.
Gruen, Margaret E; Thomson, Andrea E; Clary, Gillian P; Hamilton, Alexandra K; Hudson, Lola C; Meeker, Rick B; Sherman, Barbara L
2013-10-01
As research subjects, cats have contributed substantially to our understanding of biological systems, from the development of mammalian visual pathways to the pathophysiology of feline immunodeficiency virus as a model for human immunodeficiency virus. Few studies have evaluated humane methods for managing cats in laboratory animal facilities, however, in order to reduce fear responses and improve their welfare. The authors describe a behavioral protocol used in their laboratory to condition cats to handling and transport. Such behavioral conditioning benefits the welfare of the cats, the safety of animal technicians and the quality of feline research data.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Rogers, J.D.
1994-08-04
This report is divided into two parts. The second part is divided into the following sections: experimental protocol; modeling the hollow fiber extractor using film theory; Graetz model of the hollow fiber membrane process; fundamental diffusive-kinetic model; and diffusive liquid membrane device-a rigorous model. The first part is divided into: membrane and membrane process-a concept; metal extraction; kinetics of metal extraction; modeling the membrane contactor; and interfacial phenomenon-boundary conditions-applied to membrane transport.
Application of Mobile-ip to Space and Aeronautical Networks
NASA Technical Reports Server (NTRS)
Leung, Kent; Shell, Dan; Ivancic, William D.; Stewart, David H.; Bell, Terry L.; Kachmar, Brian A.
2001-01-01
The National Aeronautics and Space Administration (NASA) is interested in applying mobile Internet protocol (mobile-ip) technologies to its space and aeronautics programs. In particular, mobile-ip will play a major role in the Advanced Aeronautic Transportation Technology (AAT-F), the Weather Information Communication (WINCOMM), and the Small Aircraft Transportation System (SATS) aeronautics programs. This paper describes mobile-ip and mobile routers--in particular, the features, capabilities, and initial performance of the mobile router are presented. The application of mobile-router technology to NASA's space and aeronautics programs is also discussed.
76 FR 39434 - Notice of Utah's Resource Advisory Council (RAC)
Federal Register 2010, 2011, 2012, 2013, 2014
2011-07-06
... wildlife, livestock water quality, and recreational opportunities of ``time control'' grazing. A... protocol. The conference call with Director Abbey will take place from 1-1:45 p.m. (Mountain Time). A half.... All meetings are open to the public; however, transportation, lodging, and meals are the...
USDA-ARS?s Scientific Manuscript database
Linear disturbances associated with on and off-road vehicle use on rangelands has increased dramatically throughout the world in recent decades. This increase is due to a variety of factors including increased availability of all-terrain vehicles, infrastructure development (oil, gas, renewable ene...
NASA Astrophysics Data System (ADS)
Hong, Eun-Mi; Park, Yongeun; Muirhead, Richard; Pachepsky, Yakov
2017-04-01
Pathogenic microorganisms in recreational and irrigation waters remain the subject of concern. Water quality models are used to estimate microbial quality of water sources, to evaluate microbial contamination-related risks, to guide the microbial water quality monitoring, and to evaluate the effect of agricultural management on the microbial water quality. The Agricultural Policy/Environmental eXtender (APEX) is the watershed-scale water quality model that includes highly detailed representation of agricultural management. The APEX currently does not have microbial fate and transport simulation capabilities. The objective of this work was to develop the first APEX microbial fate and transport module that could use the APEX conceptual model of manure removal together with recently introduced conceptualizations of the in-stream microbial fate and transport. The module utilizes manure erosion rates found in the APEX. The total number of removed bacteria was set to the concentrations of bacteria in soil-manure mixing layer and eroded manure amount. Bacteria survival in soil-manure mixing layer was simulated with the two-stage survival model. Individual survival patterns were simulated for each manure application date. Simulated in-stream microbial fate and transport processes included the reach-scale passive release of bacteria with resuspended bottom sediment during high flow events, the transport of bacteria from bottom sediment due to the hyporheic exchange during low flow periods, the deposition with settling sediment, and the two-stage survival. Default parameter values were available from recently published databases. The APEX model with the newly developed microbial fate and transport module was applied to simulate seven years of monitoring data for the Toenepi watershed in New Zealand. The stream network of the watershed ran through grazing lands with the daily bovine waste deposition. Based on calibration and testing results, the APEX with the microbe module reproduced well the monitored pattern of E. coli concentrations at the watershed outlet. The APEX with the microbial fate and transport module will be utilized for predicting microbial quality of water under various agricultural practices (grazing, cropping, and manure application), evaluating monitoring protocols, and supporting the selection of management practices based on regulations that rely on fecal indicator bacteria concentrations. Future development should include modeling contributions of wildlife, manure weathering, and weather effects on manure-borne microorganism survival and release.
Enhancement of Beaconless Location-Based Routing with Signal Strength Assistance for Ad-Hoc Networks
NASA Astrophysics Data System (ADS)
Chen, Guowei; Itoh, Kenichi; Sato, Takuro
Routing in Ad-hoc networks is unreliable due to the mobility of the nodes. Location-based routing protocols, unlike other protocols which rely on flooding, excel in network scalability. Furthermore, new location-based routing protocols, like, e. g. BLR [1], IGF [2], & CBF [3] have been proposed, with the feature of not requiring beacons in MAC-layer, which improve more in terms of scalability. Such beaconless routing protocols can work efficiently in dense network areas. However, these protocols' algorithms have no ability to avoid from routing into sparse areas. In this article, historical signal strength has been added as a factor into the BLR algorithm, which avoids routing into sparse area, and consequently improves the global routing efficiency.
A proportional integral estimator-based clock synchronization protocol for wireless sensor networks.
Yang, Wenlun; Fu, Minyue
2017-11-01
Clock synchronization is an issue of vital importance in applications of WSNs. This paper proposes a proportional integral estimator-based protocol (EBP) to achieve clock synchronization for wireless sensor networks. As each local clock skew gradually drifts, synchronization accuracy will decline over time. Compared with existing consensus-based approaches, the proposed synchronization protocol improves synchronization accuracy under time-varying clock skews. Moreover, by restricting synchronization error of clock skew into a relative small quantity, it could reduce periodic re-synchronization frequencies. At last, a pseudo-synchronous implementation for skew compensation is introduced as synchronous protocol is unrealistic in practice. Numerical simulations are shown to illustrate the performance of the proposed protocol. Copyright © 2017 ISA. Published by Elsevier Ltd. All rights reserved.
Cryptanalysis of an inter-bank E-payment protocol based on quantum proxy blind signature
NASA Astrophysics Data System (ADS)
Cai, Xiao-Qiu; Wei, Chun-Yan
2013-04-01
We analyze the security of an inter-bank E-payment protocol based on quantum proxy blind signature, and find that there is a security leak in the quantum channels of this protocol, which gives a chance for an outside opponent to launch a special denial-of-service attack. Furthermore, we show that the dishonest merchant can succeed to change the purchase information of the customer in this protocol.
A two-hop based adaptive routing protocol for real-time wireless sensor networks.
Rachamalla, Sandhya; Kancherla, Anitha Sheela
2016-01-01
One of the most important and challenging issues in wireless sensor networks (WSNs) is to optimally manage the limited energy of nodes without degrading the routing efficiency. In this paper, we propose an energy-efficient adaptive routing mechanism for WSNs, which saves energy of nodes by removing the much delayed packets without degrading the real-time performance of the used routing protocol. It uses the adaptive transmission power algorithm which is based on the attenuation of the wireless link to improve the energy efficiency. The proposed routing mechanism can be associated with any geographic routing protocol and its performance is evaluated by integrating with the well known two-hop based real-time routing protocol, PATH and the resulting protocol is energy-efficient adaptive routing protocol (EE-ARP). The EE-ARP performs well in terms of energy consumption, deadline miss ratio, packet drop and end-to-end delay.
Microcomputer Nurse-Practitioner Protocols
Way, Anthony B.; Rowley, Blair A.; White, Melanie A.
1982-01-01
We have developed a set of protocols on a microcomputer to assist in the management of a geographically isolated nurse practitioner. If a mid-level practitioner is supervised by a physician, some system is needed to ensure that approved care is being provided. The currently available paper-based protocols do not adequately serve all the needs for training, auditing, and record keeping. Conversely, adequate systems based on large computers are not feasible for small clinics. We have therefore developed a microcomputer-based system of protocols for a small rural nurse-practitioner's clinic. Our programs are designed for direct use by the practitioners while the patient is in the clinic. The user is given immediate feedback about any errors. The supervisor is later provided with a summary of the protocol uses and errors, and a copy of any erroneous records. The system appears to be easy to use by the nurse practitioner. The protocols are quickly learned and auditing is facilitated.
Distance-Based and Low Energy Adaptive Clustering Protocol for Wireless Sensor Networks
Gani, Abdullah; Anisi, Mohammad Hossein; Ab Hamid, Siti Hafizah; Akhunzada, Adnan; Khan, Muhammad Khurram
2016-01-01
A wireless sensor network (WSN) comprises small sensor nodes with limited energy capabilities. The power constraints of WSNs necessitate efficient energy utilization to extend the overall network lifetime of these networks. We propose a distance-based and low-energy adaptive clustering (DISCPLN) protocol to streamline the green issue of efficient energy utilization in WSNs. We also enhance our proposed protocol into the multi-hop-DISCPLN protocol to increase the lifetime of the network in terms of high throughput with minimum delay time and packet loss. We also propose the mobile-DISCPLN protocol to maintain the stability of the network. The modelling and comparison of these protocols with their corresponding benchmarks exhibit promising results. PMID:27658194
NASA Astrophysics Data System (ADS)
Nikitin, I. A.; Sherstnev, V. S.; Sherstneva, A. I.; Botygin, I. A.
2017-02-01
The results of the research of existent routing protocols in wireless networks and their main features are discussed in the paper. Basing on the protocol data, the routing protocols in wireless networks, including search routing algorithms and phone directory exchange algorithms, are designed with the ‘WiFi-Direct’ technology. Algorithms without IP-protocol were designed, and that enabled one to increase the efficiency of the algorithms while working only with the MAC-addresses of the devices. The developed algorithms are expected to be used in the mobile software engineering with the Android platform taken as base. Easier algorithms and formats of the well-known route protocols, rejection of the IP-protocols enables to use the developed protocols on more primitive mobile devices. Implementation of the protocols to the engineering industry enables to create data transmission networks among working places and mobile robots without any access points.
An energy-aware routing protocol for query-based applications in wireless sensor networks.
Ahvar, Ehsan; Ahvar, Shohreh; Lee, Gyu Myoung; Crespi, Noel
2014-01-01
Wireless sensor network (WSN) typically has energy consumption restriction. Designing energy-aware routing protocol can significantly reduce energy consumption in WSNs. Energy-aware routing protocols can be classified into two categories, energy savers and energy balancers. Energy saving protocols are used to minimize the overall energy consumed by a WSN, while energy balancing protocols attempt to efficiently distribute the consumption of energy throughout the network. In general terms, energy saving protocols are not necessarily good at balancing energy consumption and energy balancing protocols are not always good at reducing energy consumption. In this paper, we propose an energy-aware routing protocol (ERP) for query-based applications in WSNs, which offers a good trade-off between traditional energy balancing and energy saving objectives and supports a soft real time packet delivery. This is achieved by means of fuzzy sets and learning automata techniques along with zonal broadcasting to decrease total energy consumption.
An Energy-Aware Routing Protocol for Query-Based Applications in Wireless Sensor Networks
Crespi, Noel
2014-01-01
Wireless sensor network (WSN) typically has energy consumption restriction. Designing energy-aware routing protocol can significantly reduce energy consumption in WSNs. Energy-aware routing protocols can be classified into two categories, energy savers and energy balancers. Energy saving protocols are used to minimize the overall energy consumed by a WSN, while energy balancing protocols attempt to efficiently distribute the consumption of energy throughout the network. In general terms, energy saving protocols are not necessarily good at balancing energy consumption and energy balancing protocols are not always good at reducing energy consumption. In this paper, we propose an energy-aware routing protocol (ERP) for query-based applications in WSNs, which offers a good trade-off between traditional energy balancing and energy saving objectives and supports a soft real time packet delivery. This is achieved by means of fuzzy sets and learning automata techniques along with zonal broadcasting to decrease total energy consumption. PMID:24696640
Communication protocol in chassis detecting wireless transmission system based on WiFi
USDA-ARS?s Scientific Manuscript database
In chassis detecting wireless transmission system, the wireless network communication protocol plays a key role in the information exchange and synchronization between the host and chassis PDA. This paper presents a wireless network transmission protocol based on TCP/IP which makes the rules of info...
NASA Astrophysics Data System (ADS)
Zhang, Li; Jabbari, Faryar; Brown, Tim; Samuelsen, Scott
2014-12-01
Plug-in electric vehicles (PEVs) shift energy consumption from petroleum to electricity for the personal transportation sector. This work proposes a decentralized charging protocol for PEVs with grid operators updating the cost signal. Each PEV calculates its own optimal charging profile only once based on the cost signal, after it is plugged in, and sends the result back to the grid operators. Grid operators only need to aggregate charging profiles and update the load and cost. The existing PEV characteristics, national household travel survey (NHTS), California Independent System Operator (CAISO) demand, and estimates for future renewable generation in California are used to simulate PEV operation, PEV charging profiles, grid demand, and grid net load (demand minus renewable). Results show the proposed protocol has good performance for overnight net load valley filling if the costs to be minimized are proportional to the net load. Annual results are shown in terms of overnight load variation and comparisons are made with grid level valley filling results. Further, a target load can be approached in the same manner by using the gap between current load and the target load as the cost. The communication effort involved is quite modest.
Image-based Lagrangian Particle Tracking in Bed-load Experiments.
Radice, Alessio; Sarkar, Sankar; Ballio, Francesco
2017-07-20
Image analysis has been increasingly used for the measurement of river flows due to its capabilities to furnish detailed quantitative depictions at a relatively low cost. This manuscript describes an application of particle tracking velocimetry (PTV) to a bed-load experiment with lightweight sediment. The key characteristics of the investigated sediment transport conditions were the presence of a covered flow and of a fixed rough bed above which particles were released in limited number at the flume inlet. Under the applied flow conditions, the motion of the individual bed-load particles was intermittent, with alternating movement and stillness terms. The flow pattern was preliminarily characterized by acoustic measurements of vertical profiles of the stream-wise velocity. During process visualization, a large field of view was obtained using two action-cameras placed at different locations along the flume. The experimental protocol is described in terms of channel calibration, experiment realization, image pre-processing, automatic particle tracking, and post-processing of particle track data from the two cameras. The presented proof-of-concept results include probability distributions of the particle hop length and duration. The achievements of this work are compared to those of existing literature to demonstrate the validity of the protocol.
Exercise based transportation reduces oil consumption and carbon emissions
NASA Astrophysics Data System (ADS)
Higgins, P. A.
2004-12-01
Current abuse and misrepresentation of science hinders society's ability to address climate change. Scientific abuse results, in part, from a widespread perception that curbing emissions will require substantial economic, political, or personal sacrifice. Here I provide one example to illustrate that this perception is false. Simply walking or biking the amount recommended for a healthy lifestyle could reduce carbon emissions up to 11 percent if the distances traveled were substituted for car travel. This level of exercise is also sufficient to eliminate obese and overweight conditions in a few years without draconian diet plans. A reduction in carbon dioxide emissions of roughly 35 percent is possible if the revenue saved through decreased health care spending on obesity is redirected toward carbon abatement. This emissions reduction far exceeds that required by the Kyoto Protocol at no net cost. Finally, widespread substitution of driving with distances traveled during recommended daily exercise would considerably ease societal dependence on oil, which leads not only to climate change but also to air pollution, political and economic instability and habitat degradation. Thus, exercise based transportation constitutes a potentially favorable alternative to the energy and diet plans that are currently under consideration and a substantial step toward dealing with the threat of climate change.
Reconfigurable PCI Express cards for low-latency data transport in HEP experiments
NASA Astrophysics Data System (ADS)
Ammendola, R.; Biagioni, A.; Cretaro, P.; Frezza, O.; Lamanna, G.; Lo Cicero, F.; Lonardo, A.; Martinelli, M.; Paolucci, P. S.; Pastorelli, E.; Pontisso, L.; Simula, F.; Vicini, P.
2017-01-01
State-of-the-art technology supports the High Energy Physics community in addressing the problem of managing an overwhelming amount of experimental data. From the point of view of communication between the detectors' readout system and computing nodes, the critical issues are the following: latency, moving data in a deterministic and low amount of time; bandwidth, guaranteeing the maximum capability of the link and communication protocol adopted; endpoint consolidation, tight aggregation of channels on a single board. This contribution describes the status and performances of the NaNet project, whose goal is the design of a family of FPGA-based PCIe network interface cards. The efforts of the team are focused on implementing a low-latency, real-time data transport mechanism between the board network multi-channel system and CPU and GPU accelerators memories on the host. Several opportunities concerning technical solutions and scientific applications have been explored: NaNet-1 with a single GbE I/O interface, and NaNet-10, offering four 10GbE ports, for activities related to the GPU-based real-time trigger of NA62 experiment at CERN; NaNet ^3 , with four 2.5Gbit optical channels, developed for the KM3NeT-ITALIA underwater neutrino telescope.
Rossano, Adam J; Romero, Michael F
2017-08-11
Epithelial ion transport is vital to systemic ion homeostasis as well as maintenance of essential cellular electrochemical gradients. Intracellular pH (pHi) is influenced by many ion transporters and thus monitoring pHi is a useful tool for assessing transporter activity. Modern Genetically Encoded pH-Indicators (GEpHIs) provide optical quantification of pHi in intact cells on a cellular and subcellular scale. This protocol describes real-time quantification of cellular pHi regulation in Malpighian Tubules (MTs) of Drosophila melanogaster through ex vivo live-imaging of pHerry, a pseudo-ratiometric GEpHI with a pKa well-suited to track pH changes in the cytosol. Extracted adult fly MTs are composed of morphologically and functionally distinct sections of single-cell layer epithelia, and can serve as an accessible and genetically tractable model for investigation of epithelial transport. GEpHIs offer several advantages over conventional pH-sensitive fluorescent dyes and ion-selective electrodes. GEpHIs can label distinct cell populations provided appropriate promoter elements are available. This labeling is particularly useful in ex vivo, in vivo, and in situ preparations, which are inherently heterogeneous. GEpHIs also permit quantification of pHi in intact tissues over time without need for repeated dye treatment or tissue externalization. The primary drawback of current GEpHIs is the tendency to aggregate in cytosolic inclusions in response to tissue damage and construct over-expression. These shortcomings, their solutions, and the inherent advantages of GEpHIs are demonstrated in this protocol through assessment of basolateral proton (H + ) transport in functionally distinct principal and stellate cells of extracted fly MTs. The techniques and analysis described are readily adaptable to a wide variety of vertebrate and invertebrate preparations, and the sophistication of the assay can be scaled from teaching labs to intricate determination of ion flux via specific transporters.
Container Inspection Utilizing 14 MeV Neutrons
NASA Astrophysics Data System (ADS)
Valkovic, Vladivoj; Sudac, Davorin; Nad, Karlo; Obhodas, Jasmina
2016-06-01
A proposal for an autonomous and flexible ship container inspection system is presented. This could be accomplished by the incorporation of an inspection system on various container transportation devices (straddle carriers, yard gentry cranes, automated guided vehicles, trailers). The configuration is terminal specific and it should be defined by the container terminal operator. This enables that no part of the port operational area is used for inspection. The inspection scenario includes container transfer from ship to transportation device with the inspection unit mounted on it. The inspection is performed during actual container movement to the container location. A neutron generator without associated alpha particle detection is used. This allows the use of higher neutron intensities (5 × 109 - 1010 n/s in 4π). The inspected container is stationary in the “inspection position” on the transportation device while the “inspection unit” moves along its side. The following analytical methods will be used simultaneously: neutron radiography, X-ray radiography, neutron activation analysis, (n, γ) and (n,n'γ) reactions, neutron absorption. and scattering, X-ray backscattering. The neutron techniques will utilize “smart collimators” for neutrons and gamma rays, both emitted and detected. The inspected voxel is defined by the intersection of the neutron generator and the detectors solid angles. The container inspection protocol is based on identification of discrepancies between the cargo manifest, elemental “fingerprint” and radiography profiles. In addition, the information on container weight is obtained during the container transport and screening by measuring of density of material in the container.
A mobile mapping system for spatial information based on DGPS/EGIS
NASA Astrophysics Data System (ADS)
Pei, Ling; Wang, Qing; Gu, Juan
2007-11-01
With the rapid developments of mobile device and wireless communication, it brings a new challenge for acquiring the spatial information. A mobile mapping system based on differential global position system (DGPS) integrated with embedded geographic information system (EGIS) is designed. A mobile terminal adapts to various GPS differential environments such as single base mode and network GPS mode like Virtual Reference Station (VRS) and Master- Auxiliary Concept (MAC) by the mobile communication technology. The spatial information collected through DGPS is organized in an EGIS running in the embedded device. A set of mobile terminal in real-time DGPS based on GPRS adopting multithreading technique of serial port in manner of simulating overlapped I/O operating is developed, further more, the GPS message analysis and checkout based on Strategy Pattern for various receivers are included in the process of development. A mobile terminal accesses to the GPS network successfully by NTRIP (Networked Transport of RTCM via Internet Protocol) compliance. Finally, the accuracy and reliability of the mobile mapping system are proved by a lot of testing in 9 provinces all over the country.
Furberg, Robert D; Zulkiewicz, Brittany A; Hudson, Jordan P; Taylor, Olivia M; Lewis, Megan A
2016-01-01
Background Tablet-based health care interventions have the potential to encourage patient care in a timelier manner, allow physicians convenient access to patient records, and provide an improved method for patient education. However, along with the continued adoption of tablet technologies, there is a concomitant need to develop protocols focusing on the configuration, management, and maintenance of these devices within the health care setting to support the conduct of clinical research. Objective Develop three protocols to support tablet configuration, tablet management, and tablet maintenance. Methods The Configurator software, Tile technology, and current infection control recommendations were employed to develop three distinct protocols for tablet-based digital health interventions. Configurator is a mobile device management software specifically for iPhone operating system (iOS) devices. The capabilities and current applications of Configurator were reviewed and used to develop the protocol to support device configuration. Tile is a tracking tag associated with a free mobile app available for iOS and Android devices. The features associated with Tile were evaluated and used to develop the Tile protocol to support tablet management. Furthermore, current recommendations on preventing health care–related infections were reviewed to develop the infection control protocol to support tablet maintenance. Results This article provides three protocols: the Configurator protocol, the Tile protocol, and the infection control protocol. Conclusions These protocols can help to ensure consistent implementation of tablet-based interventions, enhance fidelity when employing tablets for research purposes, and serve as a guide for tablet deployments within clinical settings. PMID:27350013
NASA Astrophysics Data System (ADS)
Wang, D.; Jia, W.; Olsen, S. C.; Wuebbles, D. J.; Dubey, M. K.; Rockett, A. A.
2013-07-01
The prospective future adoption of molecular hydrogen (H2) to power the road transportation sector could greatly improve tropospheric air quality but also raises the question of whether the adoption would have adverse effects on the stratospheric ozone. The possibility of undesirable impacts must be fully evaluated to guide future policy decisions. Here we evaluate the possible impact of a future (2050) H2-based road transportation sector on stratospheric composition and chemistry, especially on the stratospheric ozone, with the MOZART (Model for OZone And Related chemical Tracers) model. Since future growth is highly uncertain, we evaluate the impact of two world evolution scenarios, one based on an IPCC (Intergovernmental Panel on Climate Change) high-emitting scenario (A1FI) and the other on an IPCC low-emitting scenario (B1), as well as two technological options: H2 fuel cells and H2 internal combustion engines. We assume a H2 leakage rate of 2.5% and a complete market penetration of H2 vehicles in 2050. The model simulations show that a H2-based road transportation sector would reduce stratospheric ozone concentrations as a result of perturbed catalytic ozone destruction cycles. The magnitude of the impact depends on which growth scenario evolves and which H2 technology option is applied. For the evolution growth scenario, stratospheric ozone decreases more in the H2 fuel cell scenarios than in the H2 internal combustion engine scenarios because of the NOx emissions in the latter case. If the same technological option is applied, the impact is larger in the A1FI emission scenario. The largest impact, a 0.54% decrease in annual average global mean stratospheric column ozone, is found with a H2 fuel cell type road transportation sector in the A1FI scenario; whereas the smallest impact, a 0.04% increase in stratospheric ozone, is found with applications of H2 internal combustion engine vehicles in the B1 scenario. The impacts of the other two scenarios fall between the above two boundary scenarios. However, the magnitude of these changes is much smaller than the increases in 2050 stratospheric ozone projected, as stratospheric ozone is expected to recover due to the limits in ozone depleting substance emissions imposed in the Montreal Protocol.
Studies of Trace Gas Chemical Cycles Using Inverse Methods and Global Chemical Transport Models
NASA Technical Reports Server (NTRS)
Prinn, Ronald G.
2003-01-01
We report progress in the first year, and summarize proposed work for the second year of the three-year dynamical-chemical modeling project devoted to: (a) development, testing, and refining of inverse methods for determining regional and global transient source and sink strengths for long lived gases important in ozone depletion and climate forcing, (b) utilization of inverse methods to determine these source/sink strengths using either MATCH (Model for Atmospheric Transport and Chemistry) which is based on analyzed observed wind fields or back-trajectories computed from these wind fields, (c) determination of global (and perhaps regional) average hydroxyl radical concentrations using inverse methods with multiple titrating gases, and (d) computation of the lifetimes and spatially resolved destruction rates of trace gases using 3D models. Important goals include determination of regional source strengths of methane, nitrous oxide, methyl bromide, and other climatically and chemically important biogenic/anthropogenic trace gases and also of halocarbons restricted by the Montreal protocol and its follow-on agreements and hydrohalocarbons now used as alternatives to the restricted halocarbons.
One Step Quantum Key Distribution Based on EPR Entanglement
Li, Jian; Li, Na; Li, Lei-Lei; Wang, Tao
2016-01-01
A novel quantum key distribution protocol is presented, based on entanglement and dense coding and allowing asymptotically secure key distribution. Considering the storage time limit of quantum bits, a grouping quantum key distribution protocol is proposed, which overcomes the vulnerability of first protocol and improves the maneuverability. Moreover, a security analysis is given and a simple type of eavesdropper’s attack would introduce at least an error rate of 46.875%. Compared with the “Ping-pong” protocol involving two steps, the proposed protocol does not need to store the qubit and only involves one step. PMID:27357865
Two new Controlled not Gate Based Quantum Secret Sharing Protocols without Entanglement Attenuation
NASA Astrophysics Data System (ADS)
Zhu, Zhen-Chao; Hu, Ai-Qun; Fu, An-Min
2016-05-01
In this paper, we propose two new controlled not gate based quantum secret sharing protocols. In these two protocols, each photon only travels once, which guarantees the agents located in long distance can be able to derive the dealer's secret without suffering entanglement attenuation problem. The protocols are secure against trojan horse attack, intercept-resend attack, entangle-measure attack and entanglement-swapping attack. The theoretical efficiency for qubits of these two protocols can approach 100 %, except those used for eavesdropping checking, all entangled states can be used for final secret sharing.
Butler, Ashleigh; Hall, Helen; Copnell, Beverley
2016-06-01
The qualitative systematic review is a rapidly developing area of nursing research. In order to present trustworthy, high-quality recommendations, such reviews should be based on a review protocol to minimize bias and enhance transparency and reproducibility. Although there are a number of resources available to guide researchers in developing a quantitative review protocol, very few resources exist for qualitative reviews. To guide researchers through the process of developing a qualitative systematic review protocol, using an example review question. The key elements required in a systematic review protocol are discussed, with a focus on application to qualitative reviews: Development of a research question; formulation of key search terms and strategies; designing a multistage review process; critical appraisal of qualitative literature; development of data extraction techniques; and data synthesis. The paper highlights important considerations during the protocol development process, and uses a previously developed review question as a working example. This paper will assist novice researchers in developing a qualitative systematic review protocol. By providing a worked example of a protocol, the paper encourages the development of review protocols, enhancing the trustworthiness and value of the completed qualitative systematic review findings. Qualitative systematic reviews should be based on well planned, peer reviewed protocols to enhance the trustworthiness of results and thus their usefulness in clinical practice. Protocols should outline, in detail, the processes which will be used to undertake the review, including key search terms, inclusion and exclusion criteria, and the methods used for critical appraisal, data extraction and data analysis to facilitate transparency of the review process. Additionally, journals should encourage and support the publication of review protocols, and should require reference to a protocol prior to publication of the review results. © 2016 Sigma Theta Tau International.
In vitro microfluidic circulatory system for circulating cancer cells
wan, jiandi; Fan, Rong; Emery, Travis; Zhang, Yongguo; Xia, Yuxuan; Sun, Jun; Wan, Jiandi
2016-01-01
Circulating tumor cells (CTCs) experience hemodynamic shear stress in circulation and play critical roles in cancer metastasis. The effect of shear on CTCs, however, remains less studied. Here, we described a protocol to circulate HCT116 human colon cancer cells in a microfluidic circulatory system mimicking physiologically relevant circulating conditions. This protocol represents a useful scaffold to mimic the transportation of CTCs in circulation and thus provides an effective means to study the effect of shear on CTCs. We anticipate that future studies using the developed system will help us to further investigate the regulatory roles of shear in molecular responses of CTCs. PMID:28690779
Issues in providing a reliable multicast facility
NASA Technical Reports Server (NTRS)
Dempsey, Bert J.; Strayer, W. Timothy; Weaver, Alfred C.
1990-01-01
Issues involved in point-to-multipoint communication are presented and the literature for proposed solutions and approaches surveyed. Particular attention is focused on the ideas and implementations that align with the requirements of the environment of interest. The attributes of multicast receiver groups that might lead to useful classifications, what the functionality of a management scheme should be, and how the group management module can be implemented are examined. The services that multicasting facilities can offer are presented, followed by mechanisms within the communications protocol that implements these services. The metrics of interest when evaluating a reliable multicast facility are identified and applied to four transport layer protocols that incorporate reliable multicast.
QKD-based quantum private query without a failure probability
NASA Astrophysics Data System (ADS)
Liu, Bin; Gao, Fei; Huang, Wei; Wen, QiaoYan
2015-10-01
In this paper, we present a quantum-key-distribution (QKD)-based quantum private query (QPQ) protocol utilizing single-photon signal of multiple optical pulses. It maintains the advantages of the QKD-based QPQ, i.e., easy to implement and loss tolerant. In addition, different from the situations in the previous QKD-based QPQ protocols, in our protocol, the number of the items an honest user will obtain is always one and the failure probability is always zero. This characteristic not only improves the stability (in the sense that, ignoring the noise and the attack, the protocol would always succeed), but also benefits the privacy of the database (since the database will no more reveal additional secrets to the honest users). Furthermore, for the user's privacy, the proposed protocol is cheat sensitive, and for security of the database, we obtain an upper bound for the leaked information of the database in theory.
Optimization of the scan protocols for CT-based material extraction in small animal PET/CT studies
NASA Astrophysics Data System (ADS)
Yang, Ching-Ching; Yu, Jhih-An; Yang, Bang-Hung; Wu, Tung-Hsin
2013-12-01
We investigated the effects of scan protocols on CT-based material extraction to minimize radiation dose while maintaining sufficient image information in small animal studies. The phantom simulation experiments were performed with the high dose (HD), medium dose (MD) and low dose (LD) protocols at 50, 70 and 80 kVp with varying mA s. The reconstructed CT images were segmented based on Hounsfield unit (HU)-physical density (ρ) calibration curves and the dual-energy CT-based (DECT) method. Compared to the (HU;ρ) method performed on CT images acquired with the 80 kVp HD protocol, a 2-fold improvement in segmentation accuracy and a 7.5-fold reduction in radiation dose were observed when the DECT method was performed on CT images acquired with the 50/80 kVp LD protocol, showing the possibility to reduce radiation dose while achieving high segmentation accuracy.
Whicker, Jeffrey J; Pinder, John E; Ibrahim, Shawki A; Stone, James M; Breshears, David D; Baker, Kristine N
2007-07-01
The environmental mobility of newly deposited radionuclides in surface soil is driven by complex biogeochemical relationships, which have significant impacts on transport pathways. The partition coefficient (Kd) is useful for characterizing the soil-solution exchange kinetics and is an important factor for predicting relative amounts of a radionuclide transported to groundwater compared to that remaining on soil surfaces and thus available for transport through erosion processes. Measurements of Kd for 238U are particularly useful because of the extensive use of 238U in military applications and associated testing, such as done at Los Alamos National Laboratory (LANL). Site-specific measurements of Kd for 238U are needed because Kd is highly dependent on local soil conditions and also on the fine soil fraction because 238U concentrates onto smaller soil particles, such as clays and soil organic material, which are most susceptible to wind erosion and contribute to inhalation exposure in off-site populations. We measured Kd for uranium in soils from two neighboring semiarid forest sites at LANL using a U.S. Environmental Protection Agency (EPA)-based protocol for both whole soil and the fine soil fraction (diameters<45 microm). The 7-d Kd values, which are those specified in the EPA protocol, ranged from 276-508 mL g-1 for whole soil and from 615-2249 mL g-1 for the fine soil fraction. Unexpectedly, the 30-d Kd values, measured to test for soil-solution exchange equilibrium, were more than two times the 7-d values. Rates of adsorption of 238U to soil from solution were derived using a 2-component (FAST and SLOW) exponential model. We found significant differences in Kd values among LANL sampling sites, between whole and fine soils, and between 7-d and 30-d Kd measurements. The significant variation in soil-solution exchange kinetics among the soils and soil sizes promotes the use of site-specific data for estimates of environmental transport rates and suggests possible differences in desorption rates from soil to solution (e.g., into groundwater or lung fluid). We also explore potential relationships between wind erosion, soil characteristics, and Kd values. Combined, our results highlight the need for a better mechanistic understanding of soil-solution partitioning kinetics for accurate risk assessment.
NASA Technical Reports Server (NTRS)
Wallett, Thomas M.
2009-01-01
This paper surveys and describes some of the existing media access control and data link layer technologies for possible application in lunar surface communications and the advanced wideband Direct Sequence Code Division Multiple Access (DSCDMA) conceptual systems utilizing phased-array technology that will evolve in the next decade. Time Domain Multiple Access (TDMA) and Code Division Multiple Access (CDMA) are standard Media Access Control (MAC) techniques that can be incorporated into lunar surface communications architectures. Another novel hybrid technique that is recently being developed for use with smart antenna technology combines the advantages of CDMA with those of TDMA. The relatively new and sundry wireless LAN data link layer protocols that are continually under development offer distinct advantages for lunar surface applications over the legacy protocols which are not wireless. Also several communication transport and routing protocols can be chosen with characteristics commensurate with smart antenna systems to provide spacecraft communications for links exhibiting high capacity on the surface of the Moon. The proper choices depend on the specific communication requirements.
IMHRP: Improved Multi-Hop Routing Protocol for Wireless Sensor Networks
NASA Astrophysics Data System (ADS)
Huang, Jianhua; Ruan, Danwei; Hong, Yadong; Zhao, Ziming; Zheng, Hong
2017-10-01
Wireless sensor network (WSN) is a self-organizing system formed by a large number of low-cost sensor nodes through wireless communication. Sensor nodes collect environmental information and transmit it to the base station (BS). Sensor nodes usually have very limited battery energy. The batteries cannot be charged or replaced. Therefore, it is necessary to design an energy efficient routing protocol to maximize the network lifetime. This paper presents an improved multi-hop routing protocol (IMHRP) for homogeneous networks. In the IMHRP protocol, based on the distances to the BS, the CH nodes are divided into internal CH nodes and external CH nodes. The set-up phase of the protocol is based on the LEACH protocol and the minimum distance between CH nodes are limited to a special constant distance, so a more uniform distribution of CH nodes is achieved. In the steady-state phase, the routes of different CH nodes are created on the basis of the distances between the CH nodes. The energy efficiency of communication can be maximized. The simulation results show that the proposed algorithm can more effectively reduce the energy consumption of each round and prolong the network lifetime compared with LEACH protocol and MHT protocol.
Enhancing user privacy in SARG04-based private database query protocols
NASA Astrophysics Data System (ADS)
Yu, Fang; Qiu, Daowen; Situ, Haozhen; Wang, Xiaoming; Long, Shun
2015-11-01
The well-known SARG04 protocol can be used in a private query application to generate an oblivious key. By usage of the key, the user can retrieve one out of N items from a database without revealing which one he/she is interested in. However, the existing SARG04-based private query protocols are vulnerable to the attacks of faked data from the database since in its canonical form, the SARG04 protocol lacks means for one party to defend attacks from the other. While such attacks can cause significant loss of user privacy, a variant of the SARG04 protocol is proposed in this paper with new mechanisms designed to help the user protect its privacy in private query applications. In the protocol, it is the user who starts the session with the database, trying to learn from it bits of a raw key in an oblivious way. An honesty test is used to detect a cheating database who had transmitted faked data. The whole private query protocol has O( N) communication complexity for conveying at least N encrypted items. Compared with the existing SARG04-based protocols, it is efficient in communication for per-bit learning.
A Family of ACO Routing Protocols for Mobile Ad Hoc Networks
Rupérez Cañas, Delfín; Sandoval Orozco, Ana Lucila; García Villalba, Luis Javier; Kim, Tai-hoon
2017-01-01
In this work, an ACO routing protocol for mobile ad hoc networks based on AntHocNet is specified. As its predecessor, this new protocol, called AntOR, is hybrid in the sense that it contains elements from both reactive and proactive routing. Specifically, it combines a reactive route setup process with a proactive route maintenance and improvement process. Key aspects of the AntOR protocol are the disjoint-link and disjoint-node routes, separation between the regular pheromone and the virtual pheromone in the diffusion process and the exploration of routes, taking into consideration the number of hops in the best routes. In this work, a family of ACO routing protocols based on AntOR is also specified. These protocols are based on protocol successive refinements. In this work, we also present a parallelized version of AntOR that we call PAntOR. Using programming multiprocessor architectures based on the shared memory protocol, PAntOR allows running tasks in parallel using threads. This parallelization is applicable in the route setup phase, route local repair process and link failure notification. In addition, a variant of PAntOR that consists of having more than one interface, which we call PAntOR-MI (PAntOR-Multiple Interface), is specified. This approach parallelizes the sending of broadcast messages by interface through threads. PMID:28531159
Perumal, Madhumathy; Dhandapani, Sivakumar
2015-01-01
Data gathering and optimal path selection for wireless sensor networks (WSN) using existing protocols result in collision. Increase in collision further increases the possibility of packet drop. Thus there is a necessity to eliminate collision during data aggregation. Increasing the efficiency is the need of the hour with maximum security. This paper is an effort to come up with a reliable and energy efficient WSN routing and secure protocol with minimum delay. This technique is named as relay node based secure routing protocol for multiple mobile sink (RSRPMS). This protocol finds the rendezvous point for optimal transmission of data using a "splitting tree" technique in tree-shaped network topology and then to determine all the subsequent positions of a sink the "Biased Random Walk" model is used. In case of an event, the sink gathers the data from all sources, when they are in the sensing range of rendezvous point. Otherwise relay node is selected from its neighbor to transfer packets from rendezvous point to sink. A symmetric key cryptography is used for secure transmission. The proposed relay node based secure routing protocol for multiple mobile sink (RSRPMS) is experimented and simulation results are compared with Intelligent Agent-Based Routing (IAR) protocol to prove that there is increase in the network lifetime compared with other routing protocols.
Chen, Huifang; Fan, Guangyu; Xie, Lei; Cui, Jun-Hong
2013-01-01
Due to the characteristics of underwater acoustic channel, media access control (MAC) protocols designed for underwater acoustic sensor networks (UWASNs) are quite different from those for terrestrial wireless sensor networks. Moreover, in a sink-oriented network with event information generation in a sensor field and message forwarding to the sink hop-by-hop, the sensors near the sink have to transmit more packets than those far from the sink, and then a funneling effect occurs, which leads to packet congestion, collisions and losses, especially in UWASNs with long propagation delays. An improved CDMA-based MAC protocol, named path-oriented code assignment (POCA) CDMA MAC (POCA-CDMA-MAC), is proposed for UWASNs in this paper. In the proposed MAC protocol, both the round-robin method and CDMA technology are adopted to make the sink receive packets from multiple paths simultaneously. Since the number of paths for information gathering is much less than that of nodes, the length of the spreading code used in the POCA-CDMA-MAC protocol is shorter greatly than that used in the CDMA-based protocols with transmitter-oriented code assignment (TOCA) or receiver-oriented code assignment (ROCA). Simulation results show that the proposed POCA-CDMA-MAC protocol achieves a higher network throughput and a lower end-to-end delay compared to other CDMA-based MAC protocols. PMID:24193100
Chen, Huifang; Fan, Guangyu; Xie, Lei; Cui, Jun-Hong
2013-11-04
Due to the characteristics of underwater acoustic channel, media access control (MAC) protocols designed for underwater acoustic sensor networks (UWASNs) are quite different from those for terrestrial wireless sensor networks. Moreover, in a sink-oriented network with event information generation in a sensor field and message forwarding to the sink hop-by-hop, the sensors near the sink have to transmit more packets than those far from the sink, and then a funneling effect occurs, which leads to packet congestion, collisions and losses, especially in UWASNs with long propagation delays. An improved CDMA-based MAC protocol, named path-oriented code assignment (POCA) CDMA MAC (POCA-CDMA-MAC), is proposed for UWASNs in this paper. In the proposed MAC protocol, both the round-robin method and CDMA technology are adopted to make the sink receive packets from multiple paths simultaneously. Since the number of paths for information gathering is much less than that of nodes, the length of the spreading code used in the POCA-CDMA-MAC protocol is shorter greatly than that used in the CDMA-based protocols with transmitter-oriented code assignment (TOCA) or receiver-oriented code assignment (ROCA). Simulation results show that the proposed POCA-CDMA-MAC protocol achieves a higher network throughput and a lower end-to-end delay compared to other CDMA-based MAC protocols.
Fiber-channel audio video standard for military and commercial aircraft product lines
NASA Astrophysics Data System (ADS)
Keller, Jack E.
2002-08-01
Fibre channel is an emerging high-speed digital network technology that combines to make inroads into the avionics arena. The suitability of fibre channel for such applications is largely due to its flexibility in these key areas: Network topologies can be configured in point-to-point, arbitrated loop or switched fabric connections. The physical layer supports either copper or fiber optic implementations with a Bit Error Rate of less than 10-12. Multiple Classes of Service are available. Multiple Upper Level Protocols are supported. Multiple high speed data rates offer open ended growth paths providing speed negotiation within a single network. Current speeds supported by commercially available hardware are 1 and 2 Gbps providing effective data rates of 100 and 200 MBps respectively. Such networks lend themselves well to the transport of digital video and audio data. This paper summarizes an ANSI standard currently in the final approval cycle of the InterNational Committee for Information Technology Standardization (INCITS). This standard defines a flexible mechanism whereby digital video, audio and ancillary data are systematically packaged for transport over a fibre channel network. The basic mechanism, called a container, houses audio and video content functionally grouped as elements of the container called objects. Featured in this paper is a specific container mapping called Simple Parametric Digital Video (SPDV) developed particularly to address digital video in avionics systems. SPDV provides pixel-based video with associated ancillary data typically sourced by various sensors to be processed and/or distributed in the cockpit for presentation via high-resolution displays. Also highlighted in this paper is a streamlined Upper Level Protocol (ULP) called Frame Header Control Procedure (FHCP) targeted for avionics systems where the functionality of a more complex ULP is not required.
A Fair Contention Access Scheme for Low-Priority Traffic in Wireless Body Area Networks
Sajeel, Muhammad; Bashir, Faisal; Asfand-e-yar, Muhammad; Tauqir, Muhammad
2017-01-01
Recently, wireless body area networks (WBANs) have attracted significant consideration in ubiquitous healthcare. A number of medium access control (MAC) protocols, primarily derived from the superframe structure of the IEEE 802.15.4, have been proposed in literature. These MAC protocols aim to provide quality of service (QoS) by prioritizing different traffic types in WBANs. A contention access period (CAP)with high contention in priority-based MAC protocols can result in higher number of collisions and retransmissions. During CAP, traffic classes with higher priority are dominant over low-priority traffic; this has led to starvation of low-priority traffic, thus adversely affecting WBAN throughput, delay, and energy consumption. Hence, this paper proposes a traffic-adaptive priority-based superframe structure that is able to reduce contention in the CAP period, and provides a fair chance for low-priority traffic. Simulation results in ns-3 demonstrate that the proposed MAC protocol, called traffic- adaptive priority-based MAC (TAP-MAC), achieves low energy consumption, high throughput, and low latency compared to the IEEE 802.15.4 standard, and the most recent priority-based MAC protocol, called priority-based MAC protocol (PA-MAC). PMID:28832495
Simple protocols for oblivious transfer and secure identification in the noisy-quantum-storage model
DOE Office of Scientific and Technical Information (OSTI.GOV)
Schaffner, Christian
2010-09-15
We present simple protocols for oblivious transfer and password-based identification which are secure against general attacks in the noisy-quantum-storage model as defined in R. Koenig, S. Wehner, and J. Wullschleger [e-print arXiv:0906.1030]. We argue that a technical tool from Koenig et al. suffices to prove security of the known protocols. Whereas the more involved protocol for oblivious transfer from Koenig et al. requires less noise in storage to achieve security, our ''canonical'' protocols have the advantage of being simpler to implement and the security error is easier control. Therefore, our protocols yield higher OT rates for many realistic noise parameters.more » Furthermore, a proof of security of a direct protocol for password-based identification against general noisy-quantum-storage attacks is given.« less
Protocol vulnerability detection based on network traffic analysis and binary reverse engineering.
Wen, Shameng; Meng, Qingkun; Feng, Chao; Tang, Chaojing
2017-01-01
Network protocol vulnerability detection plays an important role in many domains, including protocol security analysis, application security, and network intrusion detection. In this study, by analyzing the general fuzzing method of network protocols, we propose a novel approach that combines network traffic analysis with the binary reverse engineering method. For network traffic analysis, the block-based protocol description language is introduced to construct test scripts, while the binary reverse engineering method employs the genetic algorithm with a fitness function designed to focus on code coverage. This combination leads to a substantial improvement in fuzz testing for network protocols. We build a prototype system and use it to test several real-world network protocol implementations. The experimental results show that the proposed approach detects vulnerabilities more efficiently and effectively than general fuzzing methods such as SPIKE.
Coexistence of WiFi and WiMAX Systems Based on PS-Request Protocols†
Kim, Jongwoo; Park, Suwon; Rhee, Seung Hyong; Choi, Yong-Hoon; Chung, Young-uk; Hwang, Ho Young
2011-01-01
We introduce both the coexistence zone within the WiMAX frame structure and a PS-Request protocol for the coexistence of WiFi and WiMAX systems sharing a frequency band. Because we know that the PS-Request protocol has drawbacks, we propose a revised PS-Request protocol to improve the performance. Two PS-Request protocols are based on the time division operation (TDO) of WiFi system and WiMAX system to avoid the mutual interference, and use the vestigial power management (PwrMgt) bit within the Frame Control field of the frames transmitted by a WiFi AP. The performance of the revised PS-Request protocol is evaluated by computer simulation, and compared to those of the cases without a coexistence protocol and to the original PS-Request protocol. PMID:22163721
A Comparison of Inquiry and Worked Example Web-Based Instruction Using Physlets
ERIC Educational Resources Information Center
Lee, Kevin M.; Nicoll, Gayle; Brooks, David W.
2004-01-01
This paper compares two protocols for web-based instruction using simulations in an introductory physics class. The Inquiry protocol allowed students to control input parameters while the Worked Example protocol did not. Students in the Worked Example group performed significantly higher on a common assessment. The ramifications of this study are…
Dewitt, James; Capistrant, Benjamin; Kohli, Nidhi; Mitteldorf, Darryl; Merengwa, Enyinnaya; West, William
2018-01-01
Background While deduplication and cross-validation protocols have been recommended for large Web-based studies, protocols for survey response validation of smaller studies have not been published. Objective This paper reports the challenges of survey validation inherent in a small Web-based health survey research. Methods The subject population was North American, gay and bisexual, prostate cancer survivors, who represent an under-researched, hidden, difficult-to-recruit, minority-within-a-minority population. In 2015-2016, advertising on a large Web-based cancer survivor support network, using email and social media, yielded 478 completed surveys. Results Our manual deduplication and cross-validation protocol identified 289 survey submissions (289/478, 60.4%) as likely spam, most stemming from advertising on social media. The basic components of this deduplication and validation protocol are detailed. An unexpected challenge encountered was invalid survey responses evolving across the study period. This necessitated the static detection protocol be augmented with a dynamic one. Conclusions Five recommendations for validation of Web-based samples, especially with smaller difficult-to-recruit populations, are detailed. PMID:29691203
A universal TaqMan-based RT-PCR protocol for cost-efficient detection of small noncoding RNA.
Jung, Ulrike; Jiang, Xiaoou; Kaufmann, Stefan H E; Patzel, Volker
2013-12-01
Several methods for the detection of RNA have been developed over time. For small RNA detection, a stem-loop reverse primer-based protocol relying on TaqMan RT-PCR has been described. This protocol requires an individual specific TaqMan probe for each target RNA and, hence, is highly cost-intensive for experiments with small sample sizes or large numbers of different samples. We describe a universal TaqMan-based probe protocol which can be used to detect any target sequence and demonstrate its applicability for the detection of endogenous as well as artificial eukaryotic and bacterial small RNAs. While the specific and the universal probe-based protocol showed the same sensitivity, the absolute sensitivity of detection was found to be more than 100-fold lower for both than previously reported. In subsequent experiments, we found previously unknown limitations intrinsic to the method affecting its feasibility in determination of mature template RISC incorporation as well as in multiplexing. Both protocols were equally specific in discriminating between correct and incorrect small RNA targets or between mature miRNA and its unprocessed RNA precursor, indicating the stem-loop RT-primer, but not the TaqMan probe, triggers target specificity. The presented universal TaqMan-based RT-PCR protocol represents a cost-efficient method for the detection of small RNAs.
Renggaman, Anriansyah; Choi, Hong L; Sudiarto, Sartika Ia; Alasaarela, Laura; Nam, Ok S
2015-01-01
Due to increased interest in animal welfare, there is now a need for a comprehensive assessment protocol to be used in intensive pig farming systems. There are two current welfare assessment protocols for pigs: Welfare Quality® Assessment Protocols (applicable in the Europe Union), that mostly focuses on animal-based measures, and the Swine Welfare Assurance Program (applicable in the United States), that mostly focuses on management- and environment-based measures. In certain cases, however, animal-based measures might not be adequate for properly assessing pig welfare status. Similarly, welfare assessment that relies only on environment- and management-based measures might not represent the actual welfare status of pigs. Therefore, the objective of this paper was to develop a new welfare protocol by integrating animal-, environment-, and management-based measures. The background for selection of certain welfare criteria and modification of the scoring systems from existing welfare assessment protocols are described. The developed pig welfare assessment protocol consists of 17 criteria that are related to four main principles of welfare (good feeding, good housing, good health, and appropriate behavior). Good feeding, good housing, and good health were assessed using a 3-point scale: 0 (good welfare), 1 (moderate welfare), and 2 (poor welfare). In certain cases, only a 2-point scale was used: 0 (certain condition is present) or 2 (certain condition is absent). Appropriate behavior was assessed by scan sampling of positive and negative social behaviors based on qualitative behavior assessment and human-animal relationship tests. Modification of the body condition score into a 3-point scale revealed pigs with a moderate body condition (score 1). Moreover, additional criteria such as feed quality confirmed that farms had moderate (score 1) or poor feed quality (score 2), especially those farms located in a high relative humidity region. The developed protocol can be utilized to assess welfare status in an intensive pig farming system. Although further improvements are still needed, this study is a first step in developing a pig welfare assessment protocol that combines animal-, environment-, and management-based measures.
Electronic Voting Protocol Using Identity-Based Cryptography.
Gallegos-Garcia, Gina; Tapia-Recillas, Horacio
2015-01-01
Electronic voting protocols proposed to date meet their properties based on Public Key Cryptography (PKC), which offers high flexibility through key agreement protocols and authentication mechanisms. However, when PKC is used, it is necessary to implement Certification Authority (CA) to provide certificates which bind public keys to entities and enable verification of such public key bindings. Consequently, the components of the protocol increase notably. An alternative is to use Identity-Based Encryption (IBE). With this kind of cryptography, it is possible to have all the benefits offered by PKC, without neither the need of certificates nor all the core components of a Public Key Infrastructure (PKI). Considering the aforementioned, in this paper we propose an electronic voting protocol, which meets the privacy and robustness properties by using bilinear maps.
Electronic Voting Protocol Using Identity-Based Cryptography
Gallegos-Garcia, Gina; Tapia-Recillas, Horacio
2015-01-01
Electronic voting protocols proposed to date meet their properties based on Public Key Cryptography (PKC), which offers high flexibility through key agreement protocols and authentication mechanisms. However, when PKC is used, it is necessary to implement Certification Authority (CA) to provide certificates which bind public keys to entities and enable verification of such public key bindings. Consequently, the components of the protocol increase notably. An alternative is to use Identity-Based Encryption (IBE). With this kind of cryptography, it is possible to have all the benefits offered by PKC, without neither the need of certificates nor all the core components of a Public Key Infrastructure (PKI). Considering the aforementioned, in this paper we propose an electronic voting protocol, which meets the privacy and robustness properties by using bilinear maps. PMID:26090515
Motor-based intervention protocols in treatment of childhood apraxia of speech (CAS)
Maas, Edwin; Gildersleeve-Neumann, Christina; Jakielski, Kathy J.; Stoeckel, Ruth
2014-01-01
This paper reviews current trends in treatment for childhood apraxia of speech (CAS), with a particular emphasis on motor-based intervention protocols. The paper first briefly discusses how CAS fits into the typology of speech sound disorders, followed by a discussion of the potential relevance of principles derived from the motor learning literature for CAS treatment. Next, different motor-based treatment protocols are reviewed, along with their evidence base. The paper concludes with a summary and discussion of future research needs. PMID:25313348
NASA Astrophysics Data System (ADS)
Li, Na; Li, Jian; Li, Lei-Lei; Wang, Zheng; Wang, Tao
2016-08-01
A deterministic secure quantum communication and authentication protocol based on extended GHZ-W state and quantum one-time pad is proposed. In the protocol, state | φ -> is used as the carrier. One photon of | φ -> state is sent to Alice, and Alice obtains a random key by measuring photons with bases determined by ID. The information of bases is secret to others except Alice and Bob. Extended GHZ-W states are used as decoy photons, the positions of which in information sequence are encoded with identity string ID of the legal user, and the eavesdropping detection rate reaches 81%. The eavesdropping detection based on extended GHZ-W state combines with authentication and the secret ID ensures the security of the protocol.
Intelligent Urban Public Transportation for Accessibility Dedicated to People with Disabilities
Zhou, Haiying; Hou, Kun-Mean; Zuo, Decheng; Li, Jian
2012-01-01
The traditional urban public transport system generally cannot provide an effective access service for people with disabilities, especially for disabled, wheelchair and blind (DWB) passengers. In this paper, based on advanced information & communication technologies (ICT) and green technologies (GT) concepts, a dedicated public urban transportation service access system named Mobi+ has been introduced, which facilitates the mobility of DWB passengers. The Mobi+ project consists of three subsystems: a wireless communication subsystem, which provides the data exchange and network connection services between buses and stations in the complex urban environments; the bus subsystem, which provides the DWB class detection & bus arrival notification services; and the station subsystem, which implements the urban environmental surveillance & bus auxiliary access services. The Mobi+ card that supports multi-microcontroller multi-transceiver adopts the fault-tolerant component-based hardware architecture, in which the dedicated embedded system software, i.e., operating system micro-kernel and wireless protocol, has been integrated. The dedicated Mobi+ embedded system provides the fault-tolerant resource awareness communication and scheduling mechanism to ensure the reliability in data exchange and service provision. At present, the Mobi+ system has been implemented on the buses and stations of line ‘2’ in the city of Clermont-Ferrand (France). The experiential results show that, on one hand the Mobi+ prototype system reaches the design expectations and provides an effective urban bus access service for people with disabilities; on the other hand the Mobi+ system is easily to deploy in the buses and at bus stations thanks to its low energy consumption and small form factor. PMID:23112622
Intelligent urban public transportation for accessibility dedicated to people with disabilities.
Zhou, Haiying; Hou, Kun-Mean; Zuo, Decheng; Li, Jian
2012-01-01
The traditional urban public transport system generally cannot provide an effective access service for people with disabilities, especially for disabled, wheelchair and blind (DWB) passengers. In this paper, based on advanced information & communication technologies (ICT) and green technologies (GT) concepts, a dedicated public urban transportation service access system named Mobi+ has been introduced, which facilitates the mobility of DWB passengers. The Mobi+ project consists of three subsystems: a wireless communication subsystem, which provides the data exchange and network connection services between buses and stations in the complex urban environments; the bus subsystem, which provides the DWB class detection & bus arrival notification services; and the station subsystem, which implements the urban environmental surveillance & bus auxiliary access services. The Mobi+ card that supports multi-microcontroller multi-transceiver adopts the fault-tolerant component-based hardware architecture, in which the dedicated embedded system software, i.e., operating system micro-kernel and wireless protocol, has been integrated. The dedicated Mobi+ embedded system provides the fault-tolerant resource awareness communication and scheduling mechanism to ensure the reliability in data exchange and service provision. At present, the Mobi+ system has been implemented on the buses and stations of line '2' in the city of Clermont-Ferrand (France). The experiential results show that, on one hand the Mobi+ prototype system reaches the design expectations and provides an effective urban bus access service for people with disabilities; on the other hand the Mobi+ system is easily to deploy in the buses and at bus stations thanks to its low energy consumption and small form factor.
NASA Astrophysics Data System (ADS)
Park, Soomyung; Joo, Seong-Soon; Yae, Byung-Ho; Lee, Jong-Hyun
2002-07-01
In this paper, we present the Optical Cross-Connect (OXC) Management Control System Architecture, which has the scalability and robust maintenance and provides the distributed managing environment in the optical transport network. The OXC system we are developing, which is divided into the hardware and the internal and external software for the OXC system, is made up the OXC subsystem with the Optical Transport Network (OTN) sub layers-hardware and the optical switch control system, the signaling control protocol subsystem performing the User-to-Network Interface (UNI) and Network-to-Network Interface (NNI) signaling control, the Operation Administration Maintenance & Provisioning (OAM&P) subsystem, and the network management subsystem. And the OXC management control system has the features that can support the flexible expansion of the optical transport network, provide the connectivity to heterogeneous external network elements, be added or deleted without interrupting OAM&P services, be remotely operated, provide the global view and detail information for network planner and operator, and have Common Object Request Broker Architecture (CORBA) based the open system architecture adding and deleting the intelligent service networking functions easily in future. To meet these considerations, we adopt the object oriented development method in the whole developing steps of the system analysis, design, and implementation to build the OXC management control system with the scalability, the maintenance, and the distributed managing environment. As a consequently, the componentification for the OXC operation management functions of each subsystem makes the robust maintenance, and increases code reusability. Also, the component based OXC management control system architecture will have the flexibility and scalability in nature.
Britt, David W; Bronstein, Janet; Norton, Jonathan D
2006-01-01
Background Prior research has shown that resources have an impact on birth outcomes. In this paper we ask how combinations of telemedical and hospital-level resources impact transports of mothers expecting very low birth weight (VLBW) babies in Arkansas. Methods Using de-identified birth certificate data from the Arkansas Department of Health, data were gathered on transports of women carrying VLBW babies for two six-month periods: a period just before the start of ANGELS (12/02-05/03), a telemedical outreach program for high-risk pregnancies, and a period after the program had been running for six months (12/03-05/04). For each maternal transport, the following information was recorded: maternal race-ethnicity, maternal age, and the birth weight of the infant. Logistic regression was used to assess the relationship between the predictors (telemedicine, hospital level, maternal characteristics) and the probability of a transport. Results Having a telemedical site available increases the probability of a mother carrying a VLBW baby being transported to a level III facility either before or during birth. Having at least a level II nursery also increases the chance of a maternal transport. Where both level II nurseries and telemedical access are available, the odds of VLBW maternal transports are only modestly increased in comparison to the case where neither is present. At the individual level, Hispanic mothers were less likely to be transported than other mothers, and teenaged mothers were more likely to be transported than those 18 and over. A mother's being Black or being over 35 did not have an impact on the odds of being transported to a level III facility. Conclusion Combinations of resources have an impact on physician decisions regarding VLBW transports and are interpretable in terms of the capacity to diagnose and absorb risk. We suggest a collegial review of transport patterns and birth outcomes from areas with different levels of resources as a vehicle for moving the entire system of care forward over time. With such an evidence-based review in place, the collegial relations among level III specialists and obstetricians from around the state can, over time, develop workable protocols for when and how level III facilities should be involved. PMID:16595016
Optimal Protocols and Optimal Transport in Stochastic Thermodynamics
NASA Astrophysics Data System (ADS)
Aurell, Erik; Mejía-Monasterio, Carlos; Muratore-Ginanneschi, Paolo
2011-06-01
Thermodynamics of small systems has become an important field of statistical physics. Such systems are driven out of equilibrium by a control, and the question is naturally posed how such a control can be optimized. We show that optimization problems in small system thermodynamics are solved by (deterministic) optimal transport, for which very efficient numerical methods have been developed, and of which there are applications in cosmology, fluid mechanics, logistics, and many other fields. We show, in particular, that minimizing expected heat released or work done during a nonequilibrium transition in finite time is solved by the Burgers equation and mass transport by the Burgers velocity field. Our contribution hence considerably extends the range of solvable optimization problems in small system thermodynamics.
Optimal protocols and optimal transport in stochastic thermodynamics.
Aurell, Erik; Mejía-Monasterio, Carlos; Muratore-Ginanneschi, Paolo
2011-06-24
Thermodynamics of small systems has become an important field of statistical physics. Such systems are driven out of equilibrium by a control, and the question is naturally posed how such a control can be optimized. We show that optimization problems in small system thermodynamics are solved by (deterministic) optimal transport, for which very efficient numerical methods have been developed, and of which there are applications in cosmology, fluid mechanics, logistics, and many other fields. We show, in particular, that minimizing expected heat released or work done during a nonequilibrium transition in finite time is solved by the Burgers equation and mass transport by the Burgers velocity field. Our contribution hence considerably extends the range of solvable optimization problems in small system thermodynamics.
An XML-Based Protocol for Distributed Event Services
NASA Technical Reports Server (NTRS)
Smith, Warren; Gunter, Dan; Quesnel, Darcy; Biegel, Bryan (Technical Monitor)
2001-01-01
A recent trend in distributed computing is the construction of high-performance distributed systems called computational grids. One difficulty we have encountered is that there is no standard format for the representation of performance information and no standard protocol for transmitting this information. This limits the types of performance analysis that can be undertaken in complex distributed systems. To address this problem, we present an XML-based protocol for transmitting performance events in distributed systems and evaluate the performance of this protocol.
Red Cell Properties after Different Modes of Blood Transportation
Makhro, Asya; Huisjes, Rick; Verhagen, Liesbeth P.; Mañú-Pereira, María del Mar; Llaudet-Planas, Esther; Petkova-Kirova, Polina; Wang, Jue; Eichler, Hermann; Bogdanova, Anna; van Wijk, Richard; Vives-Corrons, Joan-Lluís; Kaestner, Lars
2016-01-01
Transportation of blood samples is unavoidable for assessment of specific parameters in blood of patients with rare anemias, blood doping testing, or for research purposes. Despite the awareness that shipment may substantially alter multiple parameters, no study of that extent has been performed to assess these changes and optimize shipment conditions to reduce transportation-related artifacts. Here we investigate the changes in multiple parameters in blood of healthy donors over 72 h of simulated shipment conditions. Three different anticoagulants (K3EDTA, Sodium Heparin, and citrate-based CPDA) for two temperatures (4°C and room temperature) were tested to define the optimal transportation conditions. Parameters measured cover common cytology and biochemistry parameters (complete blood count, hematocrit, morphological examination), red blood cell (RBC) volume, ion content and density, membrane properties and stability (hemolysis, osmotic fragility, membrane heat stability, patch-clamp investigations, and formation of micro vesicles), Ca2+ handling, RBC metabolism, activity of numerous enzymes, and O2 transport capacity. Our findings indicate that individual sets of parameters may require different shipment settings (anticoagulants, temperature). Most of the parameters except for ion (Na+, K+, Ca2+) handling and, possibly, reticulocytes counts, tend to favor transportation at 4°C. Whereas plasma and intraerythrocytic Ca2+ cannot be accurately measured in the presence of chelators such as citrate and EDTA, the majority of Ca2+-dependent parameters are stabilized in CPDA samples. Even in blood samples from healthy donors transported using an optimized shipment protocol, the majority of parameters were stable within 24 h, a condition that may not hold for the samples of patients with rare anemias. This implies for as short as possible shipping using fast courier services to the closest expert laboratory at reach. Mobile laboratories or the travel of the patients to the specialized laboratories may be the only option for some groups of patients with highly unstable RBCs. PMID:27471472
NASA Technical Reports Server (NTRS)
James, Jeffrey M.; Sanderson, Penelope M.; Seidler, Karen S.
1990-01-01
As modern transport environments become increasingly complex, issues such as crew communication, interaction with automation, and workload management have become crucial. Much research is being focused on holistic aspects of social and cognitive behavior, such as the strategies used to handle workload, the flow of information, the scheduling of tasks, the verbal and non-verbal interactions between crew members. Traditional laboratory performance measures no longer sufficiently meet the needs of researchers addressing these issues. However observational techniques are better equipped to capture the type of data needed and to build models of the requisite level of sophistication. Presented here is SHAPA, an interactive software tool for performing both verbal and non-verbal protocol analysis. It has been developed with the idea of affording the researchers the closest possible degree of engagement with protocol data. The researcher can configure SHAPA to encode protocols using any theoretical framework or encoding vocabulary that is desired. SHAPA allows protocol analysis to be performed at any level of analysis, and it supplies a wide variety of tools for data aggregation, manipulation. The output generated by SHAPA can be used alone or in combination with other performance variables to get a rich picture of the influences on sequences of verbal or nonverbal behavior.
NASA Astrophysics Data System (ADS)
Xie, Qi; Hu, Bin; Chen, Ke-Fei; Liu, Wen-Hao; Tan, Xiao
2015-11-01
In three-party password authenticated key exchange (AKE) protocol, since two users use their passwords to establish a secure session key over an insecure communication channel with the help of the trusted server, such a protocol may suffer the password guessing attacks and the server has to maintain the password table. To eliminate the shortages of password-based AKE protocol, very recently, according to chaotic maps, Lee et al. [2015 Nonlinear Dyn. 79 2485] proposed a first three-party-authenticated key exchange scheme without using passwords, and claimed its security by providing a well-organized BAN logic test. Unfortunately, their protocol cannot resist impersonation attack, which is demonstrated in the present paper. To overcome their security weakness, by using chaotic maps, we propose a biometrics-based anonymous three-party AKE protocol with the same advantages. Further, we use the pi calculus-based formal verification tool ProVerif to show that our AKE protocol achieves authentication, security and anonymity, and an acceptable efficiency. Project supported by the Natural Science Foundation of Zhejiang Province, China (Grant No. LZ12F02005), the Major State Basic Research Development Program of China (Grant No. 2013CB834205), and the National Natural Science Foundation of China (Grant No. 61070153).
Dewitt, James; Capistrant, Benjamin; Kohli, Nidhi; Rosser, B R Simon; Mitteldorf, Darryl; Merengwa, Enyinnaya; West, William
2018-04-24
While deduplication and cross-validation protocols have been recommended for large Web-based studies, protocols for survey response validation of smaller studies have not been published. This paper reports the challenges of survey validation inherent in a small Web-based health survey research. The subject population was North American, gay and bisexual, prostate cancer survivors, who represent an under-researched, hidden, difficult-to-recruit, minority-within-a-minority population. In 2015-2016, advertising on a large Web-based cancer survivor support network, using email and social media, yielded 478 completed surveys. Our manual deduplication and cross-validation protocol identified 289 survey submissions (289/478, 60.4%) as likely spam, most stemming from advertising on social media. The basic components of this deduplication and validation protocol are detailed. An unexpected challenge encountered was invalid survey responses evolving across the study period. This necessitated the static detection protocol be augmented with a dynamic one. Five recommendations for validation of Web-based samples, especially with smaller difficult-to-recruit populations, are detailed. ©James Dewitt, Benjamin Capistrant, Nidhi Kohli, B R Simon Rosser, Darryl Mitteldorf, Enyinnaya Merengwa, William West. Originally published in JMIR Research Protocols (http://www.researchprotocols.org), 24.04.2018.
Lee, Young Han
2018-04-04
The purposes of this study are to evaluate the feasibility of protocol determination with a convolutional neural networks (CNN) classifier based on short-text classification and to evaluate the agreements by comparing protocols determined by CNN with those determined by musculoskeletal radiologists. Following institutional review board approval, the database of a hospital information system (HIS) was queried for lists of MRI examinations, referring department, patient age, and patient gender. These were exported to a local workstation for analyses: 5258 and 1018 consecutive musculoskeletal MRI examinations were used for the training and test datasets, respectively. The subjects for pre-processing were routine or tumor protocols and the contents were word combinations of the referring department, region, contrast media (or not), gender, and age. The CNN Embedded vector classifier was used with Word2Vec Google news vectors. The test set was tested with each classification model and results were output as routine or tumor protocols. The CNN determinations were evaluated using the receiver operating characteristic (ROC) curves. The accuracies were evaluated by a radiologist-confirmed protocol as the reference protocols. The optimal cut-off values for protocol determination between routine protocols and tumor protocols was 0.5067 with a sensitivity of 92.10%, a specificity of 95.76%, and an area under curve (AUC) of 0.977. The overall accuracy was 94.2% for the ConvNet model. All MRI protocols were correct in the pelvic bone, upper arm, wrist, and lower leg MRIs. Deep-learning-based convolutional neural networks were clinically utilized to determine musculoskeletal MRI protocols. CNN-based text learning and applications could be extended to other radiologic tasks besides image interpretations, improving the work performance of the radiologist.
Quantum energy teleportation in a quantum Hall system
DOE Office of Scientific and Technical Information (OSTI.GOV)
Yusa, Go; Izumida, Wataru; Hotta, Masahiro
2011-09-15
We propose an experimental method for a quantum protocol termed quantum energy teleportation (QET), which allows energy transportation to a remote location without physical carriers. Using a quantum Hall system as a realistic model, we discuss the physical significance of QET and estimate the order of energy gain using reasonable experimental parameters.
49 CFR 173.124 - Class 4, Divisions 4.1, 4.2 and 4.3-Definitions.
Code of Federal Regulations, 2010 CFR
2010-10-01
... material must be determined using the testing protocol from Figure 14.2 (Flow Chart for Assigning Self... HAZARDOUS MATERIALS SAFETY ADMINISTRATION, DEPARTMENT OF TRANSPORTATION HAZARDOUS MATERIALS REGULATIONS... Assignments and Exceptions for Hazardous Materials Other Than Class 1 and Class 7 § 173.124 Class 4, Divisions...
Developing a Model on Improving Maritime English Training for Maritime Transportation Safety
ERIC Educational Resources Information Center
Yercan, Funda; Fricke, Donna; Stone, Laurie
2005-01-01
Maritime services form an integral part of what regulatory agencies requires for the safe navigation and operation of vessels. Therefore, the maritime industry's compliance with governmental regulations and international protocols has been essential for maritime safety management. As a basis to this aspect, the preparation of maritime students as…
Baby Steps: Starting Out on the World Wide Web.
ERIC Educational Resources Information Center
Simpson, Carol; McElmeel, Sharron L.
1997-01-01
While the Internet is the physical medium used to transport data, the World Wide Web is the collection of protocols and standards used to access the information. This article provides a basic explanation of what the Web is and describes common browser commands. Discusses graphic Web browsers; universal resource locators (URLs); file, message,…
ERIC Educational Resources Information Center
Milner, Jacob
2005-01-01
Voice over Internet Protocol (VoIP) is everywhere. The technology lets users make and receive phone calls over the Internet, transporting voice traffic alongside data traffic such as instant messages (IMs) and e-mail. While the number of consumer customers using VoIP increases every week, the technology is finding its way into K-12 education as…
Jeziorowska, Dorota; Fontaine, Vincent; Jouve, Charlène; Villard, Eric; Dussaud, Sébastien; Akbar, David; Letang, Valérie; Cervello, Pauline; Itier, Jean-Michiel; Pruniaux, Marie-Pierre; Hulot, Jean-Sébastien
2017-01-01
Human induced pluripotent stem cells (iPSCs) represent a powerful human model to study cardiac disease in vitro, notably channelopathies and sarcomeric cardiomyopathies. Different protocols for cardiac differentiation of iPSCs have been proposed either based on embroid body formation (3D) or, more recently, on monolayer culture (2D). We performed a direct comparison of the characteristics of the derived cardiomyocytes (iPSC-CMs) on day 27 ± 2 of differentiation between 3D and 2D differentiation protocols with two different Wnt-inhibitors were compared: IWR1 (inhibitor of Wnt response) or IWP2 (inhibitor of Wnt production). We firstly found that the level of Troponin T (TNNT2) expression measured by FACS was significantly higher for both 2D protocols as compared to the 3D protocol. In the three methods, iPSC-CM show sarcomeric structures. However, iPSC-CM generated in 2D protocols constantly displayed larger sarcomere lengths as compared to the 3D protocol. In addition, mRNA and protein analyses reveal higher cTNi to ssTNi ratios in the 2D protocol using IWP2 as compared to both other protocols, indicating a higher sarcomeric maturation. Differentiation of cardiac myocytes with 2D monolayer-based protocols and the use of IWP2 allows the production of higher yield of cardiac myocytes that have more suitable characteristics to study sarcomeric cardiomyopathies. PMID:28587156
NASA Astrophysics Data System (ADS)
Tenenbaum-Katan, Janna; Hofemeier, Philipp; Sznitman, Josué; Janna Tenenbaum-Katan Team
2015-11-01
Inhalation therapy is the cornerstone of early-childhood respiratory treatments, as well as a rising potential for systemic drug delivery and pulmonary vaccination. As such, indispensable understanding of respiratory flow phenomena, coupled with particle transport at the deep regions of children's lungs is necessary to attain efficient targeting of aerosol therapy. However, fundamental research of pulmonary transport is overwhelmingly focused on adults. In our study, we have developed an anatomically-inspired computational model of representing pulmonary acinar regions at several age points during a child's development. Our numerical simulations examine respiratory flows and particle deposition maps within the acinar model, accounting for varying age dependant anatomical considerations and ventilation patterns. Resulting deposition maps of aerosols alter with age, such findings might suggest that medication protocols of inhalation therapy in young children should be considered to be accordingly amended with the child's development. Additionally to understanding basic scientific concepts of age effects on aerosol deposition, our research can potentially contribute practical guidelines to therapy protocols, and its' necessary modifications with age. We acknowledge the support of the ISF and the Israeli ministry of Science.
ERIC Educational Resources Information Center
Williams, Harriet G.; Pfeiffer, Karin A.; Dowda, Marsha; Jeter, Chevy; Jones, Shaverra; Pate, Russell R.
2009-01-01
The purpose of this study was to develop a valid and reliable tool for use in assessing motor skills in preschool children in field-based settings. The development of the Children's Activity and Movement in Preschool Study Motor Skills Protocol included evidence of its reliability and validity for use in field-based environments as part of large…
DICOM image secure communications with Internet protocols IPv6 and IPv4.
Zhang, Jianguo; Yu, Fenghai; Sun, Jianyong; Yang, Yuanyuan; Liang, Chenwen
2007-01-01
Image-data transmission from one site to another through public network is usually characterized in term of privacy, authenticity, and integrity. In this paper, we first describe a general scenario about how image is delivered from one site to another through a wide-area network (WAN) with security features of data privacy, integrity, and authenticity. Second, we give the common implementation method of the digital imaging and communication in medicine (DICOM) image communication software library with IPv6/IPv4 for high-speed broadband Internet by using open-source software. Third, we discuss two major security-transmission methods, the IP security (IPSec) and the secure-socket layer (SSL) or transport-layer security (TLS), being used currently in medical-image-data communication with privacy support. Fourth, we describe a test schema of multiple-modality DICOM-image communications through TCP/IPv4 and TCP/IPv6 with different security methods, different security algorithms, and operating systems, and evaluate the test results. We found that there are tradeoff factors between choosing the IPsec and the SSL/TLS-based security implementation of IPv6/IPv4 protocols. If the WAN networks only use IPv6 such as in high-speed broadband Internet, the choice is IPsec-based security. If the networks are IPv4 or the combination of IPv6 and IPv4, it is better to use SSL/TLS security. The Linux platform has more security algorithms implemented than the Windows (XP) platform, and can achieve better performance in most experiments of IPv6 and IPv4-based DICOM-image communications. In teleradiology or enterprise-PACS applications, the Linux operating system may be the better choice as peer security gateways for both the IPsec and the SSL/TLS-based secure DICOM communications cross public networks.
MR efficiency using automated MRI-desktop eProtocol
NASA Astrophysics Data System (ADS)
Gao, Fei; Xu, Yanzhe; Panda, Anshuman; Zhang, Min; Hanson, James; Su, Congzhe; Wu, Teresa; Pavlicek, William; James, Judy R.
2017-03-01
MRI protocols are instruction sheets that radiology technologists use in routine clinical practice for guidance (e.g., slice position, acquisition parameters etc.). In Mayo Clinic Arizona (MCA), there are over 900 MR protocols (ranging across neuro, body, cardiac, breast etc.) which makes maintaining and updating the protocol instructions a labor intensive effort. The task is even more challenging given different vendors (Siemens, GE etc.). This is a universal problem faced by all the hospitals and/or medical research institutions. To increase the efficiency of the MR practice, we designed and implemented a web-based platform (eProtocol) to automate the management of MRI protocols. It is built upon a database that automatically extracts protocol information from DICOM compliant images and provides a user-friendly interface to the technologists to create, edit and update the protocols. Advanced operations such as protocol migrations from scanner to scanner and capability to upload Multimedia content were also implemented. To the best of our knowledge, eProtocol is the first MR protocol automated management tool used clinically. It is expected that this platform will significantly improve the radiology operations efficiency including better image quality and exam consistency, fewer repeat examinations and less acquisition errors. These protocols instructions will be readily available to the technologists during scans. In addition, this web-based platform can be extended to other imaging modalities such as CT, Mammography, and Interventional Radiology and different vendors for imaging protocol management.
Security Services Discovery by ATM Endsystems
DOE Office of Scientific and Technical Information (OSTI.GOV)
Sholander, Peter; Tarman, Thomas
This contribution proposes strawman techniques for Security Service Discovery by ATM endsystems in ATM networks. Candidate techniques include ILMI extensions, ANS extensions and new ATM anycast addresses. Another option is a new protocol based on an IETF service discovery protocol, such as Service Location Protocol (SLP). Finally, this contribution provides strawman requirements for Security-Based Routing in ATM networks.
Efficient multiuser quantum cryptography network based on entanglement.
Xue, Peng; Wang, Kunkun; Wang, Xiaoping
2017-04-04
We present an efficient quantum key distribution protocol with a certain entangled state to solve a special cryptographic task. Also, we provide a proof of security of this protocol by generalizing the proof of modified of Lo-Chau scheme. Based on this two-user scheme, a quantum cryptography network protocol is proposed without any quantum memory.
Efficient multiuser quantum cryptography network based on entanglement
Xue, Peng; Wang, Kunkun; Wang, Xiaoping
2017-01-01
We present an efficient quantum key distribution protocol with a certain entangled state to solve a special cryptographic task. Also, we provide a proof of security of this protocol by generalizing the proof of modified of Lo-Chau scheme. Based on this two-user scheme, a quantum cryptography network protocol is proposed without any quantum memory. PMID:28374854
Experimental eavesdropping attack against Ekert's protocol based on Wigner's inequality
DOE Office of Scientific and Technical Information (OSTI.GOV)
Bovino, F. A.; Colla, A. M.; Castagnoli, G.
2003-09-01
We experimentally implemented an eavesdropping attack against the Ekert protocol for quantum key distribution based on the Wigner inequality. We demonstrate a serious lack of security of this protocol when the eavesdropper gains total control of the source. In addition we tested a modified Wigner inequality which should guarantee a secure quantum key distribution.
Efficient multiuser quantum cryptography network based on entanglement
NASA Astrophysics Data System (ADS)
Xue, Peng; Wang, Kunkun; Wang, Xiaoping
2017-04-01
We present an efficient quantum key distribution protocol with a certain entangled state to solve a special cryptographic task. Also, we provide a proof of security of this protocol by generalizing the proof of modified of Lo-Chau scheme. Based on this two-user scheme, a quantum cryptography network protocol is proposed without any quantum memory.
Protocols for pressure ulcer prevention: are they evidence-based?
Chaves, Lidice M; Grypdonck, Mieke H F; Defloor, Tom
2010-03-01
This study is a report of a study to determine the quality of protocols for pressure ulcer prevention in home care in the Netherlands. If pressure ulcer prevention protocols are evidence-based and practitioners use them correctly in practice, this will result a reduction in pressure ulcers. Very little is known about the evidence-based content and quality of the pressure ulcer prevention protocols. In 2008, current pressure ulcer prevention protocols from 24 home-care agencies in the Netherlands were evaluated. A checklist developed and validated by two pressure ulcer prevention experts was used to assess the quality of the protocols, and weighted and unweighted quality scores were computed and analysed using descriptive statistics. The 24 pressure ulcer prevention protocols had a mean weighted quality score of 63.38 points out of a maximum of 100 (sd 5). The importance of observing the skin at the pressure points at least once a day was emphasized in 75% of the protocols. Only 42% correctly warned against the use of materials that were 'less effective or that could potentially cause harm'. Pressure ulcer prevention commands a reasonable amount of attention in home care, but the incidence of pressure ulcers and lack of a consistent, standardized document for use in actual practice indicate a need for systematic implementation of national pressure ulcer prevention standards in the Netherlands to ensure adherence to the established protocols.
A Mobility-Aware QoS Signaling Protocol for Ambient Networks
NASA Astrophysics Data System (ADS)
Jeong, Seong-Ho; Lee, Sung-Hyuck; Bang, Jongho
Mobility-aware quality of service (QoS) signaling is crucial to provide seamless multimedia services in the ambient environment where mobile nodes may move frequently between different wireless access networks. The mobility of an IP-based node in ambient networks affects routing paths, and as a result, can have a significant impact on the operation and state management of QoS signaling protocols. In this paper, we first analyze the impact of mobility on QoS signaling protocols and how the protocols operate in mobility scenarios. We then propose an efficient mobility-aware QoS signaling protocol which can operate adaptively in ambient networks. The key features of the protocol include the fast discovery of a crossover node where the old and new paths converge or diverge due to handover and the localized state management for seamless services. Our analytical and simulation/experimental results show that the proposed/implemented protocol works better than existing protocols in the IP-based mobile environment.
Altered Mental Status: Current Evidence-based Recommendations for Prehospital Care.
Sanello, Ashley; Gausche-Hill, Marianne; Mulkerin, William; Sporer, Karl A; Brown, John F; Koenig, Kristi L; Rudnick, Eric M; Salvucci, Angelo A; Gilbert, Gregory H
2018-05-01
In the United States emergency medical services (EMS) protocols vary widely across jurisdictions. We sought to develop evidence-based recommendations for the prehospital evaluation and treatment of a patient with an acute change in mental status and to compare these recommendations against the current protocols used by the 33 EMS agencies in the State of California. We performed a literature review of the current evidence in the prehospital treatment of a patient with altered mental status (AMS) and augmented this review with guidelines from various national and international societies to create our evidence-based recommendations. We then compared the AMS protocols of each of the 33 EMS agencies for consistency with these recommendations. The specific protocol components that we analyzed were patient assessment, point-of-care tests, supplemental oxygen, use of standardized scoring, evaluating for causes of AMS, blood glucose evaluation, toxicological treatment, and pediatric evaluation and management. Protocols across 33 EMS agencies in California varied widely. All protocols call for a blood glucose check, 21 (64%) suggest treating adults at <60mg/dL, and half allow for the use of dextrose 10%. All the protocols recommend naloxone for signs of opioid overdose, but only 13 (39%) give specific parameters. Half the agencies (52%) recommend considering other toxicological causes of AMS, often by using the mnemonic AEIOU TIPS. Eight (24%) recommend a 12-lead electrocardiogram; others simply suggest cardiac monitoring. Fourteen (42%) advise supplemental oxygen as needed; only seven (21%) give specific parameters. In terms of considering various etiologies of AMS, 25 (76%) give instructions to consider trauma, 20 (61%) to consider stroke, and 18 (55%) to consider seizure. Twenty-three (70%) of the agencies have separate pediatric AMS protocols; others include pediatric considerations within the adult protocol. Protocols for patients with AMS vary widely across the State of California. The evidence-based recommendations that we present for the prehospital diagnosis and treatment of this condition may be useful for EMS medical directors tasked with creating and revising these protocols.