Progeria Research Foundation Diagnostic Testing Program
... Culture Protocols Immortalized Cell Culture Protocols Induced Pluripotent Stem Cells PRF Cell and Tissue Bank Publications Research Funding Opportunities Grant Application Application Deadlines Grants Funded Close Meet The Kids Meet The Kids Our Ambassadors Find The Other ...
... Culture Protocols Immortalized Cell Culture Protocols Induced Pluripotent Stem Cells PRF Cell and Tissue Bank Publications Research Funding Opportunities Grant Application Application Deadlines Grants Funded Close Meet The Kids Meet The Kids Our Ambassadors Find The Other ...
Assisted closed-loop optimization of SSVEP-BCI efficiency
Fernandez-Vargas, Jacobo; Pfaff, Hanns U.; Rodríguez, Francisco B.; Varona, Pablo
2012-01-01
We designed a novel assisted closed-loop optimization protocol to improve the efficiency of brain-computer interfaces (BCI) based on steady state visually evoked potentials (SSVEP). In traditional paradigms, the control over the BCI-performance completely depends on the subjects' ability to learn from the given feedback cues. By contrast, in the proposed protocol both the subject and the machine share information and control over the BCI goal. Generally, the innovative assistance consists in the delivery of online information together with the online adaptation of BCI stimuli properties. In our case, this adaptive optimization process is realized by (1) a closed-loop search for the best set of SSVEP flicker frequencies and (2) feedback of actual SSVEP magnitudes to both the subject and the machine. These closed-loop interactions between subject and machine are evaluated in real-time by continuous measurement of their efficiencies, which are used as online criteria to adapt the BCI control parameters. The proposed protocol aims to compensate for variability in possibly unknown subjects' state and trait dimensions. In a study with N = 18 subjects, we found significant evidence that our protocol outperformed classic SSVEP-BCI control paradigms. Evidence is presented that it takes indeed into account interindividual variabilities: e.g., under the new protocol, baseline resting state EEG measures predict subjects' BCI performances. This paper illustrates the promising potential of assisted closed-loop protocols in BCI systems. Probably their applicability might be expanded to innovative uses, e.g., as possible new diagnostic/therapeutic tools for clinical contexts and as new paradigms for basic research. PMID:23443214
Assisted closed-loop optimization of SSVEP-BCI efficiency.
Fernandez-Vargas, Jacobo; Pfaff, Hanns U; Rodríguez, Francisco B; Varona, Pablo
2013-01-01
We designed a novel assisted closed-loop optimization protocol to improve the efficiency of brain-computer interfaces (BCI) based on steady state visually evoked potentials (SSVEP). In traditional paradigms, the control over the BCI-performance completely depends on the subjects' ability to learn from the given feedback cues. By contrast, in the proposed protocol both the subject and the machine share information and control over the BCI goal. Generally, the innovative assistance consists in the delivery of online information together with the online adaptation of BCI stimuli properties. In our case, this adaptive optimization process is realized by (1) a closed-loop search for the best set of SSVEP flicker frequencies and (2) feedback of actual SSVEP magnitudes to both the subject and the machine. These closed-loop interactions between subject and machine are evaluated in real-time by continuous measurement of their efficiencies, which are used as online criteria to adapt the BCI control parameters. The proposed protocol aims to compensate for variability in possibly unknown subjects' state and trait dimensions. In a study with N = 18 subjects, we found significant evidence that our protocol outperformed classic SSVEP-BCI control paradigms. Evidence is presented that it takes indeed into account interindividual variabilities: e.g., under the new protocol, baseline resting state EEG measures predict subjects' BCI performances. This paper illustrates the promising potential of assisted closed-loop protocols in BCI systems. Probably their applicability might be expanded to innovative uses, e.g., as possible new diagnostic/therapeutic tools for clinical contexts and as new paradigms for basic research.
A LOTUS NOTES APPLICATION FOR PREPARING, REVIEWING, AND STORING NHEERL RESEARCH PROTOCOLS
Upon becoming QA Manager of the Health Effects Research Laboratory (HERL) in 1990, Ron became aware of the need to simplify and streamline the research planning process that Laboratory Principal Investigators (Pls) faced. Appropriately, animal studies require close scrutiny, both...
Hard real-time closed-loop electrophysiology with the Real-Time eXperiment Interface (RTXI)
George, Ansel; Dorval, Alan D.; Christini, David J.
2017-01-01
The ability to experimentally perturb biological systems has traditionally been limited to static pre-programmed or operator-controlled protocols. In contrast, real-time control allows dynamic probing of biological systems with perturbations that are computed on-the-fly during experimentation. Real-time control applications for biological research are available; however, these systems are costly and often restrict the flexibility and customization of experimental protocols. The Real-Time eXperiment Interface (RTXI) is an open source software platform for achieving hard real-time data acquisition and closed-loop control in biological experiments while retaining the flexibility needed for experimental settings. RTXI has enabled users to implement complex custom closed-loop protocols in single cell, cell network, animal, and human electrophysiology studies. RTXI is also used as a free and open source, customizable electrophysiology platform in open-loop studies requiring online data acquisition, processing, and visualization. RTXI is easy to install, can be used with an extensive range of external experimentation and data acquisition hardware, and includes standard modules for implementing common electrophysiology protocols. PMID:28557998
NASA Astrophysics Data System (ADS)
Balcerzyk, Marcin; Fernández-López, Rosa; Parrado-Gallego, Ángel; Pachón-Garrudo, Víctor Manuel; Chavero-Royan, José; Hevilla, Juan; Jiménez-Ortega, Elisa; Leal, Antonio
2017-11-01
Tumour uptake value is a critical result in [18F]FDG-PET/CT ([18F]fluorodeoxyglucose) quantitative scans such as the dose prescription for radiotherapy and oncology. The quantification is highly dependent on the protocol of acquisition and reconstruction of the image, especially in low activity tumours. During adjusting acquisition and reconstruction protocols available in our Siemens Biograph mCT scanner for EARL (ResEARch 4 Life®) [18F]FDG-PET/CT accreditation requirements, we developed reconstruction protocols which will be used in PET based radiotherapy planning able to reduce inter-/intra-institute variability in Standard Uptake Value (SUV) results, and to bring Recovery Coefficient to 1 as close as possible for Image Quality NEMA 2007 phantom. Primary and secondary tumours from two patients were assessed by four independent evaluators. The influence of reconstruction protocols on tumour clinical assessment was presented. We proposed the improvement route for EARL accredited protocols so that they may be developed in classes to take advantage of scanner possibilities. The application of optimized reconstruction protocol eliminates the need of partial volume corrections.
Potential of Wake-Up Radio-Based MAC Protocols for Implantable Body Sensor Networks (IBSN)—A Survey
Karuppiah Ramachandran, Vignesh Raja; Ayele, Eyuel D.; Meratnia, Nirvana; Havinga, Paul J. M.
2016-01-01
With the advent of nano-technology, medical sensors and devices are becoming highly miniaturized. Consequently, the number of sensors and medical devices being implanted to accurately monitor and diagnose a disease is increasing. By measuring the symptoms and controlling a medical device as close as possible to the source, these implantable devices are able to save lives. A wireless link between medical sensors and implantable medical devices is essential in the case of closed-loop medical devices, in which symptoms of the diseases are monitored by sensors that are not placed in close proximity of the therapeutic device. Medium Access Control (MAC) is crucial to make it possible for several medical devices to communicate using a shared wireless medium in such a way that minimum delay, maximum throughput, and increased network life-time are guaranteed. To guarantee this Quality of Service (QoS), the MAC protocols control the main sources of limited resource wastage, namely the idle-listening, packet collisions, over-hearing, and packet loss. Traditional MAC protocols designed for body sensor networks are not directly applicable to Implantable Body Sensor Networks (IBSN) because of the dynamic nature of the radio channel within the human body and the strict QoS requirements of IBSN applications. Although numerous MAC protocols are available in the literature, the majority of them are designed for Body Sensor Network (BSN) and Wireless Sensor Network (WSN). To the best of our knowledge, there is so far no research paper that explores the impact of these MAC protocols specifically for IBSN. MAC protocols designed for implantable devices are still in their infancy and one of their most challenging objectives is to be ultra-low-power. One of the technological solutions to achieve this objective so is to integrate the concept of Wake-up radio (WuR) into the MAC design. In this survey, we present a taxonomy of MAC protocols based on their use of WuR technology and identify their bottlenecks to be used in IBSN applications. Furthermore, we present a number of open research challenges and requirements for designing an energy-efficient and reliable wireless communication protocol for IBSN. PMID:27916822
Potential of Wake-Up Radio-Based MAC Protocols for Implantable Body Sensor Networks (IBSN)-A Survey.
Karuppiah Ramachandran, Vignesh Raja; Ayele, Eyuel D; Meratnia, Nirvana; Havinga, Paul J M
2016-11-29
With the advent of nano-technology, medical sensors and devices are becoming highly miniaturized. Consequently, the number of sensors and medical devices being implanted to accurately monitor and diagnose a disease is increasing. By measuring the symptoms and controlling a medical device as close as possible to the source, these implantable devices are able to save lives. A wireless link between medical sensors and implantable medical devices is essential in the case of closed-loop medical devices, in which symptoms of the diseases are monitored by sensors that are not placed in close proximity of the therapeutic device. Medium Access Control (MAC) is crucial to make it possible for several medical devices to communicate using a shared wireless medium in such a way that minimum delay, maximum throughput, and increased network life-time are guaranteed. To guarantee this Quality of Service (QoS), the MAC protocols control the main sources of limited resource wastage, namely the idle-listening, packet collisions, over-hearing, and packet loss. Traditional MAC protocols designed for body sensor networks are not directly applicable to Implantable Body Sensor Networks (IBSN) because of the dynamic nature of the radio channel within the human body and the strict QoS requirements of IBSN applications. Although numerous MAC protocols are available in the literature, the majority of them are designed for Body Sensor Network (BSN) and Wireless Sensor Network (WSN). To the best of our knowledge, there is so far no research paper that explores the impact of these MAC protocols specifically for IBSN. MAC protocols designed for implantable devices are still in their infancy and one of their most challenging objectives is to be ultra-low-power. One of the technological solutions to achieve this objective so is to integrate the concept of Wake-up radio (WuR) into the MAC design. In this survey, we present a taxonomy of MAC protocols based on their use of WuR technology and identify their bottlenecks to be used in IBSN applications. Furthermore, we present a number of open research challenges and requirements for designing an energy-efficient and reliable wireless communication protocol for IBSN.
Operationalizing Culturally Responsive Instruction: Preliminary Findings of CRIOP Research
ERIC Educational Resources Information Center
Powell, Rebecca; Cantrell, Susan Chambers; Malo-Juvera, Victor; Correll, Pamela
2016-01-01
Background: Many scholars have espoused the use of culturally responsive instruction (CRI) for closing achievement gaps, yet there is a paucity of research supporting its effectiveness. In this article, we share results of a mixed methods study that examined the use of the Culturally Responsive Instruction Observation Protocol (CRIOP) as a…
Cost-effectiveness of risk stratified followup after urethral reconstruction: a decision analysis.
Belsante, Michael J; Zhao, Lee C; Hudak, Steven J; Lotan, Yair; Morey, Allen F
2013-10-01
We propose a novel risk stratified followup protocol for use after urethroplasty and explore potential cost savings. Decision analysis was performed comparing a symptom based, risk stratified protocol for patients undergoing excision and primary anastomosis urethroplasty vs a standard regimen of close followup for urethroplasty. Model assumptions included that excision and primary anastomosis has a 94% success rate, 11% of patients with successful urethroplasty had persistent lower urinary tract symptoms requiring cystoscopic evaluation, patients in whom treatment failed undergo urethrotomy and patients with recurrence on symptom based surveillance have a delayed diagnosis requiring suprapubic tube drainage. The Nationwide Inpatient Sample from 2010 was queried to identify the number of urethroplasties performed per year in the United States. Costs were obtained based on Medicare reimbursement rates. The 5-year cost of a symptom based, risk stratified followup protocol is $430 per patient vs $2,827 per patient using standard close followup practice. An estimated 7,761 urethroplasties were performed in the United States in 2010. Assuming that 60% were excision and primary anastomosis, and with more than 5 years of followup, the risk stratified protocol was projected to yield an estimated savings of $11,165,130. Sensitivity analysis showed that the symptom based, risk stratified followup protocol was far more cost-effective than standard close followup in all settings. Less than 1% of patients would be expected to have an asymptomatic recurrence using the risk stratified followup protocol. A risk stratified, symptom based approach to urethroplasty followup would produce a significant reduction in health care costs while decreasing unnecessary followup visits, invasive testing and radiation exposure. Copyright © 2013 American Urological Association Education and Research, Inc. Published by Elsevier Inc. All rights reserved.
Can a science-based definition of acupuncture improve clinical outcomes?
Priebe, Ted; Stumpf, Steven H; Zalunardo, Rod
2017-05-01
Research on acupuncture has been muddled by attempts to bridge the ancient with the modern. Barriers to effectiveness research are reflected in recurring conflicts that include disagreement on use of the most basic terms, lack of standard intervention controls, and the absence of functional measures for assessing treatment effect. Acupuncture research has stalled at the "placebo barrier" wherein acupuncture is "no better than placebo." The most widely recognized comparative effectiveness research in acupuncture does not compare acupuncture treatment protocols within groups, thereby, mutating large scale effectiveness studies into large scale efficacy trials. Too often research in acupuncture attempts to tie outcomes to traditional belief systems thereby limiting usefulness of the research. The acupuncture research paradigm needs to focus more closely on a scientific definition of treatments and outcomes that compare protocols in terms of prevalent clinical issues such as relative effectiveness for treating pain.
Schmidt, Olga; Hausmann, Axel; Cancian de Araujo, Bruno; Sutrisno, Hari; Peggie, Djunijanti; Schmidt, Stefan
2017-01-01
Here we present a general collecting and preparation protocol for DNA barcoding of Lepidoptera as part of large-scale rapid biodiversity assessment projects, and a comparison with alternative preserving and vouchering methods. About 98% of the sequenced specimens processed using the present collecting and preparation protocol yielded sequences with more than 500 base pairs. The study is based on the first outcomes of the Indonesian Biodiversity Discovery and Information System (IndoBioSys). IndoBioSys is a German-Indonesian research project that is conducted by the Museum für Naturkunde in Berlin and the Zoologische Staatssammlung München, in close cooperation with the Research Center for Biology - Indonesian Institute of Sciences (RCB-LIPI, Bogor).
47 CFR 79.4 - Closed captioning of video programming delivered using Internet protocol.
Code of Federal Regulations, 2013 CFR
2013-10-01
... 47 Telecommunication 4 2013-10-01 2013-10-01 false Closed captioning of video programming... (CONTINUED) BROADCAST RADIO SERVICES CLOSED CAPTIONING AND VIDEO DESCRIPTION OF VIDEO PROGRAMMING § 79.4 Closed captioning of video programming delivered using Internet protocol. (a) Definitions. For purposes...
47 CFR 79.4 - Closed captioning of video programming delivered using Internet protocol.
Code of Federal Regulations, 2012 CFR
2012-10-01
... 47 Telecommunication 4 2012-10-01 2012-10-01 false Closed captioning of video programming... (CONTINUED) BROADCAST RADIO SERVICES CLOSED CAPTIONING AND VIDEO DESCRIPTION OF VIDEO PROGRAMMING § 79.4 Closed captioning of video programming delivered using Internet protocol. (a) Definitions. For purposes...
Federal Register 2010, 2011, 2012, 2013, 2014
2012-08-06
... video programming and apparatus closed captioning requirements. This notice is consistent with the Order... Delivered Using Internet Protocol, and Apparatus Closed Caption Requirements. Form Number: N/A. Respondents... rules governing the closed captioning capabilities of certain apparatus on which consumers view video...
Staff Scientist | Center for Cancer Research
The scientist will be tasked with independent research projects that support and/or further the scope of our laboratory goals as determined by the Principal Investigator. The scientist will be responsible for overseeing daily operations and coordination of projects in close conjunction with all laboratory personnel. The scientist will participate in teaching laboratory methods to first-time post-docs, research fellows, and students. The scientist will work closely with a full-time research biologist, both in collaboration of research projects and in the lab-critical administrative tasks of IRB-approval, animal protocols, budget, etc. Our laboratory has two post-doctoral researchers at any given time. This is a great opportunity for candidates who are interested in cancer biology and want to grow their research career by working in our program with outstanding support of other established laboratories and core facilities in the National Cancer Institute.
Jongsma, K R; van Bruchem-Visser, R L; van de Vathorst, S; Mattace Raso, F U S
2016-06-01
A substantial proportion of dementia patients are excluded from research participation, while for extrapolation of the study findings, it is important that the research population represents the patient population. The aim of this study is to provide an analysis of dementia research and its exclusion criteria in order to get a clearer picture whether the research participants represent the general dementia population. Dementia studies registered at ToetsingOnline.nl between 2006-2015 were analysed. Study characteristics, funding and eligibility criteria were described and analysed using a standardised score sheet. The search yielded 103 usable study protocols. The number of trials has increased over the years, and 35% of the studies were industry-financed. Alzheimer's disease was the most researched type of dementia (84%). In observational studies the most frequently observed exclusion criterion is a neurological condition, while in drug studies and other intervention studies this is a somatic condition. Of all protocols, 86% had at least one exclusion criterion concerning comorbidity. Most studies focused on mild or moderate dementia (78%). Our study has shown that the distribution of dementia research over the different subtypes of dementia does not correspond with the prevalence of these subtypes in clinical practice. The research population in the protocols is not representative of the larger patient population. A greater number of dementia patients could derive benefit from the conducted research if the research agenda were more closely aligned with disease prevalence. A better representation of all dementia patients in research will help to meet the needs of these patients.
Hausmann, Axel; Cancian de Araujo, Bruno; Sutrisno, Hari; Peggie, Djunijanti; Schmidt, Stefan
2017-01-01
Abstract Here we present a general collecting and preparation protocol for DNA barcoding of Lepidoptera as part of large-scale rapid biodiversity assessment projects, and a comparison with alternative preserving and vouchering methods. About 98% of the sequenced specimens processed using the present collecting and preparation protocol yielded sequences with more than 500 base pairs. The study is based on the first outcomes of the Indonesian Biodiversity Discovery and Information System (IndoBioSys). IndoBioSys is a German-Indonesian research project that is conducted by the Museum für Naturkunde in Berlin and the Zoologische Staatssammlung München, in close cooperation with the Research Center for Biology – Indonesian Institute of Sciences (RCB-LIPI, Bogor). PMID:29134041
Tousignant, M; Tougas, G; Rossignol, M; Goulet, L
2002-04-01
At present there is no systematic observation protocol for the assessment of the multi-factorial aspects of physical exposure related to the back used within the constraints of occupational epidemiological research. In this context, a new preliminary systematic observation protocol is proposed to assess exposure to physical loading of the back using nine categories of physical risk factors: the SOPE back protocol. The objective of this study was to investigate whether the new protocol can correctly identify the level of exposure related to measured physical loading of the back. The subjects of this closed cohort study were 451 manual workers at a natural gas distribution company. The assessment of exposure was made with the protocol using groups with different job titles. The workers were followed for a 2 yr period to establish the risk of a new occurrence of complete disability related to the back (NOCD back injury) in each job grouping. Based on the median of the total scores derived from the protocol, two levels of exposure were identified (high and low). Taking into account the limitations of this study, the protocol in development may be a good tool to establish two levels of exposure to physical loading of the back in large epidemiological studies of occupational low back pain. Further research is needed to replicate these results with larger samples and to test the reliability and predictive validity of the protocol.
47 CFR 79.4 - Closed captioning of video programming delivered using Internet protocol.
Code of Federal Regulations, 2014 CFR
2014-10-01
... 47 Telecommunication 4 2014-10-01 2014-10-01 false Closed captioning of video programming... (CONTINUED) BROADCAST RADIO SERVICES ACCESSIBILITY OF VIDEO PROGRAMMING Video Programming Owners, Providers, and Distributors § 79.4 Closed captioning of video programming delivered using Internet protocol. (a...
Teaching and Reaching All Students: An Instructional Model for Closing the Gap
ERIC Educational Resources Information Center
Powell, Rebecca; Cantrell, Susan Chambers; Rightmyer, Elizabeth
2013-01-01
This article presents a model for culturally responsive instruction (CRI) that represents a synthesis of research on effective literacy and content instruction for diverse middle grades learners.The article discusses the various elements of the Culturally Responsive Instruction Observation Protocol (CRIOP) model. It then examines these elements by…
Advertisement-Based Energy Efficient Medium Access Protocols for Wireless Sensor Networks
NASA Astrophysics Data System (ADS)
Ray, Surjya Sarathi
One of the main challenges that prevents the large-scale deployment of Wireless Sensor Networks (WSNs) is providing the applications with the required quality of service (QoS) given the sensor nodes' limited energy supplies. WSNs are an important tool in supporting applications ranging from environmental and industrial monitoring, to battlefield surveillance and traffic control, among others. Most of these applications require sensors to function for long periods of time without human intervention and without battery replacement. Therefore, energy conservation is one of the main goals for protocols for WSNs. Energy conservation can be performed in different layers of the protocol stack. In particular, as the medium access control (MAC) layer can access and control the radio directly, large energy savings is possible through intelligent MAC protocol design. To maximize the network lifetime, MAC protocols for WSNs aim to minimize idle listening of the sensor nodes, packet collisions, and overhearing. Several approaches such as duty cycling and low power listening have been proposed at the MAC layer to achieve energy efficiency. In this thesis, I explore the possibility of further energy savings through the advertisement of data packets in the MAC layer. In the first part of my research, I propose Advertisement-MAC or ADV-MAC, a new MAC protocol for WSNs that utilizes the concept of advertising for data contention. This technique lets nodes listen dynamically to any desired transmission and sleep during transmissions not of interest. This minimizes the energy lost in idle listening and overhearing while maintaining an adaptive duty cycle to handle variable loads. Additionally, ADV-MAC enables energy efficient MAC-level multicasting. An analytical model for the packet delivery ratio and the energy consumption of the protocol is also proposed. The analytical model is verified with simulations and is used to choose an optimal value of the advertisement period. Simulations show that the optimized ADV-MAC provides substantial energy gains (50% to 70% less than other MAC protocols for WSNs such as T-MAC and S-MAC for the scenarios investigated) while faring as well as T-MAC in terms of packet delivery ratio and latency. Although ADV-MAC provides substantial energy gains over S-MAC and T-MAC, it is not optimal in terms of energy savings because contention is done twice -- once in the Advertisement Period and once in the Data Period. In the next part of my research, the second contention in the Data Period is eliminated and the advantages of contention-based and TDMA-based protocols are combined to form Advertisement based Time-division Multiple Access (ATMA), a distributed TDMA-based MAC protocol for WSNs. ATMA utilizes the bursty nature of the traffic to prevent energy waste through advertisements and reservations for data slots. Extensive simulations and qualitative analysis show that with bursty traffic, ATMA outperforms contention-based protocols (S-MAC, T-MAC and ADV-MAC), a TDMA based protocol (TRAMA) and hybrid protocols (Z-MAC and IEEE 802.15.4). ATMA provides energy reductions of up to 80%, while providing the best packet delivery ratio (close to 100%) and latency among all the investigated protocols. Simulations alone cannot reflect many of the challenges faced by real implementations of MAC protocols, such as clock-drift, synchronization, imperfect physical layers, and irregular interference from other transmissions. Such issues may cripple a protocol that otherwise performs very well in software simulations. Hence, to validate my research, I conclude with a hardware implementation of the ATMA protocol on SORA (Software Radio), developed by Microsoft Research Asia. SORA is a reprogrammable Software Defined Radio (SDR) platform that satisfies the throughput and timing requirements of modern wireless protocols while utilizing the rich general purpose PC development environment. Experimental results obtained from the hardware implementation of ATMA closely mirror the simulation results obtained for a single hop network with 4 nodes.
Protocol Coordinator | Center for Cancer Research
PROGRAM DESCRIPTION Within the Leidos Biomedical Research Inc.’s Clinical Research Directorate, the Clinical Monitoring Research Program (CMRP) provides high-quality comprehensive and strategic operational support to the high-profile domestic and international clinical research initiatives of the National Cancer Institute (NCI), National Institute of Allergy and Infectious Diseases (NIAID), Clinical Center (CC), National Institute of Heart, Lung and Blood Institute (NHLBI), National Institute of Arthritis and Musculoskeletal and Skin Diseases (NIAMS), National Center for Advancing Translational Sciences (NCATS), National Institute of Neurological Disorders and Stroke (NINDS), and the National Institute of Mental Health (NIMH). Since its inception in 2001, CMRP’s ability to provide rapid responses, high-quality solutions, and to recruit and retain experts with a variety of backgrounds to meet the growing research portfolios of NCI, NIAID, CC, NHLBI, NIAMS, NCATS, NINDS, and NIMH has led to the considerable expansion of the program and its repertoire of support services. CMRP’s support services are strategically aligned with the program’s mission to provide comprehensive, dedicated support to assist National Institutes of Health researchers in providing the highest quality of clinical research in compliance with applicable regulations and guidelines, maintaining data integrity, and protecting human subjects. For the scientific advancement of clinical research, CMRP services include comprehensive clinical trials, regulatory, pharmacovigilance, protocol navigation and development, and programmatic and project management support for facilitating the conduct of 400+ Phase I, II, and III domestic and international trials on a yearly basis. These trials investigate the prevention, diagnosis, treatment of, and therapies for cancer, influenza, HIV, and other infectious diseases and viruses such as hepatitis C, tuberculosis, malaria, and Ebola virus; heart, lung, and blood diseases and conditions; parasitic infections; rheumatic and inflammatory diseases; and rare and neglected diseases. CMRP’s collaborative approach to clinical research and the expertise and dedication of staff to the continuation and success of the program’s mission has contributed to improving the overall standards of public health on a global scale. The Clinical Monitoring Research Program (CMRP) provides comprehensive clinical and administrative support to the National Cancer Institute’s Center for Cancer Research’s (CCR), Office of Regulatory Affairs for protocol development review, regulatory review, and the implementation process as well as oversees medical writing/editing, regulatory/ compliance, and protocol coordination/navigation and administration. KEY ROLES/RESPONSIBILITIES - THIS POSITION IS CONTINGENT UPON FUNDING APPROVAL The Protocol Coordinator II: Provides programmatic and logistical support for the operations of clinical research for Phase I and Phase II clinical trials Provides deployment of clinical support services for clinical research Streamlines protocol development timeline Provides data and document collection and compilation for regulatory filing with the FDA and other regulatory authorities Provides administrative coordination and general logistical support for regulatory activities Ensures the provision of training for investigators and associate staff to reinforce and enhance a GCP culture Provides quality assurance and quality control oversight Performs regulatory review of clinical protocols, informed consent and other clinical documents Tracks and facilitates a portfolio of protocols through each process step (IRB, RAC, DSMB, Office of Protocol Services) Assists clinical investigators in preparing clinical research protocols, including writing and formatting protocol documents and consent forms Prepares protocol packages for review and ensures that protocol packages include all of the required material and comply with CCR, NCI and NIH policies Collaborates with investigators to resolve any protocol/data issues Coordinates submission of protocols for scientific and ethical review by the Branch scientific review committees, the NCI Institutional Review Board (IRB) and the clinical trial sponsor or the FDA Monitors the review process and maintains detailed, complete and accurate records for each protocol of the approvals at the various stages of the review process, including new protocol submissions, amendments to protocols, and continuing reviews, as well as other submissions such as adverse events Attends and prepares minutes for the Branch Protocol Review Committees For protocols that are performed with other research centers: contacts coordinators at other centers to obtain review committee approvals at these centers, maintains records of these approvals at the outside centers in the protocol files, and sends protocol amendments and other reports to the participating centers Maintains a schedule of all review committee submission deadline dates and meeting dates Assists clinical investigators in understanding and complying with the entire review process Works closely with the NCI Protocol Review Office in establishing and maintaining a paperless automated document management and tracking system for NCI protocols Converts protocols from Word format to PDF with bookmarks Maintains the PDF version of the most current approved version of each active clinical protocol on a central server This position has the option to be located in Frederick or Rockville, Maryland.
Physiological responses to simulated firefighter exercise protocols in varying environments.
Horn, Gavin P; Kesler, Richard M; Motl, Robert W; Hsiao-Wecksler, Elizabeth T; Klaren, Rachel E; Ensari, Ipek; Petrucci, Matthew N; Fernhall, Bo; Rosengren, Karl S
2015-01-01
For decades, research to quantify the effects of firefighting activities and personal protective equipment on physiology and biomechanics has been conducted in a variety of testing environments. It is unknown if these different environments provide similar information and comparable responses. A novel Firefighting Activities Station, which simulates four common fireground tasks, is presented for use with an environmental chamber in a controlled laboratory setting. Nineteen firefighters completed three different exercise protocols following common research practices. Simulated firefighting activities conducted in an environmental chamber or live-fire structures elicited similar physiological responses (max heart rate: 190.1 vs 188.0 bpm, core temperature response: 0.047°C/min vs 0.043°C/min) and accelerometry counts. However, the response to a treadmill protocol commonly used in laboratory settings resulted in significantly lower heart rate (178.4 vs 188.0 bpm), core temperature response (0.037°C/min vs 0.043°C/min) and physical activity counts compared with firefighting activities in the burn building. Practitioner Summary: We introduce a new approach for simulating realistic firefighting activities in a controlled laboratory environment for ergonomics assessment of fire service equipment and personnel. Physiological responses to this proposed protocol more closely replicate those from live-fire activities than a traditional treadmill protocol and are simple to replicate and standardise.
Access to high-tech health care. Ethics.
Merrill, J M
1991-03-15
Access to health care has always been limited by personal and social economics. Poverty remains one element that correlates with poor prognosis in all varieties of cancer. Prior to becoming standard therapy, elements of high-tech health care are often widely available as research protocols, participation in which is generally available without considerations of insurance coverage or personal wealth. Any person may still volunteer participation in research protocols and thereby partake in high-tech advances even before these become standard therapy. However, recent developments in the conduct of research now may limit participation. Medicare and third party insurance payers proscribe payment for research project care and always have. Recently, more than ever before, reimbursements to physicians and health care institutions have been more closely scrutinized to reject all payment in research settings. In situations in which cost and availability of the new technology, whether machine or drug, limit participation, research entrepreneurs have made research participation available to only those who can pay for it. These and similar developments threaten to limit access to high-tech health care and to actually impede cancer research.
Internet Voice Distribution System (IVoDS) Utilization in Remote Payload Operations
NASA Technical Reports Server (NTRS)
Best, Susan; Bradford, Bob; Chamberlain, Jim; Nichols, Kelvin; Bailey, Darrell (Technical Monitor)
2002-01-01
Due to limited crew availability to support science and the large number of experiments to be operated simultaneously, telescience is key to a successful International Space Station (ISS) science program. Crew, operations personnel at NASA centers, and researchers at universities and companies around the world must work closely together to perform scientific experiments on-board ISS. NASA has initiated use of Voice over Internet Protocol (VoIP) to supplement the existing HVoDS mission voice communications system used by researchers. The Internet Voice Distribution System (IVoDS) connects researchers to mission support "loops" or conferences via Internet Protocol networks such as the high-speed Internet 2. Researchers use IVoDS software on personal computers to talk with operations personnel at NASA centers. IVoDS also has the capability, if authorized, to allow researchers to communicate with the ISS crew during experiment operations. NODS was developed by Marshall Space Flight Center with contractors A2 Technology, Inc. FVC, Lockheed- Martin, and VoIP Group. IVoDS is currently undergoing field-testing with full deployment for up to 50 simultaneous users expected in 2002. Research is currently being performed to take full advantage of the digital world - the Personal Computer and Internet Protocol networks - to qualitatively enhance communications among ISS operations personnel. In addition to the current voice capability, video and data-sharing capabilities are being investigated. Major obstacles being addressed include network bandwidth capacity and strict security requirements. Techniques being investigated to reduce and overcome these obstacles include emerging audio-video protocols and network technology including multicast and quality-of-service.
Protocol Coordinator | Center for Cancer Research
PROGRAM DESCRIPTION Within the Leidos Biomedical Research Inc.’s Clinical Research Directorate, the Clinical Monitoring Research Program (CMRP) provides high-quality comprehensive and strategic operational support to the high-profile domestic and international clinical research initiatives of the National Cancer Institute (NCI), National Institute of Allergy and Infectious Diseases (NIAID), Clinical Center (CC), National Institute of Heart, Lung and Blood Institute (NHLBI), National Institute of Arthritis and Musculoskeletal and Skin Diseases (NIAMS), National Center for Advancing Translational Sciences (NCATS), National Institute of Neurological Disorders and Stroke (NINDS), and the National Institute of Mental Health (NIMH). Since its inception in 2001, CMRP’s ability to provide rapid responses, high-quality solutions, and to recruit and retain experts with a variety of backgrounds to meet the growing research portfolios of NCI, NIAID, CC, NHLBI, NIAMS, NCATS, NINDS, and NIMH has led to the considerable expansion of the program and its repertoire of support services. CMRP’s support services are strategically aligned with the program’s mission to provide comprehensive, dedicated support to assist National Institutes of Health researchers in providing the highest quality of clinical research in compliance with applicable regulations and guidelines, maintaining data integrity, and protecting human subjects. For the scientific advancement of clinical research, CMRP services include comprehensive clinical trials, regulatory, pharmacovigilance, protocol navigation and development, and programmatic and project management support for facilitating the conduct of 400+ Phase I, II, and III domestic and international trials on a yearly basis. These trials investigate the prevention, diagnosis, treatment of, and therapies for cancer, influenza, HIV, and other infectious diseases and viruses such as hepatitis C, tuberculosis, malaria, and Ebola virus; heart, lung, and blood diseases and conditions; parasitic infections; rheumatic and inflammatory diseases; and rare and neglected diseases. CMRP’s collaborative approach to clinical research and the expertise and dedication of staff to the continuation and success of the program’s mission has contributed to improving the overall standards of public health on a global scale. The Clinical Monitoring Research Program (CMRP) provides comprehensive clinical and administrative support to the National Cancer Institute’s Center for Cancer Research’s (CCR) Protocol Support Office (PSO) for protocol development review, regulatory review, and the implementation process as well as oversees medical writing/editing, regulatory/ compliance, and protocol coordination/navigation and administration. KEY ROLES/RESPONSIBILITIES The Protocol Coordinator III: Provides programmatic and logistical support for the operations of clinical research for Phase I and Phase II clinical trials. Provides deployment of clinical support services for clinical research. Streamlines the protocol development timeline. Provides data and documents collection and compilation for regulatory filing with the U.S. Food and Drug Administration (FDA) and other regulatory authorities.. Provides technical review and report preparation. Provides administrative coordination and general logistical support for regulatory activities. Ensures the provision of training for investigators and associate staff to reinforce and enhance a Good Clinical Practices (GCP) culture. Oversees quality assurance and quality control, performs regulatory review of clinical protocols, informed consent and other clinical documents. Tracks and facilitates a portfolio of protocols through each process step (Institutional Review Board [IRB], Regulatory Affairs Compliance [RAC], Data Safety Monitoring Board [DSMB], Office of Protocol Services). Assists clinical investigators in preparing clinical research protocols, including writing and formatting consent forms. Prepares protocol packages for review and ensures that protocol packages include all of the required material and comply with CCR, NCI and NIH policies. Collaborates with investigators to resolve any protocol/data issues. Coordinates submission of protocols for scientific and ethical review by the Branch scientific review committees, the NCI IRB, and the clinical trial sponsor or the FDA. Monitors the review process and maintains detailed, complete and accurate records for each protocol of the approvals at the various stages of the review process, including new protocol submissions, amendments to protocols, and continuing reviews, as well as other submissions such as adverse events. Attends and prepares minutes for the Branch Protocol Review Committees. Contacts coordinators at other centers for protocols that are performed there to obtain review committee approvals at those centers, maintains records of these approvals and sends protocol amendments and other reports to the participating centers. Maintains a schedule of all review committee submission deadline dates and meeting dates. Assists clinical investigators in understanding and complying with the entire review process. Works closely with the NCI Protocol Review Office in establishing and maintaining a paperless automated document and tracking system for NCI protocols. Converts protocols from Word format to .pdf with bookmarks. Maintains the .pdf version of the most current approved version of each active clinical protocol on a central server. This position is located in Rockville, Maryland.
DOT National Transportation Integrated Search
2009-06-30
The project has been focused on National Transportation Communications for ITS Protocol : (NTCIP) research and testing across the entire life cycle of traffic operations, ITS, and statewide : communications deployments. This life cycle includes desig...
Gillman, Anna; Winkler, Renata; Taylor, Nicholas F
2017-06-01
The Frazier Free Water Protocol was developed with the aim of providing patients with dysphagia an option to consume thin (i.e. unthickened) water in-between mealtimes. A systematic review was conducted of research published in peer-reviewed journals. An electronic search of the EMBASE, CINAHL and MEDLINE databases was completed up to July 2016. A total of 8 studies were identified for inclusion: 5 randomised controlled trials, 2 cohort studies with matched cases and 1 single group pre-post intervention prospective study. A total of 215 rehabilitation inpatients and 30 acute patients with oropharyngeal dysphagia who required thickened fluids or were to remain 'nil by mouth', as determined by bedside swallow assessment and/or videofluoroscopy/fiberoptic endoscopic evaluation of swallowing, were included. Meta-analyses of the data from the rehabilitation studies revealed (1) low-quality evidence that implementing the protocol did not result in increased odds of having lung complications and (2) low-quality evidence that fluid intake may increase. Patients' perceptions of swallow-related quality of life appeared to improve. This review has found that when the protocol is closely adhered to and patients are carefully selected using strict exclusion criteria, including an evaluation of their cognition and mobility, adult rehabilitation inpatients with dysphagia to thin fluids can be offered the choice of implementing the Free Water Protocol. Further research is required to determine if the Free Water Protocol can be implemented in settings other than inpatient rehabilitation.
Closed Conference Signalling Using the Session Initiation Protocol.
ERIC Educational Resources Information Center
Miladinovic, Igor; Stadler, Johannes
2003-01-01
Introduces an extension of the Session Initiation Protocol (SIP) for closed multiparty conferences; the extension expands SIP for discovery of participant identities in a conference, and ensures that each participant is notified before a new participant joins. Verifies this extension by applying it to two SIP conference models. Concludes with an…
Federal Register 2010, 2011, 2012, 2013, 2014
2013-09-05
... FEDERAL COMMUNICATIONS COMMISSION 47 CFR Part 79 [MB Docket No. 11-154; DA 13-1785] Closed Captioning of Internet Protocol-Delivered Video Programming: Implementation of the Twenty-First Century Communications and Video Accessibility Act of 2010 AGENCY: Federal Communications Commission. ACTION: Proposed...
Snyder-Mackler, Noah; Majoros, William H.; Yuan, Michael L.; Shaver, Amanda O.; Gordon, Jacob B.; Kopp, Gisela H.; Schlebusch, Stephen A.; Wall, Jeffrey D.; Alberts, Susan C.; Mukherjee, Sayan; Zhou, Xiang; Tung, Jenny
2016-01-01
Research on the genetics of natural populations was revolutionized in the 1990s by methods for genotyping noninvasively collected samples. However, these methods have remained largely unchanged for the past 20 years and lag far behind the genomics era. To close this gap, here we report an optimized laboratory protocol for genome-wide capture of endogenous DNA from noninvasively collected samples, coupled with a novel computational approach to reconstruct pedigree links from the resulting low-coverage data. We validated both methods using fecal samples from 62 wild baboons, including 48 from an independently constructed extended pedigree. We enriched fecal-derived DNA samples up to 40-fold for endogenous baboon DNA and reconstructed near-perfect pedigree relationships even with extremely low-coverage sequencing. We anticipate that these methods will be broadly applicable to the many research systems for which only noninvasive samples are available. The lab protocol and software (“WHODAD”) are freely available at www.tung-lab.org/protocols-and-software.html and www.xzlab.org/software.html, respectively. PMID:27098910
Federal Register 2010, 2011, 2012, 2013, 2014
2013-07-02
... covered apparatus may convey from the source device to the consumer equipment the information necessary to... using Internet protocol (``IP'') and apparatus used by consumers to view video programming. The action...-delivered video programming and rules governing the closed captioning capabilities of certain apparatus on...
Conflict of interest in biomedical research: a view from Europe.
Salvi, Maurizio
2003-01-01
In this paper I address the conflict of interest (CoI) issue from a legal point of view at a European level. We will see that the regulatory framework that exists in Europe does state the need for the independence of ethics committee involved in authorisation of research and clinical trials. We will see that CoI is an element that has to be closely monitored at National and International level. Therefore, Member States and Newly Associated States do have to address CoI in the authorisation process of research and clinical protocols of biomedicine.
GLobal Integrated Design Environment (GLIDE): A Concurrent Engineering Application
NASA Technical Reports Server (NTRS)
McGuire, Melissa L.; Kunkel, Matthew R.; Smith, David A.
2010-01-01
The GLobal Integrated Design Environment (GLIDE) is a client-server software application purpose-built to mitigate issues associated with real time data sharing in concurrent engineering environments and to facilitate discipline-to-discipline interaction between multiple engineers and researchers. GLIDE is implemented in multiple programming languages utilizing standardized web protocols to enable secure parameter data sharing between engineers and researchers across the Internet in closed and/or widely distributed working environments. A well defined, HyperText Transfer Protocol (HTTP) based Application Programming Interface (API) to the GLIDE client/server environment enables users to interact with GLIDE, and each other, within common and familiar tools. One such common tool, Microsoft Excel (Microsoft Corporation), paired with its add-in API for GLIDE, is discussed in this paper. The top-level examples given demonstrate how this interface improves the efficiency of the design process of a concurrent engineering study while reducing potential errors associated with manually sharing information between study participants.
Crozer-Chester Medical Center Burn Research Projects
2009-07-01
Dressing for Autogenous Skin Donor Sites” This study will compare the performance of an agreed upon dressing to the normal standard of care (Xeroform...resuscitation algorithm for the development of a closed loop resuscitation system. a. Complete project start-up activities (hiring and training of...collect data (Year 2, Quarter 1) Study 2, Protocol Title: “Evaluation of Xxx for Autogenous Skin Donor Sites” Task 1: Enroll up to 30 patients in
Disentangling the nature of the nicotine stimulus.
Bevins, Rick A; Barrett, Scott T; Polewan, Robert J; Pittenger, Steven T; Swalve, Natashia; Charntikov, Sergios
2012-05-01
Learning involving interoceptive stimuli likely plays an important role in many diseases and psychopathologies. Within this area, there has been extensive research investigating the interoceptive stimulus effects of abused drugs. In this pursuit, behavioral pharmacologists have taken advantage of what is known about learning processes and adapted the techniques to investigate the behavioral and receptor mechanisms of drug stimuli. Of particular interest is the nicotine stimulus and the use of the two-lever operant drug discrimination task and the Pavlovian drug discriminated goal-tracking task. There is strong concordance between the two methods when using "standard" testing protocols that minimize learning on test days. For example, ABT-418, nornicotine, and varenicline all fully evoked nicotine-appropriate responding. Notably, research from our laboratory with the discriminated goal-tracking task has used an alternative testing protocol. This protocol assesses stimulus substitution based on how well extinction learning using a non-nicotine ligand transfers back to the nicotine stimulus. These findings challenge conclusions based on more "standard" testing procedures (e.g., ABT-418 is not nicotine-like). As a starting point, we propose Thurstone scaling as a quantitative method for more precisely comparing transfer of extinction across doses, experiments, and investigators. We close with a discussion of future research directions and potential implications of the research for understanding interoceptive stimuli. Copyright © 2011 Elsevier B.V. All rights reserved.
Signatures of two-step impurity mediated vortex lattice melting in Bose-Einstein condensate
NASA Astrophysics Data System (ADS)
Dey, Bishwajyoti
2017-04-01
We study impurity mediated vortex lattice melting in a rotating two-dimensional Bose-Einstein condensate (BEC). Impurities are introduced either through a protocol in which vortex lattice is produced in an impurity potential or first creating the vortex lattice in the absence of random pinning and then cranking up the impurity potential. These two protocols have obvious relation with the two commonly known protocols of creating vortex lattice in a type-II superconductor: zero field cooling protocol and the field cooling protocol respectively. Time-splitting Crank-Nicolson method has been used to numerically simulate the vortex lattice dynamics. It is shown that the vortex lattice follows a two-step melting via loss of positional and orientational order. This vortex lattice melting process in BEC closely mimics the recently observed two-step melting of vortex matter in weakly pinned type-II superconductor Co-intercalated NbSe2. Also, using numerical perturbation analysis, we compare between the states obtained in two protocols and show that the vortex lattice states are metastable and more disordered when impurities are introduced after the formation of an ordered vortex lattice. The author would like to thank SERB, Govt. of India and BCUD-SPPU for financial support through research Grants.
Yamanaka, Ashley; Fialkowski, Marie Kainoa; Wilkens, Lynne; Li, Fenfang; Ettienne, Reynolette; Fleming, Travis; Power, Julianne; Deenik, Jonathan; Coleman, Patricia; Leon Guerrero, Rachael; Novotny, Rachel
2016-09-02
Quality assurance plays an important role in research by assuring data integrity, and thus, valid study results. We aim to describe and share the results of the quality assurance process used to guide the data collection process in a multi-site childhood obesity prevalence study and intervention trial across the US Affiliated Pacific Region. Quality assurance assessments following a standardized protocol were conducted by one assessor in every participating site. Results were summarized to examine and align the implementation of protocol procedures across diverse settings. Data collection protocols focused on food and physical activity were adhered to closely; however, protocols for handling completed forms and ensuring data security showed more variability. Quality assurance protocols are common in the clinical literature but are limited in multi-site community-based studies, especially in underserved populations. The reduction in the number of QA problems found in the second as compared to the first data collection periods for the intervention study attest to the value of this assessment. This paper can serve as a reference for similar studies wishing to implement quality assurance protocols of the data collection process to preserve data integrity and enhance the validity of study findings. NIH clinical trial #NCT01881373.
Riber-Hansen, Rikke; Hastrup, Nina; Clemmensen, Ole; Behrendt, Nille; Klausen, Siri; Ramsing, Mette; Spaun, Eva; Hamilton-Dutoit, Stephen Jacques; Steiniche, Torben
2012-02-01
Metastasis size in melanoma sentinel lymph nodes (SLNs) is an emerging prognostic factor. Two European melanoma treatment trials include SLN metastasis diameters as inclusion criteria. Whilst diameter estimates are sensitive to the number of sections examined, the level of this bias is largely unknown. We performed a prospective multicentre study to compare the European Organisation for Research and Treatment of Cancer (EORTC) recommended protocol with a protocol of complete step-sectioning. One hundred and thirty-three consecutive SLNs from seven SLN centres were analysed by five central sections 50μm apart (EORTC Protocol) followed by complete 250μm step-sectioning. Overall, 29 patients (21.8%) were SLN-positive. The EORTC Protocol missed eight of these metastases (28%), one metastasis measuring less than 0.1mm in diameter, seven measuring between 0.1 and 1mm. Complete step-sectioning at 250μm intervals (Extensive Protocol) missed one metastasis (3%) that measured less than 0.1mm. Thirteen treatment courses (34%) performed if inclusion was based on the Combined Protocol would not be performed if assessed by the EORTC Protocol. Thus, 10 patients would be without completion lymph node dissection (EORTC MINITUB study), whilst three patients would not be eligible for anti-CTLA4 trial (EORTC protocol 18071). The corresponding number with the Extensive Protocol would be three; one patient for the MINITUB registration study and two patients for the anti-CTLA4 study. Examining SLNs by close central sectioning alone (EORTC Protocol) misses a substantial number of metastases and underestimates the maximum metastasis diameter, leading to important changes in patient eligibility for various treatment protocols. Copyright © 2011 Elsevier Ltd. All rights reserved.
Coherent attack on oblivious transfer based on single-qubit rotations
NASA Astrophysics Data System (ADS)
He, Guang Ping
2018-04-01
Recently a bit-string quantum oblivious transfer (OT) protocol based on single-qubit rotations was proposed (Rodrigues et al 2017 J. Phys. A: Math. Theor. 50 205301) and proven secure against few-qubit measurements. However, it was left as an open question whether the protocol remains secure against general attacks. Here, we close the gap by showing that if the receiver Bob can perform collective measurements on all qubits, then he can learn Alice’s secret message with a probability close to one. Thus the protocol fails to meet the security criterion of OT.
ERIC Educational Resources Information Center
Cai, Hansong; Cai, Luna Jing
2015-01-01
This research investigates cross-linguistic influence in the comprehension of L3 French past tense. A close examination was made on the L1 (Chinese) and L2 (English) transfer patterns among 20 English majors in their early acquisition of L3 French passé compose (PC). Data were collected through introspective think-aloud protocol in a comprehension…
Real-time Electrophysiology: Using Closed-loop Protocols to Probe Neuronal Dynamics and Beyond
Linaro, Daniele; Couto, João; Giugliano, Michele
2015-01-01
Experimental neuroscience is witnessing an increased interest in the development and application of novel and often complex, closed-loop protocols, where the stimulus applied depends in real-time on the response of the system. Recent applications range from the implementation of virtual reality systems for studying motor responses both in mice1 and in zebrafish2, to control of seizures following cortical stroke using optogenetics3. A key advantage of closed-loop techniques resides in the capability of probing higher dimensional properties that are not directly accessible or that depend on multiple variables, such as neuronal excitability4 and reliability, while at the same time maximizing the experimental throughput. In this contribution and in the context of cellular electrophysiology, we describe how to apply a variety of closed-loop protocols to the study of the response properties of pyramidal cortical neurons, recorded intracellularly with the patch clamp technique in acute brain slices from the somatosensory cortex of juvenile rats. As no commercially available or open source software provides all the features required for efficiently performing the experiments described here, a new software toolbox called LCG5 was developed, whose modular structure maximizes reuse of computer code and facilitates the implementation of novel experimental paradigms. Stimulation waveforms are specified using a compact meta-description and full experimental protocols are described in text-based configuration files. Additionally, LCG has a command-line interface that is suited for repetition of trials and automation of experimental protocols. PMID:26132434
Barckhausen, Christina; Rice, Brent; Baila, Stefano; Sensebé, Luc; Schrezenmeier, Hubert; Nold, Philipp; Hackstein, Holger; Rojewski, Markus Thomas
2016-01-01
This chapter describes a method for GMP-compliant expansion of human mesenchymal stromal/stem cells (hMSC) from bone marrow aspirates, using the Quantum(®) Cell Expansion System from Terumo BCT. The Quantum system is a functionally closed, automated hollow fiber bioreactor system designed to reproducibly grow cells in either GMP or research laboratory environments. The chapter includes protocols for preparation of media, setup of the Quantum system, coating of the hollow fiber bioreactor, as well as loading, feeding, and harvesting of cells. We suggest a panel of quality controls for the starting material, the interim product, as well as the final product.
2016-09-15
WHASC – Animal Final Report 18May16 1. Protocol Number: FWH200140094A 2. Type of Research: Animal Research 3. Title...6. Results: ROSC increased among standard CC animals with REBOA (33%) compared to standard CC animals without REBOA (0.0%) (p=0.04). Among...standard CC animals , aortic systolic blood pressure, right atrial systolic blood pressure and end tidal CO2 (ETCO2) increased during all time intervals of
A Closed Mars Analog Simulation: The Approach of Crew 5 At the Mars Desert Research Station
NASA Technical Reports Server (NTRS)
Clancey, William J.; Koga, Dennis (Technical Monitor)
2002-01-01
For twelve days in April 2002 we performed a closed simulation in the Mars Desert Research Station, isolated from other people, as on Mars, while performing systematic surface exploration and life support chores. Email provided our only means of contact; no phone or radio conversations were possible. All mission-related messages were mediated by a remote mission support team. This protocol enabled a systematic and controlled study of crew activities, scheduling, and use of space. The analysis presented here focuses on two questions: Where did the time go-why did people feel rushed and unable to complete their work? How can we measure and model productivity, to compare habitat designs, schedules, roles, and tools? Analysis suggests that a simple scheduling change-having lunch and dinner earlier, plus eliminating afternoon meetings-increased the available productive time by 41%.
Comparing the biocidal properties of non-thermal plasma sources by reference protocol
NASA Astrophysics Data System (ADS)
Khun, Josef; Jirešová, Jana; Kujalová, Lucie; Hozák, Pavel; Scholtz, Vladimír
2017-10-01
The previously proposed reference protocol enabling easy comparison of biocidal properties of different non-thermal plasma sources has been followed and discussed. For inactivation tests the reference protocol has used spores of Gram positive bacterium Bacillus subtilis (ATCC 6633) deposited on a polycarbonate membrane as reference sample. In this work, biocidal properties of a negative glow corona, positive streamer corona, positive transient spark and cometary discharges are being compared in both open air and closed apparatus. Despite the total number of bacteria surviving 1 h exposure has decreased by up to 7 orders in closed apparatus, in open one, only weak inhibition bactericidal effect has been observed.
Synthesis of all-hydrocarbon stapled α-helical peptides by ring-closing olefin metathesis.
Kim, Young-Woo; Grossmann, Tom N; Verdine, Gregory L
2011-06-01
This protocol provides a detailed procedure for the preparation of stapled α-helical peptides, which have proven their potential as useful molecular probes and as next-generation therapeutics. Two crucial features of this protocol are (i) the construction of peptide substrates containing hindered α-methyl, α-alkenyl amino acids and (ii) the ring-closing olefin metathesis (RCM) of the resulting resin-bound peptide substrates. The stapling systems described in this protocol, namely bridging one or two turns of an α-helix, are highly adaptable to most peptide sequences, resulting in favorable RCM kinetics, helix stabilization and promotion of cellular uptake.
Federal Register 2010, 2011, 2012, 2013, 2014
2011-09-28
...In this document, the Commission proposes rules to implement provisions of the Twenty-First Century Communications and Video Accessibility Act of 2010 (``CVAA'') that mandate rules for closed captioning of certain video programming delivered using Internet protocol (``IP''). The Commission seeks comment on rules that would apply to the distributors, providers, and owners of IP-delivered video programming, as well as the devices that display such programming.
Recognizing Risk and Vulnerability in Research Ethics: Imagining the "What Ifs?"
Peter, Elizabeth; Friedland, Judith
2017-04-01
Research ethics committees (RECs) may misunderstand the vulnerability of participants, given their distance from the field. What RECs identify as the vulnerabilities that were not adequately recognized in protocols and how they attempt to protect the perceived vulnerability of participants and mitigate risks were examined using the response letters sent to researchers by three university-based RECs. Using a critical qualitative method informed by feminist ethics, we identified an overarching theme of recognizing and responding to cascading vulnerabilities and four subthemes: identifying vulnerable groups, recognizing potentially risky research, imagining the "what ifs," and mitigating perceived risks. An ethics approach that is up-close, as opposed to distant, is needed to foster closer relationships among participants, researchers, and RECs and to understand participant vulnerability and strength better.
Utilization of Internet Protocol-Based Voice Systems in Remote Payload Operations
NASA Technical Reports Server (NTRS)
Chamberlain, jim; Bradford, Bob; Best, Susan; Nichols, Kelvin
2002-01-01
Due to limited crew availability to support science and the large number of experiments to be operated simultaneously, telescience is key to a successful International Space Station (ISS) science program. Crew, operations personnel at NASA centers, and researchers at universities and companies around the world must work closely together to per orm scientific experiments on-board ISS. The deployment of reliable high-speed Internet Protocol (IP)-based networks promises to greatly enhance telescience capabilities. These networks are now being used to cost-effectively extend the reach of remote mission support systems. They reduce the need for dedicated leased lines and travel while improving distributed workgroup collaboration capabilities. NASA has initiated use of Voice over Internet Protocol (VoIP) to supplement the existing mission voice communications system used by researchers at their remote sites. The Internet Voice Distribution System (IVoDS) connects remote researchers to mission support "loopsll or conferences via NASA networks and Internet 2. Researchers use NODS software on personal computers to talk with operations personnel at NASA centers. IVoDS also has the ;capability, if authorized, to allow researchers to communicate with the ISS crew during experiment operations. NODS was developed by Marshall Space Flight Center with contractors & Technology, First Virtual Communications, Lockheed-Martin, and VoIP Group. NODS is currently undergoing field-testing with full deployment for up to 50 simultaneous users expected in 2002. Research is being performed in parallel with IVoDS deployment for a next-generation system to qualitatively enhance communications among ISS operations personnel. In addition to the current voice capability, video and data/application-sharing capabilities are being investigated. IVoDS technology is also being considered for mission support systems for programs such as Space Launch Initiative and Homeland Defense.
Clean Quantum and Classical Communication Protocols.
Buhrman, Harry; Christandl, Matthias; Perry, Christopher; Zuiddam, Jeroen
2016-12-02
By how much must the communication complexity of a function increase if we demand that the parties not only correctly compute the function but also return all registers (other than the one containing the answer) to their initial states at the end of the communication protocol? Protocols that achieve this are referred to as clean and the associated cost as the clean communication complexity. Here we present clean protocols for calculating the inner product of two n-bit strings, showing that (in the absence of preshared entanglement) at most n+3 qubits or n+O(sqrt[n]) bits of communication are required. The quantum protocol provides inspiration for obtaining the optimal method to implement distributed cnot gates in parallel while minimizing the amount of quantum communication. For more general functions, we show that nearly all Boolean functions require close to 2n bits of classical communication to compute and close to n qubits if the parties have access to preshared entanglement. Both of these values are maximal for their respective paradigms.
Teaching medical students to discern ethical problems in human clinical research studies.
Roberts, Laura Weiss; Warner, Teddy D; Green Hammond, Katherine A; Brody, Janet L; Kaminsky, Alexis; Roberts, Brian B
2005-10-01
Investigators and institutional review boards are entrusted with ensuring the conduct of ethically sound human studies. Assessing ethical aspects of research protocols is a key skill in fulfilling this duty, yet no empirically validated method exists for preparing professionals to attain this skill. The authors performed a randomized controlled educational intervention, comparing a criteria-based learning method, a clinical-research- and experience-based learning method, and a control group. All 300 medical students enrolled at the University of New Mexico School of Medicine in 2001 were invited to participate. After a single half-hour educational session, a written posttest of ability to detect ethical problems in hypothetical protocol vignettes was administered. The authors analyzed responses to ten protocol vignettes that had been evaluated independently by experts. For each vignette, a global assessment of the perceived significance of ethical problems and the identification of specific ethical problems were evaluated. Eighty-three medical students (27%) volunteered: 50 (60%) were women and 55 (66%) were first- and second-year students. On global assessments, the criteria-focused group perceived ethical problems as more significant than did the other two groups (p < .02). Students in the criteria-focused group were better able than students in the control group (p < .03) to discern specific ethical problems, more closely resembling expert assessments. Unexpectedly, the group focused on clinical research participants identified fewer problems than did the control group (p < .05). The criteria-focused intervention produced enhanced ethical evaluation skills. This work supports the potential value of empirically derived methods for preparing professionals to discern ethical aspects of human studies.
Ethical Considerations in Research Participation Virality.
Ellis-Barton, Carol
2016-07-01
This article seeks to commence and encourage discussion around the upcoming ethical challenges of virality in network structures. When the call for participation in a research project on lupus in Ireland went from an advertisement in a newsletter to a meme (unit of transmissible information) on a closed Facebook page, the ethical considerations of virality were raised. The article analyzes the Association of Internet Researchers guidelines, Facebook policies, and the context of privacy in relation to virality. Virality creates the leverage for methodological pluralism. The nature of the inquiry can determine the method rather than the other way around. Viral ethical considerations are evolving due to the cyber world becoming the primary meme of communication, with flexibility in the researcher's protocol providing opportunities for efficient, cost-effective, and diverse recruitment. © The Author(s) 2016.
Data Sharing to Improve Close Approach Monitoring and Safety of Flight
NASA Astrophysics Data System (ADS)
Chan, Joseph; DalBello, Richard; Hope, Dean; Wauthier, Pascal; Douglas, Tim; Inghram, Travis
2009-03-01
Individual satellite operators have done a good job of developing the internal protocols and procedures to ensure the safe operation of their fleets. However, data sharing among operators for close approach monitoring is conducted in an ad-hoc manner during relocations, and there is currently no standardized agreement among operators on the content, format, and distribution protocol for data sharing. Crowding in geostationary orbit, participation by new commercial actors, government interest in satellite constellations, and highly maneuverable spacecraft all suggest that satellite operators will need to begin a dialogue on standard communication protocols and procedure to improve situation awareness. We will give an overview of the current best practices among different operators for close approach monitoring and discuss the concept of an active data center to improve data sharing, conjunction monitoring, and avoidance among satellite operators. We will also report on the progress and lessons learned from a Data Center prototype conducted by several operators over a one year period.
A reconfigurable visual-programming library for real-time closed-loop cellular electrophysiology
Biró, István; Giugliano, Michele
2015-01-01
Most of the software platforms for cellular electrophysiology are limited in terms of flexibility, hardware support, ease of use, or re-configuration and adaptation for non-expert users. Moreover, advanced experimental protocols requiring real-time closed-loop operation to investigate excitability, plasticity, dynamics, are largely inaccessible to users without moderate to substantial computer proficiency. Here we present an approach based on MATLAB/Simulink, exploiting the benefits of LEGO-like visual programming and configuration, combined to a small, but easily extendible library of functional software components. We provide and validate several examples, implementing conventional and more sophisticated experimental protocols such as dynamic-clamp or the combined use of intracellular and extracellular methods, involving closed-loop real-time control. The functionality of each of these examples is demonstrated with relevant experiments. These can be used as a starting point to create and support a larger variety of electrophysiological tools and methods, hopefully extending the range of default techniques and protocols currently employed in experimental labs across the world. PMID:26157385
NASA Astrophysics Data System (ADS)
Huang, C. Y.; Wu, C. H.
2016-06-01
The Internet of Things (IoT) is an infrastructure that interconnects uniquely-identifiable devices using the Internet. By interconnecting everyday appliances, various monitoring and physical mashup applications can be constructed to improve people's daily life. However, IoT devices created by different manufacturers follow different proprietary protocols and cannot communicate with each other. This heterogeneity issue causes different products to be locked in multiple closed ecosystems that we call IoT silos. In order to address this issue, a common industrial solution is the hub approach, which implements connectors to communicate with IoT devices following different protocols. However, with the growing number of proprietary protocols proposed by device manufacturers, IoT hubs need to support and maintain a lot of customized connectors. Hence, we believe the ultimate solution to address the heterogeneity issue is to follow open and interoperable standard. Among the existing IoT standards, the Open Geospatial Consortium (OGC) SensorThings API standard supports comprehensive conceptual model and query functionalities. The first version of SensorThings API mainly focuses on connecting to IoT devices and sharing sensor observations online, which is the sensing capability. Besides the sensing capability, IoT devices could also be controlled via the Internet, which is the tasking capability. While the tasking capability was not included in the first version of the SensorThings API standard, this research aims on defining the tasking capability profile and integrates with the SensorThings API standard, which we call the extended-SensorThings API in this paper. In general, this research proposes a lightweight JSON-based web service description, the "Tasking Capability Description", allowing device owners and manufacturers to describe different IoT device protocols. Through the extended- SensorThings API, users and applications can follow a coherent protocol to control IoT devices that use different communication protocols, which could consequently achieve the interoperable Internet of Things infrastructure.
Time to publication for publicly funded clinical trials in Australia: an observational study.
Strand, Linn Beate; Clarke, Philip; Graves, Nicholas; Barnett, Adrian G
2017-03-22
To examine the length of time between receiving funding and publishing the protocol and main paper for randomised controlled trials. An observational study using survival analysis. Publicly funded health and medical research in Australia. Randomised controlled trials funded by the National Health and Medical Research Council of Australia between 2008 and 2010. Time from funding to the protocol paper and main results paper. Multiple variable survival models examining whether study characteristics predicted publication times. We found 77 studies with a total funding of $A59 million. The median time to publication of the protocol paper was 6.4 years after funding (95% CI 4.1 to 8.1). The proportion with a published protocol paper 8 years after funding was 0.61 (95% CI 0.48 to 0.74). The median time to publication of the main results paper was 7.1 years after funding (95% CI 6.3 to 7.6). The proportion with a published main results paper 8 years after funding was 0.72 (95% CI 0.56 to 0.87). The HRs for how study characteristics might influence timing were generally close to one with narrow CIs, the notable exception was that a longer study length lengthened the time to the main paper (HR=0.62 per extra study year, 95% CI 0.43 to 0.89). Despite the widespread registration of clinical trials, there remain serious concerns of trial results not being published or being published with a long delay. We have found that these same concerns apply to protocol papers, which should be publishable soon after funding. Funding agencies could set a target of publishing the protocol paper within 18 months of funding. Published by the BMJ Publishing Group Limited. For permission to use (where not already granted under a licence) please go to http://www.bmj.com/company/products-services/rights-and-licensing/.
Effect of a lateral step-up exercise protocol on quadriceps and lower extremity performance.
Worrell, T W; Borchert, B; Erner, K; Fritz, J; Leerar, P
1993-12-01
Closed kinetic chain exercises have been promoted as more functional and more appropriate than open kinetic chain exercises. Limited research exists demonstrating the effect of closed kinetic chain exercise on quadriceps and lower extremity performance. The purpose of this study was to determine the effect of a lateral step-up exercise protocol on isokinetic quadriceps peak torque and the following lower extremity activities: 1) leg press, 2) maximal step-up repetitions with body weight plus 25%, 3) hop for distance, and 4) 6-m timed hop. Twenty subjects participated in a 4-week training period, and 18 subjects served as controls. For the experimental group, a repeated measure ANOVA comparing pretest and posttest values revealed significant improvements in the leg press (p < or = .05), step-ups (p < or = .05), hop for distance (p < or = .05), and hop for time (p < or = .05) and no significant increase in isokinetic quadriceps peak torque (p > or = .05). Over the course of the training period, weight used for the step-up exercise increased (p < or = .05), repetitions decreased (p < or = .05), and step-up work did not change (p > or = .05). For the control group, no significant change (p > or = .05) occurred in any variable. The inability of the isokinetic dynamometer to detect increases in quadriceps performance is important because the isokinetic values are frequently used as criteria for return to functional activities. We conclude that closed kinetic chain testing and exercise provide additional means to assess and rehabilitate the lower extremity.
A Surgical Procedure for Resecting the Mouse Rib: A Model for Large-Scale Long Bone Repair
Funnell, John W.; Thein, Thu Zan Tun; Mariani, Francesca V.
2015-01-01
This protocol introduces researchers to a new model for large-scale bone repair utilizing the mouse rib. The procedure details the following: preparation of the animal for surgery, opening the thoracic body wall, exposing the desired rib from the surrounding intercostal muscles, excising the desired section of rib without inducing a pneumothorax, and closing the incisions. Compared to the bones of the appendicular skeleton, the ribs are highly accessible. In addition, no internal or external fixator is necessary since the adjacent ribs provide a natural fixation. The surgery uses commercially available supplies, is straightforward to learn, and well-tolerated by the animal. The procedure can be carried out with or without removing the surrounding periosteum, and therefore the contribution of the periosteum to repair can be assessed. Results indicate that if the periosteum is retained, robust repair occurs in 1 - 2 months. We expect that use of this protocol will stimulate research into rib repair and that the findings will facilitate the development of new ways to stimulate bone repair in other locations around the body. PMID:25651082
The Roles of Pharmacy Schools in Bridging the Gap Between Law and Practice.
Adams, Alex J; Dering-Anderson, Allison; Klepser, Michael E; Klepser, Donald
2018-05-01
Progressive pharmacy laws do not always lead to progressive pharmacy practice. Progressive laws are necessary, but not sufficient for pharmacy services to take off in practice. Pharmacy schools can play critical roles by working collaboratively with community pharmacies to close the gap between law and practice. Our experiences launching pharmacy-based point-of-care testing services in community pharmacy settings illustrate some of the roles schools can play, including: developing and providing standardized training, developing template protocols, providing workflow support, sparking collaboration across pharmacies, providing policy support, and conducting research.
Student and Teacher Perspectives on a Close Reading Protocol
ERIC Educational Resources Information Center
Fisher, Douglas; Frey, Nancy
2014-01-01
Close reading is an instructional practice that has gained attention of late. It involves reading a complex text, annotation, and repeatedly reading to answer text-dependent questions. Although there are a number of recommendations for the use of close reading, there has not been a systematic analysis of student or teacher perceptions of this…
NASA Astrophysics Data System (ADS)
Goldenberg, Lior; Vaidman, Lev; Wiesner, Stephen
1999-04-01
We present a two-party protocol for ``quantum gambling,'' a new task closely related to coin tossing. The protocol allows two remote parties to play a gambling game such that in a certain limit it becomes a fair game. No unconditionally secure classical method is known to accomplish this task.
Intranets: Just Another Bandwagon?
ERIC Educational Resources Information Center
Lynch, Gary
1997-01-01
Discusses intranets--the deployment and use of Internet technologies such as the World Wide Web, electronic mail, and Transmission Control Protocol/Internet Protocol (TCP/IP) on a closed network. Considers the "hype," benefits, standards, implementation, and problems of intranets, and concludes that while intranets can be beneficial,…
Wall, Peter Dh; Dickenson, Edward J; Robinson, David; Hughes, Ivor; Realpe, Alba; Hobson, Rachel; Griffin, Damian R; Foster, Nadine E
2016-10-01
Femoroacetabular impingement (FAI) syndrome is increasingly recognised as a cause of hip pain. As part of the design of a randomised controlled trial (RCT) of arthroscopic surgery for FAI syndrome, we developed a protocol for non-operative care and evaluated its feasibility. In phase one, we developed a protocol for non-operative care for FAI in the UK National Health Service (NHS), through a process of systematic review and consensus gathering. In phase two, the protocol was tested in an internal pilot RCT for protocol adherence and adverse events. The final protocol, called Personalised Hip Therapy (PHT), consists of four core components led by physiotherapists: detailed patient assessment, education and advice, help with pain relief and an exercise-based programme that is individualised, supervised and progressed over time. PHT is delivered over 12-26 weeks in 6-10 physiotherapist-patient contacts, supplemented by a home exercise programme. In the pilot RCT, 42 patients were recruited and 21 randomised to PHT. Review of treatment case report forms, completed by physiotherapists, showed that 13 patients (62%) received treatment that had closely followed the PHT protocol. 13 patients reported some muscle soreness at 6 weeks, but there were no serious adverse events. PHT provides a structure for the non-operative care of FAI and offers guidance to clinicians and researchers in an evolving area with limited evidence. PHT was deliverable within the National Health Service, is safe, and now forms the comparator to arthroscopic surgery in the UK FASHIoN trial (ISRCTN64081839). ISRCTN 09754699. Published by the BMJ Publishing Group Limited. For permission to use (where not already granted under a licence) please go to http://www.bmj.com/company/products-services/rights-and-licensing/
NASA Astrophysics Data System (ADS)
Jeng, Albert; Chang, Li-Chung; Chen, Sheng-Hui
There are many protocols proposed for protecting Radio Frequency Identification (RFID) system privacy and security. A number of these protocols are designed for protecting long-term security of RFID system using symmetric key or public key cryptosystem. Others are designed for protecting user anonymity and privacy. In practice, the use of RFID technology often has a short lifespan, such as commodity check out, supply chain management and so on. Furthermore, we know that designing a long-term security architecture to protect the security and privacy of RFID tags information requires a thorough consideration from many different aspects. However, any security enhancement on RFID technology will jack up its cost which may be detrimental to its widespread deployment. Due to the severe constraints of RFID tag resources (e. g., power source, computing power, communication bandwidth) and open air communication nature of RFID usage, it is a great challenge to secure a typical RFID system. For example, computational heavy public key and symmetric key cryptography algorithms (e. g., RSA and AES) may not be suitable or over-killed to protect RFID security or privacy. These factors motivate us to research an efficient and cost effective solution for RFID security and privacy protection. In this paper, we propose a new effective generic binary tree based key agreement protocol (called BKAP) and its variations, and show how it can be applied to secure the low cost and resource constraint RFID system. This BKAP is not a general purpose key agreement protocol rather it is a special purpose protocol to protect privacy, un-traceability and anonymity in a single RFID closed system domain.
Wall, Peter DH; Dickenson, Edward J; Robinson, David; Hughes, Ivor; Realpe, Alba; Hobson, Rachel; Griffin, Damian R; Foster, Nadine E
2016-01-01
Introduction Femoroacetabular impingement (FAI) syndrome is increasingly recognised as a cause of hip pain. As part of the design of a randomised controlled trial (RCT) of arthroscopic surgery for FAI syndrome, we developed a protocol for non-operative care and evaluated its feasibility. Methods In phase one, we developed a protocol for non-operative care for FAI in the UK National Health Service (NHS), through a process of systematic review and consensus gathering. In phase two, the protocol was tested in an internal pilot RCT for protocol adherence and adverse events. Results The final protocol, called Personalised Hip Therapy (PHT), consists of four core components led by physiotherapists: detailed patient assessment, education and advice, help with pain relief and an exercise-based programme that is individualised, supervised and progressed over time. PHT is delivered over 12–26 weeks in 6–10 physiotherapist-patient contacts, supplemented by a home exercise programme. In the pilot RCT, 42 patients were recruited and 21 randomised to PHT. Review of treatment case report forms, completed by physiotherapists, showed that 13 patients (62%) received treatment that had closely followed the PHT protocol. 13 patients reported some muscle soreness at 6 weeks, but there were no serious adverse events. Conclusion PHT provides a structure for the non-operative care of FAI and offers guidance to clinicians and researchers in an evolving area with limited evidence. PHT was deliverable within the National Health Service, is safe, and now forms the comparator to arthroscopic surgery in the UK FASHIoN trial (ISRCTN64081839). Trial registration number ISRCTN 09754699. PMID:27629405
Ricci, Natalia Aquaroni; Aratani, Mayra Cristina; Caovilla, Heloísa Helena; Ganança, Fernando Freitas
2016-04-01
The aim of this study was to compare the effects of vestibular rehabilitation protocols on balance control in elderly with dizziness. This is a randomized clinical trial with 3-mo follow-up period. The sample was composed of 82 older individuals with chronic dizziness from vestibular disorders. The control group was treated according to the Conventional Cawthorne & Cooksey protocol (n = 40), and the experimental group was submitted to a Multimodal Cawthorne & Cooksey protocol (n = 42). Measures included Dynamic Gait Index, fall history, hand grip strength, Time Up-and-Go Test, sit-to-stand test, multidirectional reach, and static balance tests. With the exception of history of falls, Forward Functional Reach, Unipedal Right and Left Leg Eyes Closed, and Sensorial Romberg Eyes Open, all outcomes improved after treatments. Such results persisted at follow-up period, with the exception of the Tandem Eyes Open and the Timed Up-and-Go manual. The between-group differences for Sensorial Romberg Eyes Closed (4.27 secs) and Unipedal Left Leg Eyes Open (4.08 secs) were significant after treatment, favoring the Multimodal protocol. Both protocols resulted in improvement on elderly's balance control, which was maintained during a short-term period. The multimodal protocol presented better performance on specific static balance tests.
[The Clinical Investigation Centers in France: Whatzat? What for? How does it work?].
Montagne, O; Le Corvoisier, P
2008-01-01
For the last 15 years, French university-affiliated hospitals have dramatically modified how biomedical research is conducted in France. Multidisciplinary and technically complex research projects are increasingly difficult to conduct in clinical units. To ensure quality, good clinical practice, and security, platforms dedicated to clinical research with specific staff have been implanted. These units, called Clinical Investigation Centers (CICs), are open to academic and industrial investigators working in the medical fields involving patients and healthy volunteers. The CICs' activities are always closely related to the university hospital research programs and can also serve as a tool for locally implanted clinical and fundamental research teams (INSERM). Nowadays, clinical research requires specific tools and platforms. To enhance French university hospital research efficiency and provide a more open research environment, all investigators, on-site as well as from other institutions, are invited to use these cohesive research facilities and skills to conduct protocols that are fully adapted to their needs in optimal conditions of professional clinical research.
Cheminformatics Research at the Unilever Centre for Molecular Science Informatics Cambridge.
Fuchs, Julian E; Bender, Andreas; Glen, Robert C
2015-09-01
The Centre for Molecular Informatics, formerly Unilever Centre for Molecular Science Informatics (UCMSI), at the University of Cambridge is a world-leading driving force in the field of cheminformatics. Since its opening in 2000 more than 300 scientific articles have fundamentally changed the field of molecular informatics. The Centre has been a key player in promoting open chemical data and semantic access. Though mainly focussing on basic research, close collaborations with industrial partners ensured real world feedback and access to high quality molecular data. A variety of tools and standard protocols have been developed and are ubiquitous in the daily practice of cheminformatics. Here, we present a retrospective of cheminformatics research performed at the UCMSI, thereby highlighting historical and recent trends in the field as well as indicating future directions.
Cheminformatics Research at the Unilever Centre for Molecular Science Informatics Cambridge
Fuchs, Julian E; Bender, Andreas; Glen, Robert C
2015-01-01
The Centre for Molecular Informatics, formerly Unilever Centre for Molecular Science Informatics (UCMSI), at the University of Cambridge is a world-leading driving force in the field of cheminformatics. Since its opening in 2000 more than 300 scientific articles have fundamentally changed the field of molecular informatics. The Centre has been a key player in promoting open chemical data and semantic access. Though mainly focussing on basic research, close collaborations with industrial partners ensured real world feedback and access to high quality molecular data. A variety of tools and standard protocols have been developed and are ubiquitous in the daily practice of cheminformatics. Here, we present a retrospective of cheminformatics research performed at the UCMSI, thereby highlighting historical and recent trends in the field as well as indicating future directions. PMID:26435758
21 CFR 1301.18 - Research protocols.
Code of Federal Regulations, 2014 CFR
2014-04-01
... 21 Food and Drugs 9 2014-04-01 2014-04-01 false Research protocols. 1301.18 Section 1301.18 Food..., DISTRIBUTORS, AND DISPENSERS OF CONTROLLED SUBSTANCES Registration § 1301.18 Research protocols. (a) A protocol to conduct research with controlled substances listed in Schedule I shall be in the following form...
21 CFR 1301.18 - Research protocols.
Code of Federal Regulations, 2011 CFR
2011-04-01
... 21 Food and Drugs 9 2011-04-01 2011-04-01 false Research protocols. 1301.18 Section 1301.18 Food..., DISTRIBUTORS, AND DISPENSERS OF CONTROLLED SUBSTANCES Registration § 1301.18 Research protocols. (a) A protocol to conduct research with controlled substances listed in Schedule I shall be in the following form...
21 CFR 1301.18 - Research protocols.
Code of Federal Regulations, 2010 CFR
2010-04-01
... 21 Food and Drugs 9 2010-04-01 2010-04-01 false Research protocols. 1301.18 Section 1301.18 Food..., DISTRIBUTORS, AND DISPENSERS OF CONTROLLED SUBSTANCES Registration § 1301.18 Research protocols. (a) A protocol to conduct research with controlled substances listed in Schedule I shall be in the following form...
21 CFR 1301.18 - Research protocols.
Code of Federal Regulations, 2013 CFR
2013-04-01
... 21 Food and Drugs 9 2013-04-01 2013-04-01 false Research protocols. 1301.18 Section 1301.18 Food..., DISTRIBUTORS, AND DISPENSERS OF CONTROLLED SUBSTANCES Registration § 1301.18 Research protocols. (a) A protocol to conduct research with controlled substances listed in Schedule I shall be in the following form...
21 CFR 1301.18 - Research protocols.
Code of Federal Regulations, 2012 CFR
2012-04-01
... 21 Food and Drugs 9 2012-04-01 2012-04-01 false Research protocols. 1301.18 Section 1301.18 Food..., DISTRIBUTORS, AND DISPENSERS OF CONTROLLED SUBSTANCES Registration § 1301.18 Research protocols. (a) A protocol to conduct research with controlled substances listed in Schedule I shall be in the following form...
DDN (Defense Data Network) Protocol Handbook. Volume 1. DoD Military Standard Protocols
1985-12-01
official Military Standard communication protocols in use on the DDN are included, as are several ARPANET (Advanced Research Projects Agency Network... research protocols which are currently in use, and some protocols currently undergoing review. Tutorial information and auxiliary documents are also...compatible with DoD needs, by researchers wishing to improve the protocols, and by impleroentors of local area networks (LANs) wishing their
NASA Astrophysics Data System (ADS)
Amerimehr, Ali; Hadain Dehkordi, Massoud
2018-03-01
We analyze the security of a quantum secure direct communication and authentication protocol based on single photons. We first give an impersonation attack on the protocol. The cryptanalysis shows that there is a gap in the authentication procedure of the protocol so that an opponent can reveal the secret information by an undetectable attempt. We then propose an improvement for the protocol and show it closes the gap by applying a mutual authentication procedure. In the improved protocol single photons are transmitted once in a session, so it is easy to implement as the primary protocol. Furthermore, we use a novel technique for secret order rearrangement of photons by which not only quantum storage is eliminated also a secret key can be reused securely. So the new protocol is applicable in practical approaches like embedded system devices.
Can ex situ plant collections differ in effectiveness, even 1 between closely related species?
USDA-ARS?s Scientific Manuscript database
Conservation of imperiled plant species often requires ex situ (offsite) living collections. Protocols for developing these collections most often emphasize sampling depth, but little is known about the genetics of such collections. This study compares how well a single collecting protocol can captu...
Short Review on Quantum Key Distribution Protocols.
Giampouris, Dimitris
2017-01-01
Cryptographic protocols and mechanisms are widely investigated under the notion of quantum computing. Quantum cryptography offers particular advantages over classical ones, whereas in some cases established protocols have to be revisited in order to maintain their functionality. The purpose of this paper is to provide the basic definitions and review the most important theoretical advancements concerning the BB84 and E91 protocols. It also aims to offer a summary on some key developments on the field of quantum key distribution, closely related with the two aforementioned protocols. The main goal of this study is to provide the necessary background information along with a thorough review on the theoretical aspects of QKD, concentrating on specific protocols. The BB84 and E91 protocols have been chosen because most other protocols are similar to these, a fact that makes them important for the general understanding of how the QKD mechanism functions.
75 FR 11540 - Agency Information Collection Activities: Proposed Collection; Comment Request
Federal Register 2010, 2011, 2012, 2013, 2014
2010-03-11
... the evaluation: (1) Pre/post-test interview protocol--Consisting of both open- and closed-ended... respondents in interviews that will take one hour each. The pre/post-test interview protocol will be... the year. At the end of the year, post-test interviews will be performed as one-hour group interviews...
Pimashkin, Alexey; Gladkov, Arseniy; Mukhina, Irina; Kazantsev, Victor
2013-01-01
Learning in neuronal networks can be investigated using dissociated cultures on multielectrode arrays supplied with appropriate closed-loop stimulation. It was shown in previous studies that weakly respondent neurons on the electrodes can be trained to increase their evoked spiking rate within a predefined time window after the stimulus. Such neurons can be associated with weak synaptic connections in nearby culture network. The stimulation leads to the increase in the connectivity and in the response. However, it was not possible to perform the learning protocol for the neurons on electrodes with relatively strong synaptic inputs and responding at higher rates. We proposed an adaptive closed-loop stimulation protocol capable to achieve learning even for the highly respondent electrodes. It means that the culture network can reorganize appropriately its synaptic connectivity to generate a desired response. We introduced an adaptive reinforcement condition accounting for the response variability in control stimulation. It significantly enhanced the learning protocol to a large number of responding electrodes independently on its base response level. We also found that learning effect preserved after 4–6 h after training. PMID:23745105
Top-down contingent feature-specific orienting with and without awareness of the visual input.
Ansorge, Ulrich; Horstmann, Gernot; Scharlau, Ingrid
2011-01-01
In the present article, the role of endogenous feature-specific orienting for conscious and unconscious vision is reviewed. We start with an overview of orienting. We proceed with a review of masking research, and the definition of the criteria of experimental protocols that demonstrate endogenous and exogenous orienting, respectively. Against this background of criteria, we assess studies of unconscious orienting and come to the conclusion that so far studies of unconscious orienting demonstrated endogenous feature-specific orienting. The review closes with a discussion of the role of unconscious orienting in action control.
Bone density in limb-immobilized beagles: An animal model for bone loss in weightlessness
NASA Technical Reports Server (NTRS)
Wolinsky, Ira
1987-01-01
Prolonged weightlessness is man in space flight results in a slow progressive demineralization of bone accompanied by an increased calcium output in the urine resulting in negative calcium balances. This possibly irreversible bone loss may constitute a serious limiting factor to long duration manned space flight. In order to seek and test preventative measures an appropriate ground based animal model simulating weightlessness is necessary. Use of the mature Beagle in limb immobilization has been documented as an excellent model for orthopedic research since this animal most closely simulates the phenomenom of bone loss with regards to growth, remodeling, structure, chemistry and mineralization. The purpose of this project is to develop a research protocol for the study of bone loss in Beagles during and after cast immobilization of a hindleg; research will then be initiated.
A Web Service Protocol Realizing Interoperable Internet of Things Tasking Capability.
Huang, Chih-Yuan; Wu, Cheng-Hung
2016-08-31
The Internet of Things (IoT) is an infrastructure that interconnects uniquely-identifiable devices using the Internet. By interconnecting everyday appliances, various monitoring, and physical mashup applications can be constructed to improve human's daily life. In general, IoT devices provide two main capabilities: sensing and tasking capabilities. While the sensing capability is similar to the World-Wide Sensor Web, this research focuses on the tasking capability. However, currently, IoT devices created by different manufacturers follow different proprietary protocols and are locked in many closed ecosystems. This heterogeneity issue impedes the interconnection between IoT devices and damages the potential of the IoT. To address this issue, this research aims at proposing an interoperable solution called tasking capability description that allows users to control different IoT devices using a uniform web service interface. This paper demonstrates the contribution of the proposed solution by interconnecting different IoT devices for different applications. In addition, the proposed solution is integrated with the OGC SensorThings API standard, which is a Web service standard defined for the IoT sensing capability. Consequently, the Extended SensorThings API can realize both IoT sensing and tasking capabilities in an integrated and interoperable manner.
Turcios, Jacqueline; Cook, Barbara; Irwin, Julia; Rispoli, Taylor; Landi, Nicole
2017-07-31
This paper includes a detailed description of a familiarization protocol, which is used as an integral component of a larger research protocol to collect electroencephalography (EEG) data and Event-Related Potentials (ERPs). At present, the systems available for the collection of high-quality EEG/ERP data make significant demands on children with developmental disabilities, such as those with an Autism Spectrum Disorder (ASD). Children with ASD may have difficulty adapting to novel situations, tolerating uncomfortable sensory stimuli, and sitting quietly. This familiarization protocol uses Evidence-Based Practices (EBPs) to increase research participants' knowledge and understanding of the specific activities and steps of the research protocol. The tools in this familiarization protocol are a social narrative, a visual schedule, the Premack principle, role-playing, and modeling. The goal of this familiarization protocol is to increase understanding and agency and to potentially reduce anxiety for child participants, resulting in a greater likelihood of the successful completion of the research protocol for the collection of EEG/ERP data.
EFFICACY OF COMMERCIAL PRODUCTS IN ENHANCING OIL BIODEGRADATION IN CLOSED LABORATORY REACTORS
A laboratory screening protocol was designed and conducted to test the efficacy of eight commercial bacterial cultures and two non-bacterial products in enhancing the biodegradation of weathered Alaska North Slope crude oil in closed flasks. Three lines of evidence were used to ...
NASA Technical Reports Server (NTRS)
Chrzanowski, J.; Meng-Burany, S.; Xing, W. B.; Curzon, A. E.; Heinrich, B.; Irwin, J. C.; Cragg, R. A.; Zhou, H.; Habib, F.; Angus, V.
1995-01-01
Two series of Y1Ba2Cu3O(z) thin films deposited on (001) LaAl03 single crystals by excimer laser ablation under two different protocols have been investigated. The research has yielded well defined deposition conditions in terms of oxygen partial pressure p(O2) and substrate temperature of the deposition process Th, for the growth of high quality epitaxial films of YBCO. The films grown under conditions close to optimal for both j(sub c) and T(sub c) exhibited T(sub c) greater than or equal to 91 K and j(sub c) greater than or equal to 4 x 106 A/sq cm, at 77 K. Close correlations between the structural quality of the film, the growth parameters (p(O2), T(sub h)) and j(sub c) and T(sub c) have been found.
NASA Technical Reports Server (NTRS)
Hurtado, Jose M., Jr.; Young, Kelsey; Bleacher, Jacob E.; Garry, W. Brent; Rice, James W., Jr.
2012-01-01
Observation is the primary role of all field geologists, and geologic observations put into an evolving conceptual context will be the most important data stream that will be relayed to Earth during a planetary exploration mission. Sample collection is also an important planetary field activity, and its success is closely tied to the quality of contextual observations. To test protocols for doing effective planetary geologic field- work, the Desert RATS(Research and Technology Studies) project deployed two prototype rovers for two weeks of simulated exploratory traverses in the San Francisco volcanic field of northern Arizona. The authors of this paper represent the geologist crew members who participated in the 2010 field test.We document the procedures adopted for Desert RATS 2010 and report on our experiences regarding these protocols. Careful consideration must be made of various issues that impact the interplay between field geologic observations and sample collection, including time management; strategies relatedtoduplicationofsamplesandobservations;logisticalconstraintson the volume and mass of samples and the volume/transfer of data collected; and paradigms for evaluation of mission success. We find that the 2010 field protocols brought to light important aspects of each of these issues, and we recommend best practices and modifications to training and operational protocols to address them. Underlying our recommendations is the recognition that the capacity of the crew to flexibly execute their activities is paramount. Careful design of mission parameters, especially field geologic protocols, is critical for enabling the crews to successfully meet their science objectives.
NASA Technical Reports Server (NTRS)
Young, Kelsey; Hurtado, Jose M., Jr.; Bleacher, Jacob E.; Garry, W. Brent; Bleisath, Scott; Buffington, Jesse; Rice, James W., Jr.
2011-01-01
Observation is the primary role of all field geologists, and geologic observations put into an evolving conceptual context will be the most important data stream that will be relayed to Earth during a planetary exploration mission. Sample collection is also an important planetary field activity, and its success is closely tied to the quality of contextual observations. To test protocols for doing effective planetary geologic fieldwork, the Desert RATS (Research and Technology Studies) project deployed two prototype rovers for two weeks of simulated exploratory traverses in the San Francisco volcanic field of northern Arizona. The authors of this paper represent the geologist crewmembers who participated in the 2010 field test. We document the procedures adopted for Desert RATS 2010 and report on our experiences regarding these protocols. Careful consideration must be made of various issues that impact the interplay between field geologic observations and sample collection, including time management; strategies related to duplication of samples and observations; logistical constraints on the volume and mass of samples and the volume/transfer of data collected; and paradigms for evaluation of mission success. We find that the 2010 field protocols brought to light important aspects of each of these issues, and we recommend best practices and modifications to training and operational protocols to address them. Underlying our recommendations is the recognition that the capacity of the crew to "flexibly execute" their activities is paramount. Careful design of mission parameters, especially field geologic protocols, is critical for enabling the crews to successfully meet their science objectives.
IRR (Inter-Rater Reliability) of a COP (Classroom Observation Protocol)--A Critical Appraisal
ERIC Educational Resources Information Center
Rui, Ning; Feldman, Jill M.
2012-01-01
Notwithstanding broad utility of COPs (classroom observation protocols), there has been limited documentation of the psychometric properties of even the most popular COPs. This study attempted to fill this void by closely examining the item and domain-level IRR (inter-rater reliability) of a COP that was used in a federally funded striving readers…
Publication bias in the medical literature: a review by a Canadian Research Ethics Board.
Hall, Richard; de Antueno, Cecilia; Webber, Adam
2007-05-01
We reviewed the publication record of all protocols submitted to the Capital District Health Authority Research Ethics Board (REB) in Halifax, Nova Scotia, for the period 1995-1996. Because of a heightened awareness of the issue, we hypothesized that there would be less publication bias (a failure to report negative results) and a higher publication rate from completed studies, than previously reported. Closed studies were identified from the REB database. Publications were identified by the investigators, requests from sponsors, and a literature review. For each publication, we identified authors, title, journal, number of subjects enrolled, and whether or not the publication was a report of a randomized clinical trial. Comparisons were done using a Student's t test, the Chi-square statistic, or Fisher's exact test as appropriate. From the database of closed studies, 106 remained unpublished, while completed investigations resulted in 84 publications (44% publication rate). The median time to publication was 32.5 months. Publication of statistically significant results occurred in 71/84 trials. Publication of protocols submitted by departments ranged from 91% (anesthesia; 10/11) to 25% [nursing; 2/8 (P<0.05)]. Trials investigating new drugs in Phase 3 or 4 studies were more likely to be published than trials investigating agents in Phase 1 or 2 (P<0.05), and were less likely to be published if sponsored by a pharmaceutical company (P<0.05). Publication bias continues to be a problem, particularly for early phase investigative studies. Our results suggest that a different approach is required to reduce publication bias. The role that REBs and peer-reviewed journals might play requires further exploration.
Federal Register 2010, 2011, 2012, 2013, 2014
2011-10-28
... FEDERAL COMMUNICATIONS COMMISSION 47 CFR Parts 15 and 79 [MB Docket No. 11-154; DA 11-1766] Closed... Communications and Video Accessibility Act of 2010 AGENCY: Federal Communications Commission. ACTION: Proposed... . Follow the instructions for submitting comments. Federal Communications Commission's Electronic Comment...
Federal Register 2010, 2011, 2012, 2013, 2014
2012-03-30
... captioning requirements on certain apparatus that receive or play back video programming, and on certain... the closed captioning capabilities of certain apparatus on which consumers view video programming... requirements on certain apparatus that receive or play back video programming, and on certain recording devices...
Sathar, Aslam; Dhai, Amaboo; van der Linde, Stephan
2014-12-01
Human Biological Materials (HBMs) are an invaluable resource in biomedical research. To determine if researchers and a Research Ethics Committee (REC) at a South African institution addressed ethical issues pertaining to HBMs in collaborative research with developed countries. Ethically approved retrospective cross-sectional descriptive audit. Of the 1305 protocols audited, 151 (11.57%) fulfilled the study's inclusion criteria. Compared to other developed countries, a majority of sponsors (90) were from the USA (p = 0.0001). The principle investigators (PIs) in all 151 protocols informed the REC of their intent to store HBMs. Only 132 protocols informed research participants (P < 0.0001). In 148 protocols informed consent (IC) was obtained from research participants, 116 protocols (76.8%) solicited broad consent compared to specific consent (32; 21.2%) [p < 0.0001]. In 105 cases a code was used to maintain confidentiality. HBMs were anonymised in 14 protocols [p < 0.0001]. More protocols informed the REC (90) than the research participants (67) that HBMs would be exported (p = 0.011). Export permits (EPs) and Material Transfer Agreements (MTAs) were not available in 109 and 143 protocols, respectively. Researchers and the REC did not adequately address the inter-related ethical and regulatory issues pertaining to HBMs. There was a lack of congruence between the ethical guidelines of developed countries and their actions which are central to the access to HBMs in collaborative research. HBMs may be leaving South Africa without EPs and MTAs during the process of international collaborative research. © 2013 John Wiley & Sons Ltd.
Blom, Kimberly C; Farina, Sasha; Gomez, Yessica-Haydee; Campbell, Norm R C; Hemmelgarn, Brenda R; Cloutier, Lyne; McKay, Donald W; Dawes, Martin; Tobe, Sheldon W; Bolli, Peter; Gelfer, Mark; McLean, Donna; Bartlett, Gillian; Joseph, Lawrence; Featherstone, Robin; Schiffrin, Ernesto L; Daskalopoulou, Stella S
2015-04-01
Despite progress in automated blood pressure measurement (BPM) technology, there is limited research linking hard outcomes to automated office BPM (OBPM) treatment targets and thresholds. Equivalences for automated BPM devices have been estimated from approximations of standardized manual measurements of 140/90 mmHg. Until outcome-driven targets and thresholds become available for automated measurement methods, deriving evidence-based equivalences between automated methods and standardized manual OBPM is the next best solution. The MeasureBP study group was initiated by the Canadian Hypertension Education Program to close this critical knowledge gap. MeasureBP aims to define evidence-based equivalent values between standardized manual OBPM and automated BPM methods by synthesizing available evidence using a systematic review and individual subject-level data meta-analyses. This manuscript provides a review of the literature and MeasureBP study protocol. These results will lay the evidenced-based foundation to resolve uncertainties within blood pressure guidelines which, in turn, will improve the management of hypertension.
Allum, Laura; Shaw, Michelle; Pattison, Natalie; Dark, Paul
2018-01-01
Objective To characterise the research profile of UK critical care physiotherapists including experience, training needs, and barriers and enablers to engagement in critical care research. ‘Research’ was defined broadly to encompass activities related to quantitative and qualitative studies, service evaluations, clinical audit and quality improvements. Design Closed-question online survey, with optional free-text responses. Setting UK critical care community. Participants UK critical care physiotherapists, regardless of clinical grade or existing research experience. Results 268 eligible survey responses were received during the 12-week study period (21 incomplete, 7.8%). Respondents were based in university-affiliated (n=133, 49.6%) and district general (n=111, 41.4%) hospitals, and generally of senior clinical grade. Nearly two-thirds had postgraduate qualifications at master’s level or above (n=163, 60.8%). Seven had a doctoral-level qualification. Respondents reported a range of research experience, predominantly data acquisition (n=144, 53.7%) and protocol development (n=119, 44.4%). Perceived research training needs were prevalent, including topics of research methods, critical literature appraisal, protocol development and statistical analysis (each reported by ≥50% respondents). Multiple formats for delivery of future research training were identified. Major barriers to research engagement included lack of protected time (n=220, 82.1%), funding (n=177, 66.0%) and perceived experience (n=151, 56.3%). Barriers were conceptually categorised into capability, opportunity and motivation themes. Key enabling strategies centred on greater information provision about clinical research opportunities, access to research training, secondment roles and professional networks. Conclusions UK critical care physiotherapists are skilled, experienced and motivated to participate in research, including pursuing defined academic research pathways. Nonetheless wide-ranging training needs and notable barriers preclude further involvement. Strategies to harness the unique skills of this profession to enhance the quality, quantity and scope of critical care research, benefiting from a multiprofessional National Clinical Research Network, are required. PMID:29866725
Shin, Hangsik; Choi, Wangrim; Kim, Yi-gon; Cho, Jaegeol
2014-01-01
Snoring is one of the representative phenomena of the sleep disorder and detection of snoring is quite important for improving quality of daily human life. The purpose of this research is to define the noises of the ordinary sleep situation and to find its characteristics as a preliminary research of snoring detection. Differently from previous snoring researches, we use a built-in sound recording system of Smartphone for practical use in ordinary sleep condition, and recording was carried out in a general private bedroom. Especially, we designed the experimental protocol, including the various noises could be frequently occurred during sleep such as cough, music, talking, alarm, door open/close, fan, radio and footstep to make closer to the actual sleep circumstance. The sound data set was recorded during actual sleep from 10 normal subjects. Totally 44 snoring data set and 75-noise dataset is acquired and analyzed.
Xenbase, the Xenopus model organism database; new virtualized system, data types and genomes.
Karpinka, J Brad; Fortriede, Joshua D; Burns, Kevin A; James-Zorn, Christina; Ponferrada, Virgilio G; Lee, Jacqueline; Karimi, Kamran; Zorn, Aaron M; Vize, Peter D
2015-01-01
Xenbase (http://www.xenbase.org), the Xenopus frog model organism database, integrates a wide variety of data from this biomedical model genus. Two closely related species are represented: the allotetraploid Xenopus laevis that is widely used for microinjection and tissue explant-based protocols, and the diploid Xenopus tropicalis which is used for genetics and gene targeting. The two species are extremely similar and protocols, reagents and results from each species are often interchangeable. Xenbase imports, indexes, curates and manages data from both species; all of which are mapped via unique IDs and can be queried in either a species-specific or species agnostic manner. All our services have now migrated to a private cloud to achieve better performance and reliability. We have added new content, including providing full support for morpholino reagents, used to inhibit mRNA translation or splicing and binding to regulatory microRNAs. New genomes assembled by the JGI for both species and are displayed in Gbrowse and are also available for searches using BLAST. Researchers can easily navigate from genome content to gene page reports, literature, experimental reagents and many other features using hyperlinks. Xenbase has also greatly expanded image content for figures published in papers describing Xenopus research via PubMedCentral. © The Author(s) 2014. Published by Oxford University Press on behalf of Nucleic Acids Research.
Decullier, Evelyne; Lhéritier, Véronique; Chapuis, François
2005-10-17
Clinical trials throughout the world must be evaluated by research ethics committees. No one has yet attempted to clearly quantify at the national level the activity of ethics committees and describe the characteristics of the protocols submitted. The objectives of this study were to describe 1) the workload and the activity of Research Ethics Committees in France, and 2) the characteristics of protocols approved on a nation-wide basis. Retrospective cohort of 976 protocols approved by a representative sample of 25/48 of French Research Ethics Committees in 1994. Protocols characteristics (design, study size, investigator), number of revisions requested by the ethics committee before approval, time to approval and number of amendments after approval were collected for each protocol by trained research assistant using the committee's files and archives. Thirty-one percent of protocols were approved with no modifications requested in 16 days (95% CI: 14-17). The number of revisions requested by the committee, and amendments submitted by the investigator was on average respectively 39 (95% CI: 25-53) and 37 (95% CI: 27-46), per committee and per year. When revisions were requested, the main reasons were related to information to the patient (28%) and consent modalities (18%). Drugs were the object of research in 68% of the protocols examined. The majority of the research was national (80%) with a predominance of single-centre studies. Workload per protocol has been estimated at twelve and half hours on average for administrative support and at eleven and half hours for expertise. The estimated workload justifies specific and independent administrative and financial support for Research Ethics Committees.
[Protocol for the treatment of severe acute pancreatitis with necrosis].
Barreda, Luis; Targarona, Javier; Rodriguez, César
2005-01-01
The Severe Acute Pancreatic Unit of Edgardo Rebagliati Martins National Hospital was officially created in the year 2000. Up to date, we have cared for more than 195 patients with Pancreatic Necrosis. All of them have been treated under a management protocol presented by us. This has helped us to standardize treatment and also to compare results with work groups around the world. This Protocol comes from our own experience and that of our colleagues abroad with a wide knowledge in this kind of pathology abroad, with whom we maintain close ties.
Kost, Rhonda G.; Dowd, Kathleen A.; Hurley, Arlene M.; Rainer, Tyler‐Lauren; Coller, Barry S.
2014-01-01
Abstract The development of translational clinical research protocols is complex. To assist investigators, we developed a structured supportive guidance process (Navigation) to expedite protocol development to the standards of good clinical practice (GCP), focusing on research ethics and integrity. Navigation consists of experienced research coordinators leading investigators through a concerted multistep protocol development process from concept initiation to submission of the final protocol. To assess the effectiveness of Navigation, we collect data on the experience of investigators, the intensity of support required for protocol development, IRB review outcomes, and protocol start and completion dates. One hundred forty‐four protocols underwent Navigation and achieved IRB approval since the program began in 2007, including 37 led by trainee investigators, 26 led by MDs, 9 by MD/PhDs, 57 by PhDs, and 12 by investigators with other credentials (e.g., RN, MPH). In every year, more than 50% of Navigated protocols were approved by the IRB within 30 days. For trainees who had more than one protocol navigated, the intensity of Navigation support required decreased over time. Navigation can increase access to translational studies for basic scientists, facilitate GCP training for investigators, and accelerate development and approval of protocols of high ethical and scientific quality. PMID:24405608
Federal Register 2010, 2011, 2012, 2013, 2014
2013-07-02
... captioning synchronization requirements for covered apparatus, and on how DVD and Blu-ray players can fulfill... captioning capabilities of certain apparatus on which consumers view video programming. DATES: Comments are... synchronization requirements for covered apparatus, and on how DVD and Blu-ray players can fulfill the closed...
Schmettow, Martin; Schnittker, Raphaela; Schraagen, Jan Maarten
2017-05-01
This paper proposes and demonstrates an extended protocol for usability validation testing of medical devices. A review of currently used methods for the usability evaluation of medical devices revealed two main shortcomings. Firstly, the lack of methods to closely trace the interaction sequences and derive performance measures. Secondly, a prevailing focus on cross-sectional validation studies, ignoring the issues of learnability and training. The U.S. Federal Drug and Food Administration's recent proposal for a validation testing protocol for medical devices is then extended to address these shortcomings: (1) a novel process measure 'normative path deviations' is introduced that is useful for both quantitative and qualitative usability studies and (2) a longitudinal, completely within-subject study design is presented that assesses learnability, training effects and allows analysis of diversity of users. A reference regression model is introduced to analyze data from this and similar studies, drawing upon generalized linear mixed-effects models and a Bayesian estimation approach. The extended protocol is implemented and demonstrated in a study comparing a novel syringe infusion pump prototype to an existing design with a sample of 25 healthcare professionals. Strong performance differences between designs were observed with a variety of usability measures, as well as varying training-on-the-job effects. We discuss our findings with regard to validation testing guidelines, reflect on the extensions and discuss the perspectives they add to the validation process. Copyright © 2017 Elsevier Inc. All rights reserved.
Butler, Ashleigh; Hall, Helen; Copnell, Beverley
2016-06-01
The qualitative systematic review is a rapidly developing area of nursing research. In order to present trustworthy, high-quality recommendations, such reviews should be based on a review protocol to minimize bias and enhance transparency and reproducibility. Although there are a number of resources available to guide researchers in developing a quantitative review protocol, very few resources exist for qualitative reviews. To guide researchers through the process of developing a qualitative systematic review protocol, using an example review question. The key elements required in a systematic review protocol are discussed, with a focus on application to qualitative reviews: Development of a research question; formulation of key search terms and strategies; designing a multistage review process; critical appraisal of qualitative literature; development of data extraction techniques; and data synthesis. The paper highlights important considerations during the protocol development process, and uses a previously developed review question as a working example. This paper will assist novice researchers in developing a qualitative systematic review protocol. By providing a worked example of a protocol, the paper encourages the development of review protocols, enhancing the trustworthiness and value of the completed qualitative systematic review findings. Qualitative systematic reviews should be based on well planned, peer reviewed protocols to enhance the trustworthiness of results and thus their usefulness in clinical practice. Protocols should outline, in detail, the processes which will be used to undertake the review, including key search terms, inclusion and exclusion criteria, and the methods used for critical appraisal, data extraction and data analysis to facilitate transparency of the review process. Additionally, journals should encourage and support the publication of review protocols, and should require reference to a protocol prior to publication of the review results. © 2016 Sigma Theta Tau International.
Khan, Anwar; Ali, Ihsan; Ghani, Abdullah; Khan, Nawsher; Alsaqer, Mohammed; Rahman, Atiq Ur; Mahmood, Hasan
2018-05-18
Recent research in underwater wireless sensor networks (UWSNs) has gained the attention of researchers in academia and industry for a number of applications. They include disaster and earthquake prediction, water quality and environment monitoring, leakage and mine detection, military surveillance and underwater navigation. However, the aquatic medium is associated with a number of limitations and challenges: long multipath delay, high interference and noise, harsh environment, low bandwidth and limited battery life of the sensor nodes. These challenges demand research techniques and strategies to be overcome in an efficient and effective fashion. The design of routing protocols for UWSNs is one of the promising solutions to cope with these challenges. This paper presents a survey of the routing protocols for UWSNs. For the ease of description, the addressed routing protocols are classified into two groups: localization-based and localization-free protocols. These groups are further subdivided according to the problems they address or the major parameters they consider during routing. Unlike the existing surveys, this survey considers only the latest and state-of-the-art routing protocols. In addition, every protocol is described in terms of its routing strategy and the problem it addresses and solves. The merit(s) of each protocol is (are) highlighted along with the cost. A description of the protocols in this fashion has a number of advantages for researchers, as compared to the existing surveys. Firstly, the description of the routing strategy of each protocol makes its routing operation easily understandable. Secondly, the demerit(s) of a protocol provides (provide) insight into overcoming its flaw(s) in future investigation. This, in turn, leads to the foundation of new protocols that are more intelligent, robust and efficient with respect to the desired parameters. Thirdly, a protocol can be selected for the appropriate application based on its described merit(s). Finally, open challenges and research directions are presented for future investigation.
Ghani, Abdullah; Alsaqer, Mohammed; Rahman, Atiq Ur; Mahmood, Hasan
2018-01-01
Recent research in underwater wireless sensor networks (UWSNs) has gained the attention of researchers in academia and industry for a number of applications. They include disaster and earthquake prediction, water quality and environment monitoring, leakage and mine detection, military surveillance and underwater navigation. However, the aquatic medium is associated with a number of limitations and challenges: long multipath delay, high interference and noise, harsh environment, low bandwidth and limited battery life of the sensor nodes. These challenges demand research techniques and strategies to be overcome in an efficient and effective fashion. The design of routing protocols for UWSNs is one of the promising solutions to cope with these challenges. This paper presents a survey of the routing protocols for UWSNs. For the ease of description, the addressed routing protocols are classified into two groups: localization-based and localization-free protocols. These groups are further subdivided according to the problems they address or the major parameters they consider during routing. Unlike the existing surveys, this survey considers only the latest and state-of-the-art routing protocols. In addition, every protocol is described in terms of its routing strategy and the problem it addresses and solves. The merit(s) of each protocol is (are) highlighted along with the cost. A description of the protocols in this fashion has a number of advantages for researchers, as compared to the existing surveys. Firstly, the description of the routing strategy of each protocol makes its routing operation easily understandable. Secondly, the demerit(s) of a protocol provides (provide) insight into overcoming its flaw(s) in future investigation. This, in turn, leads to the foundation of new protocols that are more intelligent, robust and efficient with respect to the desired parameters. Thirdly, a protocol can be selected for the appropriate application based on its described merit(s). Finally, open challenges and research directions are presented for future investigation. PMID:29783686
Near-optimal protocols in complex nonequilibrium transformations
Gingrich, Todd R.; Rotskoff, Grant M.; Crooks, Gavin E.; ...
2016-08-29
The development of sophisticated experimental means to control nanoscale systems has motivated efforts to design driving protocols that minimize the energy dissipated to the environment. Computational models are a crucial tool in this practical challenge. In this paper, we describe a general method for sampling an ensemble of finite-time, nonequilibrium protocols biased toward a low average dissipation. In addition, we show that this scheme can be carried out very efficiently in several limiting cases. As an application, we sample the ensemble of low-dissipation protocols that invert the magnetization of a 2D Ising model and explore how the diversity of themore » protocols varies in response to constraints on the average dissipation. In this example, we find that there is a large set of protocols with average dissipation close to the optimal value, which we argue is a general phenomenon.« less
Data aggregation in wireless sensor networks using the SOAP protocol
NASA Astrophysics Data System (ADS)
Al-Yasiri, A.; Sunley, A.
2007-07-01
Wireless sensor networks (WSN) offer an increasingly attractive method of data gathering in distributed system architectures and dynamic access via wireless connectivity. Wireless sensor networks have physical and resource limitations, this leads to increased complexity for application developers and often results in applications that are closely coupled with network protocols. In this paper, a data aggregation framework using SOAP (Simple Object Access Protocol) on wireless sensor networks is presented. The framework works as a middleware for aggregating data measured by a number of nodes within a network. The aim of the study is to assess the suitability of the protocol in such environments where resources are limited compared to traditional networks.
Resting blood pressure differentially predicts time course in a tonic pain experiment.
Horing, Bjoern; McCubbin, James A; Moore, Dewayne; Muth, Eric R
2016-10-01
Resting blood pressure (BP) shows a negative relationship with pain sensitivity (BP-related hypoalgesia). In chronic pain conditions, this relationship is inverted. The precise mechanisms responsible for the inversion are unknown. Using a tonic pain protocol, we report findings closely resembling this inversion in healthy participants. Resting BP and state measures of anxiety and mood were assessed from 33 participants (21 female). Participants then immersed their dominant hand in painfully hot water (47 °C) for five trials of 1-min duration, with 30-s intertrial intervals. Throughout the trials, participants continually registered their pain. After a 35-min intermission, the trial sequence was repeated. A disassociation of the negative relationship of resting systolic BP (as per Trial 1) was found using hierarchical linear modeling (p < .001, R(2) = .07). The disassociation unfolds over each consecutive trial, with an increasingly positive relationship. In Sequence 2, the initially negative relationship is almost completely absent. Furthermore, the association of BP and pain was found to be moderated by anxiety, such that only persons with low anxiety exhibited BP hypoalgesia. Our findings expand the existing literature by incorporating anxiety as a moderator of BP hypoalgesia. Furthermore, the protocol emulates the changing relationship between BP and pain observed in chronic pain patients. The protocol has potential as a model for chronic pain; however, future research should determine if similar physiological systems are involved. The finding holds potential diagnostic or prognostic relevance for certain clinical pain conditions, especially those involving dysfunction of the descending modulation of pain. © 2016 Society for Psychophysiological Research.
Tersmette, Derek Gideon; Engberts, Dirk Peter
2017-01-01
The Committee for Medical Ethics (CME) of Leiden University Medical Center (LUMC) was established as the first medical ethics reviewing committee (MREC) in the Netherlands. In the period 2000-2010 the CME received 2,162 protocols for review. Some of these protocols were never approved. Until now, there has existed neither an overview of these failed protocols nor an overview of the reasons for their failure. This report draws on data from the digital database, the physical archives, and the minutes of the meetings of the CME. Additional information has been obtained from the Central Committee on Research involving Human Subjects (CCRH) and survey-based research. Protocols were itemized based on characteristic features and their reviewing procedures were analyzed. In total, 1,952 out of 2,162 research protocols submitted during 2000-2010 (90.3%) were approved by the CME; 210 of 2,162 protocols (9.7%) were not approved. Of these 210 protocols, 177 failed due to reasons not related to CME reviewing. In 15 cases CME reviewing led to protocol failure, while another 10 protocols were rejected outright. Eight of the 210 submitted protocols without approval had been conducted prior to submission. In the aforementioned period, little protocol failure occurred. For the most part, protocol failure was caused by problems that are not CME related. This type of failure has several identifiable factors, none of which have anything to do with the ethical reviewing procedure by the CME. A mere 1.2% of protocols failed due to ethical review. Unacceptable burden and risks to the subject and an inadequate methodology are the most common reasons for this CME-related protocol failure.
A Survey on Underwater Acoustic Sensor Network Routing Protocols.
Li, Ning; Martínez, José-Fernán; Meneses Chaus, Juan Manuel; Eckert, Martina
2016-03-22
Underwater acoustic sensor networks (UASNs) have become more and more important in ocean exploration applications, such as ocean monitoring, pollution detection, ocean resource management, underwater device maintenance, etc. In underwater acoustic sensor networks, since the routing protocol guarantees reliable and effective data transmission from the source node to the destination node, routing protocol design is an attractive topic for researchers. There are many routing algorithms have been proposed in recent years. To present the current state of development of UASN routing protocols, we review herein the UASN routing protocol designs reported in recent years. In this paper, all the routing protocols have been classified into different groups according to their characteristics and routing algorithms, such as the non-cross-layer design routing protocol, the traditional cross-layer design routing protocol, and the intelligent algorithm based routing protocol. This is also the first paper that introduces intelligent algorithm-based UASN routing protocols. In addition, in this paper, we investigate the development trends of UASN routing protocols, which can provide researchers with clear and direct insights for further research.
A Survey on Underwater Acoustic Sensor Network Routing Protocols
Li, Ning; Martínez, José-Fernán; Meneses Chaus, Juan Manuel; Eckert, Martina
2016-01-01
Underwater acoustic sensor networks (UASNs) have become more and more important in ocean exploration applications, such as ocean monitoring, pollution detection, ocean resource management, underwater device maintenance, etc. In underwater acoustic sensor networks, since the routing protocol guarantees reliable and effective data transmission from the source node to the destination node, routing protocol design is an attractive topic for researchers. There are many routing algorithms have been proposed in recent years. To present the current state of development of UASN routing protocols, we review herein the UASN routing protocol designs reported in recent years. In this paper, all the routing protocols have been classified into different groups according to their characteristics and routing algorithms, such as the non-cross-layer design routing protocol, the traditional cross-layer design routing protocol, and the intelligent algorithm based routing protocol. This is also the first paper that introduces intelligent algorithm-based UASN routing protocols. In addition, in this paper, we investigate the development trends of UASN routing protocols, which can provide researchers with clear and direct insights for further research. PMID:27011193
Publication trends of study protocols in rehabilitation.
Jesus, Tiago S; Colquhoun, Heather L
2017-09-04
Growing evidence points for the need to publish study protocols in the health field. To observe whether the growing interest in publishing study protocols in the broader health field has been translated into increased publications of rehabilitation study protocols. Observational study using publication data and its indexation in PubMed. Not applicable. Not applicable. PubMed was searched with appropriate combinations of Medical Subject Headings up to December 2014. The effective presence of study protocols was manually screened. Regression models analyzed the yearly growth of publications. Two-sample Z-tests analyzed whether the proportion of Systematic Reviews (SRs) and Randomized Controlled Trials (RCTs) among study protocols differed from that of the same designs for the broader rehabilitation research. Up to December 2014, 746 publications of rehabilitation study protocols were identified, with an exponential growth since 2005 (r2=0.981; p<0.001). RCT protocols were the most common among rehabilitation study protocols (83%), while RCTs were significantly more prevalent among study protocols than among the broader rehabilitation research (83% vs. 35.8%; p<0.001). For SRs, the picture was reversed: significantly less common among study protocols (2.8% vs. 9.3%; p<0.001). Funding was more often reported by rehabilitation study protocols than the broader rehabilitation research (90% vs. 53.1%; p<0.001). Rehabilitation journals published a significantly lower share of rehabilitation study protocols than they did for the broader rehabilitation research (1.8% vs.16.7%; p<0.001). Identifying the reasons for these discrepancies and reverting unwarranted disparities (e.g. low rate of publication for rehabilitation SR protocols) are likely new avenues for rehabilitation research and its publication. SRs, particularly those aggregating RCT results, are considered the best standard of evidence to guide rehabilitation clinical practice; however, that standard can be improved in rigor and/or transparency if the publications of rehabilitation SRs protocols become more common.
Roberts, Laura Weiss; Kim, Jane Paik
2017-01-01
Understanding the perspectives of healthy individuals is important ethically and for the advancement of science. We assessed perceptions of risk associated with research procedures, comparing views of healthy individuals with and without experience in clinical research, and the respondents' reported willingness to volunteer. Semistructured interviews and written surveys were conducted. Study participants were healthy individuals, half of whom were currently enrolled in clinical research and half of whom had no prior experience in clinical research. Participants were queried regarding seven "minimal risk" or "greater than minimal risk" protocol vignettes with procedures of three types: routine diagnostic tests, more burdensome (i.e., more effort or potential harm) diagnostic tests, and pharmacologic interventions. Views of influences on enrollment decisions were also assessed. Most healthy individuals indicated that protocols with more burdensome or pharmacologic interventions were very risky (59%, 58%), as opposed to routine diagnostic test procedures (32%). Respondents' willingness to enroll in protocols varied by type of protocol (p value < .001) and was inversely correlated with risk assessments (regression coefficients from GEE = -0.4; -0.5; -0.7). The odds of healthy individuals with research experience expressing strong willingness to enroll in the depicted protocols were twice the odds of healthy individuals without research experience expressing the same level of willingness (OR = 2.0 95% CI: [1.1, 3.9]). Respondents did not assign risk categories as institutional review boards (IRBs) would, as indicated by low agreement (26%) between respondent and expert opinion on minimal risk protocols. Perceptions of procedure risk appear to influence healthy individuals' willingness to enroll in protocols. Participants with experience in clinical research were far more likely to express willingness to enroll, a finding with important scientific and ethical implications. The lack of alignment between healthy individuals' views of protocol risk and IRB categorization warrants further study.
Rethinking developmental toxicity testing: Evolution or revolution?
Scialli, Anthony R; Daston, George; Chen, Connie; Coder, Prägati S; Euling, Susan Y; Foreman, Jennifer; Hoberman, Alan M; Hui, Julia; Knudsen, Thomas; Makris, Susan L; Morford, LaRonda; Piersma, Aldert H; Stanislaus, Dinesh; Thompson, Kary E
2018-06-01
Current developmental toxicity testing adheres largely to protocols suggested in 1966 involving the administration of test compound to pregnant laboratory animals. After more than 50 years of embryo-fetal development testing, are we ready to consider a different approach to human developmental toxicity testing? A workshop was held under the auspices of the Developmental and Reproductive Toxicology Technical Committee of the ILSI Health and Environmental Sciences Institute to consider how we might design developmental toxicity testing if we started over with 21st century knowledge and techniques (revolution). We first consider what changes to the current protocols might be recommended to make them more predictive for human risk (evolution). The evolutionary approach includes modifications of existing protocols and can include humanized models, disease models, more accurate assessment and testing of metabolites, and informed approaches to dose selection. The revolution could start with hypothesis-driven testing where we take what we know about a compound or close analog and answer specific questions using targeted experimental techniques rather than a one-protocol-fits-all approach. Central to the idea of hypothesis-driven testing is the concept that testing can be done at the level of mode of action. It might be feasible to identify a small number of key events at a molecular or cellular level that predict an adverse outcome and for which testing could be performed in vitro or in silico or, rarely, using limited in vivo models. Techniques for evaluating these key events exist today or are in development. Opportunities exist for refining and then replacing current developmental toxicity testing protocols using techniques that have already been developed or are within reach. © 2018 The Authors. Birth Defects Research Published by Wiley Periodicals, Inc.
Clinical Investigation Program Annual Progress Report
1993-09-30
272 93/200A 0 Comparison of Healing Rates of Bones Plated Following Fracture, Among Yucatan Swine Having Open and Closed Physes...Study Objective: Compare two enteral formulas in respect to nutritional aspects. (16) Technical Approach: Protocol will take place in SICU. (17...Protocol #: 93/200A (3) Status: Ongoing (4) Title: Comparison of Healing Rates of Bones Plated Following Fractures, Among Yucatan Swine Having Open and
Ayat-Isfahani, Farah; Pashang, Mina; Davoudi, Bita; Sadeghian, Saeed; Jalali, Arash
2017-03-01
Intravenous amiodarone is considered an effective treatment option for cardiac ventricular and atrial arrhythmias. Peripheral infusion of amiodarone may cause blood vessels irritation and phlebitis that is the most common complication of this drug by this route even when it is administered within recommended dosing limits. The effect of injection-site splinting on the occurrence of phlebitis among a group of cardiac arrhythmia patients receiving peripherally infused amiodarone. This research is a clinical trial on patients of Tehran Heart Center who were hospitalized due to cardiac arrhythmias. A sample of 60 patients with mean age 65 ± 14 years were randomly divided into control and test groups. In the experimental group with close splint and restrict the movement of the injection site until the end of the infusion and control groups without closing brace, at the same time received amiodarone. Injection protocol was similar for both groups. The results were analyzed with Spss18. The results of this research still significantly reduced the incidence of amiodarone injection-site phlebitis in the injection time (P = .005). Copyright © 2016 Society for Vascular Nursing, Inc. Published by Elsevier Inc. All rights reserved.
Li, Rebecca H; Wacholtz, Mary C; Barnes, Mark; Boggs, Liam; Callery-D'Amico, Susan; Davis, Amy; Digilova, Alla; Forster, David; Heffernan, Kate; Luthin, Maeve; Lynch, Holly Fernandez; McNair, Lindsay; Miller, Jennifer E; Murphy, Jacquelyn; Van Campen, Luann; Wilenzick, Mark; Wolf, Delia; Woolston, Cris; Aldinger, Carmen; Bierer, Barbara E
2016-01-01
A novel Protocol Ethics Tool Kit (‘Ethics Tool Kit’) has been developed by a multi-stakeholder group of the Multi-Regional Clinical Trials Center of Brigham and Women's Hospital and Harvard. The purpose of the Ethics Tool Kit is to facilitate effective recognition, consideration and deliberation of critical ethical issues in clinical trial protocols. The Ethics Tool Kit may be used by investigators and sponsors to develop a dedicated Ethics Section within a protocol to improve the consistency and transparency between clinical trial protocols and research ethics committee reviews. It may also streamline ethics review and may facilitate and expedite the review process by anticipating the concerns of ethics committee reviewers. Specific attention was given to issues arising in multinational settings. With the use of this Tool Kit, researchers have the opportunity to address critical research ethics issues proactively, potentially speeding the time and easing the process to final protocol approval. PMID:26811365
Establishing the first institutional animal care and use committee in Egypt.
Fahmy, Sohair R; Gaafar, Khadiga
2016-04-09
Although animal research ethics committees (AREC) are well established in Western countries, this field is weakly developed and its concept is poorly understood in the Middle East and North Africa region. Our main objective was to introduce the concept and requirements of ethical approaches in dealing with experimental animal in research and teaching in Egypt. Due to its very recent inception, Cairo University, Faculty of Science IACUC decided to operate in accordance with Guide for the Care and Use of Laboratory Animals 8th Edition 2011 (the Guide) since Egypt has not yet compiled its own guide. Fifty protocols were reviewed in 2013-2014. Only ten protocols were reviewed in 2013, but in 2014, forty protocols were reviewed. In 2013 all protocols were approved and in 2014, number of approvals were 35, the number of deferrals were 4, and one refused protocol. Master's theses (MSc) research protocols constituted the majority of the total reviewed protocols. This is attributed to the decision of the Board of the Faculty of Science, Cairo University in September, 2013 that the approval of the IACUC is mandatory before conducting any research involving animals or theses registration. The first IACUC was established in the Cairo University, Faculty of Science, since 2012. The challenges encountered by the committee were diverse, such as the absence of laws that control the use of animal models in scientific research, lack of guidelines (protocols for experimental animals in research) and, mandatory ethical approval for any experimental animal research.
A Web Service Protocol Realizing Interoperable Internet of Things Tasking Capability
Huang, Chih-Yuan; Wu, Cheng-Hung
2016-01-01
The Internet of Things (IoT) is an infrastructure that interconnects uniquely-identifiable devices using the Internet. By interconnecting everyday appliances, various monitoring, and physical mashup applications can be constructed to improve human’s daily life. In general, IoT devices provide two main capabilities: sensing and tasking capabilities. While the sensing capability is similar to the World-Wide Sensor Web, this research focuses on the tasking capability. However, currently, IoT devices created by different manufacturers follow different proprietary protocols and are locked in many closed ecosystems. This heterogeneity issue impedes the interconnection between IoT devices and damages the potential of the IoT. To address this issue, this research aims at proposing an interoperable solution called tasking capability description that allows users to control different IoT devices using a uniform web service interface. This paper demonstrates the contribution of the proposed solution by interconnecting different IoT devices for different applications. In addition, the proposed solution is integrated with the OGC SensorThings API standard, which is a Web service standard defined for the IoT sensing capability. Consequently, the Extended SensorThings API can realize both IoT sensing and tasking capabilities in an integrated and interoperable manner. PMID:27589759
Xenbase, the Xenopus model organism database; new virtualized system, data types and genomes
Karpinka, J. Brad; Fortriede, Joshua D.; Burns, Kevin A.; James-Zorn, Christina; Ponferrada, Virgilio G.; Lee, Jacqueline; Karimi, Kamran; Zorn, Aaron M.; Vize, Peter D.
2015-01-01
Xenbase (http://www.xenbase.org), the Xenopus frog model organism database, integrates a wide variety of data from this biomedical model genus. Two closely related species are represented: the allotetraploid Xenopus laevis that is widely used for microinjection and tissue explant-based protocols, and the diploid Xenopus tropicalis which is used for genetics and gene targeting. The two species are extremely similar and protocols, reagents and results from each species are often interchangeable. Xenbase imports, indexes, curates and manages data from both species; all of which are mapped via unique IDs and can be queried in either a species-specific or species agnostic manner. All our services have now migrated to a private cloud to achieve better performance and reliability. We have added new content, including providing full support for morpholino reagents, used to inhibit mRNA translation or splicing and binding to regulatory microRNAs. New genomes assembled by the JGI for both species and are displayed in Gbrowse and are also available for searches using BLAST. Researchers can easily navigate from genome content to gene page reports, literature, experimental reagents and many other features using hyperlinks. Xenbase has also greatly expanded image content for figures published in papers describing Xenopus research via PubMedCentral. PMID:25313157
Jeyaram, Kumaraswamy; Romi, Wahengbam; Singh, Thangjam Anand; Adewumi, Gbenga Adedeji; Basanti, Khundrakpam; Oguntoyinbo, Folarin Anthony
2011-11-01
PCR amplification of 16S rRNA gene by universal primers followed by restriction fragment length polymorphism analysis using RsaI, CfoI and HinfI endonucleases, distinctly differentiated closely related Bacillus amyloliquefaciens, Bacillus licheniformis and Bacillus pumilus from Bacillus subtilis sensu stricto. This simple, economical, rapid and reliable protocol could be an alternative to misleading phenotype-based grouping of these closely related species. Copyright © 2011 Elsevier B.V. All rights reserved.
Federal Register 2010, 2011, 2012, 2013, 2014
2013-12-26
... Seeks Comment on Application of the IP Closed Captioning Rules to Video Clips AGENCY: Federal... captioning of video clips delivered by Internet protocol (``IP''), including the extent to which industry has voluntarily captioned IP- delivered video clips. The Commission directed the Media Bureau to issue this...
Closed treatment of unilateral mandibular condyle fractures in adults: a systematic review.
Rozeboom, A V J; Dubois, L; Bos, R R M; Spijker, R; de Lange, J
2017-04-01
Of all mandibular fractures, 25-35% are condylar. Many studies have focused on whether to treat such fractures via open or closed modalities. A uniform protocol for closed treatment is lacking, but such a protocol could ensure good clinical practice. The aims of this systematic review were to provide an overview of the published studies exclusively pertaining to closed treatment and to summarize the existing modalities for closed treatment and their clinical outcomes. Sixteen studies were selected for detailed analysis. The treatments given were highly variable, ranging from doing nothing to applying maxillomandibular fixation with stainless steel wires. The results of the different studies and the treatment modalities used were difficult to interpret; however no clear differences in the outcome measures were seen between the treatment modalities applied. Complications encountered after closed treatment included malocclusion, limited mouth opening, reduced range of motion, and persistent pain. Due to the heterogeneity between groups, high loss-to-follow-up, poor descriptions of the treatments given, and variability in outcome measurement methods, no clear associations between adverse outcomes and the treatments applied could be determined. This review suggests that due to the high level of methodological variability in the relevant studies published to date, there are currently no uniform standards for the closed treatment of condylar fractures that can be expected to yield good clinical results. The establishment of such standards could potentially improve treatment outcomes. Copyright © 2016 International Association of Oral and Maxillofacial Surgeons. Published by Elsevier Ltd. All rights reserved.
Sullivan, Lauren A; Campbell, Vicki L; Onuma, Serene C
2010-07-15
To determine whether use of a closed urine collection system would decrease the incidence of nosocomial bacteriuria in hospitalized dogs, compared with use of an open urine collection system (used, sterile IV bags). Randomized controlled trial. 51 hospitalized dogs requiring indwelling urinary catheterization for >or= 24 hours. Dogs were randomly assigned to an open or closed urine collection system group. A standardized protocol for catheter placement and maintenance was followed for all dogs. A baseline urine sample was collected via cystocentesis for aerobic bacterial culture, with additional urine samples obtained daily from the urine collection reservoir. 27 dogs were assigned to the open urine collection system group, and 24 were assigned to the closed urine collection system group. The incidence of nosocomial bacteriuria in dogs with open urine collection systems (3/27 [11.1%]) was not significantly different from incidence in dogs with closed urine collection systems (2/24 [8.3%]). Median duration of catheterization was 2 days for dogs in both groups; the range was 1 to 7 days for dogs in the open group and 1 to 5 days for dogs in the closed group. Results suggested that for dogs requiring short-term indwelling urinary catheterization, the type of urine collection system (open vs closed) was not associated with likelihood of developing nosocomial bacteriuria. Use of a strict protocol for urinary catheter placement and maintenance was likely key in the low incidence of nosocomial bacteriuria in the present study.
Teaching Integrity in Empirical Research: A Protocol for Documenting Data Management and Analysis
ERIC Educational Resources Information Center
Ball, Richard; Medeiros, Norm
2012-01-01
This article describes a protocol the authors developed for teaching undergraduates to document their statistical analyses for empirical research projects so that their results are completely reproducible and verifiable. The protocol is guided by the principle that the documentation prepared to accompany an empirical research project should be…
Development of Research-Based Protocol Aligned to Predict High Levels of Teaching Quality
ERIC Educational Resources Information Center
Schumacher, Gary; Grigsby, Bettye; Vesey, Winona
2011-01-01
This study proposes a research-based teacher selection protocol. The protocol is intended to offer school district hiring authorities a tool to identify teacher candidates with the behaviors expected to predict effective teaching. It is hypothesized that a particular series of research-based interview questions focusing on teaching behaviors in…
Real-Time QoS Routing Protocols in Wireless Multimedia Sensor Networks: Study and Analysis.
Alanazi, Adwan; Elleithy, Khaled
2015-09-02
Many routing protocols have been proposed for wireless sensor networks. These routing protocols are almost always based on energy efficiency. However, recent advances in complementary metal-oxide semiconductor (CMOS) cameras and small microphones have led to the development of Wireless Multimedia Sensor Networks (WMSN) as a class of wireless sensor networks which pose additional challenges. The transmission of imaging and video data needs routing protocols with both energy efficiency and Quality of Service (QoS) characteristics in order to guarantee the efficient use of the sensor nodes and effective access to the collected data. Also, with integration of real time applications in Wireless Senor Networks (WSNs), the use of QoS routing protocols is not only becoming a significant topic, but is also gaining the attention of researchers. In designing an efficient QoS routing protocol, the reliability and guarantee of end-to-end delay are critical events while conserving energy. Thus, considerable research has been focused on designing energy efficient and robust QoS routing protocols. In this paper, we present a state of the art research work based on real-time QoS routing protocols for WMSNs that have already been proposed. This paper categorizes the real-time QoS routing protocols into probabilistic and deterministic protocols. In addition, both categories are classified into soft and hard real time protocols by highlighting the QoS issues including the limitations and features of each protocol. Furthermore, we have compared the performance of mobility-aware query based real-time QoS routing protocols from each category using Network Simulator-2 (NS2). This paper also focuses on the design challenges and future research directions as well as highlights the characteristics of each QoS routing protocol.
Real-Time QoS Routing Protocols in Wireless Multimedia Sensor Networks: Study and Analysis
Alanazi, Adwan; Elleithy, Khaled
2015-01-01
Many routing protocols have been proposed for wireless sensor networks. These routing protocols are almost always based on energy efficiency. However, recent advances in complementary metal-oxide semiconductor (CMOS) cameras and small microphones have led to the development of Wireless Multimedia Sensor Networks (WMSN) as a class of wireless sensor networks which pose additional challenges. The transmission of imaging and video data needs routing protocols with both energy efficiency and Quality of Service (QoS) characteristics in order to guarantee the efficient use of the sensor nodes and effective access to the collected data. Also, with integration of real time applications in Wireless Senor Networks (WSNs), the use of QoS routing protocols is not only becoming a significant topic, but is also gaining the attention of researchers. In designing an efficient QoS routing protocol, the reliability and guarantee of end-to-end delay are critical events while conserving energy. Thus, considerable research has been focused on designing energy efficient and robust QoS routing protocols. In this paper, we present a state of the art research work based on real-time QoS routing protocols for WMSNs that have already been proposed. This paper categorizes the real-time QoS routing protocols into probabilistic and deterministic protocols. In addition, both categories are classified into soft and hard real time protocols by highlighting the QoS issues including the limitations and features of each protocol. Furthermore, we have compared the performance of mobility-aware query based real-time QoS routing protocols from each category using Network Simulator-2 (NS2). This paper also focuses on the design challenges and future research directions as well as highlights the characteristics of each QoS routing protocol. PMID:26364639
Debruyne, Philip R; Johnson, Philip J; Pottel, Lies; Daniels, Susanna; Greer, Rachel; Hodgkinson, Elizabeth; Kelly, Stephen; Lycke, Michelle; Samol, Jens; Mason, Julie; Kimber, Donna; Loucaides, Eileen; Parmar, Mahesh Kb; Harvey, Sally
2015-06-01
Clarity and accuracy of the pharmacy aspects of cancer clinical trial protocols is essential. Inconsistencies and ambiguities in such protocols have the potential to delay research and jeopardise both patient safety and collection of credible data. The Chemotherapy and Pharmacy Advisory Service was established by the UK National Cancer Research Network, currently known as National Institute for Health Research Clinical Research Network, to improve the quality of pharmacy-related content in cancer clinical research protocols. This article reports the scope of Chemotherapy and Pharmacy Advisory Service, its methodology of mandated protocol review and pharmacy-related guidance initiatives and its current impact. Over a 6-year period (2008-2013) since the inception of Chemotherapy and Pharmacy Advisory Service, cancer clinical trial protocols were reviewed by the service, prior to implementation at clinical trial sites. A customised Review Checklist was developed and used by a panel of experts to standardise the review process and report back queries and inconsistencies to chief investigators. Based on common queries, a Standard Protocol Template comprising specific guidance on drug-related content and a Pharmacy Manual Template were developed. In addition, a guidance framework was established to address 'ad hoc' pharmacy-related queries. The most common remarks made at protocol review have been summarised and categorised through retrospective analysis. In order to evaluate the impact of the service, chief investigators were asked to respond to queries made at protocol review and make appropriate changes to their protocols. Responses from chief investigators have been collated and acceptance rates determined. A total of 176 protocols were reviewed. The median number of remarks per protocol was 26, of which 20 were deemed clinically relevant and mainly concerned the drug regimen, support medication, frequency and type of monitoring and drug supply aspects. Further analysis revealed that 62% of chief investigators responded to the review. All responses were positive with an overall acceptance rate of 89% of the proposed protocol changes. Review of pharmacy content of cancer clinical trial protocols is feasible and exposes many undetected clinically relevant issues that could hinder efficient trial conduct. Our service audit revealed that the majority of suggestions were effectively incorporated in the final protocols. The refinement of existing and development of new pharmacy-related guidance documents by Chemotherapy and Pharmacy Advisory Service might aid in better and safer clinical research. © The Author(s) 2015.
Ethics of Social Media Research: Common Concerns and Practical Considerations
Goniu, Natalie; Moreno, Peter S.; Diekema, Douglas
2013-01-01
Abstract Social media Websites (SMWs) are increasingly popular research tools. These sites provide new opportunities for researchers, but raise new challenges for Institutional Review Boards (IRBs) that review these research protocols. As of yet, there is little-to-no guidance regarding how an IRB should review the studies involving SMWs. The purpose of this article was to review the common risks inherent in social media research and consider how researchers can consider these risks when writing research protocols. We focused this article on three common research approaches: observational research, interactive research, and survey/interview research. Concomitant with these research approaches, we gave particular attention to the issues pertinent to SMW research, including privacy, consent, and confidentiality. After considering these challenges, we outlined key considerations for both researchers and reviewers when creating or reviewing SMW IRB protocols. Our goal in this article was to provide a detailed examination of relevant ethics and regulatory issues for both researchers and those who review their protocols. PMID:23679571
Ethics of social media research: common concerns and practical considerations.
Moreno, Megan A; Goniu, Natalie; Moreno, Peter S; Diekema, Douglas
2013-09-01
Social media Websites (SMWs) are increasingly popular research tools. These sites provide new opportunities for researchers, but raise new challenges for Institutional Review Boards (IRBs) that review these research protocols. As of yet, there is little-to-no guidance regarding how an IRB should review the studies involving SMWs. The purpose of this article was to review the common risks inherent in social media research and consider how researchers can consider these risks when writing research protocols. We focused this article on three common research approaches: observational research, interactive research, and survey/interview research. Concomitant with these research approaches, we gave particular attention to the issues pertinent to SMW research, including privacy, consent, and confidentiality. After considering these challenges, we outlined key considerations for both researchers and reviewers when creating or reviewing SMW IRB protocols. Our goal in this article was to provide a detailed examination of relevant ethics and regulatory issues for both researchers and those who review their protocols.
Scanning protocols dedicated to smart velocity ranging in spectral OCT.
Grulkowski, Ireneusz; Gorczynska, Iwona; Szkulmowski, Maciej; Szlag, Daniel; Szkulmowska, Anna; Leitgeb, Rainer A; Kowalczyk, Andrzej; Wojtkowski, Maciej
2009-12-21
We introduce a new type of scanning protocols, called segmented protocols, which enable extracting multi-range flow velocity information from a single Spectral OCT data set. The protocols are evaluated using a well defined flow in a glass capillary. As an example of in vivo studies, we demonstrate two- and three-dimensional imaging of the retinal vascular system in the eyes of healthy volunteers. The flow velocity detection is performed using a method of Joint Spectral and Time domain OCT. Velocity ranging is demonstrated in imaging of retinal vasculature in the macular region and in the optic disk area characterized by different flow velocity values. Additionally, an enhanced visualization of retinal capillary network is presented in the close proximity to macula.
2011-03-31
protocols conducted in Iraq. His office had been designated by the 1 A research protocol is a formal document detailing the study methodology and the...Human Research Protections Program plan requires scientific peer review to ensure that research is scientifically sound in its design and methods, and...ofthe approved research protocol and IRB minutes, revealed that there was no mention of "active rehabilitation and exercise" under the design
ERIC Educational Resources Information Center
Jacob, Stacy A.; Furgerson, S. Paige
2012-01-01
Students new to doing qualitative research in the ethnographic and oral traditions, often have difficulty creating successful interview protocols. This article offers practical suggestions for students new to qualitative research for both writing interview protocol that elicit useful data and for conducting the interview. This piece was originally…
DOE Office of Scientific and Technical Information (OSTI.GOV)
Chrzanowski, J.; Meng-Burany, S.; Xing, W.B.
1994-12-31
Two series of Y{sub 1}Ba{sub 2}Cu{sub 3}O{sub z} thin films deposited on (001) LaAlO{sub 3} single crystals by excimer laser ablation under two different protocols have been investigated. The research has yielded well defined deposition conditions in terms of oxygen partial pressure p(O{sub 2}) and substrate temperature of the deposition process T{sub h}, for the growth of high quality epitaxial films of YBCO. The films grown under conditions close to optimal for both j{sub c} and T{sub c} exhibited T{sub c}{ge}91 K and j{sub c}{ge}4 x 10{sup 6} A/cm{sup 2}, at 77 K. Close correlations between the structural quality ofmore » the film, the growth parameters (p(O{sub 2}), T{sub h}) and j{sub c} and T{sub c} have been found.« less
STANDARD MEASUREMENT PROTOCOLS - FLORIDA RADON RESEARCH PROGRAM
The manual, in support of the Florida Radon Research Program, contains standard protocols for key measurements where data quality is vital to the program. t contains two sections. he first section, soil measurements, contains field sampling protocols for soil gas permeability and...
A Protocol for Collecting Human Cardiac Tissue for Research.
Blair, Cheavar A; Haynes, Premi; Campbell, Stuart G; Chung, Charles; Mitov, Mihail I; Dennis, Donna; Bonnell, Mark R; Hoopes, Charles W; Guglin, Maya; Campbell, Kenneth S
2016-01-01
This manuscript describes a protocol at the University of Kentucky that allows a translational research team to collect human myocardium that can be used for biological research. We have gained a great deal of practical experience since we started this protocol in 2008, and we hope that other groups might be able to learn from our endeavors. To date, we have procured ~4000 samples from ~230 patients. The tissue that we collect comes from organ donors and from patients who are receiving a heart transplant or a ventricular assist device because they have heart failure. We begin our manuscript by describing the importance of human samples in cardiac research. Subsequently, we describe the process for obtaining consent from patients, the cost of running the protocol, and some of the issues and practical difficulties that we have encountered. We conclude with some suggestions for other researchers who may be considering starting a similar protocol.
A Protocol for Collecting Human Cardiac Tissue for Research
Blair, Cheavar A.; Haynes, Premi; Campbell, Stuart G.; Chung, Charles; Mitov, Mihail I.; Dennis, Donna; Bonnell, Mark R.; Hoopes, Charles W.; Guglin, Maya; Campbell, Kenneth S.
2016-01-01
This manuscript describes a protocol at the University of Kentucky that allows a translational research team to collect human myocardium that can be used for biological research. We have gained a great deal of practical experience since we started this protocol in 2008, and we hope that other groups might be able to learn from our endeavors. To date, we have procured ~4000 samples from ~230 patients. The tissue that we collect comes from organ donors and from patients who are receiving a heart transplant or a ventricular assist device because they have heart failure. We begin our manuscript by describing the importance of human samples in cardiac research. Subsequently, we describe the process for obtaining consent from patients, the cost of running the protocol, and some of the issues and practical difficulties that we have encountered. We conclude with some suggestions for other researchers who may be considering starting a similar protocol. PMID:28042604
A kind of universal quantum secret sharing protocol
NASA Astrophysics Data System (ADS)
Chen, Xiu-Bo; Dou, Zhao; Xu, Gang; He, Xiao-Yu; Yang, Yi-Xian
2017-01-01
Universality is an important feature, but less researched in quantum communication protocols. In this paper, a kind of universal quantum secret sharing protocol is investigated. Firstly, we design a quantum secret sharing protocol based on the Borras-Plastino-Batle (BPB) state. Departing from previous research, our protocol has a salient feature in that participants in our protocol only need projective measurement instead of any unitary operations. It makes our protocol more flexible. Secondly, universality of quantum communication protocols is studied for the first time. More specifically, module division of quantum communication protocols and coupling between different modules are discussed. Our aforementioned protocol is analyzed as an example. On one hand, plenty of quantum states (the BPB-class states and the BPB-like-class states, which are proposed in this paper) could be used as carrier to perform our protocol. On the other hand, our protocol also could be regarded as a quantum private comparison protocol with a little revision. These features are rare for quantum communication protocols, and make our protocol more robust. Thirdly, entanglements of the BPB-class states are calculated in the Appendix.
A kind of universal quantum secret sharing protocol.
Chen, Xiu-Bo; Dou, Zhao; Xu, Gang; He, Xiao-Yu; Yang, Yi-Xian
2017-01-12
Universality is an important feature, but less researched in quantum communication protocols. In this paper, a kind of universal quantum secret sharing protocol is investigated. Firstly, we design a quantum secret sharing protocol based on the Borras-Plastino-Batle (BPB) state. Departing from previous research, our protocol has a salient feature in that participants in our protocol only need projective measurement instead of any unitary operations. It makes our protocol more flexible. Secondly, universality of quantum communication protocols is studied for the first time. More specifically, module division of quantum communication protocols and coupling between different modules are discussed. Our aforementioned protocol is analyzed as an example. On one hand, plenty of quantum states (the BPB-class states and the BPB-like-class states, which are proposed in this paper) could be used as carrier to perform our protocol. On the other hand, our protocol also could be regarded as a quantum private comparison protocol with a little revision. These features are rare for quantum communication protocols, and make our protocol more robust. Thirdly, entanglements of the BPB-class states are calculated in the Appendix.
A kind of universal quantum secret sharing protocol
Chen, Xiu-Bo; Dou, Zhao; Xu, Gang; He, Xiao-Yu; Yang, Yi-Xian
2017-01-01
Universality is an important feature, but less researched in quantum communication protocols. In this paper, a kind of universal quantum secret sharing protocol is investigated. Firstly, we design a quantum secret sharing protocol based on the Borras-Plastino-Batle (BPB) state. Departing from previous research, our protocol has a salient feature in that participants in our protocol only need projective measurement instead of any unitary operations. It makes our protocol more flexible. Secondly, universality of quantum communication protocols is studied for the first time. More specifically, module division of quantum communication protocols and coupling between different modules are discussed. Our aforementioned protocol is analyzed as an example. On one hand, plenty of quantum states (the BPB-class states and the BPB-like-class states, which are proposed in this paper) could be used as carrier to perform our protocol. On the other hand, our protocol also could be regarded as a quantum private comparison protocol with a little revision. These features are rare for quantum communication protocols, and make our protocol more robust. Thirdly, entanglements of the BPB-class states are calculated in the Appendix. PMID:28079109
DOE Office of Scientific and Technical Information (OSTI.GOV)
Hirano, Kunio; Konagaya, Shuhei; Turner, Alexander
Human pluripotent stem cells (hPSCs) are thought to be a promising cell-source solution for regenerative medicine due to their indefinite proliferative potential and ability to differentiate to functional somatic cells. However, issues remain with regard to achieving reproducible differentiation of cells with the required functionality for realizing human transplantation therapies and with regard to reducing the potential for bacterial or fungal contamination. To meet these needs, we have developed a closed-channel culture device and corresponding control system. Uniformly-sized spheroidal hPSCs aggregates were formed inside wells within a closed-channel and maintained continuously throughout the culture process. Functional islet-like endocrine cell aggregatesmore » were reproducibly induced following a 30-day differentiation protocol. Our system shows an easily scalable, novel method for inducing PSC differentiation with both purity and functionality. - Highlights: • A simple, closed-channel-based, semi-automatic culture system is proposed. • Uniform cell aggregate formation and culture is realized in microwell structure. • Functional islet cells are successfully induced following 30-plus-day protocol. • System requires no daily medium replacement and reduces contamination risk.« less
Pulsatile desynchronizing delayed feedback for closed-loop deep brain stimulation
Lysyansky, Borys; Rosenblum, Michael; Pikovsky, Arkady; Tass, Peter A.
2017-01-01
High-frequency (HF) deep brain stimulation (DBS) is the gold standard for the treatment of medically refractory movement disorders like Parkinson’s disease, essential tremor, and dystonia, with a significant potential for application to other neurological diseases. The standard setup of HF DBS utilizes an open-loop stimulation protocol, where a permanent HF electrical pulse train is administered to the brain target areas irrespectively of the ongoing neuronal dynamics. Recent experimental and clinical studies demonstrate that a closed-loop, adaptive DBS might be superior to the open-loop setup. We here combine the notion of the adaptive high-frequency stimulation approach, that aims at delivering stimulation adapted to the extent of appropriately detected biomarkers, with specifically desynchronizing stimulation protocols. To this end, we extend the delayed feedback stimulation methods, which are intrinsically closed-loop techniques and specifically designed to desynchronize abnormal neuronal synchronization, to pulsatile electrical brain stimulation. We show that permanent pulsatile high-frequency stimulation subjected to an amplitude modulation by linear or nonlinear delayed feedback methods can effectively and robustly desynchronize a STN-GPe network of model neurons and suggest this approach for desynchronizing closed-loop DBS. PMID:28273176
Li, Rebecca H; Wacholtz, Mary C; Barnes, Mark; Boggs, Liam; Callery-D'Amico, Susan; Davis, Amy; Digilova, Alla; Forster, David; Heffernan, Kate; Luthin, Maeve; Lynch, Holly Fernandez; McNair, Lindsay; Miller, Jennifer E; Murphy, Jacquelyn; Van Campen, Luann; Wilenzick, Mark; Wolf, Delia; Woolston, Cris; Aldinger, Carmen; Bierer, Barbara E
2016-04-01
A novel Protocol Ethics Tool Kit ('Ethics Tool Kit') has been developed by a multi-stakeholder group of the Multi-Regional Clinical Trials Center of Brigham and Women's Hospital and Harvard. The purpose of the Ethics Tool Kit is to facilitate effective recognition, consideration and deliberation of critical ethical issues in clinical trial protocols. The Ethics Tool Kit may be used by investigators and sponsors to develop a dedicated Ethics Section within a protocol to improve the consistency and transparency between clinical trial protocols and research ethics committee reviews. It may also streamline ethics review and may facilitate and expedite the review process by anticipating the concerns of ethics committee reviewers. Specific attention was given to issues arising in multinational settings. With the use of this Tool Kit, researchers have the opportunity to address critical research ethics issues proactively, potentially speeding the time and easing the process to final protocol approval. Published by the BMJ Publishing Group Limited. For permission to use (where not already granted under a licence) please go to http://www.bmj.com/company/products-services/rights-and-licensing/
Bridge, Heather; Smolskis, Mary; Bianchine, Peter; Dixon, Dennis O; Kelly, Grace; Herpin, Betsey; Tavel, Jorge
2009-08-01
A clinical research protocol document must reflect both sound scientific rationale as well as local, national and, when applicable, international regulatory and human subject protections requirements. These requirements originate from a variety of sources, undergo frequent revision and are subject to interpretation. Tools to assist clinical investigators in the production of clinical protocols could facilitate navigating these requirements and ultimately increase the efficiency of clinical research. The National Institute of Allergy and Infectious Diseases (NIAID) developed templates for investigators to serve as the foundation for protocol development. These protocol templates are designed as tools to support investigators in developing clinical protocols. NIAID established a series of working groups to determine how to improve its capacity to conduct clinical research more efficiently and effectively. The Protocol Template Working Group was convened to determine what protocol templates currently existed within NIAID and whether standard NIAID protocol templates should be produced. After review and assessment of existing protocol documents and requirements, the group reached consensus about required and optional content, determined the format and identified methods for distribution as well as education of investigators in the use of these templates. The templates were approved by the NIAID Executive Committee in 2006 and posted as part of the NIAID Clinical Research Toolkit [1] website for broad access. These documents require scheduled revisions to stay current with regulatory and policy changes. The structure of any clinical protocol template, whether comprehensive or specific to a particular study phase, setting or design, affects how it is used by investigators. Each structure presents its own set of advantages and disadvantages. While useful, protocol templates are not stand-alone tools for creating an optimal protocol document, but must be complemented by institutional resources and support. Education and guidance of investigators in the appropriate use of templates is necessary to ensure a complete yet concise protocol document. Due to changing regulatory requirements, clinical protocol templates cannot become static, but require frequent revisions.
Finite-size analysis of continuous-variable measurement-device-independent quantum key distribution
NASA Astrophysics Data System (ADS)
Zhang, Xueying; Zhang, Yichen; Zhao, Yijia; Wang, Xiangyu; Yu, Song; Guo, Hong
2017-10-01
We study the impact of the finite-size effect on the continuous-variable measurement-device-independent quantum key distribution (CV-MDI QKD) protocol, mainly considering the finite-size effect on the parameter estimation procedure. The central-limit theorem and maximum likelihood estimation theorem are used to estimate the parameters. We also analyze the relationship between the number of exchanged signals and the optimal modulation variance in the protocol. It is proved that when Charlie's position is close to Bob, the CV-MDI QKD protocol has the farthest transmission distance in the finite-size scenario. Finally, we discuss the impact of finite-size effects related to the practical detection in the CV-MDI QKD protocol. The overall results indicate that the finite-size effect has a great influence on the secret-key rate of the CV-MDI QKD protocol and should not be ignored.
Quantum key distribution with an unknown and untrusted source
NASA Astrophysics Data System (ADS)
Zhao, Yi; Qi, Bing; Lo, Hoi-Kwong
2008-05-01
The security of a standard bidirectional “plug-and-play” quantum key distribution (QKD) system has been an open question for a long time. This is mainly because its source is equivalently controlled by an eavesdropper, which means the source is unknown and untrusted. Qualitative discussion on this subject has been made previously. In this paper, we solve this question directly by presenting the quantitative security analysis on a general class of QKD protocols whose sources are unknown and untrusted. The securities of standard Bennett-Brassard 1984 protocol, weak+vacuum decoy state protocol, and one-decoy state protocol, with unknown and untrusted sources are rigorously proved. We derive rigorous lower bounds to the secure key generation rates of the above three protocols. Our numerical simulation results show that QKD with an untrusted source gives a key generation rate that is close to that with a trusted source.
Development and evaluation of a study design typology for human research.
Carini, Simona; Pollock, Brad H; Lehmann, Harold P; Bakken, Suzanne; Barbour, Edward M; Gabriel, Davera; Hagler, Herbert K; Harper, Caryn R; Mollah, Shamim A; Nahm, Meredith; Nguyen, Hien H; Scheuermann, Richard H; Sim, Ida
2009-11-14
A systematic classification of study designs would be useful for researchers, systematic reviewers, readers, and research administrators, among others. As part of the Human Studies Database Project, we developed the Study Design Typology to standardize the classification of study designs in human research. We then performed a multiple observer masked evaluation of active research protocols in four institutions according to a standardized protocol. Thirty-five protocols were classified by three reviewers each into one of nine high-level study designs for interventional and observational research (e.g., N-of-1, Parallel Group, Case Crossover). Rater classification agreement was moderately high for the 35 protocols (Fleiss' kappa = 0.442) and higher still for the 23 quantitative studies (Fleiss' kappa = 0.463). We conclude that our typology shows initial promise for reliably distinguishing study design types for quantitative human research.
Bridge, Heather; Smolskis, Mary; Bianchine, Peter; Dixon, Dennis O.; Kelly, Grace; Herpin, Betsey; Tavel, Jorge
2009-01-01
Background: A clinical research protocol document must reflect both sound scientific rationale as well as local, national and, when applicable, international regulatory and human subject protections requirements. These requirements originate from a variety of sources, undergo frequent revision and are subject to interpretation. Tools to assist clinical investigators in the production of clinical protocols could facilitate navigating these requirements and ultimately increase the efficiency of clinical research. Purpose: The National Institute of Allergy and Infectious Diseases (NIAID) developed templates for investigators to serve as the foundation for protocol development. These protocol templates are designed as tools to support investigators in developing clinical protocols. Methods: NIAID established a series of working groups to determine how to improve its capacity to conduct clinical research more efficiently and effectively. The Protocol Template Working Group was convened to determine what protocol templates currently existed within NIAID and whether standard NIAID protocol templates should be produced. After review and assessment of existing protocol documents and requirements, the group reached consensus about required and optional content, determined the format and identified methods for distribution as well as education of investigators in the use of these templates. Results: The templates were approved by the NIAID Executive Committee in 2006 and posted as part of the NIAID Clinical Research Toolkit[1]website for broad access. These documents require scheduled revisions to stay current with regulatory and policy changes. Limitations: The structure of any clinical protocol template, whether comprehensive or specific to a particular study phase, setting or design, affects how it is used by investigators. Each structure presents its own set of advantages and disadvantages. While useful, protocol templates are not stand-alone tools for creating an optimal protocol document but must be complemented by institutional resources and support. Education and guidance of investigators in the appropriate use of templates is necessary to ensure a complete yet concise protocol document. Due to changing regulatory requirements, clinical protocol templates cannot become static but require frequent revisions. Conclusions: Standard protocol templates that meet applicable regulations can be important tools to assist investigators in the effective conduct of clinical research, but they require dedicated resources and ongoing input from key stakeholders. PMID:19625326
A protocol for rat in vitro fertilization during conventional laboratory working hours.
Aoto, Toshihiro; Takahashi, Ri-ichi; Ueda, Masatsugu
2011-12-01
In vitro fertilization (IVF) is a valuable technique for the propagation of experimental animals. IVF has typically been used in mice to rapidly expand breeding colonies and create large numbers of embryos. However, applications of IVF in rat breeding experiments have stalled due to the inconvenient laboratory work schedules imposed by current IVF protocols for this species. Here, we developed a new rat IVF protocol that consists of experimental steps performed during common laboratory working hours. Our protocol can be completed within 12 h by shortening the period of sperm capacitation from 5 to 1 h and the fertilization time from 10 to 8 h in human tubal fluid (HTF) medium. This new protocol generated an excellent birth rate and was applicable not only to closed colony rat strains, such as Wistar, Long-Evans, and Sprague-Dawley (SD), but also to the inbred Lewis strain. Moreover, Wistar and Long-Evans embryos prepared by this protocol were successfully frozen by vitrification and later successfully thawed and resuscitated. This protocol is practical and can be easily adopted by laboratory workers.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Tezak, J.; Miller, J.A.; Lawrence, A.W.
1995-12-01
It is estimated that there are over 260,000 natural gas production wells in the continental United States. Production or reserve pits exist which ma require remediation depending on several conditions such as: the manner in which they were initially closed; whether or not they were lined; and the local climate, soil type, and depth to groundwater. As part of the Gas Research Institute (GRI) research program on exploration and production (E&P) site remediation, a treatability Protocol is being developed to facilitate the rapid assessment of the amenability of the contaminated soils to remediation by biological processes. This paper describes themore » treatability protocol and the results of a series of treatability tests on a spectrum of hydrocarbon contaminated E&P soils collected from various operating locations throughout the United States. The soils are subjected to physical and chemical characterization prior to treatability testing. Potential biotoxic characteristics of the soils are determined by a respirometry screening technique. Presuming that the soils are not toxic to aerobic soil microorganisms, 20 percent by weight aqueous slurries of the soils are prepared and subjected to continuous batch aeration for a six week period. Conditions favorable to microbial growth are maintained in the reactors by monitoring and augmentation is needed of pH, microbial nutrients and oxygen for microbial respiration. The extent of microbial degradation of the contaminant hydrocarbons is monitored by periodic measurement of total petroleum hydrocarbons (TPH), oil and grease, and individual hydrocarbon compounds as determined by gas chromatography. Microbial plate counts are prepared to document the biological viability of the treatment process. The factors influencing the amenability of these soils to bioremediation as determined from the test results are discussed.« less
Satellite Communications Using Commercial Protocols
NASA Technical Reports Server (NTRS)
Ivancic, William D.; Griner, James H.; Dimond, Robert; Frantz, Brian D.; Kachmar, Brian; Shell, Dan
2000-01-01
NASA Glenn Research Center has been working with industry, academia, and other government agencies in assessing commercial communications protocols for satellite and space-based applications. In addition, NASA Glenn has been developing and advocating new satellite-friendly modifications to existing communications protocol standards. This paper summarizes recent research into the applicability of various commercial standard protocols for use over satellite and space- based communications networks as well as expectations for future protocol development. It serves as a reference point from which the detailed work can be readily accessed. Areas that will be addressed include asynchronous-transfer-mode quality of service; completed and ongoing work of the Internet Engineering Task Force; data-link-layer protocol development for unidirectional link routing; and protocols for aeronautical applications, including mobile Internet protocol routing for wireless/mobile hosts and the aeronautical telecommunications network protocol.
Neaton, James D; Grund, Birgit; Wentworth, Deborah
2018-03-01
Data monitoring committees for randomized clinical trials have the responsibility of safeguarding interests of trial participants. To do so, the data monitoring committee must receive reports on safety and efficacy to assess risk/benefit and on trial conduct to ensure that the study can achieve its goals. This article outlines the key components of reports to the data monitoring committee and the important role of the unblinded statistician in preparing those reports. Most data monitoring committee meetings include open and closed sessions. For each session, there is a report of interim results. The open session is attended by the sponsor and lead investigators, including the statistician(s) responsible for the trial design. These investigators are blinded to the interim treatment comparisons. The closed session is attended by the data monitoring committee members and by the statistician(s) who prepared the closed report. These individuals are unblinded to interim treatment comparisons and therefore are not involved in study design changes. The optimal content of data monitoring committee reports and qualifications of the unblinded statistician(s) are discussed. Open reports should include responses to data monitoring committee recommendations, a synopsis of the protocol, a review of the protocol history and amendments, and information on enrollment, baseline characteristics, completeness of follow-up, and data quality. The open report is also a vehicle through which the sponsor and investigators should inform the data monitoring committee of relevant external information. Data in the open report are pooled over the treatment groups. The open report should not include data summaries by treatment group. The closed report should include a written summary with references to key tables and figures and methods used to prepare them. Tables and figures should summarize baseline characteristics, follow-up completeness, treatment adherence, and major safety and efficacy outcomes by treatment group. Text summaries should accompany the tables and figures. The data monitoring committee monitoring history (e.g. treatment differences at previous meetings) should be summarized. The unblinded statistician preparing the closed report should be familiar with the protocol and data collection plan and be capable of customizing the report to the current stage of the trial. This includes anticipating questions that may arise during the data monitoring committee review and pro-actively including data summaries to address these questions. There is considerable variation in the quality of open and closed data monitoring committee reports. Open and closed data monitoring committee reports should be concise, up to date, and informative. To achieve this, unblinded statisticians responsible for preparing closed data monitoring committee reports should be familiar with the statistical methods, the trial protocol, and the data collection plan. They should be capable of anticipating questions from the data monitoring committee and responding to requests for additional analyses.
NASA Astrophysics Data System (ADS)
Black, Christopher; Voigts, Jakob; Agrawal, Uday; Ladow, Max; Santoyo, Juan; Moore, Christopher; Jones, Stephanie
2017-06-01
Objective. Electroencephalography (EEG) offers a unique opportunity to study human neural activity non-invasively with millisecond resolution using minimal equipment in or outside of a lab setting. EEG can be combined with a number of techniques for closed-loop experiments, where external devices are driven by specific neural signals. However, reliable, commercially available EEG systems are expensive, often making them impractical for individual use and research development. Moreover, by design, a majority of these systems cannot be easily altered to the specification needed by the end user. We focused on mitigating these issues by implementing open-source tools to develop a new EEG platform to drive down research costs and promote collaboration and innovation. Approach. Here, we present methods to expand the open-source electrophysiology system, Open Ephys (www.openephys.org), to include human EEG recordings. We describe the equipment and protocol necessary to interface various EEG caps with the Open Ephys acquisition board, and detail methods for processing data. We present applications of Open Ephys + EEG as a research tool and discuss how this innovative EEG technology lays a framework for improved closed-loop paradigms and novel brain-computer interface experiments. Main results. The Open Ephys + EEG system can record reliable human EEG data, as well as human EMG data. A side-by-side comparison of eyes closed 8-14 Hz activity between the Open Ephys + EEG system and the Brainvision ActiCHamp EEG system showed similar average power and signal to noise. Significance. Open Ephys + EEG enables users to acquire high-quality human EEG data comparable to that of commercially available systems, while maintaining the price point and extensibility inherent to open-source systems.
Black, Christopher; Voigts, Jakob; Agrawal, Uday; Ladow, Max; Santoyo, Juan; Moore, Christopher; Jones, Stephanie
2017-06-01
Electroencephalography (EEG) offers a unique opportunity to study human neural activity non-invasively with millisecond resolution using minimal equipment in or outside of a lab setting. EEG can be combined with a number of techniques for closed-loop experiments, where external devices are driven by specific neural signals. However, reliable, commercially available EEG systems are expensive, often making them impractical for individual use and research development. Moreover, by design, a majority of these systems cannot be easily altered to the specification needed by the end user. We focused on mitigating these issues by implementing open-source tools to develop a new EEG platform to drive down research costs and promote collaboration and innovation. Here, we present methods to expand the open-source electrophysiology system, Open Ephys (www.openephys.org), to include human EEG recordings. We describe the equipment and protocol necessary to interface various EEG caps with the Open Ephys acquisition board, and detail methods for processing data. We present applications of Open Ephys + EEG as a research tool and discuss how this innovative EEG technology lays a framework for improved closed-loop paradigms and novel brain-computer interface experiments. The Open Ephys + EEG system can record reliable human EEG data, as well as human EMG data. A side-by-side comparison of eyes closed 8-14 Hz activity between the Open Ephys + EEG system and the Brainvision ActiCHamp EEG system showed similar average power and signal to noise. Open Ephys + EEG enables users to acquire high-quality human EEG data comparable to that of commercially available systems, while maintaining the price point and extensibility inherent to open-source systems.
ERIC Educational Resources Information Center
Smith, Phillip; Poindexter, Erin; Cukrowicz, Kelly
2010-01-01
The effect of engaging in an intensive research protocol that inquired extensively about psychiatric and suicide symptoms and exposed participants to a number of images, including suicide-related content was explored. Individuals experiencing a major depressive episode were called at 1 and 3 months after the initial protocol. Participants were…
Rinehart, Joseph; Chung, Elena; Canales, Cecilia; Cannesson, Maxime
2012-10-01
The authors compared the performance of a group of anesthesia providers to closed-loop (Learning Intravenous Resuscitator [LIR]) management in a simulated hemorrhage scenario using cardiac output monitoring. A prospective cohort study. In silico simulation. University hospital anesthesiologists and the LIR closed-loop fluid administration system. Using a patient simulator, a 90-minute simulated hemorrhage protocol was run, which included a 1,200-mL blood loss over 30 minutes. Twenty practicing anesthesiology providers were asked to manage this scenario by providing fluids and vasopressor medication at their discretion. The simulation program was also run 20 times with the LIR closed-loop algorithm managing fluids and an additional 20 times with no intervention. Simulated patient weight, height, heart rate, mean arterial pressure, and cardiac output (CO) were similar at baseline. The mean stroke volume, the mean arterial pressure, CO, and the final CO were higher in the closed-loop group than in the practitioners group, and the coefficient of variance was lower. The closed-loop group received slightly more fluid (2.1 v 1.9 L, p < 0.05) than the anesthesiologist group. Despite the roughly similar volumes of fluid given, the closed-loop maintained more stable hemodynamics than the practitioners primarily because the fluid was given earlier in the protocol and CO optimized before the hemorrhage began, whereas practitioners tended to resuscitate well but only after significant hemodynamic change indicated the need. Overall, these data support the potential usefulness of this closed-loop algorithm in clinical settings in which dynamic predictors are not available or applicable. Published by Elsevier Inc.
Sacarlal, Jahit; Muchanga, Vasco; Mabutana, Carlos; Mabui, Matilde; Mariamo, Arlete; Cuamba, Assa Júlio; Fumo, Leida Artur; Silveira, Jacinta; Heitman, Elizabeth; Moon, Troy D
2018-05-23
Mozambique has seen remarkable growth in biomedical research over the last decade. To meet a growing need, the National Committee for Bioethics in Health of Mozambique (CNBS) encouraged the development of ethical review processes at institutions that regularly conduct medical and social science research. In 2012, the Faculty of Medicine (FM) of University Eduardo Mondlane (UEM) and the Maputo Central Hospital (MCH) established a joint Institutional Committee on Bioethics for Health (CIBS FM & MCH). This study examines the experience of the first 4 years of the CIBS FM & MCH. This study provides a descriptive, retrospective analysis of research protocols submitted to and approved by the CIBS FM & MCH between March 1, 2013 and December 31, 2016, together with an analysis of the Committee's respective reviews and actions. A total of 356 protocols were submitted for review during the period under analysis, with 309 protocols approved. Sixty-four percent were submitted by students, faculty, and researchers from UEM, mainly related to Master's degree research (42%). Descriptive cross-sectional studies were the most frequently reviewed research (61%). The majority were prospective (71%) and used quantitative methodologies (51%). The Departments of Internal Medicine at MCH and Community Health at the FM submitted the most protocols from their respective institutions, with 38 and 53% respectively. The CIBS's average time to final approval for all protocols was 56 days, rising to 161 for the 40 protocols that required subsequent national-level review by the CNBS. Our results show that over its first 4 years, the CIBS FM & MCH has been successful in managing a constant demand for protocol review and that several broad quality improvement initiatives, such as investigator mentoring and an electronic protocol submission platform have improved efficiency in the review process and the overall quality of the protocols submitted. Beyond Maputo, long-term investments in training and ethical capacity building for CIBS across the country continue to be needed, as Mozambique develops greater capacity for research and makes progress toward improving the health of all its citizens.
Colon cleansing protocol in children: research conditions vs. clinical practice.
Elitsur, Yoram; Balfaqih, Yaslam; Preston, Deborah
2018-04-01
Colon preparation rates are the limiting factor for a successful diagnostic colonoscopy in children. Different colon cleansing protocols have been published for use in children. Unfortunately, the applicability of those published research protocols has not been formally evaluated in routine clinical practice. We investigated the success rate of our previously published colon cleansing protocol as utilized in our clinical practice. This was a retrospective study. In the clinical practice, the colon cleansing protocol included PEG-3350 at a dose of 2 g/kg/day plus Dulcolax (Bisacodyl, Boehringer Ingelheim, TX USA) 5 mg/day for 2 days. Adequate colon preparation was graded between 1 - 5, as previously described, and grade ≥ 4.0 was considered an adequate preparation. Patients were instructed to complete a questionnaire that included PEG-3350 dose, number of stools per day, consistency of each stool, and side effects (vomiting, abdominal pain). Clinical and endoscopic results were compared between the protocol under research conditions and routine practice. The success rate of the colon preparation in our clinical practice was similar to the results observed under our research protocol (75 % vs. 73.6 %). Moreover, the total number of stools, stool consistency, and the intubation rate of the terminal ileum were also similar. We concluded, that in our experience, the colon cleansing protocol used under research conditions was effective and appropriate for use in routine clinical practice. We recommend testing each new protocol under the routine conditions of clinical practice to confirm its applicability for general practitioners.
An Ultra-low-power Medium Access Control Protocol for Body Sensor Network.
Li, Huaming; Tan, Jindong
2005-01-01
In this paper, a medium access control (MAC) protocol designed for Body Sensor Network (BSN-MAC) is proposed. BSN-MAC is an adaptive, feedback-based and IEEE 802.15.4-compatible MAC protocol. Due to the traffic coupling and sensor diversity characteristics of BSNs, common MAC protocols can not satisfy the unique requirements of the biomedical sensors in BSN. BSN-MAC exploits the feedback information from the deployed sensors to form a closed-loop control of the MAC parameters. A control algorithm is proposed to enable the BSN coordinator to adjust parameters of the IEEE 802.15.4 superframe to achieve both energy efficiency and low latency on energy critical nodes. We evaluate the performance of BSN-MAC using energy efficiency as the primary metric.
Riebeling, Christian; Pirow, Ralph; Becker, Klaus; Buesen, Roland; Eikel, Daniel; Kaltenhäuser, Johanna; Meyer, Frauke; Nau, Heinz; Slawik, Birgitta; Visan, Anke; Volland, Jutta; Spielmann, Horst; Luch, Andreas; Seiler, Andrea
2011-01-01
Teratogenicity can be predicted in vitro using the embryonic stem cell test (EST). The EST, which is based on the morphometric measurement of cardiomyocyte differentiation and cytotoxicity parameters, represents a scientifically validated method for the detection and classification of chemicals according to their teratogenic potency. Furthermore, an abbreviated protocol applying flow cytometry of intracellular marker proteins to determine differentiation into the cardiomyocyte lineage is available. Although valproic acid (VPA) is in worldwide clinical use as antiepileptic drug, it exhibits two severe side effects, i.e., teratogenicity and hepatotoxicity. These limitations have led to extensive research into derivatives of VPA. Here we chose VPA as model compound to test the applicability domain and to further evaluate the reliability of the EST. To this end, we study six closely related congeners of VPA and demonstrate that both the standard and the molecular flow cytometry-based EST are well suited to indicate differences in the teratogenic potency among VPA analogs that differ only in chirality or side chain length. Our data show that identical results can be obtained by using the standard EST or a shortened protocol based on flow cytometry of intracellular marker proteins. Both in vitro protocols enable to reliably determine differentiation of murine stem cells toward the cardiomyocyte lineage and to assess its chemical-mediated inhibition. PMID:21227905
Periodically Relieving Ischial Sitting Load to Decrease the Risk of Pressure Ulcers
Makhsous, Mohsen; Rowles, Diane M.; Rymer, William Z.; Bankard, James; Nam, Ellis K.; Chen, David; Lin, Fang
2010-01-01
Objective To investigate the relieving effect on interface pressure of an alternate sitting protocol involving a sitting posture that reduces ischial support. Design Repeated measures in 2 protocols on 3 groups of subjects. Setting Laboratory. Participants Twenty able-bodied persons, 20 persons with paraplegia, and 20 persons with tetraplegia. Interventions Two 1-hour protocols were used: alternate and normal plus pushup. In the alternate protocol, sitting posture was alternated every 10 minutes between normal (sitting upright with ischial support) and with partially removed ischial support (WO-BPS) postures; in the normal plus pushup protocol, sitting was in normal posture with pushups (lifting the subject off the seat) performed every 20 minutes. Main Outcome Measure Interface pressure on seat and backrest. Results In WO-BPS posture, the concentrated interface pressure observed around the ischia in normal posture was significantly repositioned to the thighs. By cyclically repositioning the interface pressure, the alternate protocol was superior to the normal plus pushup protocol in terms of a significantly lower average interface pressure over the buttocks. Conclusions A sitting protocol periodically reducing the ischial support helps lower the sitting load on the buttocks, especially the area close to ischial tuberosities. PMID:17601466
A Survey on the Taxonomy of Cluster-Based Routing Protocols for Homogeneous Wireless Sensor Networks
Naeimi, Soroush; Ghafghazi, Hamidreza; Chow, Chee-Onn; Ishii, Hiroshi
2012-01-01
The past few years have witnessed increased interest among researchers in cluster-based protocols for homogeneous networks because of their better scalability and higher energy efficiency than other routing protocols. Given the limited capabilities of sensor nodes in terms of energy resources, processing and communication range, the cluster-based protocols should be compatible with these constraints in either the setup state or steady data transmission state. With focus on these constraints, we classify routing protocols according to their objectives and methods towards addressing the shortcomings of clustering process on each stage of cluster head selection, cluster formation, data aggregation and data communication. We summarize the techniques and methods used in these categories, while the weakness and strength of each protocol is pointed out in details. Furthermore, taxonomy of the protocols in each phase is given to provide a deeper understanding of current clustering approaches. Ultimately based on the existing research, a summary of the issues and solutions of the attributes and characteristics of clustering approaches and some open research areas in cluster-based routing protocols that can be further pursued are provided. PMID:22969350
Naeimi, Soroush; Ghafghazi, Hamidreza; Chow, Chee-Onn; Ishii, Hiroshi
2012-01-01
The past few years have witnessed increased interest among researchers in cluster-based protocols for homogeneous networks because of their better scalability and higher energy efficiency than other routing protocols. Given the limited capabilities of sensor nodes in terms of energy resources, processing and communication range, the cluster-based protocols should be compatible with these constraints in either the setup state or steady data transmission state. With focus on these constraints, we classify routing protocols according to their objectives and methods towards addressing the shortcomings of clustering process on each stage of cluster head selection, cluster formation, data aggregation and data communication. We summarize the techniques and methods used in these categories, while the weakness and strength of each protocol is pointed out in details. Furthermore, taxonomy of the protocols in each phase is given to provide a deeper understanding of current clustering approaches. Ultimately based on the existing research, a summary of the issues and solutions of the attributes and characteristics of clustering approaches and some open research areas in cluster-based routing protocols that can be further pursued are provided.
NASA Astrophysics Data System (ADS)
Angel, Erin
Advances in Computed Tomography (CT) technology have led to an increase in the modality's diagnostic capabilities and therefore its utilization, which has in turn led to an increase in radiation exposure to the patient population. As a result, CT imaging currently constitutes approximately half of the collective exposure to ionizing radiation from medical procedures. In order to understand the radiation risk, it is necessary to estimate the radiation doses absorbed by patients undergoing CT imaging. The most widely accepted risk models are based on radiosensitive organ dose as opposed to whole body dose. In this research, radiosensitive organ dose was estimated using Monte Carlo based simulations incorporating detailed multidetector CT (MDCT) scanner models, specific scan protocols, and using patient models based on accurate patient anatomy and representing a range of patient sizes. Organ dose estimates were estimated for clinical MDCT exam protocols which pose a specific concern for radiosensitive organs or regions. These dose estimates include estimation of fetal dose for pregnant patients undergoing abdomen pelvis CT exams or undergoing exams to diagnose pulmonary embolism and venous thromboembolism. Breast and lung dose were estimated for patients undergoing coronary CTA imaging, conventional fixed tube current chest CT, and conventional tube current modulated (TCM) chest CT exams. The correlation of organ dose with patient size was quantified for pregnant patients undergoing abdomen/pelvis exams and for all breast and lung dose estimates presented. Novel dose reduction techniques were developed that incorporate organ location and are specifically designed to reduce close to radiosensitive organs during CT acquisition. A generalizable model was created for simulating conventional and novel attenuation-based TCM algorithms which can be used in simulations estimating organ dose for any patient model. The generalizable model is a significant contribution of this work as it lays the foundation for the future of simulating TCM using Monte Carlo methods. As a result of this research organ dose can be estimated for individual patients undergoing specific conventional MDCT exams. This research also brings understanding to conventional and novel close reduction techniques in CT and their effect on organ dose.
Estimating the efficacy of medical abortion.
Trussell, J; Ellertson, C
1999-09-01
Comparisons of the efficacy of different regimens of medical abortion are difficult because of the widely varying protocols (even for testing identical regimens), divergent definitions of success and failure, and lack of a standard method of analysis. In this article we review the current efficacy literature on medical abortion, highlighting some of the most important differences in the way that efficacy has been analyzed. We then propose a standard conceptual approach and the accompanying statistical methods for analyzing clinical trials of medical abortion and to explain how clinical investigators can implement this approach. Our review reveals that research on the efficacy of medical abortion has closely followed the conceptual model used for analysis of surgical abortion. The problem, however, is that, whereas surgical abortion is a discrete event occurring in the space of a few minutes or less, medical abortion is a process typically lasting from several days to several weeks. In this process, two events may occur that are not possible with surgical abortion. First, the woman can opt out of the process before a fair determination of efficacy can be made. Second, the process of medical abortion allows time for surgical interventions that may be convenient for the clinician but not strictly necessary from a medical perspective. Another difference from surgical abortions is that, for medical abortions, different medical abortion protocols specify different waiting periods, giving the drugs less time to work in some studies than in others before a determination of efficacy is made. We argue that, when analyzing efficacy of medical abortion, researchers should abandon their close reliance on the analogy to surgical abortion. In fact, medical abortion is more appropriately analyzed by life table procedures developed for the study of another fertility regulation technology; contraception. As with medical abortion, a woman initiating use of a contraceptive method can change her mind after some period of exposure and opt out. Also, as with medical abortion, a contraceptive can fail, usually with the risk of failure depending heavily on whether or not the woman follows the protocol for that method precisely. Finally, as with medical abortion, medical conditions may arise that necessitate discontinuing use of the contraceptive method. In both cases, these medical conditions are sometimes open to interpretation or subject to the skill, judgment, or experience of the clinician involved. The appropriate information to collect for a multiple decrement life table analysis of medical abortion includes data on compliance with the protocol, timing of the event of interest (abortion) when it is observable, and, because we argue that these should be regarded as events of interest, a typology of any surgical interventions that are conducted during the woman's participation in the study.
Using semantics for representing experimental protocols.
Giraldo, Olga; García, Alexander; López, Federico; Corcho, Oscar
2017-11-13
An experimental protocol is a sequence of tasks and operations executed to perform experimental research in biological and biomedical areas, e.g. biology, genetics, immunology, neurosciences, virology. Protocols often include references to equipment, reagents, descriptions of critical steps, troubleshooting and tips, as well as any other information that researchers deem important for facilitating the reusability of the protocol. Although experimental protocols are central to reproducibility, the descriptions are often cursory. There is the need for a unified framework with respect to the syntactic structure and the semantics for representing experimental protocols. In this paper we present "SMART Protocols ontology", an ontology for representing experimental protocols. Our ontology represents the protocol as a workflow with domain specific knowledge embedded within a document. We also present the S ample I nstrument R eagent O bjective (SIRO) model, which represents the minimal common information shared across experimental protocols. SIRO was conceived in the same realm as the Patient Intervention Comparison Outcome (PICO) model that supports search, retrieval and classification purposes in evidence based medicine. We evaluate our approach against a set of competency questions modeled as SPARQL queries and processed against a set of published and unpublished protocols modeled with the SP Ontology and the SIRO model. Our approach makes it possible to answer queries such as Which protocols use tumor tissue as a sample. Improving reporting structures for experimental protocols requires collective efforts from authors, peer reviewers, editors and funding bodies. The SP Ontology is a contribution towards this goal. We build upon previous experiences and bringing together the view of researchers managing protocols in their laboratory work. Website: https://smartprotocols.github.io/ .
Honest broker protocol streamlines research access to data while safeguarding patient privacy.
Silvey, Scott A; Silvey, Scott Andrew; Schulte, Janet; Smaltz, Detlev H; Smaltz, Detlev Herb; Kamal, Jyoti
2008-11-06
At Ohio State University Medical Center, The Honest Broker Protocol provides a streamlined mechanism whereby investigators can obtain de-identified clinical data for non-FDA research without having to invest the significant time and effort necessary to craft a formalized protocol for IRB approval.
Preliminary results of dancing exercise on postural stability in adolescent females.
Cheng, Hsu-Sheng; Law, Cheung-Lun; Pan, Hui-Fang; Hsiao, Yueh-Ping; Hu, Jeng-Ho; Chuang, Fu-Kai; Huang, Mao-Hsiung
2011-12-01
Twenty-six female student dancers of Chung-hua school of Art (mean age 17.5 ± 0.5 years) and twenty-five healthy active female collegiate students (mean age 18.1 ± 1.0 years) participated in this study to investigate the effects of dancing exercise on postural stability of adolescent female through a comparison study of two cohorts. The groups were matched in height and weight. Participants were excluded for left-side dominance, sustained lower extremity injury, any known vestibular system dysfunction, uncorrected visual problems, and other neurological conditions. Static and dynamic standing balances were measured by means of Biodex Stability System in six conditions include bilateral, dominant, and nondominant single leg stances with eye-open and eye-closed conditions. To investigate the difference between static and dynamic stabilities, two protocols were performed: the first protocol consisted of four positions including static position, Level 8, Level 4, and Level 1, respectively. They were instructed to maintain a level platform as stably as possible for a period of 30 seconds for each test and given a 30-second rest between tests. The second protocol was descending stability level that was gradually changed from Level 12 to Level 1 for 60 seconds. Balance indices included overall stability index, anterior-posterior stability index (APSI), and medial-lateral stability index. The results of first protocol showed that there were significant differences in overall stability index score between study and control groups at Level 8 with dominant single leg standing in the eye-open condition and the APSI score at Level 8 and at Level 4 with dominant single-leg standing in the eye-closed condition. There was no significant difference in the second protocol. The possible explanation is loss of familiarization adaptation because of level change consequently in both the groups, not step-by-step as in the first protocol study. Furthermore, a positive correlation was found between the dancing experience and the APSI at Level 8 and Level 4 with dominant single-leg standing in the eye-closed condition. In conclusion the findings implied that dancing exercise results in better postural stability and less visual dependence on postural control in adolescent females. Copyright © 2011. Published by Elsevier B.V.
How to write a surgical clinical research protocol: literature review and practical guide.
Rosenthal, Rachel; Schäfer, Juliane; Briel, Matthias; Bucher, Heiner C; Oertli, Daniel; Dell-Kuster, Salome
2014-02-01
The study protocol is the core document of every clinical research project. Clinical research in studies involving surgical interventions presents some specific challenges, which need to be accounted for and described in the study protocol. The aim of this review is to provide a practical guide for developing a clinical study protocol for surgical interventions with a focus on methodologic issues. On the basis of an in-depth literature search of methodologic literature and on some cardinal published surgical trials and observational studies, the authors provides a 10-step guide for developing a clinical study protocol in surgery. This practical guide outlines key methodologic issues important when planning an ethically and scientifically sound research project involving surgical interventions, with the ultimate goal of providing high-level evidence relevant for health care decision making in surgery. Copyright © 2014 Elsevier Inc. All rights reserved.
Alirol, Emilie; Kuesel, Annette C; Guraiib, Maria Magdalena; de la Fuente-Núñez, Vânia; Saxena, Abha; Gomes, Melba F
2017-06-26
Between 2013 and 2016, West Africa experienced the largest ever outbreak of Ebola Virus Disease. In the absence of registered treatments or vaccines to control this lethal disease, the World Health Organization coordinated and supported research to expedite identification of interventions that could control the outbreak and improve future control efforts. Consequently, the World Health Organization Research Ethics Review Committee (WHO-ERC) was heavily involved in reviews and ethics discussions. It reviewed 24 new and 22 amended protocols for research studies including interventional (drug, vaccine) and observational studies. WHO-ERC provided the reviews within on average 6 working days. The WHO-ERC often could not provide immediate approval of protocols for reasons which were not Ebola Virus Disease specific but related to protocol inconsistencies, missing information and complex informed consents. WHO-ERC considerations on Ebola Virus Disease specific issues (benefit-risk assessment, study design, exclusion of pregnant women and children from interventional studies, data and sample sharing, collaborative partnerships including international and local researchers and communities, community engagement and participant information) are presented. To accelerate study approval in future public health emergencies, we recommend: (1) internally consistent and complete submissions with information documents in language participants are likely to understand, (2) close collaboration between local and international researchers from research inception, (3) generation of template agreements for data and sample sharing and use during the ongoing global consultations on bio-banks, (4) formation of Joint Scientific Advisory and Data Safety Review Committees for all studies linked to a particular intervention or group of interventions, (5) formation of a Joint Ethics Review Committee with representatives of the Ethics Committees of all institutions and countries involved to strengthen reviews through the different perspectives provided without the 'opportunity costs' for time to final approval of multiple, independent reviews, (6) direct information exchange between the chairs of advisory, safety review and ethics committees, (7) more Ethics Committee support for investigators than is standard and (8) a global consultation on criteria for inclusion of pregnant women and children in interventional studies for conditions which put them at particularly high risk of mortality or other irreversible adverse outcomes under standard-of-care.
Wastewater GHG Accounting Protocols as Compared to the State of GHG Science.
Willis, John L; Yuan, Zhiguo; Murthy, Sudhir
2016-08-01
Greenhouse gas (GHG) accounting protocols have addressed emissions from wastewater conveyance and treatment using a variety of simplifying methodologies. While these methodologies vary to some degree by protocol, within each protocol they provide consistent tools for organizational entities of varying size and scope to report and verify GHG emissions. Much of the science supporting these methodologies is either limited or the protocols have failed to keep abreast of developing GHG research. This state-of-the-art review summarizes the sources of direct GHG emissions (both those covered and not covered in current protocols) from wastewater handling; provides a review of the wastewater-related methodologies in a select group of popular protocols; and discusses where research has out-paced protocol methodologies and other areas where the supporting science is relatively weak and warrants further exploration.
48 CFR 1352.235-73 - Research involving human subjects-after initial contract award.
Code of Federal Regulations, 2012 CFR
2012-10-01
... the United States Department of Health and Human Services' Office for Human Research Protections... documentation may include: (1) Copies of the human subjects research protocol, advertisements, recruitment... human subjects research protocol, advertisements, recruitment material, and informed consent forms by...
Land-mobile satellite communication system
NASA Technical Reports Server (NTRS)
Yan, Tsun-Yee (Inventor); Rafferty, William (Inventor); Dessouky, Khaled I. (Inventor); Wang, Charles C. (Inventor); Cheng, Unjeng (Inventor)
1993-01-01
A satellite communications system includes an orbiting communications satellite for relaying communications to and from a plurality of ground stations, and a network management center for making connections via the satellite between the ground stations in response to connection requests received via the satellite from the ground stations, the network management center being configured to provide both open-end service and closed-end service. The network management center of one embodiment is configured to provides both types of service according to a predefined channel access protocol that enables the ground stations to request the type of service desired. The channel access protocol may be configured to adaptively allocate channels to open-end service and closed-end service according to changes in the traffic pattern and include a free-access tree algorithm that coordinates collision resolution among the ground stations.
[Phenylephrine dosing error in Intensive Care Unit. Case of the trimester].
2013-01-01
A real clinical case reported to SENSAR is presented. A patient admitted to the surgical intensive care unit following a lung resection, suffered arterial hypotension. The nurse was asked to give the patient 1 mL of phenylephrine. A few seconds afterwards, the patient experienced a hypertensive crisis, which resolved spontaneously without damage. Thereafter, the nurse was interviewed and a dosing error was identified: she had mistakenly given the patient 1 mg of phenylephrine (1 mL) instead of 100 mcg (1 mL of the standard dilution, 1mg in 10 mL). The incident analysis revealed latent factors (event triggers) due to the lack of protocols and standard operating procedures, communication errors among team members (physician-nurse), suboptimal training, and underdeveloped safety culture. In order to preempt similar incidents in the future, the following actions were implemented in the surgical intensive care unit: a protocol for bolus and short lived infusions (<30 min) was developed and to close the communication gap through the adoption of communication techniques. The protocol was designed by physicians and nurses to standardize the administration of drugs with high potential for errors. To close the communication gap, repeated checks about saying and understanding was proposed ("closed loop"). Labeling syringes with the drug dilution was also recommended. Copyright © 2013 Sociedad Española de Anestesiología, Reanimación y Terapéutica del Dolor. Published by Elsevier España. All rights reserved.
48 CFR 1352.235-70 - Protection of human subjects.
Code of Federal Regulations, 2012 CFR
2012-10-01
... investigation, including research development, testing and evaluation, designed to develop or contribute to... subjects research protocol, all questionnaires, surveys, advertisements, and informed consent forms... addition, if the contractor modifies a human subjects research protocol, questionnaire, survey...
48 CFR 1352.235-71 - Protection of human subjects-exemption.
Code of Federal Regulations, 2014 CFR
2014-10-01
... a systematic investigation, including research development, testing and evaluation, designed to...; (2) Documentation of approval for the human subjects research protocol, questionnaires, surveys... contractor modifies a human subjects research protocol, questionnaire, survey, advertisement, or informed...
48 CFR 1352.235-70 - Protection of human subjects.
Code of Federal Regulations, 2011 CFR
2011-10-01
... investigation, including research development, testing and evaluation, designed to develop or contribute to... subjects research protocol, all questionnaires, surveys, advertisements, and informed consent forms... addition, if the contractor modifies a human subjects research protocol, questionnaire, survey...
48 CFR 1352.235-71 - Protection of human subjects-exemption.
Code of Federal Regulations, 2010 CFR
2010-10-01
... a systematic investigation, including research development, testing and evaluation, designed to...; (2) Documentation of approval for the human subjects research protocol, questionnaires, surveys... contractor modifies a human subjects research protocol, questionnaire, survey, advertisement, or informed...
48 CFR 1352.235-70 - Protection of human subjects.
Code of Federal Regulations, 2013 CFR
2013-10-01
... investigation, including research development, testing and evaluation, designed to develop or contribute to... subjects research protocol, all questionnaires, surveys, advertisements, and informed consent forms... addition, if the contractor modifies a human subjects research protocol, questionnaire, survey...
48 CFR 1352.235-71 - Protection of human subjects-exemption.
Code of Federal Regulations, 2013 CFR
2013-10-01
... a systematic investigation, including research development, testing and evaluation, designed to...; (2) Documentation of approval for the human subjects research protocol, questionnaires, surveys... contractor modifies a human subjects research protocol, questionnaire, survey, advertisement, or informed...
48 CFR 1352.235-71 - Protection of human subjects-exemption.
Code of Federal Regulations, 2011 CFR
2011-10-01
... a systematic investigation, including research development, testing and evaluation, designed to...; (2) Documentation of approval for the human subjects research protocol, questionnaires, surveys... contractor modifies a human subjects research protocol, questionnaire, survey, advertisement, or informed...
48 CFR 1352.235-71 - Protection of human subjects-exemption.
Code of Federal Regulations, 2012 CFR
2012-10-01
... a systematic investigation, including research development, testing and evaluation, designed to...; (2) Documentation of approval for the human subjects research protocol, questionnaires, surveys... contractor modifies a human subjects research protocol, questionnaire, survey, advertisement, or informed...
48 CFR 1352.235-70 - Protection of human subjects.
Code of Federal Regulations, 2014 CFR
2014-10-01
... investigation, including research development, testing and evaluation, designed to develop or contribute to... subjects research protocol, all questionnaires, surveys, advertisements, and informed consent forms... addition, if the contractor modifies a human subjects research protocol, questionnaire, survey...
Life and Microgravity Sciences Spacelab Mission: Human Research Pilot Study
NASA Technical Reports Server (NTRS)
Arnaud, Sara B. (Editor); Walker, Karen R. (Editor); Hargens, Alan (Editor)
1996-01-01
The Life Sciences, Microgravity Science and Spacelab Mission contains a number of human experiments directed toward identifying the functional, metabolic and neurological characteristics of muscle weakness and atrophy during space flight. To ensure the successful completion of the flight experiments, a ground-based pilot study, designed to mimic the flight protocols as closely as possible, was carried out in the head-down tilt bed rest model. This report records the rationales, procedures, preliminary results and estimated value of the pilot study, the first of its kind, for 12 of the 13 planned experiments in human research. The bed rest study was conducted in the Human Research Facility at Ames Research Center from July 11 - August 28, 1995. Eight healthy male volunteers performed the experiments before, during and after 17 days bed rest. The immediate purposes of this simulation were to integrate the experiments, provide data in a large enough sample for publication of results, enable investigators to review individual experiments in the framework of a multi-disciplinary study and relay the experience of the pilot study to the mission specialists prior to launch.
Enabling comparative modeling of closely related genomes: Example genus Brucella
Faria, José P.; Edirisinghe, Janaka N.; Davis, James J.; ...
2014-03-08
For many scientific applications, it is highly desirable to be able to compare metabolic models of closely related genomes. In this study, we attempt to raise awareness to the fact that taking annotated genomes from public repositories and using them for metabolic model reconstructions is far from being trivial due to annotation inconsistencies. We are proposing a protocol for comparative analysis of metabolic models on closely related genomes, using fifteen strains of genus Brucella, which contains pathogens of both humans and livestock. This study lead to the identification and subsequent correction of inconsistent annotations in the SEED database, as wellmore » as the identification of 31 biochemical reactions that are common to Brucella, which are not originally identified by automated metabolic reconstructions. We are currently implementing this protocol for improving automated annotations within the SEED database and these improvements have been propagated into PATRIC, Model-SEED, KBase and RAST. This method is an enabling step for the future creation of consistent annotation systems and high-quality model reconstructions that will support in predicting accurate phenotypes such as pathogenicity, media requirements or type of respiration.« less
Enabling comparative modeling of closely related genomes: Example genus Brucella
DOE Office of Scientific and Technical Information (OSTI.GOV)
Faria, José P.; Edirisinghe, Janaka N.; Davis, James J.
For many scientific applications, it is highly desirable to be able to compare metabolic models of closely related genomes. In this study, we attempt to raise awareness to the fact that taking annotated genomes from public repositories and using them for metabolic model reconstructions is far from being trivial due to annotation inconsistencies. We are proposing a protocol for comparative analysis of metabolic models on closely related genomes, using fifteen strains of genus Brucella, which contains pathogens of both humans and livestock. This study lead to the identification and subsequent correction of inconsistent annotations in the SEED database, as wellmore » as the identification of 31 biochemical reactions that are common to Brucella, which are not originally identified by automated metabolic reconstructions. We are currently implementing this protocol for improving automated annotations within the SEED database and these improvements have been propagated into PATRIC, Model-SEED, KBase and RAST. This method is an enabling step for the future creation of consistent annotation systems and high-quality model reconstructions that will support in predicting accurate phenotypes such as pathogenicity, media requirements or type of respiration.« less
Peer Review and Publication of Research Protocols and Proposals: A Role for Open Access Journals
2004-01-01
Peer-review and publication of research protocols offer several advantages to all parties involved. Among these are the following opportunities for authors: external expert opinion on the methods, demonstration to funding agencies of prior expert review of the protocol, proof of priority of ideas and methods, and solicitation of potential collaborators. We think that review and publication of protocols is an important role for Open Access journals. Because of their electronic form, openness for readers, and author-pays business model, they are better suited than traditional journals to ensure the sustainability and quality of protocol reviews and publications. In this editorial, we describe the workflow for investigators in eHealth research, from protocol submission to a funding agency, to protocol review and (optionally) publication at JMIR, to registration of trials at the International eHealth Study Registry (IESR), and to publication of the report. One innovation at JMIR is that protocol peer reviewers will be paid a honorarium, which will be drawn partly from a new submission fee for protocol reviews. Separating the article processing fee into a submission and a publishing fee will allow authors to opt for “peer-review only” (without subsequent publication) at reduced costs, if they wish to await a funding decision or for other reasons decide not to make the protocol public. PMID:15471763
Peer-review and publication of research protocols and proposals: a role for open access journals.
Eysenbach, Gunther
2004-09-30
Peer-review and publication of research protocols offer several advantages to all parties involved. Among these are the following opportunities for authors: external expert opinion on the methods, demonstration to funding agencies of prior expert review of the protocol, proof of priority of ideas and methods, and solicitation of potential collaborators. We think that review and publication of protocols is an important role for Open Access journals. Because of their electronic form, openness for readers, and author-pays business model, they are better suited than traditional journals to ensure the sustainability and quality of protocol reviews and publications. In this editorial, we describe the workflow for investigators in eHealth research, from protocol submission to a funding agency, to protocol review and (optionally) publication at JMIR, to registration of trials at the International eHealth Study Registry (IESR), and to publication of the report. One innovation at JMIR is that protocol peer reviewers will be paid a honorarium, which will be drawn partly from a new submission fee for protocol reviews. Separating the article processing fee into a submission and a publishing fee will allow authors to opt for "peer-review only" (without subsequent publication) at reduced costs, if they wish to await a funding decision or for other reasons decide not to make the protocol public.
Hazan, Hananel; Ziv, Noam E
2017-01-01
There is growing need for multichannel electrophysiological systems that record from and interact with neuronal systems in near real-time. Such systems are needed, for example, for closed loop, multichannel electrophysiological/optogenetic experimentation in vivo and in a variety of other neuronal preparations, or for developing and testing neuro-prosthetic devices, to name a few. Furthermore, there is a need for such systems to be inexpensive, reliable, user friendly, easy to set-up, open and expandable, and possess long life cycles in face of rapidly changing computing environments. Finally, they should provide powerful, yet reasonably easy to implement facilities for developing closed-loop protocols for interacting with neuronal systems. Here, we survey commercial and open source systems that address these needs to varying degrees. We then present our own solution, which we refer to as Closed Loop Experiments Manager (CLEM). CLEM is an open source, soft real-time, Microsoft Windows desktop application that is based on a single generic personal computer (PC) and an inexpensive, general-purpose data acquisition board. CLEM provides a fully functional, user-friendly graphical interface, possesses facilities for recording, presenting and logging electrophysiological data from up to 64 analog channels, and facilities for controlling external devices, such as stimulators, through digital and analog interfaces. Importantly, it includes facilities for running closed-loop protocols written in any programming language that can generate dynamic link libraries (DLLs). We describe the application, its architecture and facilities. We then demonstrate, using networks of cortical neurons growing on multielectrode arrays (MEA) that despite its reliance on generic hardware, its performance is appropriate for flexible, closed-loop experimentation at the neuronal network level.
Hazan, Hananel; Ziv, Noam E.
2017-01-01
There is growing need for multichannel electrophysiological systems that record from and interact with neuronal systems in near real-time. Such systems are needed, for example, for closed loop, multichannel electrophysiological/optogenetic experimentation in vivo and in a variety of other neuronal preparations, or for developing and testing neuro-prosthetic devices, to name a few. Furthermore, there is a need for such systems to be inexpensive, reliable, user friendly, easy to set-up, open and expandable, and possess long life cycles in face of rapidly changing computing environments. Finally, they should provide powerful, yet reasonably easy to implement facilities for developing closed-loop protocols for interacting with neuronal systems. Here, we survey commercial and open source systems that address these needs to varying degrees. We then present our own solution, which we refer to as Closed Loop Experiments Manager (CLEM). CLEM is an open source, soft real-time, Microsoft Windows desktop application that is based on a single generic personal computer (PC) and an inexpensive, general-purpose data acquisition board. CLEM provides a fully functional, user-friendly graphical interface, possesses facilities for recording, presenting and logging electrophysiological data from up to 64 analog channels, and facilities for controlling external devices, such as stimulators, through digital and analog interfaces. Importantly, it includes facilities for running closed-loop protocols written in any programming language that can generate dynamic link libraries (DLLs). We describe the application, its architecture and facilities. We then demonstrate, using networks of cortical neurons growing on multielectrode arrays (MEA) that despite its reliance on generic hardware, its performance is appropriate for flexible, closed-loop experimentation at the neuronal network level. PMID:29093659
Protocol, pattern and paper: interactive stabilization of immunohistochemical knowledge.
Nederbragt, Hubertus
2010-12-01
This paper analyzes the investigation of the distribution of the protein tenascin-C in canine mammary tumors. The method involved immunohistochemistry of tissue slices, performed by the application of an antibody to tenascin-C that specifically can be made visible for microscopic inspection. The first phase of the project is the making of the protocol, the second the deduction of a pattern of tenascin-C distribution in tumors and the third the writing of a paper. Each of the phases is analyzed separately, using the concept of resistance and accommodation. My purpose is to show that in each phase of the process of producing knowledge, the scientist meets resistances which force him to accommodate by changing his conceptual, technical and methodological approaches. In reverse, the details of the non-human agent (protocol, pattern or paper) have to be accommodated to the wishes and expectations of the scientist. Through this interaction a situation of stability of knowledge is reached at the end of each phase. In the protocol phase, resistance is found in the antibody and tissue slices. In the phase of pattern deduction the resistance is in the pathological diagnosis of the tumors and the expectations and hypothesis with which the scientist had entered the project; in the criteria to be used for assigning the slices to a tenascin-C pattern; and in the responses of colleagues and supervisor. In the paper-writing phase the interaction is between the scientist and the scientific community which should take on board the knowledge from the research project. When stabilization of knowledge is obtained in one of the phases, the agents of resistance turn into allies in the next phase, giving support to accommodating the resistances in this later phase. Second, the stabilization of knowledge of the protocol is further enhanced when stabilization of the pattern is achieved; in addition, knowledge of the pattern is more definite when it has become stabilized and closed knowledge within the science community. Copyright © 2010 Elsevier Ltd. All rights reserved.
Quantum key distribution with an unknown and untrusted source
NASA Astrophysics Data System (ADS)
Zhao, Yi; Qi, Bing; Lo, Hoi-Kwong
2009-03-01
The security of a standard bi-directional ``plug & play'' quantum key distribution (QKD) system has been an open question for a long time. This is mainly because its source is equivalently controlled by an eavesdropper, which means the source is unknown and untrusted. Qualitative discussion on this subject has been made previously. In this paper, we present the first quantitative security analysis on a general class of QKD protocols whose sources are unknown and untrusted. The securities of standard BB84 protocol, weak+vacuum decoy state protocol, and one-decoy decoy state protocol, with unknown and untrusted sources are rigorously proved. We derive rigorous lower bounds to the secure key generation rates of the above three protocols. Our numerical simulation results show that QKD with an untrusted source gives a key generation rate that is close to that with a trusted source. Our work is published in [1]. [4pt] [1] Y. Zhao, B. Qi, and H.-K. Lo, Phys. Rev. A, 77:052327 (2008).
Brunner, Dani; Balcı, Fuat; Ludvig, Elliot A
2012-02-01
Drug discovery for brain disorders is undergoing a period of upheaval. Faced with an empty drug pipeline and numerous failures of potential new drugs in clinical trials, many large pharmaceutical companies have been shrinking or even closing down their research divisions that focus on central nervous system (CNS) disorders. In this paper, we argue that many of the difficulties facing CNS drug discovery stem from a lack of robustness in pre-clinical (i.e., non-human animal) testing. There are two main sources for this lack of robustness. First, there is the lack of replicability of many results from the pre-clinical stage, which we argue is driven by a combination of publication bias and inappropriate selection of statistical and experimental designs. Second, there is the frequent failure to translate results in non-human animals to parallel results in humans in the clinic. This limitation can only be overcome by developing new behavioral tests for non-human animals that have predictive, construct, and etiological validity. Here, we present these translational difficulties as a "grand challenge" to researchers from comparative cognition, who are well positioned to provide new methods for testing behavior and cognition in non-human animals. These new experimental protocols will need to be both statistically robust and target behavioral and cognitive processes that allow for better connection with human CNS disorders. Our hope is that this downturn in industrial research may represent an opportunity to develop new protocols that will re-kindle the search for more effective and safer drugs for CNS disorders. Copyright © 2011 Elsevier B.V. All rights reserved.
Teaching Cell Biology to Dental Students with a Project-Based Learning Approach.
Costa-Silva, Daniela; Côrtes, Juliana A; Bachinski, Rober F; Spiegel, Carolina N; Alves, Gutemberg G
2018-03-01
Although the discipline of cell biology (CB) is part of the curricula of predoctoral dental schools, students often fail to recognize its practical relevance. The aim of this study was to assess the effectiveness of a practical-theoretical project-based course in closing the gaps among CB, scientific research, and dentistry for dental students. A project-based learning course was developed with nine sequential lessons to evaluate 108 undergraduate dental students enrolled in CB classes of a Brazilian school of dentistry during 2013-16. To highlight the relevance of in vitro studies in the preclinical evaluation of dental materials at the cellular level, the students were challenged to complete the process of drafting a protocol and performing a cytocompatibility assay for a bone substitute used in dentistry. Class activities included small group discussions, scientific database search and article presentations, protocol development, lab experimentation, and writing of a final scientific report. A control group of 31 students attended only one laboratory class on the same theme, and the final reports were compared between the two groups. The results showed that the project-based learning students had superior outcomes in acknowledging the relevance of in vitro methods during biocompatibility testing. Moreover, they produced scientifically sound reports with more content on methodological issues, the relationship with dentistry, and the scientific literature than the control group (p<0.05). The project-based learning students also recognized a higher relevance of scientific research and CB to dental practice. These results suggest that a project-based approach can help contextualize scientific research in dental curricula.
Increasing value and reducing waste: addressing inaccessible research.
Chan, An-Wen; Song, Fujian; Vickers, Andrew; Jefferson, Tom; Dickersin, Kay; Gøtzsche, Peter C; Krumholz, Harlan M; Ghersi, Davina; van der Worp, H Bart
2014-01-18
The methods and results of health research are documented in study protocols, full study reports (detailing all analyses), journal reports, and participant-level datasets. However, protocols, full study reports, and participant-level datasets are rarely available, and journal reports are available for only half of all studies and are plagued by selective reporting of methods and results. Furthermore, information provided in study protocols and reports varies in quality and is often incomplete. When full information about studies is inaccessible, billions of dollars in investment are wasted, bias is introduced, and research and care of patients are detrimentally affected. To help to improve this situation at a systemic level, three main actions are warranted. First, academic institutions and funders should reward investigators who fully disseminate their research protocols, reports, and participant-level datasets. Second, standards for the content of protocols and full study reports and for data sharing practices should be rigorously developed and adopted for all types of health research. Finally, journals, funders, sponsors, research ethics committees, regulators, and legislators should endorse and enforce policies supporting study registration and wide availability of journal reports, full study reports, and participant-level datasets. Copyright © 2014 Elsevier Ltd. All rights reserved.
Increasing value and reducing waste: addressing inaccessible research
Chan, An-Wen; Song, Fujian; Vickers, Andrew; Jefferson, Tom; Dickersin, Kay; Gøtzsche, Peter C.; Krumholz, Harlan M.; Ghersi, Davina; van der Worp, H. Bart
2015-01-01
The study protocol, publications, full study report detailing all analyses, and participant-level dataset constitute the main documentation of methods and results for health research. However, journal publications are available for only half of all studies and are plagued by selective reporting of methods and results. The protocol, full study report, and participant-level dataset are rarely available. The quality of information provided in study protocols and reports is variable and often incomplete. Inaccessibility of full information for the vast majority of studies wastes billions of dollars, introduces bias, and has a detrimental impact on patient care and research. To help improve this situation at a systemic level, three main actions are warranted. Firstly, it is important that academic institutions and funders reward investigators who fully disseminate their research protocols, reports, and participant-level datasets. Secondly, standards for the content of protocols, full study reports, and data sharing practices should be rigorously developed and adopted for all types of health research. Finally, journals, funders, sponsors, research ethics committees, regulators, and legislators should implement and enforce policies supporting study registration and availability of journal publications, full study reports, and participant-level datasets. PMID:24411650
Combined Heat and Power Protocol for Uniform Methods Project | Advanced
Manufacturing Research | NREL Combined Heat and Power Protocol for Uniform Methods Project Combined Heat and Power Protocol for Uniform Methods Project NREL developed a protocol that provides a ; is consistent with the scope and other protocols developed for the Uniform Methods Project (UMP
Rosser, B. R. Simon; Kilian, Gunna; West, William G.
2012-01-01
Certain research topics - including studies of sexual behavior, substance use, and HIV risk -- are more likely to be scrutinized by the media and groups opposed to this area of research. When studying topics that others might deem controversial, it is critical that researchers anticipate potential negative media events prior to their occurrence. By developing an Emergency Public Relations Protocol at the genesis of a study, researchers can identify and plan for events that might result in higher scrutiny. For each identified risk, a good protocol details procedures to enact before, during and after a media event. This manuscript offers recommendations for developing a protocol based on both Situational Crisis Communication Theory and our experience as an HIV prevention research group who recently experienced such an event. The need to have procedures in place to monitor and address social media is highlighted. PMID:23565067
Rosser, B R Simon; Kilian, Gunna; West, William G
2013-03-01
Certain research topics - including studies of sexual behavior, substance use, and HIV risk -- are more likely to be scrutinized by the media and groups opposed to this area of research. When studying topics that others might deem controversial, it is critical that researchers anticipate potential negative media events prior to their occurrence. By developing an Emergency Public Relations Protocol at the genesis of a study, researchers can identify and plan for events that might result in higher scrutiny. For each identified risk, a good protocol details procedures to enact before, during and after a media event. This manuscript offers recommendations for developing a protocol based on both Situational Crisis Communication Theory and our experience as an HIV prevention research group who recently experienced such an event. The need to have procedures in place to monitor and address social media is highlighted.
Roberts, Laura Weiss; Kim, Jane Paik
2014-01-01
Motivation Ethical controversy surrounds clinical research involving seriously ill participants. While many stakeholders have opinions, the extent to which protocol volunteers themselves see human research as ethically acceptable has not been documented. To address this gap of knowledge, authors sought to assess views of healthy and ill clinical research volunteers regarding the ethical acceptability of human studies involving individuals who are ill or are potentially vulnerable. Methods Surveys and semi-structured interviews were used to query clinical research protocol participants and a comparison group of healthy individuals. A total of 179 respondents participated in this study: 150 in protocols (60 mentally ill, 43 physically ill, and 47 healthy clinical research protocol participants) and 29 healthy individuals not enrolled in protocols. Main outcome measures included responses regarding ethical acceptability of clinical research when it presents significant burdens and risks, involves people with serious mental and physical illness, or enrolls people with other potential vulnerabilities in the research situation. Results Respondents expressed decreasing levels of acceptance of participation in research that posed burdens of increasing severity. Participation in protocols with possibly life-threatening consequences was perceived as least acceptable (mean = 1.82, sd = 1.29). Research on serious illnesses, including HIV, cancer, schizophrenia, depression, and post-traumatic stress disorder, was seen as ethically acceptable across respondent groups (range of means = [4.0, 4.7]). Mentally ill volunteers expressed levels of ethical acceptability for physical illness research and mental illness research as acceptable and similar, while physically ill volunteers expressed greater ethical acceptability for physical illness research than for mental illness research. Mentally ill, physically ill, and healthy participants expressed neutral to favorable perspectives regarding the ethical acceptability of clinical research participation by potentially vulnerable subpopulations (difference in acceptability perceived by mentally ill - healthy=−0.04, CI [−0.46, 0.39]; physically ill – healthy= −0.13, CI [−0.62, −.36]). Conclusions Clinical research volunteers and healthy clinical research-“naive” individuals view studies involving ill people as ethically acceptable, and their responses reflect concern regarding research that poses considerable burdens and risks and research involving vulnerable subpopulations. Physically ill research volunteers may be more willing to see burdensome and risky research as acceptable. Mentally ill research volunteers and healthy individuals expressed similar perspectives in this study, helping to dispel a misconception that those with mental illness should be presumed to hold disparate views. PMID:24931849
Roberts, Laura Weiss; Kim, Jane Paik
2014-09-01
Ethical controversy surrounds clinical research involving seriously ill participants. While many stakeholders have opinions, the extent to which protocol volunteers themselves see human research as ethically acceptable has not been documented. To address this gap of knowledge, authors sought to assess views of healthy and ill clinical research volunteers regarding the ethical acceptability of human studies involving individuals who are ill or are potentially vulnerable. Surveys and semi-structured interviews were used to query clinical research protocol participants and a comparison group of healthy individuals. A total of 179 respondents participated in this study: 150 in protocols (60 mentally ill, 43 physically ill, and 47 healthy clinical research protocol participants) and 29 healthy individuals not enrolled in protocols. Main outcome measures included responses regarding ethical acceptability of clinical research when it presents significant burdens and risks, involves people with serious mental and physical illness, or enrolls people with other potential vulnerabilities in the research situation. Respondents expressed decreasing levels of acceptance of participation in research that posed burdens of increasing severity. Participation in protocols with possibly life-threatening consequences was perceived as least acceptable (mean = 1.82, sd = 1.29). Research on serious illnesses, including HIV, cancer, schizophrenia, depression, and post-traumatic stress disorder, was seen as ethically acceptable across respondent groups (range of means = [4.0, 4.7]). Mentally ill volunteers expressed levels of ethical acceptability for physical illness research and mental illness research as acceptable and similar, while physically ill volunteers expressed greater ethical acceptability for physical illness research than for mental illness research. Mentally ill, physically ill, and healthy participants expressed neutral to favorable perspectives regarding the ethical acceptability of clinical research participation by potentially vulnerable subpopulations (difference in acceptability perceived by mentally ill - healthy = -0.04, CI [-0.46, 0.39]; physically ill - healthy = -0.13, CI [-0.62, -.36]). Clinical research volunteers and healthy clinical research-"naïve" individuals view studies involving ill people as ethically acceptable, and their responses reflect concern regarding research that poses considerable burdens and risks and research involving vulnerable subpopulations. Physically ill research volunteers may be more willing to see burdensome and risky research as acceptable. Mentally ill research volunteers and healthy individuals expressed similar perspectives in this study, helping to dispel a misconception that those with mental illness should be presumed to hold disparate views. Copyright © 2014 Elsevier Ltd. All rights reserved.
Eggert, Corinne; Moselle, Kenneth; Protti, Denis; Sanders, Dale
2017-01-01
Closed Loop Analytics© is receiving growing interest in healthcare as a term referring to information technology, local data and clinical analytics working together to generate evidence for improvement. The Closed Loop Analytics model consists of three loops corresponding to the decision-making levels of an organization and the associated data within each loop - Patients, Protocols, and Populations. The authors propose that each of these levels should utilize the same ecosystem of electronic health record (EHR) and enterprise data warehouse (EDW) enabled data, in a closed-loop fashion, with that data being repackaged and delivered to suit the analytic and decision support needs of each level, in support of better outcomes.
Sivaraman, Mathana Amaris Fiona; Noor, Siti Nurani Mohd
2016-04-01
Embryonic Stem Cell Research (ESCR) raises ethical issues. In the process of research, embryos may be destroyed and, to some, such an act entails the 'killing of human life'. Past studies have sought the views of scientists and the general public on the ethics of ESCR. This study, however, explores multi-faith ethical viewpoints, in particular, those of Buddhists, Hindus and Catholics in Malaysia, on ESCR. Responses were gathered via semi-structured, face-to-face interviews. Three main ethical quandaries emerged from the data: (1) sanctity of life, (2) do no harm, and (3) 'intention' of the research. Concerns regarding the sanctity of life are directed at particular research protocols which interfere with religious notions of human ensoulment and early consciousness. The principle of 'do no harm' which is closely related to ahimsa prohibits all acts of violence. Responses obtained indicate that respondents either discourage research that inflicts harm on living entities or allow ESCR with reservations. 'Intention' of the research seems to be an interesting and viable rationale that would permit ESCR for the Buddhists and Hindus. Research that is intended for the purpose of alleviating human suffering is seen as being ethical. This study also notes that Catholics oppose ESCR on the basis of the inviolability of human life.
Byk, J C
1997-02-01
The objective of this paper is to stimulate academic debate on embryo and fetal research from the perspective of the drafting of a protocol to the European Convention on Biomedicine. The Steering Committee on Bioethics of the Council of Europe was mandated to draw up such a protocol and for this purpose organised an important symposium on reproductive technologies and embryo research, in Strasbourg from the 16th to the 18th of December 1996.
Microbiological Research Under the Nagoya Protocol: Facts and Fiction.
Overmann, Jörg; Scholz, Amber Hartman
2017-02-01
The Nagoya Protocol is based on concepts of biological diversity that are hardly applicable to microorganisms. Because of this incongruence, the Nagoya Protocol threatens future microbial research, potentially defeating its original purpose. Countries with appropriate regulations can promote science and their bioeconomy through international collaboration and simultaneously gain a competitive advantage. Copyright © 2016 Elsevier Ltd. All rights reserved.
Code of Federal Regulations, 2010 CFR
2010-01-01
... clinical study involving human subjects under a clinical research protocol approved by an institutional review board. (2) Clinical research has the meaning set forth in 42 U.S.C. 284d(b). (3) Institutional... review a clinical research protocol and approve the initiation of biomedical research involving human...
The report provides guidance and a readily available reference to groups involved with the Florida Radon Research Program's (FRRP's) research house studies. It includes: 1): Lists of Parameters for continuous and periodic high and low resolution measurements; (2) Protocols for c...
Method-centered digital communities on protocols.io for fast-paced scientific innovation.
Kindler, Lori; Stoliartchouk, Alexei; Teytelman, Leonid; Hurwitz, Bonnie L
2016-01-01
The Internet has enabled online social interaction for scientists beyond physical meetings and conferences. Yet despite these innovations in communication, dissemination of methods is often relegated to just academic publishing. Further, these methods remain static, with subsequent advances published elsewhere and unlinked. For communities undergoing fast-paced innovation, researchers need new capabilities to share, obtain feedback, and publish methods at the forefront of scientific development. For example, a renaissance in virology is now underway given the new metagenomic methods to sequence viral DNA directly from an environment. Metagenomics makes it possible to "see" natural viral communities that could not be previously studied through culturing methods. Yet, the knowledge of specialized techniques for the production and analysis of viral metagenomes remains in a subset of labs. This problem is common to any community using and developing emerging technologies and techniques. We developed new capabilities to create virtual communities in protocols.io, an open access platform, for disseminating protocols and knowledge at the forefront of scientific development. To demonstrate these capabilities, we present a virology community forum called VERVENet. These new features allow virology researchers to share protocols and their annotations and optimizations, connect with the broader virtual community to share knowledge, job postings, conference announcements through a common online forum, and discover the current literature through personalized recommendations to promote discussion of cutting edge research. Virtual communities in protocols.io enhance a researcher's ability to: discuss and share protocols, connect with fellow community members, and learn about new and innovative research in the field. The web-based software for developing virtual communities is free to use on protocols.io. Data are available through public APIs at protocols.io.
21 CFR 14.27 - Determination to close portions of advisory committee meetings.
Code of Federal Regulations, 2011 CFR
2011-04-01
... protocols and procedures for a class of drugs or devices; consideration of labeling requirements for a class... brought to their attention, the person will be required to leave the meeting immediately. This inadvertent...
Freeman, Anne; Stanko, Patrick; Berkowitz, Lily N; Parnell, Neanta; Zuppe, Anastasia; Bale, Tracy L; Ziolek, Tracy; Epperson, C Neill
2017-01-01
The 2015 National Institutes of Health (NIH) policy that sex be considered as a biological variable (SABV) is now a critical part of the peer-review process for NIH funding as well as publication in several high-impact scientific journals. We sought to determine the degree to which biomedical researchers at the University of Pennsylvania already consider SABV or gender in their research. We reviewed 240 research protocols approved by the University of Pennsylvania Investigational Review Board (IRB) consecutively submitted between January and July 2016. Each protocol was searched for the terms sex, gender, male, female, man, and woman and justifications related to the population under study. A PubMed search was conducted to determine the current state of knowledge regarding potential sex and/or gender differences with respect to protocol topic. Data were summarized using descriptive statistics. Of the 165 (68.8%) protocols that included one of the search terms, only 24 (14.5%) provided justification for the choice of the sex/gender of the population studied. Sixty-three percent ( n = 151) of the protocols focused on topics for which the extant literature supports at least a moderate degree of sex/gender differences in some aspect of the disorder/condition being studied. Of these, only three (2.0%) indicated that the investigator would consider sex or gender impact on their primary outcomes. Review of a subset of IRB protocols submitted at a major research institution suggests that very few investigators are considering sex or gender as important variables in their clinical research at the stage of protocol development. IRBs are in an excellent position to encourage investigators to consider SABV and gender in order to enhance the rigor of research design, maximize the importance of the resulting knowledge, and ensure that subject selection is equitable. These findings serve as the basis for developing an intervention at the level of IRB protocol development and submission that will promote consideration of SABV and/or gender, factors with critical import to patient safety and efficacy of interventions.
NASA Astrophysics Data System (ADS)
DeGrasse, Stacey; Conrad, Stephen; DiStefano, Paul; Vanegas, Camilo; Wallace, David; Jensen, Pete; Hickey, J. Michael; Cenci, Florence; Pitt, Jaclyn; Deardorff, Dave; Rubio, Fernando; Easy, Dorothy; Donovan, Mary Anne; Laycock, Maurice; Rouse, Debbie; Mullen, John
2014-05-01
Paralytic shellfish poisoning (PSP) is the foodborne intoxication associated with the consumption of seafood contaminated with naturally occurring neurotoxins known as paralytic shellfish toxins. To protect public health from this potentially fatal syndrome, harvesting closures are implemented when toxins exceed the regulatory action level. Traditional monitoring programs established by state shellfish authorities allow for timely closures in state waters with minimal negative impacts on industry. However, such monitoring programs are not feasible in federal offshore waters given their distance from shore and the range of their spatial coverage. Thus innovative management strategies were investigated for these offshore resources. Georges Bank, an offshore resource with an estimated market value of more than 3 billion in Atlantic surfclams and ocean quahogs, has been closed to harvesting following a temporary ban in 1989 and a subsequent indefinite closure in 1990 due to the risk of PSP. As a means of managing this risk and allowing harvest of safe shellfish from this important resource, the Onboard Screening Dockside Testing Protocol (referred to as the Protocol) was developed by the US Food and Drug Administration (FDA), National Marine Fisheries Service (NMFS), state shellfish control authorities, and industry. The Protocol, which sets forth control measures to ensure product safety and public health protection, was endorsed by the Interstate Shellfish Sanitation Conference (ISSC) for pilot testing. Briefly, the pilot study Protocol required that (1) the fishing vessel receive a permit from NMFS to harvest in closed waters, (2) a miniμm of five shellfish samples per intended harvest lot be tested for PSP toxins onboard, and (3) harvesting only occur when the samples tested from the intended fishing area are negative using the Jellett Rapid Tests or Abraxis Shipboard ELISA kits. Finally, product landed under the Protocol was confirmed to be safe for consumption using the mouse bioassay (MBA) prior to its introduction into commerce. This paper presents data from the pilot study, with primary focus on the advantages and challenges of the field kits employed onboard compared to the dockside MBA, which has served as the longstanding regulatory method for PSP toxins. In 2010 alone, the successful pilot study resulted in the safe harvest of over 2.7 million worth of surfclams in an area that has otherwise been unavailable for decades. Due to the success of this pilot study, the Protocol was adopted into the National Shellfish Sanitation Program Model Ordinance as an approved marine biotoxin control strategy for use in federal waters at the 2011 ISSC Biennial Meeting. In January 2013 a portion of Georges Bank was reopened for the harvest of Atlantic surfclams and ocean quahogs to fishermen following the Protocol.
Analytical Models of Cross-Layer Protocol Optimization in Real-Time Wireless Sensor Ad Hoc Networks
NASA Astrophysics Data System (ADS)
Hortos, William S.
The real-time interactions among the nodes of a wireless sensor network (WSN) to cooperatively process data from multiple sensors are modeled. Quality-of-service (QoS) metrics are associated with the quality of fused information: throughput, delay, packet error rate, etc. Multivariate point process (MVPP) models of discrete random events in WSNs establish stochastic characteristics of optimal cross-layer protocols. Discrete-event, cross-layer interactions in mobile ad hoc network (MANET) protocols have been modeled using a set of concatenated design parameters and associated resource levels by the MVPPs. Characterization of the "best" cross-layer designs for a MANET is formulated by applying the general theory of martingale representations to controlled MVPPs. Performance is described in terms of concatenated protocol parameters and controlled through conditional rates of the MVPPs. Modeling limitations to determination of closed-form solutions versus explicit iterative solutions for ad hoc WSN controls are examined.
Reveiz, Ludovic; Haby, Michelle M; Martínez-Vega, Ruth; Pinzón-Flores, Carlos E; Elias, Vanessa; Smith, Emma; Pinart, Mariona; Broutet, Nathalie; Becerra-Posada, Francisco; Aldighieri, Sylvain; Van Kerkhove, Maria D
2017-01-01
Given the severity and impact of the current Zika virus (ZIKV) outbreak in the Americas, numerous countries have rushed to develop research studies to assess ZIKV and its potential health consequences. In an effort to ensure that studies are comprehensive, both internally and externally valid, and with reliable results, the World Health Organization, the Pan American Health Organization, Institut Pasteur, the networks of Fiocruz, the Consortia for the Standardization of Influenza Seroepidemiology (CONSISE) and the International Severe Acute Respiratory and Emerging Infection Consortium (ISARIC) have generated six standardized clinical and epidemiological research protocols and questionnaires to address key public health questions on ZIKV. We conducted a systematic search of ongoing study protocols related to ZIKV research. We analyzed the content of protocols of 32 cohort studies and 13 case control studies for systematic bias that could produce erroneous results. Additionally we aimed to characterize the risks of bias and confounding in observational studies related to ZIKV and to propose ways to minimize them, including the use of six newly standardized research protocols. Observational studies of ZIKV face an array of challenges, including measurement of exposure and outcomes (microcephaly and Guillain-Barré Syndrome). Potential confounders need to be measured where known and controlled for in the analysis. Selection bias due to non-random selection is a significant issue, particularly in the case-control design, and losses to follow-up is equally important for the cohort design. Observational research seeking to answer key questions on the ZIKV should consider these restrictions and take precautions to minimize bias in an effort to provide reliable and valid results. Utilization of the standardized research protocols developed by the WHO, PAHO, Institut Pasteur, and CONSISE will harmonize the key methodological aspects of each study design to minimize bias at different stages of the study. Biases need to be considered by researchers implementing the standardized protocols as well as by users of observational epidemiological studies of ZIKV.
Wright, Melanie C; Taekman, Jeffrey M; Barber, Linda; Hobbs, Gene; Newman, Mark F; Stafford-Smith, Mark
2005-12-01
Errors in clinical research can be costly, in terms of patient safety, data integrity, and data collection. Data inaccuracy in early subjects of a clinical study may be associated with problems in the design of the protocol, procedures, and data collection tools. High-fidelity patient simulation centers provide an ideal environment to apply human-centered design to clinical trial development. A draft of a complex clinical protocol was designed, evaluated and modified using a high-fidelity human patient simulator in the Duke University Human Simulation and Patient Safety Center. The process included walk-throughs, detailed modifications of the protocol and development of procedural aids. Training of monitors and coordinators provided an opportunity for observation of performance that was used to identify further improvements to the protocol. Evaluative steps were used to design the research protocol and procedures. Iterative modifications were made to the protocol and data collection tools. The success in use of human simulation in the preparation of a complex clinical drug trial suggests the benefits of human patient simulation extend beyond training and medical equipment evaluation. Human patient simulation can provide a context for informal expert evaluation of clinical protocol design and for formal "rehearsal" to evaluate the efficacy of procedures and support tools.
Standards for Environmental Measurement Using GIS: Toward a Protocol for Protocols.
Forsyth, Ann; Schmitz, Kathryn H; Oakes, Michael; Zimmerman, Jason; Koepp, Joel
2006-02-01
Interdisciplinary research regarding how the built environment influences physical activity has recently increased. Many research projects conducted jointly by public health and environmental design professionals are using geographic information systems (GIS) to objectively measure the built environment. Numerous methodological issues remain, however, and environmental measurements have not been well documented with accepted, common definitions of valid, reliable variables. This paper proposes how to create and document standardized definitions for measures of environmental variables using GIS with the ultimate goal of developing reliable, valid measures. Inherent problems with software and data that hamper environmental measurement can be offset by protocols combining clear conceptual bases with detailed measurement instructions. Examples demonstrate how protocols can more clearly translate concepts into specific measurement. This paper provides a model for developing protocols to allow high quality comparative research on relationships between the environment and physical activity and other outcomes of public health interest.
Protocol Coordinator | Center for Cancer Research
PROGRAM DESCRIPTION Within the Leidos Biomedical Research Inc.’s Clinical Research Directorate, the Clinical Monitoring Research Program (CMRP) provides high-quality comprehensive and strategic operational support to the high-profile domestic and international clinical research initiatives of the National Cancer Institute (NCI), National Institute of Allergy and Infectious Diseases (NIAID), Clinical Center (CC), National Heart, Lung and Blood Institute (NHLBI), National Institute of Arthritis and Musculoskeletal and Skin Diseases (NIAMS), National Center for Advancing Translational Sciences (NCATS), National Institute of Neurological Disorders and Stroke (NINDS), and the National Institute of Mental Health (NIMH). Since its inception in 2001, CMRP’s ability to provide rapid responses, high-quality solutions, and to recruit and retain experts with a variety of backgrounds to meet the growing research portfolios of NCI, NIAID, CC, NHLBI, NIAMS, NCATS, NINDS, and NIMH has led to the considerable expansion of the program and its repertoire of support services. CMRP’s support services are strategically aligned with the program’s mission to provide comprehensive, dedicated support to assist National Institutes of Health researchers in providing the highest quality of clinical research in compliance with applicable regulations and guidelines, maintaining data integrity, and protecting human subjects. For the scientific advancement of clinical research, CMRP services include comprehensive clinical trials, regulatory, pharmacovigilance, protocol navigation and development, and programmatic and project management support for facilitating the conduct of 400+ Phase I, II, and III domestic and international trials on a yearly basis. These trials investigate the prevention, diagnosis, treatment of, and therapies for cancer, influenza, HIV, and other infectious diseases and viruses such as hepatitis C, tuberculosis, malaria, and Ebola virus; heart, lung, and blood diseases and conditions; parasitic infections; rheumatic and inflammatory diseases; and rare and neglected diseases. CMRP’s collaborative approach to clinical research and the expertise and dedication of staff to the continuation and success of the program’s mission has contributed to improving the overall standards of public health on a global scale. KEY ROLES/RESPONSIBILITIES The Protocol Coordinator II: Provides comprehensive clinical and administrative support to the Brain Tumor Trial Collaborative, Neuro-Oncology Branch, NCI, National Institutes of Health Serves as a liaison with Principal Investigators (PIs), the associated study teams and a variety of offices associated with protocol development and approvals Orchestrates meetings with investigators and other key medical staff to identify required support Coordinates the writing and regulatory review processes that occur in tandem, facilitates the bi-directional dialogue and feedback between various teams, and assists investigators and medical writers on the production/revision of clinical research protocols Assists research staff in coordinating/navigating requirements for special circumstances and facilitates access to necessary services Facilitates initiation of intramural research by providing assistance in obtaining required approvals Coordinates with investigators and medical writers to ensure Institutional Review Board (IRB) and Food and Drug Administration (FDA) stipulations are appropriately addressed in a timely manner Provides consultation and assistance for all aspects of the protocol lifecycle including initial Investigational New Drug (IND) submission, IRB submission, continuing review applications, protocol amendments, annual reports, and protocol inactivation with IRB and FDA Tracks a portfolio of protocols through each lifecycle step; processes and tracks appropriate approvals (e.g., IRB, Data and Safety Monitoring Board, Radiation Safety, Office of Protocol Services, etc.) Provides administrative support to Scientific Review Committees (SRC), reviews proposed protocol documents to ensure they are complete, distributes to reviewers, documents meeting minutes, enters data into the IRIS database, facilitates processes to obtain approval to initiate and continue clinical research Creates, maintains and queries an IRB database of approved amendment descriptions Maintains records of the current protocol(s) version, current Informed Consent document(s), FDA Safe to Proceed designation, etc. for each IND Provides expertise in data management including data collection and analysis Develops procedural manuals for clinical trials protocols Participates in quality improvement and assurance involving International Conference on Harmonization (ICH) Good Clinical Practice (GCP) guidelines This position is located at the National Institutes of Health (NIH) in Bethesda, Maryland.
Roberts, Laura Weiss; Warner, Teddy D; Anderson, Charles T; Smithpeter, Megan V; Rogers, Melinda K
2004-04-01
To examine the perspectives and preferences regarding ethically important aspects of recruitment, consent, and debriefing of people with schizophrenia who volunteered for research protocols. A structured interview to assess research-related views of people with schizophrenia was developed and piloted. Data collection occurred at three sites. For this analysis, we examined the subset of responses from schizophrenia patients currently enrolled in a protocol. Data from 28 schizophrenia research volunteers were analyzed. Of these, 22 were men and 11 were voluntary inpatients. Most (n=23) recalled speaking with someone before enrolling in the protocol, and most (n=26) reported trusting the person who told them about it. Participants reported a moderate understanding of their protocols. All but one person (n=27) remembered signing a consent form. Twenty-one volunteers indicated that consent forms are meant to help both the patient and the researcher. Most (n=23) reported making the enrollment decision alone, with 22 making this decision prior to reviewing the consent form. The decision was described as relatively easy. Respondents felt some pressure to enroll, with women experiencing more pressure. Debriefing practices were strongly endorsed by participants. All 28 of the volunteers wished to be informed if a health problem (i.e., "something wrong") was discovered during the protocol. The persons living with schizophrenia who were interviewed for this project expressed interesting perspectives and preferences regarding ethically important aspects of recruitment, consent, and debriefing in clinical research that may help guide efforts to make research processes more attuned to participants and merit further inquiry.
Aristizabal, Paula; Singer, Jenelle; Cooper, Renee; Wells, Kristen J.; Nodora, Jesse; Milburn, Mehrzad; Gahagan, Sheila; Schiff, Deborah E.; Martinez, Maria Elena
2015-01-01
Background Survival rates in pediatric oncology have improved dramatically, in part due to high patient participation in clinical trials. Although racial/ethnic inequalities in clinical trial participation have been reported in adults, pediatric data and studies comparing participation rates by socio-demographic characteristics are scarce. The goal of this study was to assess differences in research protocol participation for childhood cancer by age, sex, race/ethnicity, parental language, cancer type and insurance status. Procedure Data on enrollment in any protocol, biospecimen, or therapeutic protocols were collected and analyzed for newly diagnosed pediatric patients with cancer from 2008–2012 at Rady Children’s Hospital. Results Among the 353 patients included in the analysis, 304 (86.1%) were enrolled in any protocol. Enrollment in biospecimen and therapeutic protocols was 84.2% (261/310) and 81.1% (206/254), respectively. Logistic regression analyses revealed significant enrollment underrepresentation in any protocol for Hispanics compared to Non-Hispanic whites (81% vs. 91%; Odds Ratio [OR], 0.43; 95% Confidence Interval [CI], 0.21–0.90; p=0.021) and among children of Spanish-speaking vs. English-speaking parents (78% vs. 89%; OR, 0.45; 95%CI, 0.23–0.87; p=0.016). Compared to patients aged 0–4 years, significant underrepresentation was also found among patients 15–21 years old (92% vs.72%; OR, 0.21; 95% CI, 0.09–0.48; p<0.001). Similar trends were observed when analyzing enrollment in biospecimen and therapeutic protocols separately. Conclusions There was significant underrepresentation in protocol participation for Hispanics, children of Spanish-speaking parents, and patients ages 15–21. Research is urgently needed to understand barriers to research participation among these groups underrepresented in pediatric oncology clinical trials. PMID:25755225
Analytical approach to cross-layer protocol optimization in wireless sensor networks
NASA Astrophysics Data System (ADS)
Hortos, William S.
2008-04-01
In the distributed operations of route discovery and maintenance, strong interaction occurs across mobile ad hoc network (MANET) protocol layers. Quality of service (QoS) requirements of multimedia service classes must be satisfied by the cross-layer protocol, along with minimization of the distributed power consumption at nodes and along routes to battery-limited energy constraints. In previous work by the author, cross-layer interactions in the MANET protocol are modeled in terms of a set of concatenated design parameters and associated resource levels by multivariate point processes (MVPPs). Determination of the "best" cross-layer design is carried out using the optimal control of martingale representations of the MVPPs. In contrast to the competitive interaction among nodes in a MANET for multimedia services using limited resources, the interaction among the nodes of a wireless sensor network (WSN) is distributed and collaborative, based on the processing of data from a variety of sensors at nodes to satisfy common mission objectives. Sensor data originates at the nodes at the periphery of the WSN, is successively transported to other nodes for aggregation based on information-theoretic measures of correlation and ultimately sent as information to one or more destination (decision) nodes. The "multimedia services" in the MANET model are replaced by multiple types of sensors, e.g., audio, seismic, imaging, thermal, etc., at the nodes; the QoS metrics associated with MANETs become those associated with the quality of fused information flow, i.e., throughput, delay, packet error rate, data correlation, etc. Significantly, the essential analytical approach to MANET cross-layer optimization, now based on the MVPPs for discrete random events occurring in the WSN, can be applied to develop the stochastic characteristics and optimality conditions for cross-layer designs of sensor network protocols. Functional dependencies of WSN performance metrics are described in terms of the concatenated protocol parameters. New source-to-destination routes are sought that optimize cross-layer interdependencies to achieve the "best available" performance in the WSN. The protocol design, modified from a known reactive protocol, adapts the achievable performance to the transient network conditions and resource levels. Control of network behavior is realized through the conditional rates of the MVPPs. Optimal cross-layer protocol parameters are determined by stochastic dynamic programming conditions derived from models of transient packetized sensor data flows. Moreover, the defining conditions for WSN configurations, grouping sensor nodes into clusters and establishing data aggregation at processing nodes within those clusters, lead to computationally tractable solutions to the stochastic differential equations that describe network dynamics. Closed-form solution characteristics provide an alternative to the "directed diffusion" methods for resource-efficient WSN protocols published previously by other researchers. Performance verification of the resulting cross-layer designs is found by embedding the optimality conditions for the protocols in actual WSN scenarios replicated in a wireless network simulation environment. Performance tradeoffs among protocol parameters remain for a sequel to the paper.
ERIC Educational Resources Information Center
Early, Diane M.; Rogge, Ronald D.; Deci, Edward L.
2014-01-01
This paper investigates engagement (E), alignment (A), and rigor (R) as vital signs of high-quality teacher instruction as measured by the EAR Classroom Visit Protocol, designed by the Institute for Research and Reform in Education (IRRE). Findings indicated that both school leaders and outside raters could learn to score the protocol with…
Research protocols in National Park Service wilderness
Jim Walters
2000-01-01
While the National Park Service encourages the use of its wilderness resource for research, management policies require that all research apply âminimum requirementâ protocols to determine: 1) if the research is needed to support the purposes of wilderness and, 2) if it is appropriate, determine the minimum tool needed to accomplish the work.
15 CFR Supplement No. 1 to Part 783 - Deadlines for Submission of Reports and Amendments
Code of Federal Regulations, 2010 CFR
2010-01-01
... PROTOCOL REGULATIONS CIVIL NUCLEAR FUEL CYCLE-RELATED ACTIVITIES NOT INVOLVING NUCLEAR MATERIALS Pt. 783...) uranium hard-rock mines that have changed from operating or suspended status to closed-down status during...
Gundlach, Karsten K H; Bardach, Janusz; Filippow, Daniel; Stahl-de Castrillon, Franka; Lenz, Jan-Hendrik
2013-01-01
Speech development is of utmost importance and requires early closure of a palatal cleft. On the other hand, it is well known that all types and timings of surgical repair of facial clefts are detrimental to maxillary growth. Nevertheless, these days one is more and more confronted with a world-wide tendency in favour of the one-in-all operation to close clefts of the lip, alveolus, and palate. Therefore, a three-centre study was performed for testing - once more - the value of two-stage palatoplasty as a means to reduce the detrimental effects of surgery on palatal growth and at the same time to also enable early speech development. Plaster casts from 85 patients have been re-evaluated. All of them had a complete unilateral cleft of lip, alveolus, and palate. They had been treated according to the old therapy protocols followed in either one of the three different cleft centres many years ago, namely in Hamburg, (Western) Germany, Iowa City, IO, USA, and Rostock, (in those days still Eastern) Germany. The impressions had been taken already in 1987 from patients being either 8 years (36 pts.) or 16 years of age (49 pts.). Three different treatment protocols had been followed for these patients in those centres in those days: The main difference was that in centres A and B the palates were closed in two stages whilst in centre C palatoplasty was performed in just one operation. The most interesting results regarding the palatal growth were that: 1. In centre C (one-stage palatoplasty) the patients had more constricted palates. 2. In centre A (two-stage palatoplasty) the patients had least often an anterior cross-bite. It appears that it was possible to show once more that closing the palate in one stage at age 1 year or less is interfering most with maxillary growth. This study leads us to conclude that two-stage palatoplasty is still a valuable treatment protocol for patients with a complete unilateral cleft of lip, alveolus, and palate, especially as apparently good guidance of speech development can lead to satisfactory speech for cleft patients in whom the hard palate was closed at a later age. Copyright © 2012 European Association for Cranio-Maxillo-Facial Surgery. Published by Elsevier Ltd. All rights reserved.
Suzuki, Mika; Sato, Keiko
2016-07-01
Research Ethics Committees (RECs) are designed to protect human subjects in research. It is essential to recognize whether the RECs are achieving this goal. Several studies have reported on RECs; however, detailed data regarding the quality of research protocols and the review process of RECs have not been reported in Japan. We examine research protocols reviewed by RECs and the review processes at three institutions using a novel checklist we developed. The data show that approximately half of all examined protocols lacked a clearly written "Background" section that defines the study rationale and design. These results reiterate suggestions made in previous research regarding educational programs and support departments that could enhance responsible conduct in clinical research to protect human subjects in Japan. © The Author(s) 2016.
Evaluating the Process of Generating a Clinical Trial Protocol
Franciosi, Lui G.; Butterfield, Noam N.; MacLeod, Bernard A.
2002-01-01
The research protocol is the principal document in the conduct of a clinical trial. Its generation requires knowledge about the research problem, the potential experimental confounders, and the relevant Good Clinical Practices for conducting the trial. However, such information is not always available to authors during the writing process. A checklist of over 80 items has been developed to better understand the considerations made by authors in generating a protocol. It is based on the most cited requirements for designing and implementing the randomised controlled trial. Items are categorised according to the trial's research question, experimental design, statistics, ethics, and standard operating procedures. This quality assessment tool evaluates the extent that a generated protocol deviates from the best-planned clinical trial.
Alexander, Robert W; Harrell, David B
2013-01-01
Objectives Provide background for use of acquiring autologous adipose tissue as a tissue graft and source of adult progenitor cells for use in cosmetic plastic surgery. Discuss the background and mechanisms of action of closed syringe vacuum lipoaspiration, with emphasis on accessing adipose-derived mesenchymal/stromal cells and the stromal vascular fraction (SVF) for use in aesthetic, structural reconstruction and regenerative applications. Explain a proven protocol for acquiring high-quality autologous fat grafts (AFG) with use of disposable, microcannula systems. Design Explain the components and advantage of use of the patented super luer-lock and microcannulas system for use with the closed-syringe system. A sequential explanation of equipment selection for minimally traumatic lipoaspiration in small volumes is presented, including use of blunt injection cannulas to reduce risk of embolism. Results Thousands of AFG have proven safe and efficacious for lipoaspiration techniques for large and small structural fat grafting procedures. The importance and advantages of gentle harvesting of the adipose tissue complex has become very clear in the past 5 years. The closed-syringe system offers a minimally invasive, gentle system with which to mobilize subdermal fat tissues in a suspension form. Resulting total nuclear counting of undifferentiated cells of the adipose-derived -SVF suggests that the yield achieved is better than use of always-on, constant mechanical pump applied vacuum systems. Conclusion Use of a closed-syringe lipoaspiration system featuring disposable microcannulas offers a safe and effective means of harvesting small volumes of nonmanipulated adipose tissues and its accompanying progenitor cells within the SVF. Closed syringes and microcannulas are available as safe, sterile, disposable, compact systems for acquiring high-quality AFG. Presented is a detailed, step-by-step, proven protocol for performing quality autologous structural adipose transplantation. PMID:23630430
2016-01-01
Training subjects to step in place on a rotating platform while maintaining a fixed body orientation in space produces a posteffect consisting in inadvertent turning around while stepping in place eyes closed (podokinetic after-rotation, PKAR). We tested the hypothesis that voluntary turning around while stepping in place also produces a posteffect similar to PKAR. Sixteen subjects performed 12 min of voluntary turning while stepping around their vertical axis eyes closed and 12 min of stepping in place eyes open on the center of a platform rotating at 60°/s (pretests). Then, subjects continued stepping in place eyes closed for at least 10 min (posteffect). We recorded the positions of markers fixed to head, shoulder, and feet. The posteffect of voluntary turning shared all features of PKAR. Time decay of angular velocity, stepping cadence, head acceleration, and ratio of angular velocity after to angular velocity before were similar between both protocols. Both postrotations took place inadvertently. The posteffects are possibly dependent on the repeated voluntary contraction of leg and foot intrarotating pelvic muscles that rotate the trunk over the stance foot, a synergy common to both protocols. We propose that stepping in place and voluntary turning can be a scheme ancillary to the rotating platform for training body segment coordination in patients with impairment of turning synergies of various origin. PMID:27635264
Energy-efficient and fast data gathering protocols for indoor wireless sensor networks.
Tümer, Abdullah Erdal; Gündüz, Mesut
2010-01-01
Wireless Sensor Networks have become an important technology with numerous potential applications for the interaction of computers and the physical environment in civilian and military areas. In the routing protocols that are specifically designed for the applications used by sensor networks, the limited available power of the sensor nodes has been taken into consideration in order to extend the lifetime of the networks. In this paper, two protocols based on LEACH and called R-EERP and S-EERP with base and threshold values are presented. R-EERP and S-EERP are two efficient energy aware routing protocols that can be used for some critical applications such as detecting dangerous gases (methane, ammonium, carbon monoxide, etc.) in an indoor environment. In R-EERP, sensor nodes are deployed randomly in a field similar to LEACH. In S-EERP, nodes are deployed sequentially in the rooms of the flats of a multi-story building. In both protocols, nodes forming clusters do not change during a cluster change time, only the cluster heads change. Furthermore, an XOR operation is performed on the collected data in order to prevent the sending of the same data sensed by the nodes close to each other. Simulation results show that our proposed protocols are more energy-efficient than the conventional LEACH protocol.
Automating Security Protocol Analysis
2004-03-01
language that allows easy representation of pattern interaction. Using CSP, Lowe tests whether a protocol achieves authentication. In the case of...only to correctly code whatever protocol they intend to evaluate. The tool, OCaml 3.04 [1], translates the protocol into Horn clauses and then...model protocol transactions. One example of automated modeling software is Maude [19]. Maude was the intended language for this research, but Java
Scalability enhancement of AODV using local link repairing
NASA Astrophysics Data System (ADS)
Jain, Jyoti; Gupta, Roopam; Bandhopadhyay, T. K.
2014-09-01
Dynamic change in the topology of an ad hoc network makes it difficult to design an efficient routing protocol. Scalability of an ad hoc network is also one of the important criteria of research in this field. Most of the research works in ad hoc network focus on routing and medium access protocols and produce simulation results for limited-size networks. Ad hoc on-demand distance vector (AODV) is one of the best reactive routing protocols. In this article, modified routing protocols based on local link repairing of AODV are proposed. Method of finding alternate routes for next-to-next node is proposed in case of link failure. These protocols are beacon-less, means periodic hello message is removed from the basic AODV to improve scalability. Few control packet formats have been changed to accommodate suggested modification. Proposed protocols are simulated to investigate scalability performance and compared with basic AODV protocol. This also proves that local link repairing of proposed protocol improves scalability of the network. From simulation results, it is clear that scalability performance of routing protocol is improved because of link repairing method. We have tested protocols for different terrain area with approximate constant node densities and different traffic load.
Byk, J C
1997-01-01
The objective of this paper is to stimulate academic debate on embryo and fetal research from the perspective of the drafting of a protocol to the European Convention on Biomedicine. The Steering Committee on Bioethics of the Council of Europe was mandated to draw up such a protocol and for this purpose organised an important symposium on reproductive technologies and embryo research, in Strasbourg from the 16th to the 18th of December 1996. PMID:9055160
Quantum fingerprinting with coherent states and a constant mean number of photons
NASA Astrophysics Data System (ADS)
Arrazola, Juan Miguel; Lütkenhaus, Norbert
2014-06-01
We present a protocol for quantum fingerprinting that is ready to be implemented with current technology and is robust to experimental errors. The basis of our scheme is an implementation of the signal states in terms of a coherent state in a superposition of time-bin modes. Experimentally, this requires only the ability to prepare coherent states of low amplitude and to interfere them in a balanced beam splitter. The states used in the protocol are arbitrarily close in trace distance to states of O (log2n) qubits, thus exhibiting an exponential separation in abstract communication complexity compared to the classical case. The protocol uses a number of optical modes that is proportional to the size n of the input bit strings but a total mean photon number that is constant and independent of n. Given the expended resources, our protocol achieves a task that is provably impossible using classical communication only. In fact, even in the presence of realistic experimental errors and loss, we show that there exist a large range of input sizes for which our quantum protocol transmits an amount of information that can be more than two orders of magnitude smaller than a classical fingerprinting protocol.
Fallah, F; Minaei Chenar, H; Amiri, H; Omodipour, S; Shirbande Ghods, F; Kahrizi, D; Sohrabi, M; Ghorbani, T; Kazemi, E
2017-02-28
High quality DNA is essential for molecular research. Secondary metabolites can affect the quantity and quality DNA. In current research two DNA isolation methods including CTAB and Delaporta (protocols 1 & 2 respectively) were applied in three leave samples from Cotinus coggygria, Citrus sinensis and Genus juglans that their leaves are rich of secondary metabolites. We successfully isolated DNA from C. coggygria, C. sinensis and Genus Juglans using the two protocols described above. Good quality DNA was isolated from C. coggygria, C. sinensis and Genus Juglans using protocol 1, while protocol 2 failed to produce usable DNA from these sources. The highest amount of DNA (1.3-1.6) was obtained from them using protocol 1. As we discovered, procedure 1 may work better for plants with secondary metabolites.
Tan, Whye Kit; Lee, Sang-Gon; Lam, Jun Huy; Yoo, Seong-Moo
2013-01-01
Wireless mesh networks (WMNs) can act as a scalable backbone by connecting separate sensor networks and even by connecting WMNs to a wired network. The Hybrid Wireless Mesh Protocol (HWMP) is the default routing protocol for the 802.11s WMN. The routing protocol is one of the most important parts of the network, and it requires protection, especially in the wireless environment. The existing security protocols, such as the Broadcast Integrity Protocol (BIP), Counter with cipher block chaining message authentication code protocol (CCMP), Secure Hybrid Wireless Mesh Protocol (SHWMP), Identity Based Cryptography HWMP (IBC-HWMP), Elliptic Curve Digital Signature Algorithm HWMP (ECDSA-HWMP), and Watchdog-HWMP aim to protect the HWMP frames. In this paper, we have analyzed the vulnerabilities of the HWMP and developed security requirements to protect these identified vulnerabilities. We applied the security requirements to analyze the existing secure schemes for HWMP. The results of our analysis indicate that none of these protocols is able to satisfy all of the security requirements. We also present a quantitative complexity comparison among the protocols and an example of a security scheme for HWMP to demonstrate how the result of our research can be utilized. Our research results thus provide a tool for designing secure schemes for the HWMP. PMID:24002231
Tan, Whye Kit; Lee, Sang-Gon; Lam, Jun Huy; Yoo, Seong-Moo
2013-09-02
Wireless mesh networks (WMNs) can act as a scalable backbone by connecting separate sensor networks and even by connecting WMNs to a wired network. The Hybrid Wireless Mesh Protocol (HWMP) is the default routing protocol for the 802.11s WMN. The routing protocol is one of the most important parts of the network, and it requires protection, especially in the wireless environment. The existing security protocols, such as the Broadcast Integrity Protocol (BIP), Counter with cipher block chaining message authentication code protocol (CCMP), Secure Hybrid Wireless Mesh Protocol (SHWMP), Identity Based Cryptography HWMP (IBC-HWMP), Elliptic Curve Digital Signature Algorithm HWMP (ECDSA-HWMP), and Watchdog-HWMP aim to protect the HWMP frames. In this paper, we have analyzed the vulnerabilities of the HWMP and developed security requirements to protect these identified vulnerabilities. We applied the security requirements to analyze the existing secure schemes for HWMP. The results of our analysis indicate that none of these protocols is able to satisfy all of the security requirements. We also present a quantitative complexity comparison among the protocols and an example of a security scheme for HWMP to demonstrate how the result of our research can be utilized. Our research results thus provide a tool for designing secure schemes for the HWMP.
2014-01-01
Background Sedation in palliative care has received growing attention in recent years; and so have guidelines, position statements, and related literature that provide recommendations for its practice. Yet little is known collectively about the content, scope and methodological quality of these materials. According to research, there are large variations in palliative sedation practice, depending on the definition and methodology used. However, a standardised approach to comparing and contrasting related documents, across countries, associations and governmental bodies is lacking. This paper reports on a protocol designed to enable thorough and systematic comparison of guidelines and guidance documents on palliative sedation. Methods and design A multidisciplinary and international group of palliative care researchers, identified themes and clinical issues on palliative sedation based on expert consultations and evidence drawn from the EAPC (European Association of Palliative Care) framework for palliative sedation and AGREE II (Appraisal Guideline Research and Evaluation) instrument for guideline assessment. The most relevant themes were selected and built into a comprehensive checklist. This was tested on people working closely with practitioners and patients, for user-friendliness and comprehensibility, and modified where necessary. Next, a systematic search was conducted for guidelines in English, Dutch, Flemish, or Italian. The search was performed in multiple databases (PubMed, CancerLit, CNAHL, Cochrane Library, NHS Evidence and Google Scholar), and via other Internet resources. Hereafter, the final version of the checklist will be used to extract data from selected literature, and the same will be compiled, entered into SPSS, cleaned and analysed systematically for publication. Discussion We have together developed a comprehensive checklist in a scientifically rigorous manner to allow standardised and systematic comparison. The protocol is applicable to all guidelines on palliative sedation, and the approach will contribute to rigorous and systematic comparison of international guidelines on any challenging topic such as this. Results from the study will provide valuable insights into common core elements and differences between the selected guidelines, and the extent to which recommendations are derived from, or match those in the EAPC framework. The outcomes of the study will be disseminated via peer-reviewed journals and directly to appropriate audiences. PMID:25028571
Abarshi, Ebun; Rietjens, Judith; Caraceni, Augusto; Payne, Sheila; Deliens, Luc; Van Den Block, Lieve
2014-01-01
Sedation in palliative care has received growing attention in recent years; and so have guidelines, position statements, and related literature that provide recommendations for its practice. Yet little is known collectively about the content, scope and methodological quality of these materials. According to research, there are large variations in palliative sedation practice, depending on the definition and methodology used. However, a standardised approach to comparing and contrasting related documents, across countries, associations and governmental bodies is lacking. This paper reports on a protocol designed to enable thorough and systematic comparison of guidelines and guidance documents on palliative sedation. A multidisciplinary and international group of palliative care researchers, identified themes and clinical issues on palliative sedation based on expert consultations and evidence drawn from the EAPC (European Association of Palliative Care) framework for palliative sedation and AGREE II (Appraisal Guideline Research and Evaluation) instrument for guideline assessment. The most relevant themes were selected and built into a comprehensive checklist. This was tested on people working closely with practitioners and patients, for user-friendliness and comprehensibility, and modified where necessary. Next, a systematic search was conducted for guidelines in English, Dutch, Flemish, or Italian. The search was performed in multiple databases (PubMed, CancerLit, CNAHL, Cochrane Library, NHS Evidence and Google Scholar), and via other Internet resources. Hereafter, the final version of the checklist will be used to extract data from selected literature, and the same will be compiled, entered into SPSS, cleaned and analysed systematically for publication. We have together developed a comprehensive checklist in a scientifically rigorous manner to allow standardised and systematic comparison. The protocol is applicable to all guidelines on palliative sedation, and the approach will contribute to rigorous and systematic comparison of international guidelines on any challenging topic such as this. Results from the study will provide valuable insights into common core elements and differences between the selected guidelines, and the extent to which recommendations are derived from, or match those in the EAPC framework. The outcomes of the study will be disseminated via peer-reviewed journals and directly to appropriate audiences.
Ethical issues faced by field primatologists: asking the relevant questions.
Fedigan, Linda Marie
2010-09-01
Field primatologists face unusual ethical issues. We study animals rather than people and receive research approval from animal care rather than ethics committees. However, animal care evaluation forms are developed from concerns about laboratory animal research and are based on the "Three R's" for humane treatment of captive experimental subjects (replacement, reduction and refinement), which are only debatably relevant to field research. Scientists who study wild, free-ranging primates in host countries experience many ethical dilemmas seldom dealt with in animal care forms. This paper reviews the ethical issues many field primatologists say they face and how these might be better addressed by animal care forms. The ethical issues arising for field researchers are divided into three categories: "Presence, Protocols and People" and for each the most frequent issues are described. The most commonly mentioned ethical concern arising from our presence in the field is the possibility of disease transmission. Although most primate field studies employ only observational protocols, the practice of habituating our study animals to close human presence is an ethical concern for many since it can lessen the animals' fear of all humans, thereby facilitating undesirable behaviors (e.g., crop-raiding) and rendering them vulnerable to harm. Field primatologists who work in host countries must observe national laws and local traditions. As conservationists, primatologists must often negotiate between the resource needs and cultural practices of local people and the interests of the nonhuman primates. Many say they face more ethical dilemmas arising from human interactions than from research on the animals per se. This review concludes with suggestions for relevant questions to ask on animal care forms, and actions that field primatologists can take to better inform animal care committees about the common ethical issues we experience as well as how to develop guidelines for addressing them. (c) 2010 Wiley-Liss, Inc.
Extremely high data-rate, reliable network systems research
NASA Technical Reports Server (NTRS)
Foudriat, E. C.; Maly, Kurt J.; Mukkamala, R.; Murray, Nicholas D.; Overstreet, C. Michael
1990-01-01
Significant progress was made over the year in the four focus areas of this research group: gigabit protocols, extensions of metropolitan protocols, parallel protocols, and distributed simulations. Two activities, a network management tool and the Carrier Sensed Multiple Access Collision Detection (CSMA/CD) protocol, have developed to the point that a patent is being applied for in the next year; a tool set for distributed simulation using the language SIMSCRIPT also has commercial potential and is to be further refined. The year's results for each of these areas are summarized and next year's activities are described.
Fitzpatrick, Emily F M; Carter, Maureen; Oscar, June; Lawford, Tom; Martiniuk, Alexandra L C; D’Antoine, Heather A; Elliott, Elizabeth J
2017-01-01
Introduction Research with Indigenous populations is not always designed with cultural sensitivity. Few publications evaluate or describe in detail seeking consent for research with Indigenous participants. When potential participants are not engaged in a culturally respectful manner, participation rates and research quality can be adversely affected. It is unethical to proceed with research without truly informed consent. Methods and analysis We describe a culturally appropriate research protocol that is invited by Aboriginal communities of the Fitzroy Valley in Western Australia. The Picture Talk Project is a research partnership with local Aboriginal leaders who are also chief investigators. We will interview Aboriginal leaders about research, community engagement and the consent process and hold focus groups with Aboriginal community members about individual consent. Cultural protocols will be applied to recruit and conduct research with participants. Transcripts will be analysed using NVivo10 qualitative software and themes synthesised to highlight the key issues raised by the community about the research process. This protocol will guide future research with the Aboriginal communities of the Fitzroy Valley and may inform the approach to research with other Indigenous communities of Australia or the world. It must be noted that no community is the same and all research requires local consultation and input. To conduct culturally sensitive research, respected local people from the community who have knowledge of cultural protocol and language are engaged to guide each step of the research process from the project design to the delivery of results. Ethics and dissemination Ethics approval was granted by the University of Sydney Human Research Ethics Committee (No. 2012/348, reference:14760), the Western Australia Country Health Service Ethics Committee (No. 2012:15), the Western Australian Aboriginal Health Ethics Committee and reviewed by the Kimberley Aboriginal Health Planning Forum Research Sub-Committee (No. 2012–008). Results will be disseminated through peer review articles, a local Fitzroy Valley report and conference presentations. PMID:29288181
Rosemann, Achim; Chaisinthop, Nattaka
2016-01-01
The article explores the formation of an international politics of resistance and ‘alter-standardization’ in regenerative stem cell medicine. The absence of internationally harmonized regulatory frameworks in the clinical stem cell field and the presence of lucrative business opportunities have resulted in the formation of transnational networks adopting alternative research standards and practices. These oppose, as a universal global standard, strict evidence-based medicine clinical research protocols as defined by scientists and regulatory agencies in highly developed countries. The emergence of transnational spaces of alter-standardization is closely linked to scientific advances in rapidly developing countries such as China and India, but calls for more flexible regulatory frameworks, and the legitimization of experimental for-profit applications outside of evidence-based medical care, are emerging increasingly also within more stringently regulated countries, such as the United States and countries in the European Union. We can observe, then, a trend toward the pluralization of the standards, practices, and concepts in the stem cell field. PMID:26983174
Investigating nurse practitioners in the private sector: a theoretically informed research protocol.
Adams, Margaret; Gardner, Glenn; Yates, Patsy
2017-06-01
To report a study protocol and the theoretical framework normalisation process theory that informs this protocol for a case study investigation of private sector nurse practitioners. Most research evaluating nurse practitioner service is focused on public, mainly acute care environments where nurse practitioner service is well established with strong structures for governance and sustainability. Conversely, there is lack of clarity in governance for emerging models in the private sector. In a climate of healthcare reform, nurse practitioner service is extending beyond the familiar public health sector. Further research is required to inform knowledge of the practice, operational framework and governance of new nurse practitioner models. The proposed research will use a multiple exploratory case study design to examine private sector nurse practitioner service. Data collection includes interviews, surveys and audits. A sequential mixed method approach to analysis of each case will be conducted. Findings from within-case analysis will lead to a meta-synthesis across all four cases to gain a holistic understanding of the cases under study, private sector nurse practitioner service. Normalisation process theory will be used to guide the research process, specifically coding and analysis of data using theory constructs and the relevant components associated with those constructs. This article provides a blueprint for the research and describes a theoretical framework, normalisation process theory in terms of its flexibility as an analytical framework. Consistent with the goals of best research practice, this study protocol will inform the research community in the field of primary health care about emerging research in this field. Publishing a study protocol ensures researcher fidelity to the analysis plan and supports research collaboration across teams. © 2016 John Wiley & Sons Ltd.
Conducting Clinically Based Intimate Partner Violence Research: Safety Protocol Recommendations.
Anderson, Jocelyn C; Glass, Nancy E; Campbell, Jacquelyn C
Maintaining safety is of utmost importance during research involving participants who have experienced intimate partner violence (IPV). Limited guidance on safety protocols to protect participants is available, particularly information related to technology-based approaches to informed consent, data collection, and contacting participants during the course of a study. The purpose of the article is to provide details on the safety protocol developed and utilized with women receiving care at an urban HIV clinic and who were taking part in an observational study of IPV, mental health symptoms, and substance abuse and their relationship to HIV treatment adherence. The protocol presents the technological strategies to promote safety and allow autonomy in participant decision-making throughout the research process, including Voice over Internet Protocol telephone numbers, and tablet-based eligibility screening and data collection. Protocols for management of participants at risk for suicide and/or intimate partner homicide that included automated high-risk messaging to participants and research staff and facilitated disclosure of risk to clinical staff based on participant preferences are discussed. Use of technology and partnership with clinic staff helped to provide an environment where research regarding IPV could be conducted without undue burden or risk to participants. Utilizing tablet-based survey administration provided multiple practical and safety benefits for participants. Most women who screened into high-risk categories for suicide or intimate partner homicide did not choose to have their results shared with their healthcare providers, indicating the importance of allowing participants control over information sharing whenever possible.
Dewitt, James; Capistrant, Benjamin; Kohli, Nidhi; Rosser, B R Simon; Mitteldorf, Darryl; Merengwa, Enyinnaya; West, William
2018-04-24
While deduplication and cross-validation protocols have been recommended for large Web-based studies, protocols for survey response validation of smaller studies have not been published. This paper reports the challenges of survey validation inherent in a small Web-based health survey research. The subject population was North American, gay and bisexual, prostate cancer survivors, who represent an under-researched, hidden, difficult-to-recruit, minority-within-a-minority population. In 2015-2016, advertising on a large Web-based cancer survivor support network, using email and social media, yielded 478 completed surveys. Our manual deduplication and cross-validation protocol identified 289 survey submissions (289/478, 60.4%) as likely spam, most stemming from advertising on social media. The basic components of this deduplication and validation protocol are detailed. An unexpected challenge encountered was invalid survey responses evolving across the study period. This necessitated the static detection protocol be augmented with a dynamic one. Five recommendations for validation of Web-based samples, especially with smaller difficult-to-recruit populations, are detailed. ©James Dewitt, Benjamin Capistrant, Nidhi Kohli, B R Simon Rosser, Darryl Mitteldorf, Enyinnaya Merengwa, William West. Originally published in JMIR Research Protocols (http://www.researchprotocols.org), 24.04.2018.
Kim, Jane Paik; Roberts, Laura Weiss
Empirical ethics inquiry works from the notion that stakeholder perspectives are necessary for gauging the ethical acceptability of human studies and assuring that research aligns with societal expectations. Although common, studies involving different populations often entail comparisons of trends that problematize the interpretation of results. Using graphical model selection - a technique aimed at transcending limitations of conventional methods - this report presents data on the ethics of clinical research with two objectives: (1) to display the patterns of views held by ill and healthy individuals in clinical research as a test of the study's original hypothesis and (2) to introduce graphical model selection as a key analytic tool for ethics research. In this IRB-approved, NIH-funded project, data were collected from 60 mentally ill and 43 physically ill clinical research protocol volunteers, 47 healthy protocol-consented participants, and 29 healthy individuals without research protocol experience. Respondents were queried on the ethical acceptability of research involving people with mental and physical illness (i.e., cancer, HIV, depression, schizophrenia, and post-traumatic stress disorder) and non-illness related sources of vulnerability (e.g., age, class, gender, ethnicity). Using a statistical algorithm, we selected graphical models to display interrelationships among responses to questions. Both mentally and physically ill protocol volunteers revealed a high degree of connectivity among ethically-salient perspectives. Healthy participants, irrespective of research protocol experience, revealed patterns of views that were not highly connected. Between ill and healthy protocol participants, the pattern of views is vastly different. Experience with illness was tied to dense connectivity, whereas healthy individuals expressed views with sparse connections. In offering a nuanced perspective on the interrelation of ethically relevant responses, graphical model selection has the potential to bring new insights to the field of ethics.
Position paper: Rationale for the treatment of Wilms tumour in the UMBRELLA SIOP-RTSG 2016 protocol.
van den Heuvel-Eibrink, Marry M; Hol, Janna A; Pritchard-Jones, Kathy; van Tinteren, Harm; Furtwängler, Rhoikos; Verschuur, Arnauld C; Vujanic, Gordan M; Leuschner, Ivo; Brok, Jesper; Rübe, Christian; Smets, Anne M; Janssens, Geert O; Godzinski, Jan; Ramírez-Villar, Gema L; de Camargo, Beatriz; Segers, Heidi; Collini, Paola; Gessler, Manfred; Bergeron, Christophe; Spreafico, Filippo; Graf, Norbert
2017-12-01
The Renal Tumour Study Group of the International Society of Paediatric Oncology (SIOP-RTSG) has developed a new protocol for the diagnosis and treatment of childhood renal tumours, the UMBRELLA SIOP-RTSG 2016 (the UMBRELLA protocol), to continue international collaboration in the treatment of childhood renal tumours. This protocol will support integrated biomarker and imaging research, focussing on assessing the independent prognostic value of genomic changes within the tumour and the volume of the blastemal component that survives preoperative chemotherapy. Treatment guidelines for Wilms tumours in the UMBRELLA protocol include recommendations for localized, metastatic, and bilateral disease, for all age groups, and for relapsed disease. These recommendations have been established by a multidisciplinary panel of leading experts on renal tumours within the SIOP-RTSG. The UMBRELLA protocol should promote international collaboration and research and serve as the SIOP-RTSG best available treatment standard.
Haby, Michelle M.; Martínez-Vega, Ruth; Pinzón-Flores, Carlos E.; Smith, Emma; Pinart, Mariona; Broutet, Nathalie; Becerra-Posada, Francisco; Aldighieri, Sylvain; Van Kerkhove, Maria D.
2017-01-01
Introduction Given the severity and impact of the current Zika virus (ZIKV) outbreak in the Americas, numerous countries have rushed to develop research studies to assess ZIKV and its potential health consequences. In an effort to ensure that studies are comprehensive, both internally and externally valid, and with reliable results, the World Health Organization, the Pan American Health Organization, Institut Pasteur, the networks of Fiocruz, the Consortia for the Standardization of Influenza Seroepidemiology (CONSISE) and the International Severe Acute Respiratory and Emerging Infection Consortium (ISARIC) have generated six standardized clinical and epidemiological research protocols and questionnaires to address key public health questions on ZIKV. Methods We conducted a systematic search of ongoing study protocols related to ZIKV research. We analyzed the content of protocols of 32 cohort studies and 13 case control studies for systematic bias that could produce erroneous results. Additionally we aimed to characterize the risks of bias and confounding in observational studies related to ZIKV and to propose ways to minimize them, including the use of six newly standardized research protocols. Results Observational studies of ZIKV face an array of challenges, including measurement of exposure and outcomes (microcephaly and Guillain-Barré Syndrome). Potential confounders need to be measured where known and controlled for in the analysis. Selection bias due to non-random selection is a significant issue, particularly in the case-control design, and losses to follow-up is equally important for the cohort design. Conclusion Observational research seeking to answer key questions on the ZIKV should consider these restrictions and take precautions to minimize bias in an effort to provide reliable and valid results. Utilization of the standardized research protocols developed by the WHO, PAHO, Institut Pasteur, and CONSISE will harmonize the key methodological aspects of each study design to minimize bias at different stages of the study. Biases need to be considered by researchers implementing the standardized protocols as well as by users of observational epidemiological studies of ZIKV. PMID:28686621
Linear modeling of human hand-arm dynamics relevant to right-angle torque tool interaction.
Ay, Haluk; Sommerich, Carolyn M; Luscher, Anthony F
2013-10-01
A new protocol was evaluated for identification of stiffness, mass, and damping parameters employing a linear model for human hand-arm dynamics relevant to right-angle torque tool use. Powered torque tools are widely used to tighten fasteners in manufacturing industries. While these tools increase accuracy and efficiency of tightening processes, operators are repetitively exposed to impulsive forces, posing risk of upper extremity musculoskeletal injury. A novel testing apparatus was developed that closely mimics biomechanical exposure in torque tool operation. Forty experienced torque tool operators were tested with the apparatus to determine model parameters and validate the protocol for physical capacity assessment. A second-order hand-arm model with parameters extracted in the time domain met model accuracy criterion of 5% for time-to-peak displacement error in 93% of trials (vs. 75% for frequency domain). Average time-to-peak handle displacement and relative peak handle force errors were 0.69 ms and 0.21%, respectively. Model parameters were significantly affected by gender and working posture. Protocol and numerical calculation procedures provide an alternative method for assessing mechanical parameters relevant to right-angle torque tool use. The protocol more closely resembles tool use, and calculation procedures demonstrate better performance of parameter extraction using time domain system identification methods versus frequency domain. Potential future applications include parameter identification for in situ torque tool operation and equipment development for human hand-arm dynamics simulation under impulsive forces that could be used for assessing torque tools based on factors relevant to operator health (handle dynamics and hand-arm reaction force).
NASA Technical Reports Server (NTRS)
Hooker, Stanford B. (Editor); Firestone, Elaine R. (Editor); Acker, James G. (Editor); Mueller, James L.; Austin, Roswell W.
1995-01-01
This report presents protocols for measuring optical properties, and other environmental variables, to validate the radiometric performance of the Sea-viewing Wide Field-of-view Sensor (SeaWiFS), and to develop and validate bio-optical algorithms for use with SeaWiFS data. The protocols are intended to establish foundations for a measurement strategy to verify the challenging SeaWiFS uncertainty goals of 5 percent in water-leaving radiances and 35 percent in chlorophyll alpha concentration. The protocols first specify the variables which must be measured, and briefly review the rationale for measuring each variable. Subsequent chapters cover detailed protocols for instrument performance specifications, characterizing and calibrating instruments, methods of making measurements in the field, and methods of data analysis. These protocols were developed at a workshop sponsored by the SeaWiFS Project Office (SPO) and held at the Naval Postgraduate School in Monterey, California (9-12 April 1991). This report began as the proceedings of the workshop, as interpreted and expanded by the authors and reviewed by workshop participants and other members of the bio-optical research community. The protocols are an evolving prescription to allow the research community to approach the unprecedented measurement uncertainties implied by the SeaWiFS goals; research and development are needed to improve the state-of-the-art in specific areas. These protocols should be periodically revised to reflect technical advances during the SeaWiFS Project cycle. The present edition (Revision 1) incorporates new protocols in several areas, including expanded protocol descriptions for Case-2 waters and other improvements, as contributed by several members of the SeaWiFS Science Team.
Gautier, Isabelle; Janiaud, Perrine; Rollet, Nelly; André, Nicolas; Tsimaratos, Michel; Cornu, Catherine; Malik, Salma; Gentile, Stéphanie; Kassaï, Behrouz
2017-08-23
There is a great need for high quality clinical research for children. The European Pediatric Regulation aimed to improve the quality of clinical trials in order to increase the availability of treatments for children. The main purpose of this study was to assess the evolution of both the number and the quality of pediatric trial protocols that were submitted to a French Institutional Review Board (IRB00009118) before and after the initiation of the EU Pediatric Regulation. All protocols submitted to the IRB00009118 between 2003 and 2014 and conducting research on subjects under eighteen years of age were eligible. The quality of randomized clinical trials was assessed according to the guidelines developed by the Enhancing the QUAlity and Transparency Of health Research (EQUATOR) Network and ranked using the Jadad score. Out of 622 protocols submitted to the Institutional Review Board (IRB), 21% (133/622) included children. Among these 133 pediatric protocols, the number of submitted pediatric protocols doubled between the two studied periods. From 2003 to 2008, 47 protocols including 21 institutionally sponsored were submitted to the IRB and from 2009 until 2014, 86 protocols including 48 institutionally sponsored were submitted. No significant trend was observed on the quality of RCTs. The overall median score of RCTs on the Jadad scale was high (3.5), 70.0% of protocols had a Jadad score ≥ 3, and 30.0% had a score < 3. Following the EU Pediatric Regulation, the number of pediatric protocols submitted to the IRB00009118 tends to increase, but no change was noticed regarding their quality.
Kasenda, Benjamin; Schandelmaier, Stefan; Sun, Xin; von Elm, Erik; You, John; Blümle, Anette; Tomonaga, Yuki; Saccilotto, Ramon; Amstutz, Alain; Bengough, Theresa; Meerpohl, Joerg J; Stegert, Mihaela; Olu, Kelechi K; Tikkinen, Kari A O; Neumann, Ignacio; Carrasco-Labra, Alonso; Faulhaber, Markus; Mulla, Sohail M; Mertz, Dominik; Akl, Elie A; Bassler, Dirk; Busse, Jason W; Ferreira-González, Ignacio; Lamontagne, Francois; Nordmann, Alain; Gloy, Viktoria; Raatz, Heike; Moja, Lorenzo; Rosenthal, Rachel; Ebrahim, Shanil; Vandvik, Per O; Johnston, Bradley C; Walter, Martin A; Burnand, Bernard; Schwenkglenks, Matthias; Hemkens, Lars G; Bucher, Heiner C; Guyatt, Gordon H; Briel, Matthias
2014-07-16
To investigate the planning of subgroup analyses in protocols of randomised controlled trials and the agreement with corresponding full journal publications. Cohort of protocols of randomised controlled trial and subsequent full journal publications. Six research ethics committees in Switzerland, Germany, and Canada. 894 protocols of randomised controlled trial involving patients approved by participating research ethics committees between 2000 and 2003 and 515 subsequent full journal publications. Of 894 protocols of randomised controlled trials, 252 (28.2%) included one or more planned subgroup analyses. Of those, 17 (6.7%) provided a clear hypothesis for at least one subgroup analysis, 10 (4.0%) anticipated the direction of a subgroup effect, and 87 (34.5%) planned a statistical test for interaction. Industry sponsored trials more often planned subgroup analyses compared with investigator sponsored trials (195/551 (35.4%) v 57/343 (16.6%), P<0.001). Of 515 identified journal publications, 246 (47.8%) reported at least one subgroup analysis. In 81 (32.9%) of the 246 publications reporting subgroup analyses, authors stated that subgroup analyses were prespecified, but this was not supported by 28 (34.6%) corresponding protocols. In 86 publications, authors claimed a subgroup effect, but only 36 (41.9%) corresponding protocols reported a planned subgroup analysis. Subgroup analyses are insufficiently described in the protocols of randomised controlled trials submitted to research ethics committees, and investigators rarely specify the anticipated direction of subgroup effects. More than one third of statements in publications of randomised controlled trials about subgroup prespecification had no documentation in the corresponding protocols. Definitive judgments regarding credibility of claimed subgroup effects are not possible without access to protocols and analysis plans of randomised controlled trials. © The DISCO study group 2014.
van Lent, Marlies; Rongen, Gerard A; Out, Henk J
2014-12-10
Submission of study protocols to research ethics committees (RECs) constitutes one of the earliest stages at which planned trials are documented in detail. Previous studies have investigated the amendments requested from researchers by RECs, but the type of issues raised during REC review have not been compared by sponsor type. The objective of this study was to identify recurring shortcomings in protocols of drug trials based on REC comments and to assess whether these were more common among industry-sponsored or non-industry trials. Retrospective analysis of 226 protocols of drug trials approved in 2010-2011 by three RECs affiliated to academic medical centres in The Netherlands. For each protocol, information on sponsorship, number of participating centres, participating countries, study phase, registration status of the study drug, and type and number of subjects was retrieved. REC comments were extracted from decision letters sent to investigators after review and were classified using a predefined checklist that was based on legislation and guidelines on clinical drug research and previous literature. Most protocols received comments regarding participant information and consent forms (n = 182, 80.5%), methodology and statistical analyses (n = 160, 70.8%), and supporting documentation, including trial agreements and certificates of insurance (n = 154, 68.1%). Of the submitted protocols, 122 (54.0%) were non-industry and 104 (46.0%) were industry-sponsored trials. Non-industry trials more often received comments on subject selection (n = 44, 36.1%) than industry-sponsored trials (n = 18, 17.3%; RR, 1.58; 95% CI, 1.01 to 2.47), and on methodology and statistical analyses (n = 95, 77.9% versus n = 65, 62.5%, respectively; RR, 1.18; 95% CI, 1.01 to 1.37). Non-industry trials less often received comments on supporting documentation (n = 72, 59.0%) than industry-sponsored trials (n = 82, 78.8%; RR, 0.83; 95% CI, 0.72 to 0.95). RECs identified important ethical and methodological shortcomings in protocols of both industry-sponsored and non-industry drug trials. Investigators, especially of non-industry trials, should better prepare their research protocols in order to facilitate the ethical review process.
Verkest, K R; Fleeman, L M; Rand, J S; Morton, J M
2010-10-01
There is need for simple, inexpensive measures of glucose tolerance, insulin sensitivity, and insulin secretion in dogs. The aim of this study was to estimate the closeness of correlation between fasting and dynamic measures of insulin sensitivity and insulin secretion, the precision of fasting measures, and the agreement between results of standard and simplified glucose tolerance tests in dogs. A retrospective descriptive study using 6 naturally occurring obese and 6 lean dogs was conducted. Data from frequently sampled intravenous glucose tolerance tests (FSIGTTs) in 6 obese and 6 lean client-owned dogs were used to calculate HOMA, QUICKI, fasting glucose and insulin concentrations. Fasting measures of insulin sensitivity and secretion were compared with MINMOD analysis of FSIGTTs using Pearson correlation coefficients, and they were evaluated for precision by the discriminant ratio. Simplified sampling protocols were compared with standard FSIGTTs using Lin's concordance correlation coefficients, limits of agreement, and Pearson correlation coefficients. All fasting measures except fasting plasma glucose concentration were moderately correlated with MINMOD-estimated insulin sensitivity (|r| = 0.62-0.80; P < 0.03), and those that combined fasting insulin and glucose were moderately closely correlated with MINMOD-estimated insulin secretion (r = 0.60-0.79; P < 0.04). HOMA calculated using the nonlinear formulae had the closest estimated correlation (r = 0.77 and 0.74) and the best discrimination for insulin sensitivity and insulin secretion (discriminant ratio 4.4 and 3.4, respectively). Simplified sampling protocols with half as many samples collected over 3 h had close agreement with the full sampling protocol. Fasting measures and simplified intravenous glucose tolerance tests reflect insulin sensitivity and insulin secretion derived from frequently sampled glucose tolerance tests with MINMOD analysis in dogs. Copyright 2010 Elsevier Inc. All rights reserved.
Roberts, J. Scott; Shalowitz, David I.; Christensen, Kurt D.; Everett, Jessica N.; Kim, Scott Y. H.; Raskin, Leon; Gruber, Stephen B.
2011-01-01
The obligations of researchers to disclose clinically and/or personally significant individual research results are highly debated, but few empirical studies have addressed this topic. We describe the development of a protocol for returning research results to participants at one site of a multicenter study of the genetic epidemiology of melanoma. Protocol development involved numerous challenges: (1) deciding whether genotype results merited disclosure; (2) achieving an appropriate format for communicating results; (3) developing education materials; (4) deciding whether to retest samples for additional laboratory validation; (5) identifying and notifying selected participants; and (6) assessing the impact of disclosure. Our experience suggests potential obstacles depending on researcher resources and the design of the parent study, but offers a process by which researchers can responsibly return individual study results and evaluate the impact of disclosure. PMID:20831418
Increasing chronic disease research capacity in Guatemala through a mentoring program.
Barnoya, Joaquin; Monzon, Jose C; Colditz, Graham A
2013-09-12
The Chronic Disease Research Fellowship Program (RFP) aims to build the research capacity of recent medical graduates to support the development of chronic disease control strategies. Guatemala is undergoing an epidemiologic transition. However, given the way universities and the health care system are structured, it lacks an environment that fosters research careers and generates the required knowledge to implement sound public health policies and clinical strategies. The RFP was implemented at the Cardiovascular Unit of Guatemala. This 4-year Program recruited two one-year fellows and provided funding to define a research topic, write a protocol and implement the research. Strong emphasis is placed on developing skills in knowledge translation and exchange to bridge the "know-do" gap. Close mentoring relationships between the Principal Investigator and former and current fellows are fostered through the Program. The mentoring Program has generated strategic data to support the implementation of sound chronic disease control strategies, mainly related to tobacco control. Results have been presented nationally and internationally. Research training has included principles of biostatistics and epidemiology, and a journal club. The Program is increasingly generating interest among medical graduates to pursue further research training abroad and is building local research capacity. Fellows and research assistants have created a research network in Guatemala and abroad. The main obstacle the Program faces is ensuring long-term sustainability. A mentoring program can lead to an increase in research interest and capacity in a low-income country with little research infrastructure.
Meeting Submission Deadlines--A Shared Responsibility.
ERIC Educational Resources Information Center
Nachby, Andrew L.
1979-01-01
A research administrator is seen as one who provides an environment conducive to the performance of research by allowing the principal investigator to spend as little time as possible with administrative paperwork. A protocol routing sheet and a checklist for protocol submissions are provided. (MLW)
Conducting a successful residency research project.
Barletta, Jeffrey F
2008-08-15
The residency research project can be a challenging endeavor for pharmacy residents since they typically have limited experience in this area. Furthermore, as the number of accredited residency programs has increased, so has the demand for preceptors with research experience. This review is intended to assist the resident and preceptor by providing steps and guidance with conducting a successful residency research project. Items such as idea generation, proposing the right type of project, departmental review, and project management skills are discussed and guidance with writing the research protocol is provided. Items that must be addressed in every research protocol are described and a generalized protocol template is presented. In addition, the institutional review board review process is described and tips and pointers for obtaining approval are included. Finally, useful tools and resources are provided that can be used up front or throughout each phase of the research project.
Brody, Janet L.; Annett, Robert D.; Scherer, David G.; Perryman, Mandy L.; Cofrin, Keely M. W.
2007-01-01
Purpose Much has been written about conceptual concern for voluntary assent with children and adolescents. However, little empirical data exists examining the frequency with which, or context in which, adolescents and parents disagree on research participation decisions. The purpose of this study was to compare parent and adolescent willingness to participate in minimal and above minimal risk pediatric asthma research protocols. Method 36 adolescents diagnosed with asthma and one of their parents independently rated their willingness to participate in 9 pediatric asthma research protocol vignettes. The selected protocols were chosen by an expert panel as representative of typical minimal and above minimal risk pediatric asthma studies. Results Parents and adolescents were significantly less likely to agree to enroll in above minimal risk studies. However, this was qualified by a finding that adolescents were significantly more willing than parents to enroll in above minimal risk research. Across all 9 studies, parents and adolescents held concordant views on participation decisions approximately 60% of the time. Perception of potential study benefit was the most frequent reason provided for participation decisions by both parents and adolescents. Conclusion Parents and their adolescents report a consistent 40% discordance in their views about participating in asthma research across a variety of asthma research protocols, with adolescents more willing than their parents to enroll in above minimal risk studies. These differences of opinion highlight the need to carefully consider the process by which families are offered the option of adolescent research participation. PMID:16109343
Protocols for Automated Protist Analysis
2011-12-01
Report No: CG-D-14-13 Protocols for Automated Protist Analysis December 2011 Distribution Statement A: Approved for public...release; distribution is unlimited. Protocols for Automated Protist Analysis ii UNCLAS//Public | CG-926 RDC | B. Nelson, et al. | Public...Director United States Coast Guard Research & Development Center 1 Chelsea Street New London, CT 06320 Protocols for Automated Protist Analysis
Code of Federal Regulations, 2014 CFR
2014-07-01
..., and Process Heaters Using Portable Analyzers”, EMC Conditional Test Protocol 30 (CTM-30), Gas Research... cell design(s) conforming to this protocol will determine the analytical range for each gas component..., selective gas scrubbers, etc.) to meet the design specifications of this protocol. Do not make changes to...
Code of Federal Regulations, 2013 CFR
2013-07-01
..., and Process Heaters Using Portable Analyzers”, EMC Conditional Test Protocol 30 (CTM-30), Gas Research... cell design(s) conforming to this protocol will determine the analytical range for each gas component..., selective gas scrubbers, etc.) to meet the design specifications of this protocol. Do not make changes to...
Hamilton, Alison B; Farmer, Melissa M; Moin, Tannaz; Finley, Erin P; Lang, Ariel J; Oishi, Sabine M; Huynh, Alexis K; Zuchowski, Jessica; Haskell, Sally G; Bean-Mayberry, Bevanne
2017-11-07
The Enhancing Mental and Physical health of Women through Engagement and Retention or EMPOWER program represents a partnership with the US Department of Veterans Health Administration (VA) Health Service Research and Development investigators and the VA Office of Women's Health, National Center for Disease Prevention and Health Promotion, Primary Care-Mental Health Integration Program Office, Women's Mental Health Services, and the Office of Patient Centered Care and Cultural Transformation. EMPOWER includes three projects designed to improve women Veterans' engagement and retention in evidence-based care for high-priority health conditions, i.e., prediabetes, cardiovascular, and mental health. The three proposed projects will be conducted in VA primary care clinics that serve women Veterans including general primary care and women's health clinics. The first project is a 1-year quality improvement project targeting diabetes prevention. Two multi-site research implementation studies will focus on cardiovascular risk prevention and collaborative care to address women Veterans' mental health treatment needs respectively. All projects will use the evidence-based Replicating Effective Programs (REP) implementation strategy, enhanced with multi-stakeholder engagement and complexity theory. Mixed methods implementation evaluations will focus on investigating primary implementation outcomes of adoption, acceptability, feasibility, and reach. Program-wide organizational-, provider-, and patient-level measures and tools will be utilized to enhance synergy, productivity, and impact. Both implementation research studies will use a non-randomized stepped wedge design. EMPOWER represents a coherent program of women's health implementation research and quality improvement that utilizes cross-project implementation strategies and evaluation methodology. The EMPOWER Quality Enhancement Research Initiative (QUERI) will constitute a major milestone for realizing women Veterans' engagement and empowerment in the VA system. EMPOWER QUERI will be conducted in close partnership with key VA operations partners, such as the VA Office of Women's Health, to disseminate and spread the programs nationally. The two implementation research studies described in this protocol have been registered as required: Facilitating Cardiovascular Risk Screening and Risk Reduction in Women Veterans: Trial registration NCT02991534 , registered 9 December 2016. Implementation of Tailored Collaborative Care for Women Veterans: Trial registration NCT02950961 , registered 21 October 2016.
Furberg, Robert D; Ortiz, Alexa M; Zulkiewicz, Brittany A; Hudson, Jordan P; Taylor, Olivia M; Lewis, Megan A
2016-06-27
Tablet-based health care interventions have the potential to encourage patient care in a timelier manner, allow physicians convenient access to patient records, and provide an improved method for patient education. However, along with the continued adoption of tablet technologies, there is a concomitant need to develop protocols focusing on the configuration, management, and maintenance of these devices within the health care setting to support the conduct of clinical research. Develop three protocols to support tablet configuration, tablet management, and tablet maintenance. The Configurator software, Tile technology, and current infection control recommendations were employed to develop three distinct protocols for tablet-based digital health interventions. Configurator is a mobile device management software specifically for iPhone operating system (iOS) devices. The capabilities and current applications of Configurator were reviewed and used to develop the protocol to support device configuration. Tile is a tracking tag associated with a free mobile app available for iOS and Android devices. The features associated with Tile were evaluated and used to develop the Tile protocol to support tablet management. Furthermore, current recommendations on preventing health care-related infections were reviewed to develop the infection control protocol to support tablet maintenance. This article provides three protocols: the Configurator protocol, the Tile protocol, and the infection control protocol. These protocols can help to ensure consistent implementation of tablet-based interventions, enhance fidelity when employing tablets for research purposes, and serve as a guide for tablet deployments within clinical settings.
Nollett, Claire; Kelson, Mark; Hood, Kerenza
2016-11-01
The Study Within a Trial (SWAT) program exists to 'embed research within research, so as to resolve uncertainties about the different ways of designing, conducting, analyzing, and interpreting evaluations of health and social care' (1). Published in this journal in 2013, a template for the first SWAT protocol outlined an investigation into the effects of site visits by the principal investigator on recruitment in multicentre randomized controlled trials (1). We have now designed a SWAT protocol to extend this question and ask 'does it matter who conducts the site visit?' Our aim is to provide a protocol that trials can implement to address this research question. © 2016 Chinese Cochrane Center, West China Hospital of Sichuan University and John Wiley & Sons Australia, Ltd.
Advanced teleprocessing systems
NASA Astrophysics Data System (ADS)
Kleinrock, L.; Gerla, M.
1982-09-01
This Annual Technical Report covers research covering the period from October 1, 1981 to September 30, 1982. This contract has three primary designated research areas: packet radio systems, resource sharing and allocation, and distributed processing and control. This report contains abstracts of publications which summarize research results in these areas followed by the main body of the report which is devoted to a study of channel access protocols that are executed by the nodes of a network to schedule their transmissions on multi-access broadcast channel. In particular the main body consists of a Ph.D. dissertation, Channel Access Protocols for Multi-Hop Broadcast Packet Radio Networks. This work discusses some new channel access protocols useful for mobile radio networks. Included is an analysis of slotted ALOHA and some tight bounds on the performance of all possible protocols in a mobile environment.
Privacy-preserving search for chemical compound databases.
Shimizu, Kana; Nuida, Koji; Arai, Hiromi; Mitsunari, Shigeo; Attrapadung, Nuttapong; Hamada, Michiaki; Tsuda, Koji; Hirokawa, Takatsugu; Sakuma, Jun; Hanaoka, Goichiro; Asai, Kiyoshi
2015-01-01
Searching for similar compounds in a database is the most important process for in-silico drug screening. Since a query compound is an important starting point for the new drug, a query holder, who is afraid of the query being monitored by the database server, usually downloads all the records in the database and uses them in a closed network. However, a serious dilemma arises when the database holder also wants to output no information except for the search results, and such a dilemma prevents the use of many important data resources. In order to overcome this dilemma, we developed a novel cryptographic protocol that enables database searching while keeping both the query holder's privacy and database holder's privacy. Generally, the application of cryptographic techniques to practical problems is difficult because versatile techniques are computationally expensive while computationally inexpensive techniques can perform only trivial computation tasks. In this study, our protocol is successfully built only from an additive-homomorphic cryptosystem, which allows only addition performed on encrypted values but is computationally efficient compared with versatile techniques such as general purpose multi-party computation. In an experiment searching ChEMBL, which consists of more than 1,200,000 compounds, the proposed method was 36,900 times faster in CPU time and 12,000 times as efficient in communication size compared with general purpose multi-party computation. We proposed a novel privacy-preserving protocol for searching chemical compound databases. The proposed method, easily scaling for large-scale databases, may help to accelerate drug discovery research by making full use of unused but valuable data that includes sensitive information.
Privacy-preserving search for chemical compound databases
2015-01-01
Background Searching for similar compounds in a database is the most important process for in-silico drug screening. Since a query compound is an important starting point for the new drug, a query holder, who is afraid of the query being monitored by the database server, usually downloads all the records in the database and uses them in a closed network. However, a serious dilemma arises when the database holder also wants to output no information except for the search results, and such a dilemma prevents the use of many important data resources. Results In order to overcome this dilemma, we developed a novel cryptographic protocol that enables database searching while keeping both the query holder's privacy and database holder's privacy. Generally, the application of cryptographic techniques to practical problems is difficult because versatile techniques are computationally expensive while computationally inexpensive techniques can perform only trivial computation tasks. In this study, our protocol is successfully built only from an additive-homomorphic cryptosystem, which allows only addition performed on encrypted values but is computationally efficient compared with versatile techniques such as general purpose multi-party computation. In an experiment searching ChEMBL, which consists of more than 1,200,000 compounds, the proposed method was 36,900 times faster in CPU time and 12,000 times as efficient in communication size compared with general purpose multi-party computation. Conclusion We proposed a novel privacy-preserving protocol for searching chemical compound databases. The proposed method, easily scaling for large-scale databases, may help to accelerate drug discovery research by making full use of unused but valuable data that includes sensitive information. PMID:26678650
Goldhamer, Alan C; Klaper, Michael; Foorohar, Afsoon; Myers, Toshia R
2015-12-10
Follicular lymphoma (FL), the second most common non-Hodgkin's lymphoma (NHL), is well characterised by a classic histological appearance and an indolent course. Current treatment protocols for FL range from close observation to immunotherapy, chemotherapy and/or radiotherapies. We report the case of a 42-year-old woman diagnosed by excisional biopsy with stage IIIa, grade 1 FL. In addition to close observation, the patient underwent a medically supervised, 21-day water-only fast after which enlarged lymph nodes were substantially reduced in size. The patient then consumed a diet of minimally processed plant foods free of added sugar, oil and salt (SOS), and has remained on the diet since leaving the residential facility. At 6 and 9-month follow-up visits, the patient's lymph nodes were non-palpable and she remained asymptomatic. This case establishes a basis for further studies evaluating water-only fasting and a plant foods, SOS-free diet as a treatment protocol for FL. 2015 BMJ Publishing Group Ltd.
Klaper, Michael; Foorohar, Afsoon; Myers, Toshia R
2015-01-01
Follicular lymphoma (FL), the second most common non-Hodgkin's lymphoma (NHL), is well characterised by a classic histological appearance and an indolent course. Current treatment protocols for FL range from close observation to immunotherapy, chemotherapy and/or radiotherapies. We report the case of a 42-year-old woman diagnosed by excisional biopsy with stage IIIa, grade 1 FL. In addition to close observation, the patient underwent a medically supervised, 21-day water-only fast after which enlarged lymph nodes were substantially reduced in size. The patient then consumed a diet of minimally processed plant foods free of added sugar, oil and salt (SOS), and has remained on the diet since leaving the residential facility. At 6 and 9-month follow-up visits, the patient's lymph nodes were non-palpable and she remained asymptomatic. This case establishes a basis for further studies evaluating water-only fasting and a plant foods, SOS-free diet as a treatment protocol for FL. PMID:26655228
SUPPLEMENT TO: STANDARD MEASUREMENT PROTOCOLS - FLORIDA RADON RESEARCH PROGRAM
The report supplements earlier published standard protocols for key measurements where data quality is vital to the Florida Radon Research Program. The report adds measurements of small canister radon flux and soil water potential to the section on soil measurements. It adds indo...
34 CFR Appendix to Part 5 - Unknown Title
Code of Federal Regulations, 2010 CFR
2010-07-01
... the Department. Research protocol, design, processing, and other technical information to the extent... report submitted for comment prior to acceptance. Research protocol, design, processing, and other...-10) Pt. 5, App. Appendix to Part 5 [The following are some examples of specific records (or specific...
Preparing Protocols for Institutional Review Boards.
ERIC Educational Resources Information Center
Lyons, Charles M.
1983-01-01
Introduces the process by which Institutional Review Boards (IRBs) review proposals for research involving human subjects. Describes the composition of IRBs. Presents the Nuremberg code, the elements of informed consent, the judging criteria for proposals, and a sample protocol format. References newly published regulations governing research with…
Health and the Built Environment: Exploring Foundations for a New Interdisciplinary Profession
Kent, Jennifer; Thompson, Susan
2012-01-01
The supportive role of the built environment for human health is a growing area of interdisciplinary research, evidence-based policy development, and related practice. Nevertheless, despite closely linked origins, the contemporary professions of public health and urban planning largely operate within the neoliberal framework of academic, political, and policy silos. A reinvigorated relationship between the two is fundamental to building and sustaining an effective “healthy built environment profession.” A recent comprehensive review of the burgeoning literature on healthy built environments identified an emergent theme which we have termed “Professional Development.” This literature relates to the development of relationships between health and built environment professionals. It covers case studies illustrating good practice models for policy change, as well as ways professionals can work to translate research into policy. Intertwined with this empirical research is a dialogue on theoretical tensions emerging as health and built environment practitioners and researchers seek to establish mutual understanding and respect. The nature of evidence required to justify policy change, for example, has surfaced as an area of asynchrony between accepted disciplinary protocols. Our paper discusses this important body of research with a view to initiating and supporting the ongoing development of an interdisciplinary profession of healthy planning. PMID:23028393
Abduo, Jaafar; Chen, Chen; Le Breton, Eugene; Radu, Alexandra; Szeto, Josephine; Judge, Roy; Darby, Ivan
To compare the Encode impression protocol (Biomet 3i) with the conventional impression protocol in terms of treatment duration, clinical accuracy, and outcome up to the first postplacement review of single-implant crowns. A total of 45 implants were included in this study. The implants were randomly allocated to the Encode group (23 implants) or the conventional group (22 implants). At the time of surgery, all implants received two-piece Encode healing abutments. The implants were restored 3 months after insertion. In the conventional protocol, open-tray implant-level impressions were taken and the implants were restored with prefabricated abutments and porcelain-fused-to-metal (PFM) crowns. For the implants in the Encode group, closed-tray impressions of the healing abutments were taken. The generated casts were sent to the Biomet 3i scanning/milling center for custom abutment manufacturing on which PFM crowns were fabricated. Treatment duration (laboratory and clinical), clinical accuracy of occlusal and proximal contacts, and outcome (esthetics, patient satisfaction, and crown contour) were evaluated with the aid of a series of questionnaires. The Encode protocol required significantly less laboratory time (18 minutes) than the conventional protocol for adjustment of the abutments. The impression pour time, time for the laboratory to return the crown, time for crown insertion at the final appointment, and total clinical time for crown insertion did not differ significantly between the two protocols. Likewise, clinical accuracy, esthetics, and patient satisfaction were similar for the two protocols. The two protocols were clinically comparable. The Encode protocol is advantageous in reducing the laboratory time before crown fabrication.
The deployment of routing protocols in distributed control plane of SDN.
Jingjing, Zhou; Di, Cheng; Weiming, Wang; Rong, Jin; Xiaochun, Wu
2014-01-01
Software defined network (SDN) provides a programmable network through decoupling the data plane, control plane, and application plane from the original closed system, thus revolutionizing the existing network architecture to improve the performance and scalability. In this paper, we learned about the distributed characteristics of Kandoo architecture and, meanwhile, improved and optimized Kandoo's two levels of controllers based on ideological inspiration of RCP (routing control platform). Finally, we analyzed the deployment strategies of BGP and OSPF protocol in a distributed control plane of SDN. The simulation results show that our deployment strategies are superior to the traditional routing strategies.
Pal, Krishnendu; Gangopadhyay, Gautam
2016-01-01
ABSTRACT Inactivation path of voltage gated sodium channel has been studied here under various voltage protocols as it is the main governing factor for the periodic occurrence and shape of the action potential. These voltage protocols actually serve as non-equilibrium response spectroscopic tools to study the ion channel in non-equilibrium environment. In contrast to a lot of effort in finding the crystal structure based molecular mechanism of closed-state(CSI) and open-state inactivation(OSI); here our approach is to understand the dynamical characterization of inactivation. The kinetic flux as well as energetic contribution of the closed and open- state inactivation path is compared here for voltage protocols, namely constant, pulsed and oscillating. The non-equilibrium thermodynamic quantities used in response to these voltage protocols serve as improved characterization tools for theoretical understanding which not only agrees with the previously known kinetic measurements but also predict the energetically optimum processes to sustain the auto-regulatory mechanism of action potential and the consequent inactivation steps needed. The time dependent voltage pattern governs the population of the conformational states which when couple with characteristic rate parameters, the CSI and OSI selectivity arise dynamically to control the inactivation path. Using constant, pulsed and continuous oscillating voltage protocols we have shown that during depolarization the OSI path is more favored path of inactivation however, in the hyper-polarized situation the CSI is favored. It is also shown that the re-factorisation of inactivated sodium channel to resting state occurs via CSI path. Here we have shown how the subtle energetic and entropic cost due to the change in the depolarization magnitude determines the optimum path of inactivation. It is shown that an efficient CSI and OSI dynamical profile in principle can characterize the open-state drug blocking phenomena. PMID:27367642
Perioperative management of external fixation in staged protocols: an international survey.
Hodel, Sandro; Link, Björn-Christian; Babst, Reto; Mallee, W H; Posso, Philippe; Beeres, Frank J P
2018-05-01
Despite the frequent use of external fixation, various regimes of antibiotic prophylaxis, surgical technique and postoperative pin care exist and underline the lack of current evidence. The aim of the study was to assess the variability or consensus in perioperative protocols to prevent implant-associated infections for temporary external fixation in closed fractures of the extremities. A 26-question survey was sent to 170 members of the Traumaplatform. The survey included questions concerning demographics, level of training, type of training and perioperative protocols as: antibiotic prophylaxis, intraoperative management, disinfection and postoperative pin site care. All responses were statistically analysed, and intraoperative measures rated on a 5-point Likert scale. The responses of fifty orthopaedic trauma and general surgeons (response rate, 29.4%) were analysed. The level of experience was more than 5 years in 92% (n = 46) with up to 50 closed fractures of the extremities annually treated with external fixation in 80% (n = 40). Highest consensus could be identified in the following perioperative measures: preoperative antibiotic prophylaxis with a second-generation cephalosporin (86%, n = 43), changing gloves if manipulation of the external fixator is necessary during surgery (86%, n = 43; 4.12 points on the Likert scale), avoid overlapping of the pin sites with the definitive implant site (94%, n = 47; 4.12 points on the Likert scale) and soft tissue protection with a drill sleeve (83.6%, n = 41). Our survey could identify some general principles, which were rated as important by a majority of the respondents. Futures studies' focus should elucidate the role of perioperative antibiotics and different disinfection protocols on implant-associated infections after temporary external fixation in staged protocols. This study provides Level IV evidence according to Oxford centre for evidence-based medicine.
Goal-setting protocol in adherence to exercise by Italian adults.
Annesi, James J
2002-04-01
A goal-setting protocol, based on research in goal setting and performance and personal construct theory, was tested for its effect on adherence to a new exercise program. The Goal-setting group (n = 50) had significantly less dropout (30%) than the control group (n = 50) (74%). The Goal-setting group also had significantly better attendance (p<.0001). Suggestions for increasing confidence in findings through further research and practical implications of using the protocol to improve exercise maintenance across settings were discussed.
The use of participant-observation protocol in an industrial engineering research.
Silveira e Silva, Renato da; Sznelwar, Laerte Idal; D'Afonseca e Silva, Victor
2012-01-01
Based on literature, this article aims to present the "participant-observation' research protocol, and its practical application in the industrial engineering field, more specifically within the area of design development, and in the case shown by this article, of interiors' design. The main target is to identify the concept of the method, i.e., from its characteristics to structure a general sense about the subject, so that the protocol can be used in different areas of knowledge, especially those ones which are committed with the scientific research involving the expertise from researchers, and subjective feelings and opinions of the users of an engineering product, and how this knowledge can be benefic for product design, contributing since the earliest stage of design.
García-Magariño, Iván; Lacuesta, Raquel; Lloret, Jaime
2018-03-27
Smart communication protocols are becoming a key mechanism for improving communication performance in networks such as wireless sensor networks. However, the literature lacks mechanisms for simulating smart communication protocols in precision agriculture for decreasing production costs. In this context, the current work presents an agent-based simulator of smart communication protocols for efficiently managing pesticides. The simulator considers the needs of electric power, crop health, percentage of alive bugs and pesticide consumption. The current approach is illustrated with three different communication protocols respectively called (a) broadcast, (b) neighbor and (c) low-cost neighbor. The low-cost neighbor protocol obtained a statistically-significant reduction in the need of electric power over the neighbor protocol, with a very large difference according to the common interpretations about the Cohen's d effect size. The presented simulator is called ABS-SmartComAgri and is freely distributed as open-source from a public research data repository. It ensures the reproducibility of experiments and allows other researchers to extend the current approach.
2018-01-01
Smart communication protocols are becoming a key mechanism for improving communication performance in networks such as wireless sensor networks. However, the literature lacks mechanisms for simulating smart communication protocols in precision agriculture for decreasing production costs. In this context, the current work presents an agent-based simulator of smart communication protocols for efficiently managing pesticides. The simulator considers the needs of electric power, crop health, percentage of alive bugs and pesticide consumption. The current approach is illustrated with three different communication protocols respectively called (a) broadcast, (b) neighbor and (c) low-cost neighbor. The low-cost neighbor protocol obtained a statistically-significant reduction in the need of electric power over the neighbor protocol, with a very large difference according to the common interpretations about the Cohen’s d effect size. The presented simulator is called ABS-SmartComAgri and is freely distributed as open-source from a public research data repository. It ensures the reproducibility of experiments and allows other researchers to extend the current approach. PMID:29584703
Clinical Trials Management | Division of Cancer Prevention
Information for researchers about developing, reporting, and managing NCI-funded cancer prevention clinical trials. Protocol Information Office The central clearinghouse for clinical trials management within the Division of Cancer Prevention.Read more about the Protocol Information Office. | Information for researchers about developing, reporting, and managing NCI-funded
New archeomagnetic intensity data from Western Russia
NASA Astrophysics Data System (ADS)
Salnaya, Natasha; Gallet, Yves; Akimova, Stanislava; Antipov, Ilya; Glazunova, Olga
2015-04-01
We recently started a new archeomagnetism research program for Western Russia. The main objective of this project is to recover the geomagnetic field intensity variations in Western Russia over the past two millennia, in order to compare these variations with those already known from Western and Eastern Europe. We sampled several ensembles of baked brick fragments precisely dated by historical constraints between the XIIth and XIVth centuries AD from the archeological site of Novgorod, south of St Petersburg, and between the XVIIth and XVIIIth centuries AD from the Monastery of New Jerusalem located close to Moscow. Most fragments, with a magnetic mineralogy dominated by magnetite, are suitable for archeointensity experiments. For some fragments from Novgorod, the magnetization is carried by a mixture of magnetite and another mineral of high coercivity and low unblocking temperature. The unblocking temperatures are close to 200°C. This mineral, most probably a form of hematite with Al substitutions, is therefore similar to that previously reported from archeological fired-clay artifacts originating from Europe and South America. Archeointensity experiments were conducted using the experimental protocol developed for the Triaxe magnetometer. We will present our first archeointensity results and a preliminary comparison with available European results, mostly from France and Bulgaria.
Biocoder: A programming language for standardizing and automating biology protocols
2010-01-01
Background Published descriptions of biology protocols are often ambiguous and incomplete, making them difficult to replicate in other laboratories. However, there is increasing benefit to formalizing the descriptions of protocols, as laboratory automation systems (such as microfluidic chips) are becoming increasingly capable of executing them. Our goal in this paper is to improve both the reproducibility and automation of biology experiments by using a programming language to express the precise series of steps taken. Results We have developed BioCoder, a C++ library that enables biologists to express the exact steps needed to execute a protocol. In addition to being suitable for automation, BioCoder converts the code into a readable, English-language description for use by biologists. We have implemented over 65 protocols in BioCoder; the most complex of these was successfully executed by a biologist in the laboratory using BioCoder as the only reference. We argue that BioCoder exposes and resolves ambiguities in existing protocols, and could provide the software foundations for future automation platforms. BioCoder is freely available for download at http://research.microsoft.com/en-us/um/india/projects/biocoder/. Conclusions BioCoder represents the first practical programming system for standardizing and automating biology protocols. Our vision is to change the way that experimental methods are communicated: rather than publishing a written account of the protocols used, researchers will simply publish the code. Our experience suggests that this practice is tractable and offers many benefits. We invite other researchers to leverage BioCoder to improve the precision and completeness of their protocols, and also to adapt and extend BioCoder to new domains. PMID:21059251
RNA-seq mixology: designing realistic control experiments to compare protocols and analysis methods
Holik, Aliaksei Z.; Law, Charity W.; Liu, Ruijie; Wang, Zeya; Wang, Wenyi; Ahn, Jaeil; Asselin-Labat, Marie-Liesse; Smyth, Gordon K.
2017-01-01
Abstract Carefully designed control experiments provide a gold standard for benchmarking different genomics research tools. A shortcoming of many gene expression control studies is that replication involves profiling the same reference RNA sample multiple times. This leads to low, pure technical noise that is atypical of regular studies. To achieve a more realistic noise structure, we generated a RNA-sequencing mixture experiment using two cell lines of the same cancer type. Variability was added by extracting RNA from independent cell cultures and degrading particular samples. The systematic gene expression changes induced by this design allowed benchmarking of different library preparation kits (standard poly-A versus total RNA with Ribozero depletion) and analysis pipelines. Data generated using the total RNA kit had more signal for introns and various RNA classes (ncRNA, snRNA, snoRNA) and less variability after degradation. For differential expression analysis, voom with quality weights marginally outperformed other popular methods, while for differential splicing, DEXSeq was simultaneously the most sensitive and the most inconsistent method. For sample deconvolution analysis, DeMix outperformed IsoPure convincingly. Our RNA-sequencing data set provides a valuable resource for benchmarking different protocols and data pre-processing workflows. The extra noise mimics routine lab experiments more closely, ensuring any conclusions are widely applicable. PMID:27899618
Statistical Methods and Tools for Uxo Characterization (SERDP Final Technical Report)
DOE Office of Scientific and Technical Information (OSTI.GOV)
Pulsipher, Brent A.; Gilbert, Richard O.; Wilson, John E.
2004-11-15
The Strategic Environmental Research and Development Program (SERDP) issued a statement of need for FY01 titled Statistical Sampling for Unexploded Ordnance (UXO) Site Characterization that solicited proposals to develop statistically valid sampling protocols for cost-effective, practical, and reliable investigation of sites contaminated with UXO; protocols that could be validated through subsequent field demonstrations. The SERDP goal was the development of a sampling strategy for which a fraction of the site is initially surveyed by geophysical detectors to confidently identify clean areas and subsections (target areas, TAs) that had elevated densities of anomalous geophysical detector readings that could indicate the presencemore » of UXO. More detailed surveys could then be conducted to search the identified TAs for UXO. SERDP funded three projects: those proposed by the Pacific Northwest National Laboratory (PNNL) (SERDP Project No. UXO 1199), Sandia National Laboratory (SNL), and Oak Ridge National Laboratory (ORNL). The projects were closely coordinated to minimize duplication of effort and facilitate use of shared algorithms where feasible. This final report for PNNL Project 1199 describes the methods developed by PNNL to address SERDP's statement-of-need for the development of statistically-based geophysical survey methods for sites where 100% surveys are unattainable or cost prohibitive.« less
Cluster Size Optimization in Sensor Networks with Decentralized Cluster-Based Protocols
Amini, Navid; Vahdatpour, Alireza; Xu, Wenyao; Gerla, Mario; Sarrafzadeh, Majid
2011-01-01
Network lifetime and energy-efficiency are viewed as the dominating considerations in designing cluster-based communication protocols for wireless sensor networks. This paper analytically provides the optimal cluster size that minimizes the total energy expenditure in such networks, where all sensors communicate data through their elected cluster heads to the base station in a decentralized fashion. LEACH, LEACH-Coverage, and DBS comprise three cluster-based protocols investigated in this paper that do not require any centralized support from a certain node. The analytical outcomes are given in the form of closed-form expressions for various widely-used network configurations. Extensive simulations on different networks are used to confirm the expectations based on the analytical results. To obtain a thorough understanding of the results, cluster number variability problem is identified and inspected from the energy consumption point of view. PMID:22267882
2012-01-01
Background To simplify clinical scale lymphocyte expansions, we investigated the use of the WAVE®, a closed system bioreactor that utilizes active perfusion to generate high cell numbers in minimal volumes. Methods We have developed an optimized rapid expansion protocol for the WAVE bioreactor that produces clinically relevant numbers of cells for our adoptive cell transfer clinical protocols. Results TIL and genetically modified PBL were rapidly expanded to clinically relevant scales in both static bags and the WAVE bioreactor. Both bioreactors produced comparable numbers of cells; however the cultures generated in the WAVE bioreactor had a higher percentage of CD4+ cells and had a less activated phenotype. Conclusions The WAVE bioreactor simplifies the process of rapidly expanding tumor reactive lymphocytes under GMP conditions, and provides an alternate approach to cell generation for ACT protocols. PMID:22475724
Biernat, Ryszard; Wołosewicz, Mariusz; Tomaszewski, Wiesław
2007-01-01
The purpose of this paper is to present a protocol of rehabilitation after ACL reconstruction using a hamstring autograft in the first month after surgery. The program enables the patient to return early to everyday activities (school, sedentary work) without crutches or a stabilizer. The program has been developed in accordance with rehabilitation protocols employed at Karolinska Institute in Sweden and Prof. Shelbourne's Clinic in the USA. The study group included 31 patients (18 men and 13 women). Patients rehabilitated in the Department according to our program achieved stable gait patterns and were able to step up and down within four to seven weeks. Early patient mobilization after ACL reconstruction is possible and does not cause any negative effects provided that the patient, doctor and physiotherapist cooperate very closely.
Research on an IP disaster recovery storage system
NASA Astrophysics Data System (ADS)
Zeng, Dong; Wang, Yusheng; Zhu, Jianfeng
2008-12-01
According to both the Fibre Channel (FC) Storage Area Network (SAN) switch and Fabric Application Interface Standard (FAIS) mechanism, an iSCSI storage controller is put forward and based upon it, an internet Small Computer System Interface (iSCSI) SAN construction strategy for disaster recovery (DR) is proposed and some multiple sites replication models and a closed queue performance analysis method are also discussed in this paper. The iSCSI storage controller lies in the fabric level of the networked storage infrastructure, and it can be used to connect to both the hybrid storage applications and storage subsystems, besides, it can provide virtualized storage environment and support logical volume access control, and by cooperating with the remote peerparts, a disaster recovery storage system can be built on the basis of the data replication, block-level snapshot and Internet Protocol (IP) take-over functions.
Gilmore, Brynne; Adams, Ben Jack; Bartoloni, Alex; Alhaydar, Bana; McAuliffe, Eilish; Raven, Joanna; Taegtmeyer, Miriam; Vallières, Frédérique
2016-01-01
Introduction Understanding what enhances the motivation and performance of community health workers (CHWs) in humanitarian emergencies represents a key research gap within the field of human resources for health. This paper presents the research protocol for the Performance ImprovEment of CHWs in Emergency Settings (PIECES) research programme. Enhancing Learning and Research in Humanitarian Action (ELRHA) funded the development of this protocol as part of their Health in Humanitarian Crises (R2HC) call (No.19839). PIECES aims to understand what factors improve the performance of CHWs in level III humanitarian emergencies. Methods and analysis The suggested protocol uses a realist evaluation with multiple cases across the 3 country sites: Turkey, Iraq and Lebanon. Working with International Medical Corps (IMC), an initial programme theory was elicited through literature and document reviews, semistructured interviews and focus groups with IMC programme managers and CHWs. Based on this initial theory, this protocol proposes a combination of semistructured interviews, life histories and critical incident narratives, surveys and latent variable modelling of key constructs to explain how contextual factors work to trigger mechanisms for specific outcomes relating to IMC's 300+ CHWs' performance. Participants will also include programme staff, CHWs and programme beneficiaries. Realist approaches will be used to better understand ‘what works, for whom and under what conditions’ for improving CHW performance within humanitarian contexts. Ethics and dissemination Trinity College Dublin's Health Policy and Management/Centre for Global Health Research Ethics Committee gave ethical approval for the protocol development phase. For the full research project, additional ethical approval will be sought from: Université St. Joseph (Lebanon), the Ethics Committee of the Ministry of Health in Baghdad (Iraq) and the Middle East Technical University (Turkey). Dissemination activities will involve a mixture of research feedback, policy briefs, guidelines and recommendations, as well as open source academic articles. PMID:27531730
Gilmore, Brynne; Adams, Ben Jack; Bartoloni, Alex; Alhaydar, Bana; McAuliffe, Eilish; Raven, Joanna; Taegtmeyer, Miriam; Vallières, Frédérique
2016-08-16
Understanding what enhances the motivation and performance of community health workers (CHWs) in humanitarian emergencies represents a key research gap within the field of human resources for health. This paper presents the research protocol for the Performance ImprovEment of CHWs in Emergency Settings (PIECES) research programme. Enhancing Learning and Research in Humanitarian Action (ELRHA) funded the development of this protocol as part of their Health in Humanitarian Crises (R2HC) call (No.19839). PIECES aims to understand what factors improve the performance of CHWs in level III humanitarian emergencies. The suggested protocol uses a realist evaluation with multiple cases across the 3 country sites: Turkey, Iraq and Lebanon. Working with International Medical Corps (IMC), an initial programme theory was elicited through literature and document reviews, semistructured interviews and focus groups with IMC programme managers and CHWs. Based on this initial theory, this protocol proposes a combination of semistructured interviews, life histories and critical incident narratives, surveys and latent variable modelling of key constructs to explain how contextual factors work to trigger mechanisms for specific outcomes relating to IMC's 300+ CHWs' performance. Participants will also include programme staff, CHWs and programme beneficiaries. Realist approaches will be used to better understand 'what works, for whom and under what conditions' for improving CHW performance within humanitarian contexts. Trinity College Dublin's Health Policy and Management/Centre for Global Health Research Ethics Committee gave ethical approval for the protocol development phase. For the full research project, additional ethical approval will be sought from: Université St. Joseph (Lebanon), the Ethics Committee of the Ministry of Health in Baghdad (Iraq) and the Middle East Technical University (Turkey). Dissemination activities will involve a mixture of research feedback, policy briefs, guidelines and recommendations, as well as open source academic articles. Published by the BMJ Publishing Group Limited. For permission to use (where not already granted under a licence) please go to http://www.bmj.com/company/products-services/rights-and-licensing/
EPA Traceability Protocol for Assay and Certification of Gaseous Calibration Standards
In 1997, the U.S. Environmental Protection Agency (EPA) in Research Triangle Park, North Carolina, revised its 1993 version of its traceability protocol for the assay and certification of compressed gas and permeation-device calibration standards. The protocol allows producers o...
Comparative Study on Various Authentication Protocols in Wireless Sensor Networks.
Rajeswari, S Raja; Seenivasagam, V
2016-01-01
Wireless sensor networks (WSNs) consist of lightweight devices with low cost, low power, and short-ranged wireless communication. The sensors can communicate with each other to form a network. In WSNs, broadcast transmission is widely used along with the maximum usage of wireless networks and their applications. Hence, it has become crucial to authenticate broadcast messages. Key management is also an active research topic in WSNs. Several key management schemes have been introduced, and their benefits are not recognized in a specific WSN application. Security services are vital for ensuring the integrity, authenticity, and confidentiality of the critical information. Therefore, the authentication mechanisms are required to support these security services and to be resilient to distinct attacks. Various authentication protocols such as key management protocols, lightweight authentication protocols, and broadcast authentication protocols are compared and analyzed for all secure transmission applications. The major goal of this survey is to compare and find out the appropriate protocol for further research. Moreover, the comparisons between various authentication techniques are also illustrated.
Zebrafish embryology and cartilage staining protocols for high school students.
Emran, Farida; Brooks, Jacqueline M; Zimmerman, Steven R; Johnson, Susan L; Lue, Robert A
2009-06-01
The Life Sciences-Howard Hughes Medical Institute Outreach Program at Harvard University supports high school science education by offering an on-campus program for students and their teachers to participate in investigative, hands-on laboratory sessions. The outreach program has recently designed and launched a successful zebrafish embryology protocol that we present here. The main objectives of this protocol are to introduce students to zebrafish as a model research organism and to provide students with direct experience with current techniques used in embryological research. The content of the lab is designed to generate discussions on embryology, genetics, fertilization, natural selection, and animal adaptation. The protocol produces reliable results in a time-efficient manner using a minimum of reagents. The protocol presented here consists of three sections: observations of live zebrafish larvae at different developmental stages, cartilage staining of zebrafish larvae, and a mutant hunt involving identification of two zebrafish mutants (nacre and chokh). Here, we describe the protocol, show the results obtained for each section, and suggest possible alternatives for different lab settings.
Comparative Study on Various Authentication Protocols in Wireless Sensor Networks
Rajeswari, S. Raja; Seenivasagam, V.
2016-01-01
Wireless sensor networks (WSNs) consist of lightweight devices with low cost, low power, and short-ranged wireless communication. The sensors can communicate with each other to form a network. In WSNs, broadcast transmission is widely used along with the maximum usage of wireless networks and their applications. Hence, it has become crucial to authenticate broadcast messages. Key management is also an active research topic in WSNs. Several key management schemes have been introduced, and their benefits are not recognized in a specific WSN application. Security services are vital for ensuring the integrity, authenticity, and confidentiality of the critical information. Therefore, the authentication mechanisms are required to support these security services and to be resilient to distinct attacks. Various authentication protocols such as key management protocols, lightweight authentication protocols, and broadcast authentication protocols are compared and analyzed for all secure transmission applications. The major goal of this survey is to compare and find out the appropriate protocol for further research. Moreover, the comparisons between various authentication techniques are also illustrated. PMID:26881272
Analogy motor learning by young children: a study of rope skipping.
Tse, Andy C Y; Fong, Shirley S M; Wong, Thomson W L; Masters, Rich
2017-03-01
Research in psychology suggests that provision of an instruction by analogy can enhance acquisition and understanding of knowledge. Limited research has been conducted to test this proposition in motor learning by children. The purpose of the present study was to examine the feasibility of analogy instructions in motor skill acquisition by children. Thirty-two children were randomly assigned to one of the two instruction protocols: analogy and explicit instruction protocols for a two-week rope skipping training. Each participant completed a pretest (Lesson 1), three practice sessions (Lesson 2-4), a posttest and a secondary task test (Lesson 5). Children in the analogy protocol displayed better rope skip performance than those in the explicit instruction protocol (p < .001). Moreover, a cognitive secondary task test indicated that children in the analogy protocol performed more effectively, whereas children in the explicit protocol displayed decrements in performance. Analogy learning may aid children to acquire complex motor skills, and have potential benefits related to reduced cognitive processing requirements.
Furberg, Robert D; Zulkiewicz, Brittany A; Hudson, Jordan P; Taylor, Olivia M; Lewis, Megan A
2016-01-01
Background Tablet-based health care interventions have the potential to encourage patient care in a timelier manner, allow physicians convenient access to patient records, and provide an improved method for patient education. However, along with the continued adoption of tablet technologies, there is a concomitant need to develop protocols focusing on the configuration, management, and maintenance of these devices within the health care setting to support the conduct of clinical research. Objective Develop three protocols to support tablet configuration, tablet management, and tablet maintenance. Methods The Configurator software, Tile technology, and current infection control recommendations were employed to develop three distinct protocols for tablet-based digital health interventions. Configurator is a mobile device management software specifically for iPhone operating system (iOS) devices. The capabilities and current applications of Configurator were reviewed and used to develop the protocol to support device configuration. Tile is a tracking tag associated with a free mobile app available for iOS and Android devices. The features associated with Tile were evaluated and used to develop the Tile protocol to support tablet management. Furthermore, current recommendations on preventing health care–related infections were reviewed to develop the infection control protocol to support tablet maintenance. Results This article provides three protocols: the Configurator protocol, the Tile protocol, and the infection control protocol. Conclusions These protocols can help to ensure consistent implementation of tablet-based interventions, enhance fidelity when employing tablets for research purposes, and serve as a guide for tablet deployments within clinical settings. PMID:27350013
75 FR 53273 - Federal Aquatic Nuisance Species Research Risk Analysis Protocol
Federal Register 2010, 2011, 2012, 2013, 2014
2010-08-31
....)]. The Protocol encourages the incorporation of a Hazard Analysis and Critical Control Point (HACCP) approach for prevention planning within research activities. Information about the use of HACCP is available at http://www.seagrant.umn.edu/ais/haccp . A web site detailing the application of HACCP to...
The Historian and Electronic Research: File Transfer Protocol (FTP).
ERIC Educational Resources Information Center
McCarthy, Michael J.
1993-01-01
Asserts that the Internet will become the academic communication medium for historians in the 1990s. Describes the "file transfer protocol" (FTP) access approach to the Internet and discusses its significant for historical research. Includes instructions for using FTP and a list of history-related FTP sites. (CFR)
Two-party quantum key agreement protocols under collective noise channel
NASA Astrophysics Data System (ADS)
Gao, Hao; Chen, Xiao-Guang; Qian, Song-Rong
2018-06-01
Recently, quantum communication has become a very popular research field. The quantum key agreement (QKA) plays an important role in the field of quantum communication, based on its unconditional security in terms of theory. Among all kinds of QKA protocols, QKA protocols resisting collective noise are widely being studied. In this paper, we propose improved two-party QKA protocols resisting collective noise and present a feasible plan for information reconciliation. Our protocols' qubit efficiency has achieved 26.67%, which is the best among all the two-party QKA protocols against collective noise, thus showing that our protocol can improve the transmission efficiency of quantum key agreement.
A Message Exchange Protocol in Command and Control Systems Integration, using the JC3IEDM
2014-06-01
19TH International Command and Control Research and Technology Symposium C2 Agility: Lessons Learned from Research and Operations. A Message...distribution unlimited 13. SUPPLEMENTARY NOTES Presented at the 18th International Command & Control Research & Technology Symposium (ICCRTS) held 16...presents approaches of integration, compares their technologies , points out their advantages, proposes requirements, and provides the design of a protocol
Auer, Jorg A; Goodship, Allen; Arnoczky, Steven; Pearce, Simon; Price, Jill; Claes, Lutz; von Rechenberg, Brigitte; Hofmann-Amtenbrinck, Margarethe; Schneider, Erich; Müller-Terpitz, R; Thiele, F; Rippe, Klaus-Peter; Grainger, David W
2007-08-01
In an attempt to establish some consensus on the proper use and design of experimental animal models in musculoskeletal research, AOVET (the veterinary specialty group of the AO Foundation) in concert with the AO Research Institute (ARI), and the European Academy for the Study of Scientific and Technological Advance, convened a group of musculoskeletal researchers, veterinarians, legal experts, and ethicists to discuss, in a frank and open forum, the use of animals in musculoskeletal research. The group narrowed the field to fracture research. The consensus opinion resulting from this workshop can be summarized as follows: Anaesthesia and pain management protocols for research animals should follow standard protocols applied in clinical work for the species involved. This will improve morbidity and mortality outcomes. A database should be established to facilitate selection of anaesthesia and pain management protocols for specific experimental surgical procedures and adopted as an International Standard (IS) according to animal species selected. A list of 10 golden rules and requirements for conduction of animal experiments in musculoskeletal research was drawn up comprising 1) Intelligent study designs to receive appropriate answers; 2) Minimal complication rates (5 to max. 10%); 3) Defined end-points for both welfare and scientific outputs analogous to quality assessment (QA) audit of protocols in GLP studies; 4) Sufficient details for materials and methods applied; 5) Potentially confounding variables (genetic background, seasonal, hormonal, size, histological, and biomechanical differences); 6) Post-operative management with emphasis on analgesia and follow-up examinations; 7) Study protocols to satisfy criteria established for a "justified animal study"; 8) Surgical expertise to conduct surgery on animals; 9) Pilot studies as a critical part of model validation and powering of the definitive study design; 10) Criteria for funding agencies to include requirements related to animal experiments as part of the overall scientific proposal review protocols. Such agencies are also encouraged to seriously consider and adopt the recommendations described here when awarding funds for specific projects. Specific new requirements and mandates related both to improving the welfare and scientific rigour of animal-based research models are urgently needed as part of international harmonization of standards.
Multimodal biometrics for identity documents (MBioID).
Dessimoz, Damien; Richiardi, Jonas; Champod, Christophe; Drygajlo, Andrzej
2007-04-11
The MBioID initiative has been set up to address the following germane question: What and how biometric technologies could be deployed in identity documents in the foreseeable future? This research effort proposes to look at current and future practices and systems of establishing and using biometric identity documents (IDs) and evaluate their effectiveness in large-scale developments. The first objective of the MBioID project is to present a review document establishing the current state-of-the-art related to the use of multimodal biometrics in an IDs application. This research report gives the main definitions, properties and the framework of use related to biometrics, an overview of the main standards developed in the biometric industry and standardisation organisations to ensure interoperability, as well as some of the legal framework and the issues associated to biometrics such as privacy and personal data protection. The state-of-the-art in terms of technological development is also summarised for a range of single biometric modalities (2D and 3D face, fingerprint, iris, on-line signature and speech), chosen according to ICAO recommendations and availabilities, and for various multimodal approaches. This paper gives a summary of the main elements of that report. The second objective of the MBioID project is to propose relevant acquisition and evaluation protocols for a large-scale deployment of biometric IDs. Combined with the protocols, a multimodal database will be acquired in a realistic way, in order to be as close as possible to a real biometric IDs deployment. In this paper, the issues and solutions related to the acquisition setup are briefly presented.
Fuzz Testing of Industrial Network Protocols in Programmable Logic Controllers
2017-12-01
PLCs) are vital components in these cyber-physical systems. The industrial network protocols used to communicate between nodes in a control network...AB/RA) MicroLogix 1100 PLC through its implementation of EtherNet/IP, Common Industrial Protocol (CIP), and Programmable Controller Communication ...Commands (PCCC) communication protocols. This research also examines whether cross-generational vulnerabilities exist in the more advanced AB/RA
Feasibility of Developing a Protocol for Automated Protist Analysis
2010-03-01
Acquisition Directorate Research & Development Center Report No: CG-D-02-ll Feasibility of Developing a Protocol for Automated Protist Analysis...Technical Information Service, Springfield, VA 22161. March 2010 Homeland Security Feasibility of Developing a Protocol for Automated Protist ...March 21)10 Feasibility of Developing a Protocol for Automated Protist Analysis 00 00 o CM Technical Report Documentation Page 1. Report No CG-D
Bartel, Sylvia B; Tyler, Timothy G; Power, Luci A
2018-02-15
Results of a study to evaluate the effectiveness of a recently introduced closed system drug-transfer device (CSTD) in reducing surface contamination during compounding and simulated administration of antineoplastic hazardous drugs (AHDs) are reported. Wipe samples were collected from 6 predetermined surfaces in compounding and infusion areas of 13 U.S. cancer centers to establish preexisting levels of surface contamination by 2 marker AHDs (cyclophosphamide and fluorouracil). Stainless steel templates were placed over the 6 previously sampled surfaces, and the marker drugs were compounded and infused per a specific protocol using all components of the CSTD. Wipe samples were collected from the templates after completion of tasks and analyzed for both marker AHDs. Aggregated results of wipe sampling to detect preexisting contamination at the 13 study sites showed that overall, 66.7% of samples (104 of 156) had detectable levels of at least 1 marker AHD; subsequent testing after CSTD use per protocol found a sample contamination rate of 5.8% (9 of 156 samples). In the administration areas alone, the rate of preexisting contamination was 78% (61 of 78 samples); with use of the CSTD protocol, the contamination rate was 2.6%. Twenty-six participants rated the CSTD for ease of use, with 100% indicating that they were satisfied or extremely satisfied. A study involving a rigorous protocol and 13 cancer centers across the United States demonstrated that the CSTD reduced surface contamination by cyclophosphamide and fluorouracil during compounding and simulated administration. Participants reported that the CSTD was easy to use. Copyright © 2018 by the American Society of Health-System Pharmacists, Inc. All rights reserved.
Pandurangan, Arun Prasad; Shakeel, Shabih; Butcher, Sarah Jane; Topf, Maya
2014-01-01
Fitting of atomic components into electron cryo-microscopy (cryoEM) density maps is routinely used to understand the structure and function of macromolecular machines. Many fitting methods have been developed, but a standard protocol for successful fitting and assessment of fitted models has yet to be agreed upon among the experts in the field. Here, we created and tested a protocol that highlights important issues related to homology modelling, density map segmentation, rigid and flexible fitting, as well as the assessment of fits. As part of it, we use two different flexible fitting methods (Flex-EM and iMODfit) and demonstrate how combining the analysis of multiple fits and model assessment could result in an improved model. The protocol is applied to the case of the mature and empty capsids of Coxsackievirus A7 (CAV7) by flexibly fitting homology models into the corresponding cryoEM density maps at 8.2 and 6.1 Å resolution. As a result, and due to the improved homology models (derived from recently solved crystal structures of a close homolog – EV71 capsid – in mature and empty forms), the final models present an improvement over previously published models. In close agreement with the capsid expansion observed in the EV71 structures, the new CAV7 models reveal that the expansion is accompanied by ∼5° counterclockwise rotation of the asymmetric unit, predominantly contributed by the capsid protein VP1. The protocol could be applied not only to viral capsids but also to many other complexes characterised by a combination of atomic structure modelling and cryoEM density fitting. PMID:24333899
Burggraaff, Marloes C; van Nispen, Ruth M A; Melis-Dankers, Bart J M; van Rens, Ger H M B
2010-03-10
Reading problems are frequently reported by visually impaired persons. A closed-circuit television (CCTV) can be helpful to maintain reading ability, however, it is difficult to learn how to use this device. In the Netherlands, an evidence-based rehabilitation program in the use of CCTVs was lacking. Therefore, a standard training protocol needed to be developed and tested in a randomized controlled trial (RCT) to provide an evidence-based training program in the use of this device. To develop a standard training program, information was collected by studying literature, observing training in the use of CCTVs, discussing the content of the training program with professionals and organizing focus and discussion groups. The effectiveness of the program was evaluated in an RCT, to obtain an evidence-based training program. Dutch patients (n = 122) were randomized into a treatment group: normal instructions from the supplier combined with training in the use of CCTVs, or into a control group: instructions from the supplier only. The effect of the training program was evaluated in terms of: change in reading ability (reading speed and reading comprehension), patients' skills to operate the CCTV, perceived (vision-related) quality of life and tasks performed in daily living. The development of the CCTV training protocol and the design of the RCT in the present study may serve as an example to obtain an evidence-based training program. The training program was adjusted to the needs and learning abilities of individual patients, however, for scientific reasons it might have been preferable to standardize the protocol further, in order to gain more comparable results. http://www.trialregister.nl, identifier: NTR1031.
Hale, Sharon L; Herring, Michael J; Kloner, Robert A
2013-01-04
Many studies have shown that when hypothermia is started after coronary artery reperfusion (CAR), it is ineffective at reducing necrosis. However, some suggest that hypothermia may preferentially reduce no-reflow. Our aim was to test the effects of hypothermia on no-reflow when initiated close to reperfusion and 30 minutes after reperfusion, times not associated with a protective effect on myocardial infarct size. Rabbits received 30 minutes coronary artery occlusion/3 hours CAR. In protocol 1, hearts were treated for 1 hour with topical hypothermia (myocardial temperature ≈32°C) initiated at 5 minutes before or 5 minutes after CAR, and the results were compared with a normothermic group. In protocol 2, hypothermia was delayed until 30 minutes after CAR and control hearts remained normothermic. In protocol 1, risk zones were similar and infarct size was not significantly reduced by hypothermia initiated close to CAR. However, the no-reflow defect was significantly reduced by 43% (5 minutes before CAR) and 38% (5 minutes after CAR) in hypothermic compared with normothermic hearts (P=0.004, ANOVA, P=ns between the 2 treated groups). In protocol 2, risk zones and infarct sizes were similar, but delayed hypothermia significantly reduced no-reflow in hypothermic hearts by 30% (55±6% of the necrotic region in hypothermia group versus 79±6% with normothermia, P=0.008). These studies suggest that treatment with hypothermia reduces no-reflow even when initiated too late to reduce infarct size and that the microvasculature is especially receptive to the protective properties of hypothermia and confirm that microvascular damage is in large part a form of true reperfusion injury.
2010-01-01
Background Reading problems are frequently reported by visually impaired persons. A closed-circuit television (CCTV) can be helpful to maintain reading ability, however, it is difficult to learn how to use this device. In the Netherlands, an evidence-based rehabilitation program in the use of CCTVs was lacking. Therefore, a standard training protocol needed to be developed and tested in a randomized controlled trial (RCT) to provide an evidence-based training program in the use of this device. Methods/Design To develop a standard training program, information was collected by studying literature, observing training in the use of CCTVs, discussing the content of the training program with professionals and organizing focus and discussion groups. The effectiveness of the program was evaluated in an RCT, to obtain an evidence-based training program. Dutch patients (n = 122) were randomized into a treatment group: normal instructions from the supplier combined with training in the use of CCTVs, or into a control group: instructions from the supplier only. The effect of the training program was evaluated in terms of: change in reading ability (reading speed and reading comprehension), patients' skills to operate the CCTV, perceived (vision-related) quality of life and tasks performed in daily living. Discussion The development of the CCTV training protocol and the design of the RCT in the present study may serve as an example to obtain an evidence-based training program. The training program was adjusted to the needs and learning abilities of individual patients, however, for scientific reasons it might have been preferable to standardize the protocol further, in order to gain more comparable results. Trial registration http://www.trialregister.nl, identifier: NTR1031 PMID:20219120
Hinckson, Erica; Schneider, Margaret; Winter, Sandra J; Stone, Emily; Puhan, Milo; Stathi, Afroditi; Porter, Michelle M; Gardiner, Paul A; Dos Santos, Daniela Lopes; Wolff, Andrea; King, Abby C
2017-09-29
Physical inactivity across the lifespan remains a public health issue for many developed countries. Inactivity has contributed considerably to the pervasiveness of lifestyle diseases. Government, national and local agencies and organizations have been unable to systematically, and in a coordinated way, translate behavioral research into practice that makes a difference at a population level. One approach for mobilizing multi-level efforts to improve the environment for physical activity is to engage in a process of citizen science. Citizen Science here is defined as a participatory research approach involving members of the public working closely with research investigators to initiate and advance scientific research projects. However, there are no common measures or protocols to guide citizen science research at the local community setting. We describe overarching categories of constructs that can be considered when designing citizen science projects expected to yield multi-level interventions, and provide an example of the citizen science approach to promoting PA. We also recommend potential measures across different levels of impact. Encouraging some consistency in measurement across studies will potentially accelerate the efficiency with which citizen science participatory research provides new insights into and solutions to the behaviorally-based public health issues that drive most of morbidity and mortality. The measures described in this paper abide by four fundamental principles specifically selected for inclusion in citizen science projects: feasibility, accuracy, propriety, and utility. The choice of measures will take into account the potential resources available for outcome and process evaluation. Our intent is to emphasize the importance for all citizen science participatory projects to follow an evidence-based approach and ensure that they incorporate an appropriate assessment protocol. We provided the rationale for and a list of contextual factors along with specific examples of measures to encourage consistency among studies that plan to use a citizen science participatory approach. The potential of this approach to promote health and wellbeing in communities is high and we hope that we have provided the tools needed to optimally promote synergistic gains in knowledge across a range of Citizen Science participatory projects.
NASA Technical Reports Server (NTRS)
James, Jeffrey M.; Sanderson, Penelope M.; Seidler, Karen S.
1990-01-01
As modern transport environments become increasingly complex, issues such as crew communication, interaction with automation, and workload management have become crucial. Much research is being focused on holistic aspects of social and cognitive behavior, such as the strategies used to handle workload, the flow of information, the scheduling of tasks, the verbal and non-verbal interactions between crew members. Traditional laboratory performance measures no longer sufficiently meet the needs of researchers addressing these issues. However observational techniques are better equipped to capture the type of data needed and to build models of the requisite level of sophistication. Presented here is SHAPA, an interactive software tool for performing both verbal and non-verbal protocol analysis. It has been developed with the idea of affording the researchers the closest possible degree of engagement with protocol data. The researcher can configure SHAPA to encode protocols using any theoretical framework or encoding vocabulary that is desired. SHAPA allows protocol analysis to be performed at any level of analysis, and it supplies a wide variety of tools for data aggregation, manipulation. The output generated by SHAPA can be used alone or in combination with other performance variables to get a rich picture of the influences on sequences of verbal or nonverbal behavior.
Implementation and Evaluation of Four Interoperable Open Standards for the Internet of Things.
Jazayeri, Mohammad Ali; Liang, Steve H L; Huang, Chih-Yuan
2015-09-22
Recently, researchers are focusing on a new use of the Internet called the Internet of Things (IoT), in which enabled electronic devices can be remotely accessed over the Internet. As the realization of IoT concept is still in its early stages, manufacturers of Internet-connected devices and IoT web service providers are defining their proprietary protocols based on their targeted applications. Consequently, IoT becomes heterogeneous in terms of hardware capabilities and communication protocols. Addressing these heterogeneities by following open standards is a necessary step to communicate with various IoT devices. In this research, we assess the feasibility of applying existing open standards on resource-constrained IoT devices. The standard protocols developed in this research are OGC PUCK over Bluetooth, TinySOS, SOS over CoAP, and OGC SensorThings API. We believe that by hosting open standard protocols on IoT devices, not only do the devices become self-describable, self-contained, and interoperable, but innovative applications can also be easily developed with standardized interfaces. In addition, we use memory consumption, request message size, response message size, and response latency to benchmark the efficiency of the implemented protocols. In all, this research presents and evaluates standard-based solutions to better understand the feasibility of applying existing standards to the IoT vision.
Protocols development for security and privacy of radio frequency identification systems
NASA Astrophysics Data System (ADS)
Sabbagha, Fatin
There are benefits to adopting radio frequency identification (RFID) technology, although there are methods of attack that can compromise the system. This research determined how that may happen and what possible solutions can keep that from happening. Protocols were developed to implement better security. In addition, new topologies were developed to handle the problems of the key management. Previously proposed protocols focused on providing mutual authentication and privacy between readers and tags. However, those protocols are still vulnerable to be attacked. These protocols were analyzed and the disadvantages shown for each one. Previous works assumed that the channels between readers and the servers were secure. In the proposed protocols, a compromised reader is considered along with how to prevent tags from being read by that reader. The new protocols provide mutual authentication between readers and tags and, at the same time, remove the compromised reader from the system. Three protocols are proposed. In the first protocol, a mutual authentication is achieved and a compromised reader is not allowed in the network. In the second protocol, the number of times a reader contacts the server is reduced. The third protocol provides authentication and privacy between tags and readers using a trusted third party. The developed topology is implemented using python language and simulates work to check the efficiency regarding the processing time. The three protocols are implemented by writing codes in C language and then compiling them in MSP430. IAR Embedded workbench is used, which is an integrated development environment with the C/C++ compiler to generate a faster code and to debug the microcontroller. In summary, the goal of this research is to find solutions for the problems on previously proposed protocols, handle a compromised reader, and solve key management problems.
Abdel-Aal, Wafaa; Ghaffar, Esmat Abdel; El Shabrawy, Osama
2013-10-01
Globally, ethical issues in research are becoming of major importance, being well established in developed countries with little information about research ethics committees (RECs) in Africa to assess whether these committees are actually improving the protection of human research participants. To describe the establishment, structure, function, operations and outcome of the Medical Research Ethics Committee (MREC) of the National Research Center (NRC) of Egypt from 2003 to 2011. The committee established its regulatory rules for human and animal research ethics based on the Declaration of Helsinki 2000-2008 and WHO regulations 2000-2011. There were 974 protocols revised in the 7 years (2005-2011). The outcome of the committee discussions was to clear 262 of the protocols without conditions. A full 556 were cleared conditionally upon completion of modifications. Another 118 were deferred pending action and further consideration at a subsequent meeting. And 16 researchers did not reply, while 22 protocols were rejected. Since 2005, the MREC in NRC Egypt has built up considerable experience of evaluating the ethical issues arising within the field of medical research.
ERIC Educational Resources Information Center
Schmid, Jeannette; Fiedler, Klaus
1996-01-01
Investigates attributional implications of prosecutors' and defense attorneys' language strategies using the protocols of the historical Nuremberg trials. States that apart from more positive statements regarding the defendants being made by defense lawyers than prosecutors, both sides used a number of subtler strategies. (PA)
A new amperometric glucose microsensor: in vitro and short-term in vivo evaluation.
Ward, W Kenneth; Jansen, Lawrence B; Anderson, Ellen; Reach, Gerard; Klein, Jean-Claude; Wilson, George S
2002-03-01
For biosensor fabrication, it is important to optimize materials and methods in order to create predictable function in vitro and in vivo. For this reason, we designed a new glucose sensor ('revised protocol') that utilized an outer permselective membrane made of amphiphobic polyurethane which allows glucose passage through hydrophilic segments. An inner polyethersulfone membrane, stabilized with a trimethoxysilane, provided specificity. Before application of the inner membrane, it was necessary to etch the platinum electrode with a radio frequency oxygen plasma. The revised protocol sensors (n=185) were compared with sensors fabricated with an earlier ('original') protocol (n=204) which used an outer polyurethane without hydrophilic segments and a complex inner membrane of cellulose acetate and Nafion. The function of revised protocol sensors was more predictable in vitro as evidenced by a much lower variation of glucose sensitivity than the original protocol sensors. Revised and original protocol sensors were nearly linear up to a glucose concentration of 20 mM. In vitro interference from 0.1 mM acetaminophen was minimal in both groups of sensors and would be expected to represent about 2% of the total sensor response at normal glucose levels for revised protocol sensors. Prolonged testing of the revised protocol sensors for 11 days during immersion in buffer revealed stable sensitivities (day 1: 6.12+/-1.34 nA/mM; day 3: 6.33+/-1.40; day 8: 7.13+/-1.39; and day 11: 7.56+/-1.47; sensitivity for day 1 vs. each other day: not significant) and no critical loss of glucose oxidase activity. The response of the revised protocol sensors (n=7) to intraperitoneal glucose was tested in rats approximately one day after subcutaneous implantation and the sensors tracked glucose closely with a slight lag of 3-6 min.
Postdoctoral Fellow | Center for Cancer Research
A Postdoctoral Fellow position is available in Dr. Chuong Dinh Hoang's laboratory within the Thoracic and Gastrointestinal Oncology Branch (TGIB), National Cancer Institute, NIH. Our broad goal is to explore the molecular and cellular biology of thoracic cancers, namely mesothelioma and/ or non-small cell lung carcinoma, thymoma, etc. Currently, we have projects that involve investigating microRNA-mRNA interactions in malignant mesothelioma. New projects will focus on the pathogenic signaling pathways relevant to tumor initiation, invasion, metastasis, and resistance. With these projects, we have translational aims of developing novel molecular biomarkers and therapeutic targets based on an understanding of the pathogenetic mechanisms active in these cancers. Also, we are developing novel delivery platforms for nucleic-based agents that require pre-clinical testing in mouse tumor models. The culmination of these projects will be linked to clinical human protocols in these thoracic cancers of interest. This is a great opportunity for candidates who are interested in cancer biology and want to enhance their career potential by working in our research program with outstanding support of other established laboratories and core facilities in the National Cancer Institute. This laboratory effort will be in close collaboration with other faculty in our branch. We work closely with the Thoracic Oncology Section of David S. Schrump, M.D. (Chief, TGIB), which focuses on epigenetic mechanisms and regulation of thoracic tumors; and with the lab of Dr. Taylor Ripley, M.D., which focuses on metabolism of thoracic tumors.
Gunn, Patrick P; Fremont, Allen M; Bottrell, Melissa; Shugarman, Lisa R; Galegher, Jolene; Bikson, Tora
2004-04-01
The Health Insurance Portability and Accountability Act (HIPAA) Privacy Rule, intended to address potential threats to patient privacy posed by the computerization and standardization of medical records, provides a new floor level of federal protection for health information in all 50 states. In most cases, compliance with the Privacy Rule was required as of April 2003. Yet considerable confusion and concern remain about the Privacy Rule and the specific changes it requires in the way healthcare providers, health plans, and others use, maintain, and disclose health information. Researchers worry that the Privacy Rule could hinder their access to health information needed to conduct their research. In this article, we explain how the final version of the Privacy Rule governs disclosure of health information, assess implications of the Privacy Rule for research, and offer practical suggestions for researchers who require access to health information. The Privacy Rule is fundamentally changing the way that healthcare providers, health plans, and others use, maintain, and disclose health information and the steps that researchers must take to obtain health data. The Privacy Rule requires researchers who seek access to identifiable health information to obtain written authorization from subjects, or, alternatively, to demonstrate that their research protocols meet certain Privacy Rule requirements that permit access without written authorization. To ensure continued access to data, researchers will need to work more closely than before with healthcare providers, health plans, and other institutions that generate and maintain health information.
Instruments for Assessment of Instructional Practices in Standards-Based Teaching
NASA Astrophysics Data System (ADS)
Wainwright, Camille L.
2006-12-01
This paper describes the development of two forms of an instrument used as a classroom observation protocol, designed to document the impact of reform-based professional development with undergraduate mathematics and science faculty and its impact on the resultant preparation of teachers (PreK 12). A rationale for the development and utilization of this instrument (known as the OTOP, or the Oregon Teacher Observation Protocol) is provided. Constructed upon review of the research on teaching and standards documents in mathematics and science, the protocol formed the basis for data collection in a three-year longitudinal study of teaching practice among early career teachers as well as undergraduate college faculty. In addition, this paper suggests further applications of the observation protocol beyond the original research study purpose. One prominent use for the protocol is in supervisor observations of mathematics and science student teachers.
Research on low-latency MAC protocols for wireless sensor networks
NASA Astrophysics Data System (ADS)
He, Chenguang; Sha, Xuejun; Lee, Chankil
2007-11-01
Energy-efficient should not be the only design goal in MAC protocols for wireless sensor networks, which involve the use of battery-operated computing and sensing devices. Low-latency operation becomes the same important as energy-efficient in the case that the traffic load is very heavy or the real-time constrain is used in applications like tracking or locating. This paper introduces some causes of traditional time delays which are inherent in a multi-hops network using existing WSN MAC protocols, illuminates the importance of low-latency MAC design for wireless sensor networks, and presents three MACs as examples of low-latency protocols designed specially for sleep delay, wait delay and wakeup delay in wireless sensor networks, respectively. The paper also discusses design trade-offs with emphasis on low-latency and points out their advantages and disadvantages, together with some design considerations and suggestions for MAC protocols for future applications and researches.
Experiencing your brain: neurofeedback as a new bridge between neuroscience and phenomenology
Bagdasaryan, Juliana; Quyen, Michel Le Van
2013-01-01
Neurophenomenology is a scientific research program aimed to combine neuroscience with phenomenology in order to study human experience. Nevertheless, despite several explicit implementations, the integration of first-person data into the experimental protocols of cognitive neuroscience still faces a number of epistemological and methodological challenges. Notably, the difficulties to simultaneously acquire phenomenological and neuroscientific data have limited its implementation into research projects. In our paper, we propose that neurofeedback paradigms, in which subjects learn to self-regulate their own neural activity, may offer a pragmatic way to integrate first-person and third-person descriptions. Here, information from first- and third-person perspectives is braided together in the iterative causal closed loop, creating experimental situations in which they reciprocally constrain each other. In real-time, the subject is not only actively involved in the process of data acquisition, but also assisted to directly influence the neural data through conscious experience. Thus, neurofeedback may help to gain a deeper phenomenological-physiological understanding of downward causations whereby conscious activities have direct causal effects on neuronal patterns. We discuss possible mechanisms that could mediate such effects and indicate a number of directions for future research. PMID:24187537
DiBartolomeis, Susan M; Moné, James P
2003-01-01
Over the past decade, apoptosis has emerged as an important field of study central to ongoing research in many diverse fields, from developmental biology to cancer research. Apoptosis proceeds by a highly coordinated series of events that includes enzyme activation, DNA fragmentation, and alterations in plasma membrane permeability. The detection of each of these phenotypic changes is accessible to advanced undergraduate cell and molecular biology students. We describe a 4-week laboratory sequence that integrates cell culture, fluorescence microscopy, DNA isolation and analysis, and western blotting (immunoblotting) to follow apoptosis in cultured human cells. Students working in teams chemically induce apoptosis, and harvest, process, and analyze cells, using their data to determine the order of events during apoptosis. We, as instructors, expose the students to an environment closely simulating what they would encounter in an active cell or molecular biology research laboratory by having students coordinate and perform multiple tasks simultaneously and by having them experience experimental design using current literature, data interpretation, and analysis to answer a single question. Students are assessed by examination of laboratory notebooks for completeness of experimental protocols and analysis of results and for completion of an assignment that includes questions pertaining to data interpretation and apoptosis.
Use of the Seasons and Biomes Project in Climate Change Education
NASA Astrophysics Data System (ADS)
Sparrow, E. B.; Morris, K.; . Jaroensutasinee, M.; Jaroensutasinee, K.; Yule, S.; Boger, R.; Gordon, L. S.; Yoshikawa, K.; Kopplin, M. R.; Verbyla, D. L.
2009-04-01
The Seasons and Biomes Project is an inquiry- and project- based initiative that monitors seasons, specifically their interannual variability, with the goal of increasing primary and secondary students' understanding of the earth system, and engaging them in research as a way of learning science, understanding climate change, contributing to climate change studies and participating in the fourth International Polar Year. International professional development workshops have been conducted in the United States, S. Africa, Germany and most recently in Thailand. Primary and secondary teachers and teacher trainers as well as scientists from Argentina, Bahrain, Cameroon, Canada, Czech Republic, Estonia, Germany, Greenland, India, Peru, Paraguay, Mongolia, Norway, Saudi Arabia, South Africa, Switzerland, Thailand and the United States have participated in the training workshops and are working with students. Available to the Seasons and Biomes participants are the rich array of scientific protocols for investigations on atmosphere/weather, hydrology, soils, land cover biology, and phenology as well as learning activities which have been developed by the Global Learning and Observations to Benefit the Environment program (GLOBE) program (www.globe.gov). GLOBE is an international (109 countries involved) earth/environmental science and education program that brings together scientists, teachers, students and parents in inquiry-based studies and in monitoring the Earth, increasing awareness of and care of the environment, and increasing student achievement across the curriculum. Students conduct their studies at or close to their schools and submit the data they have collected to the Data Archive on the GLOBE website. Seasons and Biomes has developed additional learning activities and measurement protocols such as freshwater ice phenology protocols (freeze-up and break-up) and a frost tube (depth of freezing in soils) protocol that are being used in schools. A mosquito protocol developed by Thai scientists as part of the program to determine abundance and types of mosquitoes that are vectors of malaria and dengue fever, has been successfully tested in two schools and will now be used by students in at least 15 other schools in Thailand. African schools are also interested in using the mosquito protocol. A mosquito protocol to determine start of season in northern latitudes will be tested in Alaskan schools. There is a lot of interest in the effect of climate change on environmental parameters, populations of disease vectors and relationship to disease incidence. Changes in plant and ice phenology can be both indicators and impacts of climate change. Seasons and Biomes has also conducted Pole to Pole climate change videoconferences for Alaskan and Argentinean students, and arctic and antarctic scientists. These gave the students the opportunity to share their observations, ask each other questions, ask the scientists their questions on climate change and discuss topics for research investigations. The videoconferences were followed by web chats and web forums to allow more students from other countries to participate. Students are encouraged to present their studies at science fairs and symposiums and during GLOBE conferences. Indeed some students including Alaskan Native students, have done so.
Rater Drift and Time Trends in Classroom Observations
ERIC Educational Resources Information Center
Casabianca, Jodi M.; Lockwood, J. R.
2013-01-01
Classroom observation protocols, in which observers rate multiple dimensions of teaching according to established protocols (either live in the classroom, or post-hoc from lesson videos), are increasingly being used in both research and policy contexts. However, scores generated from these protocols have many sources of error. Day to day variation…
In 1997, the U.S. Environmental Protection Agency (EPA) in Research Triangle Park, North Carolina, revised its 1993 version of its traceability protocol for the assay and certification of compressed gas and permeation-device calibration standards. The protocol allows producers of...
NASA Astrophysics Data System (ADS)
Clarke, Peter; Davenhall, Clive; Greenwood, Colin; Strong, Matthew
ESLEA, an EPSRC-funded project, aims to demonstrate the potential benefits of circuit-switched optical networks (lightpaths) to the UK e-Science community. This is being achieved by running a number of "proof of benefit" pilot applications over UKLight, the UK's first national optical research network. UKLight provides a new way for researchers to obtain dedicated "lightpaths" between remote sites and to deploy and test novel networking methods and technologies. It facilitates collaboration on global projects by providing a point of access to the fast growing international optical R&D infrastructure. A diverse range of data-intensive fields of academic endeavour are participating in the ESLEA project; all these groups require the integration of high-bandwidth switched lightpath circuits into their experimental and analysis infrastructure for international transport of high-volume applications data. In addition, network protocol research and development of circuit reservation mechanisms has been carried out to help the pilot applications to exploit the UKLight infrastructure effectively. Further information about ESLEA can be viewed at www.eslea.uklight.ac.uk. ESLEA activities are now coming to an end and work will finish from February to July 2007, depending upon the terms of funding of each pilot application. The first quarter of 2007 is considered the optimum time to hold a closing conference for the project. The objectives of the conference are to: 1. Provide a forum for the dissemination of research findings and learning experiences from the ESLEA project. 2. Enable colleagues from the UK and international e-Science communities to present, discuss and learn about the latest developments in networking technology. 3. Raise awareness about the deployment of the UKLight infrastructure and its relationship to SuperJANET 5. 4. Identify potential uses of UKLight by existing or future research projects
In-Space Networking on NASA's SCAN Testbed
NASA Technical Reports Server (NTRS)
Brooks, David E.; Eddy, Wesley M.; Clark, Gilbert J.; Johnson, Sandra K.
2016-01-01
The NASA Space Communications and Navigation (SCaN) Testbed, an external payload onboard the International Space Station, is equipped with three software defined radios and a flight computer for supporting in-space communication research. New technologies being studied using the SCaN Testbed include advanced networking, coding, and modulation protocols designed to support the transition of NASAs mission systems from primarily point to point data links and preplanned routes towards adaptive, autonomous internetworked operations needed to meet future mission objectives. Networking protocols implemented on the SCaN Testbed include the Advanced Orbiting Systems (AOS) link-layer protocol, Consultative Committee for Space Data Systems (CCSDS) Encapsulation Packets, Internet Protocol (IP), Space Link Extension (SLE), CCSDS File Delivery Protocol (CFDP), and Delay-Tolerant Networking (DTN) protocols including the Bundle Protocol (BP) and Licklider Transmission Protocol (LTP). The SCaN Testbed end-to-end system provides three S-band data links and one Ka-band data link to exchange space and ground data through NASAs Tracking Data Relay Satellite System or a direct-to-ground link to ground stations. The multiple data links and nodes provide several upgradable elements on both the space and ground systems. This paper will provide a general description of the testbeds system design and capabilities, discuss in detail the design and lessons learned in the implementation of the network protocols, and describe future plans for continuing research to meet the communication needs for evolving global space systems.
How to design and write a clinical research protocol in Cosmetic Dermatology*
Bagatin, Ediléia; Miot, Helio A.
2013-01-01
Cosmetic Dermatology is a growing subspecialty. High-quality basic science studies have been published; however, few double-blind, randomized controlled clinical trials, which are the major instrument for evidence-based medicine, have been conducted in this area. Clinical research is essential for the discovery of new knowledge, improvement of scientific basis, resolution of challenges, and good clinical practice. Some basic principles for a successful researcher include interest, availability, persistence, and honesty. It is essential to learn how to write a protocol research and to know the international and national regulatory rules. A complete clinical trial protocol should include question, background, objectives, methodology (design, variable description, sample size, randomization, inclusion and exclusion criteria, intervention, efficacy and safety measures, and statistical analysis), consent form, clinical research form, and references. Institutional ethical review board approval and financial support disclosure are necessary. Publication of positive or negative results should be an authors' commitment. PMID:23539006
Using research literature to develop a perceptual retraining treatment protocol.
Neistadt, M E
1994-01-01
Treatment protocols derived from research literature can help therapists provide more rigorous treatment and more systematic assessment of client progress. This study applied research findings about the influence of task, subject, and feedback parameters on adult performance with block designs to an occupational therapy treatment protocol for parquetry block assembly--an activity occupational therapists use to remediate constructional deficits. Task parameter research suggests that parquetry tasks can be graded according to the features of the design cards, with cards having all block boundaries drawn in being easier than those with some block boundaries omitted. Subject parameter findings suggest that clients' lesions and initial constructional competence can influence their approaches to parquetry tasks. Feedback parameter research suggests that a combination of perceptual and planning cues is most effective for parquetry tasks. Methods to help clients transfer constructional skills from parquetry to functional tasks are also discussed.
ERIC Educational Resources Information Center
Piercy, Fred P.; Franz, Nancy; Donaldson, Joseph L.; Richard, Robert F.
2011-01-01
The purpose of this paper is to reflect on our efforts to balance consistency in our multi-year participatory action research study with the need to adapt our research protocol to what we are learning along the way. While both are important, we share several examples of how our flexibility and openness to adapt our protocol to our research…
Berger, Cezar; Freitas, Renato; Malafaia, Osvaldo; Pinto, José Simão de Paula; Mocellin, Marcos; Macedo, Evaldo; Fagundes, Marina Serrato Coelho
2012-01-01
Summary Introduction: In the health field, computerization has become increasingly necessary in professional practice, since it facilitates data recovery and assists in the development of research with greater scientific rigor. Objective: the present work aimed to develop, apply, and validate specific electronic protocols for patients referred for rhinoplasty. Methods: The prospective research had 3 stages: (1) preparation of theoretical data bases; (2) creation of a master protocol using Integrated System of Electronic Protocol (SINPE©); and (3) elaboration, application, and validation of a specific protocol for the nose and sinuses regarding rhinoplasty. Results: After the preparation of the master protocol, which dealt with the entire field of otorhinolaryngology, we idealized a specific protocol containing all matters related to the patient. In particular, the aesthetic and functional nasal complaints referred for surgical treatment (i.e., rhinoplasty) were organized into 6 main hierarchical categories: anamnesis, physical examination, complementary exams, diagnosis, treatment, and outcome. This protocol utilized these categories and their sub-items: finality; access; surgical maneuvers on the nasal dorsum, tip, and base; clinical evolution after 3, 6, and 12 months; revisional surgery; and quantitative and qualitative evaluations. Conclusion: The developed electronic-specific protocol is feasible and important for information registration from patients referred to rhinoplasty. PMID:25991979
Development of bull trout sampling protocols
R. F. Thurow; J. T. Peterson; J. W. Guzevich
2001-01-01
This report describes results of research conducted in Washington in 2000 through Interagency Agreement #134100H002 between the U.S. Fish and Wildlife Service (USFWS) and the U.S. Forest Service Rocky Mountain Research Station (RMRS). The purpose of this agreement is to develop a bull trout (Salvelinus confluentus) sampling protocol by integrating...
Adding Dimension to Evaluative Research Through the Use of Protocol Material.
ERIC Educational Resources Information Center
Tittle, Carol Kehr
A rationale and illustration of the use of original records or protocol materials in an evaluation research report are described. Records of school observations and audiotape transcripts were selected to represent the concepts or categories which were developed in the process of evaluation. These qualitative data were collected in a project which…
USDA-ARS?s Scientific Manuscript database
This research re-evaluated the impact of scalding protocols on the recovery of Campylobacter from breast skin following defeathering after preliminary processing trials detected Campylobacter from breast skin for 4/8 carcasses that had vents plugged and sutured prior to scalding. Published research...
Improvement of "Novel Multiparty Quantum Key Agreement Protocol with GHZ States"
NASA Astrophysics Data System (ADS)
Gu, Jun; Hwang, Tzonelih
2017-10-01
Quantum key agreement (QKA) protocol is a method for negotiating a fair and secure key among mutually untrusted participants. Recently, Xu et al. (Quantum Inf. Process. 13:2587-2594, 2014) proposed a multi-party QKA protocol based on Greenberger-Horne-Zeilinger (GHZ) states. However, this study points out that Xu et al.'s protocol cannot provide the fairness property. That is, the last involved participant in the protocol can manipulate the final shared secret key without being detected by the other participants. Moreover, according to Yu et al.'s research (2015), Xu et al.'s protocol cannot avoid the public discussion attack too. To avoid these weaknesses, an improved QKA protocol is proposed.
The Deployment of Routing Protocols in Distributed Control Plane of SDN
Jingjing, Zhou; Di, Cheng; Weiming, Wang; Rong, Jin; Xiaochun, Wu
2014-01-01
Software defined network (SDN) provides a programmable network through decoupling the data plane, control plane, and application plane from the original closed system, thus revolutionizing the existing network architecture to improve the performance and scalability. In this paper, we learned about the distributed characteristics of Kandoo architecture and, meanwhile, improved and optimized Kandoo's two levels of controllers based on ideological inspiration of RCP (routing control platform). Finally, we analyzed the deployment strategies of BGP and OSPF protocol in a distributed control plane of SDN. The simulation results show that our deployment strategies are superior to the traditional routing strategies. PMID:25250395
Adaptive hybrid optimal quantum control for imprecisely characterized systems.
Egger, D J; Wilhelm, F K
2014-06-20
Optimal quantum control theory carries a huge promise for quantum technology. Its experimental application, however, is often hindered by imprecise knowledge of the input variables, the quantum system's parameters. We show how to overcome this by adaptive hybrid optimal control, using a protocol named Ad-HOC. This protocol combines open- and closed-loop optimal control by first performing a gradient search towards a near-optimal control pulse and then an experimental fidelity estimation with a gradient-free method. For typical settings in solid-state quantum information processing, adaptive hybrid optimal control enhances gate fidelities by an order of magnitude, making optimal control theory applicable and useful.
Physical and perceptual estimation of differences between loudspeakers
NASA Astrophysics Data System (ADS)
Lavandier, Mathieu; Herzog, Philippe; Meunier, Sabine
2006-12-01
Differentiating the restitution of timbre by several loudspeakers may result from standard measurements, or from listening tests. This work proposes a protocol keeping a close relationship between the objective and perceptual evaluations: the stimuli are musical excerpts, and the measuring environment is a standard listening room. The protocol involves recordings made at a listener position, and objective dissimilarities are computed using an auditory model simulating masking effects. The resulting data correlate very well with listening tests using the same recordings, and show similar dependencies on the major parameters identified from the dissimilarity matrices. To cite this article: M. Lavandier et al., C. R. Mecanique 334 (2006).
Enhancing creative cognition with a rapid right-parietal neurofeedback procedure.
Agnoli, Sergio; Zanon, Marco; Mastria, Serena; Avenanti, Alessio; Corazza, Giovanni Emanuele
2018-02-14
The present article describes an innovative neurofeedback training (NFT) procedure aimed at increasing creative cognition through the enhancement of specific brain activities previously associated with divergent thinking. We designed and tested two NFT protocols based on training alpha and beta EEG oscillations selectively measured over the right parietal region. A total of 80 participants were involved, 40 in the alpha NFT protocol and 40 in the beta NFT protocol. The NFT loop was closed on a video stream that would advance only when oscillation power exceeded a normalized threshold. The total duration of the protocol was two hours in a single day, hence its classification as rapid. Changes in ideational fluency and originality, measured with a divergent thinking task, were compared between participants receiving real video feedback and participants receiving sham feedback. We controlled for individual differences in creative achievement level. Results showed that the protocols were effective at enhancing alpha and beta activities in the targeted area. Differences between the two protocols emerged in their effectiveness at promoting divergent thinking. While no significant changes in originality resulted from the rapid alpha NFT, increases in both originality and fluency emerged as a consequence of the rapid beta NFT. These results were particularly evident in participants starting with a low creative achievement level. Possible interpretations and future directions are proposed and discussed. Copyright © 2018 Elsevier Ltd. All rights reserved.
Influence of the Distribution of Tag IDs on RFID Memoryless Anti-Collision Protocols.
Cmiljanic, Nikola; Landaluce, Hugo; Perallos, Asier; Arjona, Laura
2017-08-17
In recent years, Radio Frequency Identification (RFID) has become very popular. The main feature of this technology is that RFID tags do not require close handling and no line of sight is required between the reader and the tags. RFID is a technology that uses radio frequencies in order to identify tags, which do not need to be positioned accurately relative to the reader. Tags share the communication channel, increasing the likelihood of causing a problem, viz., a message collision. Tree based protocols can resolve these collisions, but require a uniform tag ID distribution. This means they are very dependent of the distribution of the IDs of the tags. Tag IDs are written in the tag and contain a predefined bit string of data. A study of the influence of the tag ID distribution on the protocols' behaviour is proposed here. A new protocol, called the Flexible Query window Tree (FQwT) is presented to estimate the tag ID distribution, taking into consideration the type of distribution. The aim is to create a flexible anti-collision protocol in order to identify a set of tags that constitute an ID distribution. As a result, the reader classifies tags into groups determined by using a distribution estimator. Simulations show that the FQwT protocol contributes to significant reductions in identification time and energy consumption regardless of the type of ID distribution.
Hiding the Source Based on Limited Flooding for Sensor Networks.
Chen, Juan; Lin, Zhengkui; Hu, Ying; Wang, Bailing
2015-11-17
Wireless sensor networks are widely used to monitor valuable objects such as rare animals or armies. Once an object is detected, the source, i.e., the sensor nearest to the object, generates and periodically sends a packet about the object to the base station. Since attackers can capture the object by localizing the source, many protocols have been proposed to protect source location. Instead of transmitting the packet to the base station directly, typical source location protection protocols first transmit packets randomly for a few hops to a phantom location, and then forward the packets to the base station. The problem with these protocols is that the generated phantom locations are usually not only near the true source but also close to each other. As a result, attackers can easily trace a route back to the source from the phantom locations. To address the above problem, we propose a new protocol for source location protection based on limited flooding, named SLP. Compared with existing protocols, SLP can generate phantom locations that are not only far away from the source, but also widely distributed. It improves source location security significantly with low communication cost. We further propose a protocol, namely SLP-E, to protect source location against more powerful attackers with wider fields of vision. The performance of our SLP and SLP-E are validated by both theoretical analysis and simulation results.
NASA Technical Reports Server (NTRS)
Iannicca, Dennis; Hylton, Alan; Ishac, Joseph
2012-01-01
Delay-Tolerant Networking (DTN) is an active area of research in the space communications community. DTN uses a standard layered approach with the Bundle Protocol operating on top of transport layer protocols known as convergence layers that actually transmit the data between nodes. Several different common transport layer protocols have been implemented as convergence layers in DTN implementations including User Datagram Protocol (UDP), Transmission Control Protocol (TCP), and Licklider Transmission Protocol (LTP). The purpose of this paper is to evaluate several stand-alone implementations of negative-acknowledgment based transport layer protocols to determine how they perform in a variety of different link conditions. The transport protocols chosen for this evaluation include Consultative Committee for Space Data Systems (CCSDS) File Delivery Protocol (CFDP), Licklider Transmission Protocol (LTP), NACK-Oriented Reliable Multicast (NORM), and Saratoga. The test parameters that the protocols were subjected to are characteristic of common communications links ranging from terrestrial to cis-lunar and apply different levels of delay, line rate, and error.
Okamura, Hideo; Padmanabhan, Deepak; Watson, Robert E; Dalzell, Connie; Acker, Nancy; Jondal, Mary; Romme, Abby L; Cha, Yong-Mei; Asirvatham, Samuel J; Felmlee, Joel P; Friedman, Paul A
2017-05-01
Magnetic resonance imaging (MRI) in patients with non-MRI-conditional cardiac implantable electronic devices (CIEDs) has been shown to be safe when performed under closely monitored protocols. However, the safety of MRI in patients with devices with a nearly depleted battery has not been reported. Prospective data were collected between January 2008 and May 2015 in patients with non-MRI-conditional CIEDs undergoing clinically indicated MRI under institutional protocol. Patients who were pacemaker dependent were excluded. Patients whose devices were at elective replacement indicator (ERI) at the time of MRI or close to ERI (ERI or replacement for battery depletion within 3 months of scan) were identified through database review and analyzed for clinical events. MRI scans (n = 569) were performed in 442 patients. Of these, we identified 13 scans performed with a nearly depleted battery in nine patients. All scans with implantable cardioverter defibrillators (ICDs, n = 9) were uneventful. However, two scans with pacemakers close to ERI resulted in a power-on-reset (PoR) event. One scan with a pacemaker close to ERI that was programmed to DOO mode reached ERI during MRI and automatically changed to VVI mode. Additionally, one scan with a pacemaker at ERI did not allow programming. All pacemakers with events were implanted before 2005. Patients with pacemakers and ICDs with a nearly depleted battery can safely undergo MRI when patients are not pacemaker dependent. Attention should be paid because old devices can result in PoR or ERI during MRI, which may lead to oversensing and inhibition of pacing. © 2017 Wiley Periodicals, Inc.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Schkade, D.A.; Payne, J.W.
This paper investigates what a respondent is thinking when answering a willingness-to-pay question in a contingent valuation, using a [open quotes]think aloud[close quotes] technique for psychology called verbal protocol analysis. The willingness-to-pay responses we observed seem to be constructed from a variety of considerations, including an obligation to pay a fair share of the cost of the solution and signaling concern for a larger set of environmental issues. The finding that respondents seem to construct their values at the time they are asked, rather than reporting a more well-defined value, is seen as consistent with over two decades of researchmore » on the psychology of decision making. Potential uses of verbal protocols in contingent valuation studies are also discussed. 64 refs., 6 tabs.« less
Magic state distillation protocols with noisy Clifford gates
NASA Astrophysics Data System (ADS)
Brooks, Peter
2013-03-01
A promising approach to universal fault-tolerant quantum computation is to implement the non-universal group of Clifford gates, and to achieve universality by adding the ability to prepare high-fidelity copies of certain ``magic states''. By applying state distillation protocols, many noisy copies of a magic state ancilla can be purified into a smaller number of clean copies which are arbitrarily close to the perfect state, using only Clifford operations. In practice, the Clifford gates themselves will be noisy, which can limit the efficiency of state distillation and put a floor on the achievable fidelity with the desired state. Recently, a number of new state distillation protocols have been proposed that have the potential to reduce the required resource overhead. I analyze these protocols and explore the tradeoffs between these different approaches to magic state distillation when noisy Clifford gates are taken into account. Supported in part by IARPA under contract D11PC20165, by NSF under Grant No. PHY-0803371, by DOE under Grant No. DE-FG03-92-ER40701, and by NSA/ARO under Grant No. W911NF-09-1-0442.
Dealing with the long-term social implications of research.
Fleischman, Alan; Levine, Carol; Eckenwiler, Lisa; Grady, Christine; Hammerschmidt, Dale E; Sugarman, Jeremy
2011-05-01
Biomedical and behavioral research may affect strongly held social values and thereby create significant controversy over whether such research should be permitted in the first place. Institutional review boards (IRBs) responsible for protecting the rights and welfare of participants in research are sometimes faced with review of protocols that have significant implications for social policy and the potential for negative social consequences. Although IRB members often raise concerns about potential long-term social implications in protocol review, federal regulations strongly discourage IRBs from considering them in their decisions. Yet IRBs often do consider the social implications of research protocols and sometimes create significant delays in initiating or even prevent such research. The social implications of research are important topics for public scrutiny and professional discussion. This article examines the reasons that the federal regulations preclude IRBs from assessing the social risks of research, and examines alternative approaches that have been used with varying success by national advisory groups to provide such guidance. The article concludes with recommendations for characteristics of a national advisory group that could successfully fulfill this need, including sustainability, independence, diverse and relevant expertise, and public transparency.
So you think you've designed an effective recruitment protocol?
Green, Cara; Vandall-Walker, Virginia
2017-03-22
Background Recruiting acutely ill patients to participate in research can be challenging. This paper outlines the difficulties the first author encountered in a study and the steps she took to overcome problems with research ethics, gain access to participants and implement a recruitment protocol in multiple hospitals. It also compares these steps with literature related to recruitment. Aim To inform and inspire neophyte researchers about the need for planning and resilience when dealing with recruitment challenges in multiple hospitals. Discussion The multiple enablers and barriers to the successful implementation of a hospital-based study recruitment protocol are explored based on a neophyte researcher's optimistic assumptions about this stage of the study. Conclusions Perseverance, adequately planning for contingencies, and accepting the barriers and challenges to recruitment are essential for completing one's research study and ensuring fulfilment as a researcher. Implications for practice Healthcare students carrying out research require adequate knowledge about conducting hospital-based, patient research to inform their recruitment plan. Maximising control over recruitment, allowing for adequate time to conduct data collection, and maintaining a good work ethic will help to ensure success.
Addressing risks to advance mental health research.
Iltis, Ana S; Misra, Sahana; Dunn, Laura B; Brown, Gregory K; Campbell, Amy; Earll, Sarah A; Glowinski, Anne; Hadley, Whitney B; Pies, Ronald; Dubois, James M
2013-12-01
Risk communication and management are essential to the ethical conduct of research, yet addressing risks may be time consuming for investigators and institutional review boards may reject study designs that seem too risky. This can discourage needed research, particularly in higher-risk protocols or those enrolling potentially vulnerable individuals, such as those with some level of suicidality. Improved mechanisms for addressing research risks may facilitate much needed psychiatric research. To provide mental health researchers with practical approaches to (1) identify and define various intrinsic research risks, (2) communicate these risks to others (eg, potential participants, regulatory bodies, and society), (3) manage these risks during the course of a study, and (4) justify the risks. As part of a National Institute of Mental Health-funded scientific meeting series, a public conference and a closed-session expert panel meeting were held on managing and disclosing risks in mental health clinical trials. The expert panel reviewed the literature with a focus on empirical studies and developed recommendations for best practices and further research on managing and disclosing risks in mental health clinical trials. No institutional review board-review was required because there were no human subjects. Challenges, current data, practical strategies, and topics for future research are addressed for each of 4 key areas pertaining to management and disclosure of risks in clinical trials: identifying and defining risks, communicating risks, managing risks during studies, and justifying research risks. Empirical data on risk communication, managing risks, and the benefits of research can support the ethical conduct of mental health research and may help investigators better conceptualize and confront risks and to gain institutional review board-approval.
Alali, Aziz S; McCredie, Victoria A; Mainprize, Todd G; Gomez, David; Nathens, Avery B
2017-10-01
Outcome after severe traumatic brain injury (TBI) differs substantially between hospitals. Explaining this variation begins with understanding the differences in structures and processes of care, particularly at intensive care units (ICUs) where acute TBI care takes place. We invited trauma medical directors (TMDs) from 187 centers participating in the American College of Surgeons Trauma Quality Improvement Program (ACS TQIP) to complete a survey. The survey domains included ICU model, type, availability of specialized units, staff, training programs, standard protocols and order sets, approach to withdrawal of life support, and perceived level of neurosurgeons' engagement in the ICU management of TBI. One hundred forty-two TMDs (76%) completed the survey. Severe TBI patients are admitted to dedicated neurocritical care units in 52 hospitals (37%), trauma ICUs in 44 hospitals (31%), general ICUs in 34 hospitals (24%), and surgical ICUs in 11 hospitals (8%). Fifty-seven percent are closed units. Board-certified intensivists directed 89% of ICUs, whereas 17% were led by neurointensivists. Sixty percent of ICU directors were general surgeons. Thirty-nine percent of hospitals had critical care fellowships and 11% had neurocritical care fellowships. Fifty-nine percent of ICUs had standard order sets and 61% had standard protocols specific for TBI, with the most common protocol relating to intracranial pressure management (53%). Only 43% of TMDs were satisfied with the current level of neurosurgeons' engagement in the ICU management of TBI; 46% believed that neurosurgeons should be more engaged; 11% believed they should be less engaged. In the largest survey of North American ICUs caring for TBI patients, there is substantial variation in the current approaches to ICU care for TBI, highlighting multiple opportunities for comparative effectiveness research.
Protocols | Office of Cancer Clinical Proteomics Research
Each reagent on the Antibody Portal has been characterized by a combination of methods specific for that antibody. To view the customized antibody methods and protocols (Standard Operating Procedures) used to generate and characterize each reagent, select an antibody of interest and open the protocols associated with their respective characterization methods along with characterization data.
Insider versus outsider executive succession: The relationship to hospital efficiency.
Ford, Eric W; Lowe, Kevin B; Silvera, Geoffrey B; Babik, Dmytro; Huerta, Timothy R
The relationship between Chief Executive Officer (CEO) succession and hospitals' competitive performance is an area of interest for health services researchers. Of particular interest is the impact on overall strategic direction and health system performance that results from selecting a CEO from inside the firm as opposed to seeking outside leadership. Empirical work-to-date has yielded mixed results. Much of this variability has been attributed to design flaws; however, in the absence of a clear message from the evidence, the preference for hiring "outsiders" continues to grow. This paper investigates on the extent to which insider CEO succession versus outsider succession impacts hospitals' competitive advantage vis-à-vis a sample of organizations that compete in the same sector. A hospital matching protocol based on propensity scores is used to control for endogeneity and makes comparisons of productivity across organizations through the use of stochastic frontier estimation. Succession negatively impacts hospitals' productivity, and firms with outsider CEO succession events closed the gap toward the competitive advantage frontier faster than comparable firms with insider successions. More research needs to be done on succession planning and its impact on CEO turnover.
Hensel, Kendi L; Carnes, Michael S; Stoll, Scott T
2016-11-01
The structural and physiologic changes in a woman's body during pregnancy can predispose pregnant women to low back pain and its associated disability, as well as to complications of pregnancy, labor, and delivery. Anecdotal and empirical evidence has indicated that osteopathic manipulative treatment (OMT) may be efficacious in improving pain and functionality in women who are pregnant. Based on that premise, the Pregnancy Research on Osteopathic Manipulation Optimizing Treatment Effects (PROMOTE) study was designed as a prospective, randomized, placebo-controlled, and blinded clinical trial to evaluate the efficacy of an OMT protocol for pain during third-trimester pregnancy. The OMT protocol developed for the PROMOTE study was based on physiologic theory and the concept of the interrelationship of structure and function. The 12 well-defined, standardized OMT techniques used in the protocol are commonly taught at osteopathic medical schools in the United States. These techniques can be easily replicated as a 20-minute protocol applied in conjunction with usual prenatal care, thus making it feasible to implement into clinical practice. This article presents an overview of the study design and treatment protocols used in the PROMOTE study.
Dewitt, James; Capistrant, Benjamin; Kohli, Nidhi; Mitteldorf, Darryl; Merengwa, Enyinnaya; West, William
2018-01-01
Background While deduplication and cross-validation protocols have been recommended for large Web-based studies, protocols for survey response validation of smaller studies have not been published. Objective This paper reports the challenges of survey validation inherent in a small Web-based health survey research. Methods The subject population was North American, gay and bisexual, prostate cancer survivors, who represent an under-researched, hidden, difficult-to-recruit, minority-within-a-minority population. In 2015-2016, advertising on a large Web-based cancer survivor support network, using email and social media, yielded 478 completed surveys. Results Our manual deduplication and cross-validation protocol identified 289 survey submissions (289/478, 60.4%) as likely spam, most stemming from advertising on social media. The basic components of this deduplication and validation protocol are detailed. An unexpected challenge encountered was invalid survey responses evolving across the study period. This necessitated the static detection protocol be augmented with a dynamic one. Conclusions Five recommendations for validation of Web-based samples, especially with smaller difficult-to-recruit populations, are detailed. PMID:29691203
Implementation and Evaluation of Four Interoperable Open Standards for the Internet of Things
Jazayeri, Mohammad Ali; Liang, Steve H. L.; Huang, Chih-Yuan
2015-01-01
Recently, researchers are focusing on a new use of the Internet called the Internet of Things (IoT), in which enabled electronic devices can be remotely accessed over the Internet. As the realization of IoT concept is still in its early stages, manufacturers of Internet-connected devices and IoT web service providers are defining their proprietary protocols based on their targeted applications. Consequently, IoT becomes heterogeneous in terms of hardware capabilities and communication protocols. Addressing these heterogeneities by following open standards is a necessary step to communicate with various IoT devices. In this research, we assess the feasibility of applying existing open standards on resource-constrained IoT devices. The standard protocols developed in this research are OGC PUCK over Bluetooth, TinySOS, SOS over CoAP, and OGC SensorThings API. We believe that by hosting open standard protocols on IoT devices, not only do the devices become self-describable, self-contained, and interoperable, but innovative applications can also be easily developed with standardized interfaces. In addition, we use memory consumption, request message size, response message size, and response latency to benchmark the efficiency of the implemented protocols. In all, this research presents and evaluates standard-based solutions to better understand the feasibility of applying existing standards to the IoT vision. PMID:26402683
Lund, Travis J.; Pilarz, Matthew; Velasco, Jonathan B.; Chakraverty, Devasmita; Rosploch, Kaitlyn; Undersander, Molly; Stains, Marilyne
2015-01-01
Researchers, university administrators, and faculty members are increasingly interested in measuring and describing instructional practices provided in science, technology, engineering, and mathematics (STEM) courses at the college level. Specifically, there is keen interest in comparing instructional practices between courses, monitoring changes over time, and mapping observed practices to research-based teaching. While increasingly common observation protocols (Reformed Teaching Observation Protocol [RTOP] and Classroom Observation Protocol in Undergraduate STEM [COPUS]) at the postsecondary level help achieve some of these goals, they also suffer from weaknesses that limit their applicability. In this study, we leverage the strengths of these protocols to provide an easy method that enables the reliable and valid characterization of instructional practices. This method was developed empirically via a cluster analysis using observations of 269 individual class periods, corresponding to 73 different faculty members, 28 different research-intensive institutions, and various STEM disciplines. Ten clusters, called COPUS profiles, emerged from this analysis; they represent the most common types of instructional practices enacted in the classrooms observed for this study. RTOP scores were used to validate the alignment of the 10 COPUS profiles with reformed teaching. Herein, we present a detailed description of the cluster analysis method, the COPUS profiles, and the distribution of the COPUS profiles across various STEM courses at research-intensive universities. PMID:25976654
Continued Development of Internet Protocols under the IBM OS/MVS Operating System
1985-01-25
developed a prototype TCP/IP implementation for an IBM MVS host under a previous DARPA contract’ as part of the Internet research effort on the design of...participated in the DARPA Internet research program which led to the present TCP and IP protocols. Development of a prototype implementation of TCP/IP
21 CFR 610.2 - Requests for samples and protocols; official release.
Code of Federal Regulations, 2010 CFR
2010-04-01
... Biologics Evaluation and Research, a manufacturer shall not distribute a lot of a product until the lot is... Evaluation and Research, a manufacturer shall not distribute a lot of a biological product until the lot is... 21 Food and Drugs 7 2010-04-01 2010-04-01 false Requests for samples and protocols; official...
21 CFR 610.2 - Requests for samples and protocols; official release.
Code of Federal Regulations, 2011 CFR
2011-04-01
... Biologics Evaluation and Research, a manufacturer shall not distribute a lot of a product until the lot is... Evaluation and Research, a manufacturer shall not distribute a lot of a biological product until the lot is... 21 Food and Drugs 7 2011-04-01 2010-04-01 true Requests for samples and protocols; official...
Justin D. Waskiewicz; Laura S. Kenefic; Nicole S. Rogers; Joshua J. Puhlick; John C. Brissette; Richard J. Dionne
2015-01-01
The U.S. Forest Service, Northern Research Station has been conducting research on the silviculture of northern conifers on the Penobscot Experimental Forest (PEF) in Maine since 1950. Formal study plans provide guidance and specifications for the experimental treatments, but documentation is also needed to ensure consistency in data collection and sampling protocols....
40 CFR 1048.110 - How must my engines diagnose malfunctions?
Code of Federal Regulations, 2013 CFR
2013-07-01
... control of air-fuel ratios: (a) Equip your engines with a diagnostic system. Starting in the 2007 model... malfunction whenever the air-fuel ratio does not cross stoichiometry for one minute of intended closed-loop operation. You may use other diagnostic strategies if we approve them in advance. (2) If the protocol...
40 CFR 1048.110 - How must my engines diagnose malfunctions?
Code of Federal Regulations, 2012 CFR
2012-07-01
... control of air-fuel ratios: (a) Equip your engines with a diagnostic system. Starting in the 2007 model... malfunction whenever the air-fuel ratio does not cross stoichiometry for one minute of intended closed-loop operation. You may use other diagnostic strategies if we approve them in advance. (2) If the protocol...
40 CFR 1048.110 - How must my engines diagnose malfunctions?
Code of Federal Regulations, 2014 CFR
2014-07-01
... control of air-fuel ratios: (a) Equip your engines with a diagnostic system. Starting in the 2007 model... malfunction whenever the air-fuel ratio does not cross stoichiometry for one minute of intended closed-loop operation. You may use other diagnostic strategies if we approve them in advance. (2) If the protocol...
Accuracy of the adiabatic-impulse approximation for closed and open quantum systems
NASA Astrophysics Data System (ADS)
Tomka, Michael; Campos Venuti, Lorenzo; Zanardi, Paolo
2018-03-01
We study the adiabatic-impulse approximation (AIA) as a tool to approximate the time evolution of quantum states when driven through a region of small gap. Such small-gap regions are a common situation in adiabatic quantum computing and having reliable approximations is important in this context. The AIA originates from the Kibble-Zurek theory applied to continuous quantum phase transitions. The Kibble-Zurek mechanism was developed to predict the power-law scaling of the defect density across a continuous quantum phase transition. Instead, here we quantify the accuracy of the AIA via the trace norm distance with respect to the exact evolved state. As expected, we find that for short times or fast protocols, the AIA outperforms the simple adiabatic approximation. However, for large times or slow protocols, the situation is actually reversed and the AIA provides a worse approximation. Nevertheless, we found a variation of the AIA that can perform better than the adiabatic one. This counterintuitive modification consists in crossing the region of small gap twice. Our findings are illustrated by several examples of driven closed and open quantum systems.
The Quantum Steganography Protocol via Quantum Noisy Channels
NASA Astrophysics Data System (ADS)
Wei, Zhan-Hong; Chen, Xiu-Bo; Niu, Xin-Xin; Yang, Yi-Xian
2015-08-01
As a promising branch of quantum information hiding, Quantum steganography aims to transmit secret messages covertly in public quantum channels. But due to environment noise and decoherence, quantum states easily decay and change. Therefore, it is very meaningful to make a quantum information hiding protocol apply to quantum noisy channels. In this paper, we make the further research on a quantum steganography protocol for quantum noisy channels. The paper proved that the protocol can apply to transmit secret message covertly in quantum noisy channels, and explicity showed quantum steganography protocol. In the protocol, without publishing the cover data, legal receivers can extract the secret message with a certain probability, which make the protocol have a good secrecy. Moreover, our protocol owns the independent security, and can be used in general quantum communications. The communication, which happen in our protocol, do not need entangled states, so our protocol can be used without the limitation of entanglement resource. More importantly, the protocol apply to quantum noisy channels, and can be used widely in the future quantum communication.
Maturo, Donna; Powell, Alexis; Major-Wilson, Hannah; Sanchez, Kenia; De Santis, Joseph P; Friedman, Lawrence B
2015-01-01
Advances in care and treatment of adolescents/young adults with HIV infection have made survival into adulthood possible, requiring transition to adult care. Researchers have documented that the transition process is challenging for adolescents/young adults. To ensure successful transition, a formal transition protocol is needed. Despite existing research, little quantitative evaluation of the transition process has been conducted. The purpose of the study was to pilot test the "Movin' Out" Transitioning Protocol, a formalized protocol developed to assist transition to adult care. A retrospective medical/nursing record review was conducted with 38 clients enrolled in the "Movin' Out" Transitioning Protocol at a university-based adolescent medicine clinic providing care to adolescents/young adults with HIV infection. Almost half of the participants were able to successfully transition to adult care. Reasons for failure to transition included relocation, attrition, lost to follow-up, and transfer to another adult service. Failure to transition to adult care was not related to adherence issues, X(2) (1, N=38)=2.49, p=.288; substance use, X(2) (1, N=38)=1.71, p=.474; mental health issues, X(2) (1, N=38)=2.23, p=.322; or pregnancy/childrearing, X(2) (1, N=38)=0.00, p=.627). Despite the small sample size, the "Movin' Out" Transitioning Protocol appears to be useful in guiding the transition process of adolescents/young adults with HIV infection to adult care. More research is needed with a larger sample to fully evaluate the "Movin' Out" Transitioning Protocol. Copyright © 2015 Elsevier Inc. All rights reserved.
Higdon, Lauren E; Lee, Karim; Tang, Qizhi; Maltzman, Jonathan S
2016-09-01
Research on human immune responses frequently involves the use of peripheral blood mononuclear cells (PBMC) immediately, or at significantly delayed timepoints, after collection. This requires PBMC isolation from whole blood and cryopreservation for some applications. It is important to standardize protocols for blood collection, PBMC isolation, cryopreservation, and thawing that maximize survival and functionality of PBMC at the time of analysis. This resource includes detailed protocols describing blood collection tubes, isolation of PBMC using a density gradient, cryopreservation of PBMC, and thawing of cells as well as preparation for functional assays. For each protocol, we include important considerations, such as timing, storage temperatures, and freezing rate. In addition, we provide alternatives so that researchers can make informed decisions in determining the optimal protocol for their application.
How blockchain-timestamped protocols could improve the trustworthiness of medical science
Irving, Greg; Holden, John
2017-01-01
Trust in scientific research is diminished by evidence that data are being manipulated. Outcome switching, data dredging and selective publication are some of the problems that undermine the integrity of published research. Methods for using blockchain to provide proof of pre-specified endpoints in clinical trial protocols were first reported by Carlisle. We wished to empirically test such an approach using a clinical trial protocol where outcome switching has previously been reported. Here we confirm the use of blockchain as a low cost, independently verifiable method to audit and confirm the reliability of scientific studies. PMID:27239273
How blockchain-timestamped protocols could improve the trustworthiness of medical science.
Irving, Greg; Holden, John
2016-01-01
Trust in scientific research is diminished by evidence that data are being manipulated. Outcome switching, data dredging and selective publication are some of the problems that undermine the integrity of published research. Methods for using blockchain to provide proof of pre-specified endpoints in clinical trial protocols were first reported by Carlisle. We wished to empirically test such an approach using a clinical trial protocol where outcome switching has previously been reported. Here we confirm the use of blockchain as a low cost, independently verifiable method to audit and confirm the reliability of scientific studies.
GATEWAY - COMMUNICATIONS GATEWAY SOFTWARE FOR NETEX, DECNET, AND TCP/IP
NASA Technical Reports Server (NTRS)
Keith, B.
1994-01-01
The Communications Gateway Software, GATEWAY, provides process-to-process communication between remote applications programs in different protocol domains. Communicating peer processes may be resident on any paired combination of NETEX, DECnet, or TCP/IP hosts. The gateway provides the necessary mapping from one protocol to another and will facilitate practical intermachine communications in a cost effective manner by eliminating the need to standardize on a single protocol or the need to implement multiple protocols in the host computers. The purpose of the gateway is to support data transfers between application programs on different host computers using different protocols. The gateway computer must be physically connected to both host computers and must contain the system software needed to use the communication protocols of both host computers. The communication process between application partners can be divided into three phases: session establishment, data transfer, and session termination. The communication protocols supported by GATEWAY (DECnet, NETEX, and TCP/IP) have addressing mechanisms that allow an application to identify itself and distinguish among other applications on the network. The exact form of the address varies depending on whether an application is passively offering (awaiting the receipt of a network connection from another network application) or actively connecting to another network. When the gateway is started, GATEWAY reads a file of address pairs. One of the address pairs is used by GATEWAY for passively offering on one network while the other address in the pair is used for actively connecting on the other network establishing the session. Now the two application partners can send and receive data in a manner appropriate to their home networks. GATEWAY accommodates full duplex transmissions. Thus, if the application partners are sophisticated enough, they can send and receive simultaneously. GATEWAY also keeps track of the number of bytes contained in each ransferred data packet. If GATEWAY detects an error during the data transfer, the sessions on both networks are terminated and the passive offer on the appropriate network is reissued. After performing the desired data transfer, one of the remote applications will send a network disconnect to the gateway to close its communication link. Upon detecting this network disconnect, GATEWAY replies with its own disconnect to ensure that the network connection has been fully terminated. Then, GATEWAY terminates its session with the other application by closing the communication link. GATEWAY has been implemented on a DEC VAX under VMS 4.7. It is written in ADA and has a central memory requirement of approximately 406K bytes. The communications protocols supported by GATEWAY are Network Systems Corporation's Network Executive (NETEX), Excelan's TCP/IP, and DECnet. GATEWAY was developed in 1988.
2014-01-01
Background Evidence demonstrates that physical exercise and psychological wellbeing are closely interlinked, particularly in older-aged women. However, research investigating how different forms of exercise influence mental health in older-aged women is underdeveloped. Methods/Design A randomized controlled trial (N = 300) will assess the relative effectiveness of two different exercise programs (whole-body vibration and Multicomponent Training) for improving psychological wellbeing in older-aged women. The following outcomes will be assessed at three time points (that is, pre, post, and follow-up): psychological wellbeing, proactive attitude, quality of life, and happiness. Discussion Results will have important implications for preventing psychological and physiological disease in older-aged women and for managing health-related costs for this population group. Trial registration Number NCT01966562 on Clinical Gov database the 8 October 2013 PMID:24886107
Siu, Natalie P Y; Too, L C; Tsang, Caroline S H; Young, Betty W Y
2015-06-01
There is increasing evidence that supports the close relationship between childhood and adult health. Fostering healthy growth and development of children deserves attention and effort. The Reference Framework for Preventive Care for Children in Primary Care Settings has been published by the Task Force on Conceptual Model and Preventive Protocols under the direction of the Working Group on Primary Care. It aims to promote health and prevent disease in children and is based on the latest research, and contributions of the Clinical Advisory Group that comprises primary care physicians, paediatricians, allied health professionals, and patient groups. This article highlights the comprehensive, continuing, and patient-centred preventive care for children and discusses how primary care physicians can incorporate the evidence-based recommendations into clinical practice. It is anticipated that the adoption of this framework will contribute to improved health and wellbeing of children.
Belenko, Steven; Hiller, Matthew; Visher, Christy; Copenhaver, Michael; O’Connell, Daniel; Burdon, William; Pankow, Jennifer; Clarke, Jennifer; Oser, Carrie
2013-01-01
HIV risk is disproportionately high among incarcerated individuals. Corrections agencies have been slow to implement evidence-based guidelines and interventions for HIV prevention, testing, and treatment. The emerging field of implementation science focuses on organizational interventions to facilitate adoption and implementation of evidence-based practices. A survey of among CJ-DATS correctional agency partners revealed that HIV policies and practices in prevention, detection and medical care varied widely, with some corrections agencies and facilities closely matching national guidelines and/or implementing evidence-based interventions. Others, principally attributed to limited resources, had numerous gaps in delivery of best HIV service practices. A brief overview is provided of a new CJ-DATS cooperative research protocol, informed by the survey findings, to test an organization-level intervention to reduce HIV service delivery gaps in corrections. PMID:24078624
Auer, Jorg A; Goodship, Allen; Arnoczky, Steven; Pearce, Simon; Price, Jill; Claes, Lutz; von Rechenberg, Brigitte; Hofmann-Amtenbrinck, Margarethe; Schneider, Erich; Müller-Terpitz, R; Thiele, F; Rippe, Klaus-Peter; Grainger, David W
2007-01-01
Background In an attempt to establish some consensus on the proper use and design of experimental animal models in musculoskeletal research, AOVET (the veterinary specialty group of the AO Foundation) in concert with the AO Research Institute (ARI), and the European Academy for the Study of Scientific and Technological Advance, convened a group of musculoskeletal researchers, veterinarians, legal experts, and ethicists to discuss, in a frank and open forum, the use of animals in musculoskeletal research. Methods The group narrowed the field to fracture research. The consensus opinion resulting from this workshop can be summarized as follows: Results & Conclusion Anaesthesia and pain management protocols for research animals should follow standard protocols applied in clinical work for the species involved. This will improve morbidity and mortality outcomes. A database should be established to facilitate selection of anaesthesia and pain management protocols for specific experimental surgical procedures and adopted as an International Standard (IS) according to animal species selected. A list of 10 golden rules and requirements for conduction of animal experiments in musculoskeletal research was drawn up comprising 1) Intelligent study designs to receive appropriate answers; 2) Minimal complication rates (5 to max. 10%); 3) Defined end-points for both welfare and scientific outputs analogous to quality assessment (QA) audit of protocols in GLP studies; 4) Sufficient details for materials and methods applied; 5) Potentially confounding variables (genetic background, seasonal, hormonal, size, histological, and biomechanical differences); 6) Post-operative management with emphasis on analgesia and follow-up examinations; 7) Study protocols to satisfy criteria established for a "justified animal study"; 8) Surgical expertise to conduct surgery on animals; 9) Pilot studies as a critical part of model validation and powering of the definitive study design; 10) Criteria for funding agencies to include requirements related to animal experiments as part of the overall scientific proposal review protocols. Such agencies are also encouraged to seriously consider and adopt the recommendations described here when awarding funds for specific projects. Specific new requirements and mandates related both to improving the welfare and scientific rigour of animal-based research models are urgently needed as part of international harmonization of standards. PMID:17678534
A mechanical protocol to replicate impact in walking footwear.
Price, Carina; Cooper, Glen; Graham-Smith, Philip; Jones, Richard
2014-01-01
Impact testing is undertaken to quantify the shock absorption characteristics of footwear. The current widely reported mechanical testing method mimics the heel impact in running and therefore applies excessive energy to walking footwear. The purpose of this study was to modify the ASTM protocol F1614 (Procedure A) to better represent walking gait. This was achieved by collecting kinematic and kinetic data while participants walked in four different styles of walking footwear (trainer, oxford shoe, flip-flop and triple-density sandal). The quantified heel-velocity and effective mass at ground-impact were then replicated in a mechanical protocol. The kinematic data identified different impact characteristics in the footwear styles. Significantly faster heel velocity towards the floor was recorded walking in the toe-post sandals (flip-flop and triple-density sandal) compared with other conditions (e.g. flip-flop: 0.36±0.05 ms(-1) versus trainer: 0.18±0.06 ms(-1)). The mechanical protocol was adapted by altering the mass and drop height specific to the data captured for each shoe (e.g. flip-flop: drop height 7 mm, mass 16.2 kg). As expected, the adapted mechanical protocol produced significantly lower peak force and accelerometer values than the ASTM protocol (p<.001). The mean difference between the human and adapted protocol was 12.7±17.5% (p<.001) for peak acceleration and 25.2±17.7% (p=.786) for peak force. This paper demonstrates that altered mechanical test protocols can more closely replicate loading on the lower limb in walking. This therefore suggests that testing of material properties of footbeds not only needs to be gait style specific (e.g. running versus walking), but also footwear style specific. Copyright © 2014 Elsevier B.V. All rights reserved.
Costa, Deena Kelly; Wallace, David J; Kahn, Jeremy M
2015-11-01
Daytime intensivist physician staffing is associated with improved outcomes in the ICU. However, it is unclear whether this association persists in the era of interprofessional, protocol-directed critical care. We sought to reexamine the association between daytime intensivist physician staffing and ICU mortality and determine if interprofessional rounding and protocols for mechanical ventilation in part mediate this relationship. Retrospective cohort study of ICUs in the Acute Physiology and Chronic Health Evaluation clinical information system from 2009 to 2010. Forty-nine ICUs in 25 U.S. hospitals. Adults (17 yr and older) admitted to a study ICU. None. We defined high-intensity daytime intensivist staffing as either a mandatory consult or closed ICU model; interprofessional rounds as rounds that included a respiratory therapist, pharmacist, physician and nurse; and protocol use as having protocols for liberation from mechanical ventilation and lung protective mechanical ventilation. Using multivariable logistic regression, we estimated the independent effect of daytime intensivist physician staffing on in-hospital mortality controlling for interprofessional rounds and protocols for mechanical ventilation, as well as other patient and hospital characteristics. Twenty-seven ICUs (55%) reported high-intensity daytime physician staffing, 42 ICUs (85%) reported daily interprofessional rounds, and 31 (63%) reported having protocols for mechanical ventilation. There was no association between daytime intensivist physician staffing and in-hospital mortality (adjusted odds ratio, 0.86; 95% CI, 0.65-1.14). After adjusting for interprofessional rounds and protocols for mechanical ventilation, the effect of daytime intensivist physician staffing remained nonsignificant (adjusted odds ratio, 0.90; 95% CI, 0.70-1.17). High-intensity daytime physician staffing in the ICU was not significantly associated with lower mortality in a modern cohort. This association was not affected by interprofessional rounds or protocols for mechanical ventilation.
Rosito, G; Sum, K; Chorne, N
2010-10-01
Indomethacin, a non-selective inhibitor of prostaglandin synthesis, is the gold standard treatment for patent ductus arteriosus (PDA). Indomethacin has been shown to permanently close the ductus and when given prophylactically, it reduces the incidence of PDA (1, 2). This study compares PDA closure and surgical ligation rates between patients using two different indomethacin administration protocols. This is a retrospective comparison analysis of 72 neonates, who received one of two indomethacin administration protocols. Our previous protocol suggested an initial dose of 0·2 mg/kg followed by two 0·1 mg/kg, with doses infused over 4 h and a 24-h dosing interval. A new potentially more useful protocol using the same mg/kg dose regimen but with doses infused over 30 min and a 12-h dosing interval, was evaluated. Each neonate was allowed three courses of treatment before surgical ligation was performed for persistent PDA. There were no statistically significant differences between the two protocol groups when comparing percentages of neonates with gestational age≤28 weeks, birth weight≤1000 g, male gender or receiving indomethacin for the indication of PDA prophylaxis vs. treatment. There was a trend towards a higher PDA closure rate and subsequently a lower PDA ligation rate in the new protocol when compared with the previous protocol. In this small population of premature neonates, there was a trend, but no significant difference, towards increasing PDA closure and lower surgical ligation rates in neonates given indomethacin with more frequent dosing and shorter infusion time. A well-powered randomized controlled trial is now needed. Copyright © 2010 The Authors. JCPT © 2010 Blackwell Publishing Ltd.
SeaWiFS technical report series. Volume 5: Ocean optics protocols for SeaWiFS validation
NASA Technical Reports Server (NTRS)
Mueller, James L.; Austin, Roswell W.; Hooker, Stanford B. (Editor); Firestone, Elaine R. (Editor)
1992-01-01
Protocols are presented for measuring optical properties, and other environmental variables, to validate the radiometric performance of the Sea-viewing Wide Field-of-view Sensor (SeaWiFS), and to develop and validate bio-optical algorithms for use with SeaWiFS data. The protocols are intended to establish foundations for a measurement strategy to verify the challenging SeaWiFS accuracy goals of 5 percent in water-leaving radiances and 35 percent in chlorophyll alpha concentration. The protocols first specify the variables which must be measured, and briefly review rationale. Subsequent chapters cover detailed protocols for instrument performance specifications, characterizing and calibration instruments, methods of making measurements in the field, and methods of data analysis. These protocols were developed at a workshop sponsored by the SeaWiFS Project Office (SPO) and held at the Naval Postgraduate School in Monterey, California (9-12 April, 1991). This report is the proceedings of that workshop, as interpreted and expanded by the authors and reviewed by workshop participants and other members of the bio-optical research community. The protocols are a first prescription to approach unprecedented measurement accuracies implied by the SeaWiFS goals, and research and development are needed to improve the state-of-the-art in specific areas. The protocols should be periodically revised to reflect technical advances during the SeaWiFS Project cycle.
Vahabzadeh, Massoud; Lin, Jia-Ling; Mezghanni, Mustapha; Epstein, David H; Preston, Kenzie L
2009-01-01
A challenge in treatment research is the necessity of adhering to protocol and regulatory strictures while maintaining flexibility to meet patients' treatment needs and to accommodate variations among protocols. Another challenge is the acquisition of large amounts of data in an occasionally hectic environment, along with the provision of seamless methods for exporting, mining and querying the data. We have automated several major functions of our outpatient treatment research clinic for studies in drug abuse and dependence. Here we describe three such specialised applications: the Automated Contingency Management (ACM) system for the delivery of behavioural interventions, the transactional electronic diary (TED) system for the management of behavioural assessments and the Protocol Workflow System (PWS) for computerised workflow automation and guidance of each participant's daily clinic activities. These modules are integrated into our larger information system to enable data sharing in real time among authorised staff. ACM and the TED have each permitted us to conduct research that was not previously possible. In addition, the time to data analysis at the end of each study is substantially shorter. With the implementation of the PWS, we have been able to manage a research clinic with an 80 patient capacity, having an annual average of 18,000 patient visits and 7300 urine collections with a research staff of five. Finally, automated data management has considerably enhanced our ability to monitor and summarise participant safety data for research oversight. When developed in consultation with end users, automation in treatment research clinics can enable more efficient operations, better communication among staff and expansions in research methods.
2016-01-01
of data science within DIA and ensure the activities assist and inform DIA’s decisionmakers, analysts , and operators. The research addressed two key...by an analyst or researcher . This type of identifi- cation can be time-consuming and potentially full of errors. GENIE learns from ana- 1 Interview... analysts . The protocol can be found in Appendix A. The protocol was intended to elicit information in five broad research areas. First, we asked a
Gonorazky, Sergio E
2008-01-01
The Administración Nacional de Medicamentos, Alimentos y Tecnología Médica de la República Argentina (ANMAT) requires that an independent ethics committee of sponsors and/or researchers must previously evaluate and approve all the new pharmacological research protocols carried out on human beings. However, due to the lucrative nature of the evaluation, and because the selection of the Independent Ethics Committee is carried out by the sponsors and/or researchers, the assumed autonomy of the former can be reduced to merely a relationship of "service provider-customer". The Institutional Review Board of the Mar del Plata s Community Hospital has evaluated, between 2005 and 2006, thirty three research protocols (with their corresponding information sheets for patients and informed consent forms) previously approved by a non-institutional Independent Ethics Committee. The median number of objections made by the Institutional Review Board, which prompted the previously mentioned protocols to be modified in order to be approved, was of three per protocol. In other words, the accreditation of an Independent Ethics Committee requires a system that guarantees actual independence from the sponsors and/or researchers, as well as management control mechanisms that may lead them into an eventual loss of accreditation. Several measures are proposed in order to correct the deficiencies of the present system.
Kaiser, Ulrike; Steinmetz, Dorit; Scharnagel, Rüdiger; Jensen, Mark P; Balck, Friedrich; Sabatowski, Rainer
2014-10-14
Since the response of spouses has been proven to be an important reinforcement of pain behaviour and disability it has been addressed in research and therapy. Fordyce suggested pain behaviour and well behaviour be considered in explaining suffering in chronic pain patients. Among existing instruments concerning spouse's responses the aspect of well behaviour has not been examined so far. The SRI (Spouse Response Inventory) tries to consider pain behaviour and well behaviour and appears to be acceptable because of its brevity and close proximity to daily language. The aim of the study is the translation into German, followed by evaluation and validation, of the SRI on a German sample of patients with chronic pain. The study is comprehensively designed: initially, the focus will lie on the translation of the instrument following the guidelines for cross-cultural translation and adaptation and evaluation of the German version according to the source study. Subsequently, a validation referring to predictive, incremental and construct validation will be conducted using instruments based on similar or close but different constructs. Evaluation of the resulting SRI-G (SRI-German) will be conducted on a sample of at least 30 patients with chronic pain attending a comprehensive pain centre. For validation at least 120 patients with chronic headache, back pain, cancer related pain and somatoform pain disorder shall be included, for a total of 480 patients. Separate analyses according to specific pain diagnoses will be performed to ensure psychometric property, interpretability and control of diagnosis of specific limitations. Analyses will include comprehensive investigation of psychometric property of the scale by hierarchical regression analyses, correlation analyses, multivariate analysis of variance and exploratory factor analyses (SPSS). The study protocol was approved by the Ethics Committee of the University of Dresden (EK 335 122008) based on the Helsinki declaration. Published by the BMJ Publishing Group Limited. For permission to use (where not already granted under a licence) please go to http://group.bmj.com/group/rights-licensing/permissions.
MRI Sequences in Head & Neck Radiology - State of the Art.
Widmann, Gerlig; Henninger, Benjamin; Kremser, Christian; Jaschke, Werner
2017-05-01
Background Magnetic resonance imaging (MRI) has become an essential imaging modality for the evaluation of head & neck pathologies. However, the diagnostic power of MRI is strongly related to the appropriate selection and interpretation of imaging protocols and sequences. The aim of this article is to review state-of-the-art sequences for the clinical routine in head & neck MRI and to describe the evidence for which medical question these sequences and techniques are useful. Method Literature review of state-of-the-art sequences in head & neck MRI. Results and Conclusion Basic sequences (T1w, T2w, T1wC+) and fat suppression techniques (TIRM/STIR, Dixon, Spectral Fat sat) are important tools in the diagnostic workup of inflammation, congenital lesions and tumors including staging. Additional sequences (SSFP (CISS, FIESTA), SPACE, VISTA, 3D-FLAIR) are used for pathologies of the cranial nerves, labyrinth and evaluation of endolymphatic hydrops in Menière's disease. Vessel and perfusion sequences (3D-TOF, TWIST/TRICKS angiography, DCE) are used in vascular contact syndromes, vascular malformations and analysis of microvascular parameters of tissue perfusion. Diffusion-weighted imaging (EPI-DWI, non-EPI-DWI, RESOLVE) is helpful in cholesteatoma imaging, estimation of malignancy, and evaluation of treatment response and posttreatment recurrence in head & neck cancer. Understanding of MRI sequences and close collaboration with referring physicians improves the diagnostic confidence of MRI in the daily routine and drives further research in this fascinating image modality. Key Points: · Understanding of MRI sequences is essential for the correct and reliable interpretation of MRI findings.. · MRI protocols have to be carefully selected based on relevant clinical information.. · Close collaboration with referring physicians improves the output obtained from the diagnostic possibilities of MRI.. Citation Format · Widmann G, Henninger B, Kremser C et al. MRI Sequences in Head & Neck Radiology - State of the Art. Fortschr Röntgenstr 2017; 189: 413 - 422. © Georg Thieme Verlag KG Stuttgart · New York.
At the request of staff in the EPA Regions, EPA?s Office of Research and Development carried out an independent evaluation of the Technical Protocol for Evaluating Natural Attenuation of Chlorinated Solvents in Ground Water (EPA/600/R-98/128). The Protocol was developed around c...
van den Oetelaar, W F J M; van Stel, H F; van Rhenen, W; Stellato, R K; Grolman, W
2016-11-10
Hospitals pursue different goals at the same time: excellent service to their patients, good quality care, operational excellence, retaining employees. This requires a good balance between patient needs and nursing staff. One way to ensure a proper fit between patient needs and nursing staff is to work with a workload management method. In our view, a nursing workload management method needs to have the following characteristics: easy to interpret; limited additional registration; applicable to different types of hospital wards; supported by nurses; covers all activities of nurses and suitable for prospective planning of nursing staff. At present, no such method is available. The research follows several steps to come to a workload management method for staff nurses. First, a list of patient characteristics relevant to care time will be composed by performing a Delphi study among staff nurses. Next, a time study of nurses' activities will be carried out. The 2 can be combined to estimate care time per patient group and estimate the time nurses spend on non-patient-related activities. These 2 estimates can be combined and compared with available nursing resources: this gives an estimate of nurses' workload. The research will take place in an academic hospital in the Netherlands. 6 surgical wards will be included, capacity 15-30 beds. The study protocol was submitted to the Medical Ethical Review Board of the University Medical Center (UMC) Utrecht and received a positive advice, protocol number 14-165/C. This method will be developed in close cooperation with staff nurses and ward management. The strong involvement of the end users will contribute to a broader support of the results. The method we will develop may also be useful for planning purposes; this is a strong advantage compared with existing methods, which tend to focus on retrospective analysis. Published by the BMJ Publishing Group Limited. For permission to use (where not already granted under a licence) please go to http://www.bmj.com/company/products-services/rights-and-licensing/.
Multi-party quantum key agreement protocol secure against collusion attacks
NASA Astrophysics Data System (ADS)
Wang, Ping; Sun, Zhiwei; Sun, Xiaoqiang
2017-07-01
The fairness of a secure multi-party quantum key agreement (MQKA) protocol requires that all involved parties are entirely peer entities and can equally influence the outcome of the protocol to establish a shared key wherein no one can decide the shared key alone. However, it is found that parts of the existing MQKA protocols are sensitive to collusion attacks, i.e., some of the dishonest participants can collaborate to predetermine the final key without being detected. In this paper, a multi-party QKA protocol resisting collusion attacks is proposed. Different from previous QKA protocol resisting N-1 coconspirators or resisting 1 coconspirators, we investigate the general circle-type MQKA protocol which can be secure against t dishonest participants' cooperation. Here, t < N. We hope the results of the presented paper will be helpful for further research on fair MQKA protocols.
Calvert, Melanie; Kyte, Derek; Mercieca-Bebber, Rebecca; Slade, Anita; Chan, An-Wen; King, Madeleine T; Hunn, Amanda; Bottomley, Andrew; Regnault, Antoine; Chan, An-Wen; Ells, Carolyn; O'Connor, Daniel; Revicki, Dennis; Patrick, Donald; Altman, Doug; Basch, Ethan; Velikova, Galina; Price, Gary; Draper, Heather; Blazeby, Jane; Scott, Jane; Coast, Joanna; Norquist, Josephine; Brown, Julia; Haywood, Kirstie; Johnson, Laura Lee; Campbell, Lisa; Frank, Lori; von Hildebrand, Maria; Brundage, Michael; Palmer, Michael; Kluetz, Paul; Stephens, Richard; Golub, Robert M; Mitchell, Sandra; Groves, Trish
2018-02-06
Patient-reported outcome (PRO) data from clinical trials can provide valuable evidence to inform shared decision making, labeling claims, clinical guidelines, and health policy; however, the PRO content of clinical trial protocols is often suboptimal. The SPIRIT (Standard Protocol Items: Recommendations for Interventional Trials) statement was published in 2013 and aims to improve the completeness of trial protocols by providing evidence-based recommendations for the minimum set of items to be addressed, but it does not provide PRO-specific guidance. To develop international, consensus-based, PRO-specific protocol guidance (the SPIRIT-PRO Extension). The SPIRIT-PRO Extension was developed following the Enhancing Quality and Transparency of Health Research (EQUATOR) Network's methodological framework for guideline development. This included (1) a systematic review of existing PRO-specific protocol guidance to generate a list of potential PRO-specific protocol items (published in 2014); (2) refinements to the list and removal of duplicate items by the International Society for Quality of Life Research (ISOQOL) Protocol Checklist Taskforce; (3) an international stakeholder survey of clinical trial research personnel, PRO methodologists, health economists, psychometricians, patient advocates, funders, industry representatives, journal editors, policy makers, ethicists, and researchers responsible for evidence synthesis (distributed by 38 international partner organizations in October 2016); (4) an international Delphi exercise (n = 137 invited; October 2016 to February 2017); and (5) consensus meeting (n = 30 invited; May 2017). Prior to voting, consensus meeting participants were informed of the results of the Delphi exercise and given data from structured reviews evaluating the PRO protocol content of 3 defined samples of trial protocols. The systematic review identified 162 PRO-specific protocol recommendations from 54 sources. The ISOQOL Taskforce (n = 21) reduced this to 56 items, which were considered by 138 international stakeholder survey participants and 99 Delphi panelists. The final wording of the SPIRIT-PRO Extension was agreed on at a consensus meeting (n = 29 participants) and reviewed by external group of experts during a consultation period. Eleven extensions and 5 elaborations to the SPIRIT 2013 checklist were recommended for inclusion in clinical trial protocols in which PROs are a primary or key secondary outcome. Extension items focused on PRO-specific issues relating to the trial rationale, objectives, eligibility criteria, concepts used to evaluate the intervention, time points for assessment, PRO instrument selection and measurement properties, data collection plan, translation to other languages, proxy completion, strategies to minimize missing data, and whether PRO data will be monitored during the study to inform clinical care. The SPIRIT-PRO guidelines provide recommendations for items that should be addressed and included in clinical trial protocols in which PROs are a primary or key secondary outcome. Improved design of clinical trials including PROs could help ensure high-quality data that may inform patient-centered care.
Physician communication in the operating room.
Kirschbaum, Kristin A; Rask, John P; Fortner, Sally A; Kulesher, Robert; Nelson, Michael T; Yen, Tony; Brennan, Matthew
2015-01-01
In this study, communication research was conducted with multidisciplinary groups of operating-room physicians. Theoretical frameworks from intercultural communication and rhetoric were used to (a) measure latent cultural communication variables and (b) conduct communication training with the physicians. A six-step protocol guided the research with teams of physicians from different surgical specialties: anesthesiologists, general surgeons, and obstetrician-gynecologists (n = 85). Latent cultural communication variables were measured by surveys administered to physicians before and after completion of the protocol. The centerpiece of the 2-hour research protocol was an instructional session that informed the surgical physicians about rhetorical choices that support participatory communication. Post-training results demonstrated scores increased on communication variables that contribute to collaborative communication and teamwork among the physicians. This study expands health communication research through application of combined intercultural and rhetorical frameworks, and establishes new ways communication theory can contribute to medical education.
Consideration and Checkboxes: Incorporating Ethics and Science into the 3Rs
Landi, Margaret S; Shriver, Adam J; Mueller, Anne
2015-01-01
Members of the research community aim to both produce high-quality research and ensure that harm is minimized in animals. The primary means of ensuring these goals are both met is the 3Rs framework of replacement, reduction, and refinement. However, some approaches to the 3Rs may result in a ‘check box mentality’ in which IACUC members, researchers, administrators, and caretakers check off a list of tasks to evaluate a protocol. We provide reasons for thinking that the 3Rs approach could be enhanced with more explicit discussion of the ethical assumptions used to arrive at an approved research protocol during IACUC review. Here we suggest that the notion of moral considerability, and all of the related issues it gives rise to, should be incorporated into IACUC discussions of 3Rs deliberations during protocol review to ensure that animal wellbeing is enhanced within the constraints of scientific investigation. PMID:25836970
Du, Lanying; Li, Ye; Gao, Jimin; Zhou, Yusen; Jiang, Shibo
2013-01-01
Summary Influenza A viruses (IAVs), particularly the highly pathogenic avian influenza (HPAI) H5N1, have posed a substantial threat to public health worldwide. Although the laboratory generation of the mutant influenza virus H5N1 with airborne transmissibility among mammals, which has been considered as a dual-use research, may benefit the development of effective vaccines and therapeutics against the emerging infectious agents, it may also pose threats to national biosecurity, laboratory biosafety, and/or public health. This review introduces the classification and characterization of IAVs, pinpoints historic pandemics and epidemics caused by IAVs, emphasizes the significance and necessity of biosafety, summarizes currently established biosafety-related protocols for IAV research, and provides potential strategies to improve biosafety protocols for dual-use research on the highly pathogenic avian influenza viruses and other emerging infectious agents. PMID:22987727
Du, Lanying; Li, Ye; Gao, Jimin; Zhou, Yusen; Jiang, Shibo
2012-11-01
Influenza A viruses (IAVs), particularly the highly pathogenic avian influenza H5N1, have posed a substantial threat to public health worldwide. Although the laboratory generation of the mutant influenza virus H5N1 with airborne transmissibility among mammals, which has been considered as a dual-use research, may benefit the development of effective vaccines and therapeutics against the emerging infectious agents, it may also pose threats to national biosecurity, laboratory biosafety, and/or public health. This review introduces the classification and characterization of IAVs, pinpoints historic pandemics and epidemics caused by IAVs, emphasizes the significance and necessity of biosafety, summarizes currently established biosafety-related protocols for IAV research, and provides potential strategies to improve biosafety protocols for dual-use research on the highly pathogenic avian influenza viruses and other emerging infectious agents. Copyright © 2012 John Wiley & Sons, Ltd.
Meyer, Markus; Donsa, Klaus; Truskaller, Thomas; Frohner, Matthias; Pohn, Birgit; Felfernig, Alexander; Sinner, Frank; Pieber, Thomas
2018-01-01
A fast and accurate data transmission from glucose meter to clinical decision support systems (CDSSs) is crucial for the management of type 2 diabetes mellitus since almost all therapeutic interventions are derived from glucose measurements. Aim was to develop a prototype of an automated glucose measurement transmission protocol based on the Continua Design Guidelines and to embed the protocol into a CDSS used by healthcare professionals. A literature and market research was performed to analyze the state-of-the-art and thereupon develop, integrate and validate an automated glucose measurement transmission protocol in an iterative process. Findings from literature and market research guided towards the development of a standardized glucose measurement transmission protocol using a middleware. The interface description to communicate with the glucose meter was illustrated and embedded into a CDSS. A prototype of an interoperable transmission of glucose measurements was developed and implemented in a CDSS presenting a promising way to reduce medication errors and improve user satisfaction.
The Wiley Protocol: an analysis of ethical issues.
Rosenthal, M Sara
2008-01-01
: This review explores the ethical issues surrounding an unregulated protocol that is advertised to women through consumer books, the popular press, and the Internet, known as the Wiley Protocol. : A content analysis of relevant documents was conducted, followed by telephone interviews with investigators and former participants to verify facts. : The Wiley Protocol is an example of unregulated research involving potentially unsafe doses of bioidentical hormones applied to an unselected population of women. This protocol fails to use research ethics guidelines such as informed consent, investigator expertise, sound methodology, standardized data collection, and data safety monitoring. : Clinical ethics breaches include lack of full disclosure of risks, coercive influences, as well as misinformation about the study goals and safety. Breaches of professional ethics include conflicts of interest with respect to financial incentives, patient accrual, and inadequate standards of awareness and proficiency among participating investigators. It appears evident that the failure to regulate nutriceuticals and products of compounding pharmacy has provided the opportunity for these ethical violations.
ERIC Educational Resources Information Center
Peacock, Christopher
2012-01-01
The purpose of this research effort was to develop a model that provides repeatable Location Management (LM) testing using a network simulation tool, QualNet version 5.1 (2011). The model will provide current and future protocol developers a framework to simulate stable protocol environments for development. This study used the Design Science…
Evaluation of Patient Handoff Methods on an Inpatient Teaching Service
Craig, Steven R.; Smith, Hayden L.; Downen, A. Matthew; Yost, W. John
2012-01-01
Background The patient handoff process can be a highly variable and unstructured period at risk for communication errors. The morning sign-in process used by resident physicians at teaching hospitals typically involves less rigorous handoff protocols than the resident evening sign-out process. Little research has been conducted on best practices for handoffs during morning sign-in exchanges between resident physicians. Research must evaluate optimal protocols for the resident morning sign-in process. Methods Three morning handoff protocols consisting of written, electronic, and face-to-face methods were implemented over 3 study phases during an academic year. Study participants included all interns covering the internal medicine inpatient teaching service at a tertiary hospital. Study measures entailed intern survey-based interviews analyzed for failures in handoff protocols with or without missed pertinent information. Descriptive and comparative analyses examined study phase differences. Results A scheduled face-to-face handoff process had the fewest protocol deviations and demonstrated best communication of essential patient care information between cross-covering teams compared to written and electronic sign-in protocols. Conclusion Intern patient handoffs were more reliable when the sign-in protocol included scheduled face-to-face meetings. This method provided the best communication of patient care information and allowed for open exchanges of information. PMID:23267259
A History of the Improvement of Internet Protocols Over Satellites Using ACTS
NASA Technical Reports Server (NTRS)
Allman, Mark; Kruse, Hans; Ostermann, Shawn
2000-01-01
This paper outlines the main results of a number of ACTS experiments on the efficacy of using standard Internet protocols over long-delay satellite channels. These experiments have been jointly conducted by NASAs Glenn Research Center and Ohio University over the last six years. The focus of our investigations has been the impact of long-delay networks with non-zero bit-error rates on the performance of the suite of Internet protocols. In particular, we have focused on the most widely used transport protocol, the Transmission Control Protocol (TCP), as well as several application layer protocols. This paper presents our main results, as well as references to more verbose discussions of our experiments.
Rolling Deck to Repository (R2R): Standards and Semantics for Open Access to Research Data
NASA Astrophysics Data System (ADS)
Arko, Robert; Carbotte, Suzanne; Chandler, Cynthia; Smith, Shawn; Stocks, Karen
2015-04-01
In recent years, a growing number of funding agencies and professional societies have issued policies calling for open access to research data. The Rolling Deck to Repository (R2R) program is working to ensure open access to the environmental sensor data routinely acquired by the U.S. academic research fleet. Currently 25 vessels deliver 7 terabytes of data to R2R each year, acquired from a suite of geophysical, oceanographic, meteorological, and navigational sensors on over 400 cruises worldwide. R2R is working to ensure these data are preserved in trusted repositories, discoverable via standard protocols, and adequately documented for reuse. R2R maintains a master catalog of cruises for the U.S. academic research fleet, currently holding essential documentation for over 3,800 expeditions including vessel and cruise identifiers, start/end dates and ports, project titles and funding awards, science parties, dataset inventories with instrument types and file formats, data quality assessments, and links to related content at other repositories. A Digital Object Identifier (DOI) is published for 1) each cruise, 2) each original field sensor dataset, 3) each post-field data product such as quality-controlled shiptrack navigation produced by the R2R program, and 4) each document such as a cruise report submitted by the science party. Scientists are linked to personal identifiers, such as the Open Researcher and Contributor ID (ORCID), where known. Using standard global identifiers such as DOIs and ORCIDs facilitates linking with journal publications and generation of citation metrics. Since its inception, the R2R program has worked in close collaboration with other data repositories in the development of shared semantics for oceanographic research. The R2R cruise catalog uses community-standard terms and definitions hosted by the NERC Vocabulary Server, and publishes ISO metadata records for each cruise that use community-standard profiles developed with the NOAA Data Centers and the EU SeaDataNet project. R2R is a partner in the Ocean Data Interoperability Platform (ODIP), working to strengthen links among regional and national data systems, as well as a lead partner in the EarthCube "GeoLink" project, developing a standard set of ontology design patterns for publishing research data using Semantic Web protocols.
Thermal Imaging to Study Stress Non-invasively in Unrestrained Birds.
Jerem, Paul; Herborn, Katherine; McCafferty, Dominic; McKeegan, Dorothy; Nager, Ruedi
2015-11-06
Stress, a central concept in biology, describes a suite of emergency responses to challenges. Among other responses, stress leads to a change in blood flow that results in a net influx of blood to key organs and an increase in core temperature. This stress-induced hyperthermia is used to assess stress. However, measuring core temperature is invasive. As blood flow is redirected to the core, the periphery of the body can cool. This paper describes a protocol where peripheral body temperature is measured non-invasively in wild blue tits (Cyanistes caeruleus) using infrared thermography. In the field we created a set-up bringing the birds to an ideal position in front of the camera by using a baited box. The camera takes a short thermal video recording of the undisturbed bird before applying a mild stressor (closing the box and therefore capturing the bird), and the bird's response to being trapped is recorded. The bare skin of the eye-region is the warmest area in the image. This allows an automated extraction of the maximum eye-region temperature from each image frame, followed by further steps of manual data filtering removing the most common sources of errors (motion blur, blinking). This protocol provides a time series of eye-region temperature with a fine temporal resolution that allows us to study the dynamics of the stress response non-invasively. Further work needs to demonstrate the usefulness of the method to assess stress, for instance to investigate whether eye-region temperature response is proportional to the strength of the stressor. If this can be confirmed, it will provide a valuable alternative method of stress assessment in animals and will be useful to a wide range of researchers from ecologists, conservation biologists, physiologists to animal welfare researchers.
Thermal Imaging to Study Stress Non-invasively in Unrestrained Birds
Jerem, Paul; Herborn, Katherine; McCafferty, Dominic; McKeegan, Dorothy; Nager, Ruedi
2015-01-01
Stress, a central concept in biology, describes a suite of emergency responses to challenges. Among other responses, stress leads to a change in blood flow that results in a net influx of blood to key organs and an increase in core temperature. This stress-induced hyperthermia is used to assess stress. However, measuring core temperature is invasive. As blood flow is redirected to the core, the periphery of the body can cool. This paper describes a protocol where peripheral body temperature is measured non-invasively in wild blue tits (Cyanistes caeruleus) using infrared thermography. In the field we created a set-up bringing the birds to an ideal position in front of the camera by using a baited box. The camera takes a short thermal video recording of the undisturbed bird before applying a mild stressor (closing the box and therefore capturing the bird), and the bird’s response to being trapped is recorded. The bare skin of the eye-region is the warmest area in the image. This allows an automated extraction of the maximum eye-region temperature from each image frame, followed by further steps of manual data filtering removing the most common sources of errors (motion blur, blinking). This protocol provides a time series of eye-region temperature with a fine temporal resolution that allows us to study the dynamics of the stress response non-invasively. Further work needs to demonstrate the usefulness of the method to assess stress, for instance to investigate whether eye-region temperature response is proportional to the strength of the stressor. If this can be confirmed, it will provide a valuable alternative method of stress assessment in animals and will be useful to a wide range of researchers from ecologists, conservation biologists, physiologists to animal welfare researchers. PMID:26575985
Visuospatial selective attention in chickens.
Sridharan, Devarajan; Ramamurthy, Deepa L; Schwarz, Jason S; Knudsen, Eric I
2014-05-13
Voluntary control of attention promotes intelligent, adaptive behaviors by enabling the selective processing of information that is most relevant for making decisions. Despite extensive research on attention in primates, the capacity for selective attention in nonprimate species has never been quantified. Here we demonstrate selective attention in chickens by applying protocols that have been used to characterize visual spatial attention in primates. Chickens were trained to localize and report the vertical position of a target in the presence of task-relevant distracters. A spatial cue, the location of which varied across individual trials, indicated the horizontal, but not vertical, position of the upcoming target. Spatial cueing improved localization performance: accuracy (d') increased and reaction times decreased in a space-specific manner. Distracters severely impaired perceptual performance, and this impairment was greatly reduced by spatial cueing. Signal detection analysis with an "indecision" model demonstrated that spatial cueing significantly increased choice certainty in localizing targets. By contrast, error-aversion certainty (certainty of not making an error) remained essentially constant across cueing protocols, target contrasts, and individuals. The results show that chickens shift spatial attention rapidly and dynamically, following principles of stimulus selection that closely parallel those documented in primates. The findings suggest that the mechanisms that control attention have been conserved through evolution, and establish chickens--a highly visual species that is easily trained and amenable to cutting-edge experimental technologies--as an attractive model for linking behavior to neural mechanisms of selective attention.
Gornitzky, Alex L; Georgiadis, Andrew G; Seeley, Mark A; Horn, B David; Sankar, Wudbhav N
2016-05-01
Gadolinium-enhanced perfusion MRI (pMRI) after closed reduction/spica casting for developmental dysplasia of the hip (DDH) has been suggested as a potential means to identify and avoid avascular necrosis (AVN). To date, however, no study has evaluated the effectiveness of pMRI in clinical practice or compared it with other approaches (such as postreduction CT scan) to show a difference in the proportion of AVN. (1) Can a pMRI-based protocol be used immediately post closed reduction to minimize the risk that AVN would develop? (2) What are the overall hip-related outcomes after closed reduction/spica casting using this protocol? (3) Do any patient-specific factors at the time of closed reduction predict future AVN? This was a retrospective cohort study at a large tertiary care children's hospital. Between 2009 and 2013 we treated 43 patients with closed reduction/spica casting for DDH, of whom 33 (77%) received a postreduction pMRI. All patients were indicated for pMRI per treating surgeon preference. A convenience sample totaling 25 hips in 22 patients treated with pMRI was then established using the following exclusion criteria: DDH of neuromuscular/syndromic origin, failed initial closed reduction, less than 1 year of clinical and radiographic followup, and subsequent open reduction. Next, the 40 patients treated with closed reduction between 2004 and 2009 were screened until the chronologically most recent 25 hips (after applying the previously mentioned exclusion criteria) were identified in 21 of the first 34 patients (62%) screened. Although termed the CT group, specific postreduction imaging was not a defined inclusion criterion in this group with the majority (21 of 25 [84%]) receiving postreduction CT and the remainder (four of 25 [16%]) receiving only postreduction radiographs. All hips with globally decreased femoral head perfusion on postreduction pMRI were treated with immediate cast removal followed by repeat closed reduction or open reduction, as per surgeon preference, with two of 33 (6%) requiring such further interventions. Salter criteria were then used to determine the proportion of AVN on radiographs at 1-year and final followup. Secondary outcomes including residual dysplasia and the need for further corrective surgery were ascertained through radiographic and retrospective chart review. At 1-year followup there was no difference in the proportion of AVN in the historical CT group as compared with the pMRI group (six of 25 [24%] versus one of 25 [4%]; odds ratio [OR], 7.6; 95% confidence interval [CI], 0.8-363; p = 0.098). However, by final followup there was a statistically higher proportion of AVN in the CT group (seven of 25 [28%] versus one of 25 [4%]; OR, 9.3; 95% CI, 1.0-438; p = 0.049). No patient with normal perfusion on postreduction pMRI went on to develop AVN. In those pMRI patients in whom a successful reduction was initially obtained, two of 25 (8%) went on to require further corrective surgery and one of 25 (4%) had a redislocation event. With the numbers available, no patient-specific factors at the time of closed reduction were predictive of future AVN, including the patient's age/weight, the presence of an ossific nucleus, history of previous bracing treatment, or the abduction angle in spica cast. A pMRI-based protocol immediately after closed reduction/spica casting may decrease the risk of AVN by helping the surgeon to evaluate femoral head vascularity. Although preliminary in nature, this study could serve to guide further investigation into the potential role of pMRI for the treatment of patients who require closed reduction/spica casting for DDH. Level III, therapeutic study.
A versatile modular bioreactor platform for Tissue Engineering
Schuerlein, Sebastian; Schwarz, Thomas; Krziminski, Steffan; Gätzner, Sabine; Hoppensack, Anke; Schwedhelm, Ivo; Schweinlin, Matthias; Walles, Heike
2016-01-01
Abstract Tissue Engineering (TE) bears potential to overcome the persistent shortage of donor organs in transplantation medicine. Additionally, TE products are applied as human test systems in pharmaceutical research to close the gap between animal testing and the administration of drugs to human subjects in clinical trials. However, generating a tissue requires complex culture conditions provided by bioreactors. Currently, the translation of TE technologies into clinical and industrial applications is limited due to a wide range of different tissue‐specific, non‐disposable bioreactor systems. To ensure a high level of standardization, a suitable cost‐effectiveness, and a safe graft production, a generic modular bioreactor platform was developed. Functional modules provide robust control of culture processes, e.g. medium transport, gas exchange, heating, or trapping of floating air bubbles. Characterization revealed improved performance of the modules in comparison to traditional cell culture equipment such as incubators, or peristaltic pumps. By combining the modules, a broad range of culture conditions can be achieved. The novel bioreactor platform allows using disposable components and facilitates tissue culture in closed fluidic systems. By sustaining native carotid arteries, engineering a blood vessel, and generating intestinal tissue models according to a previously published protocol the feasibility and performance of the bioreactor platform was demonstrated. PMID:27492568
A versatile modular bioreactor platform for Tissue Engineering.
Schuerlein, Sebastian; Schwarz, Thomas; Krziminski, Steffan; Gätzner, Sabine; Hoppensack, Anke; Schwedhelm, Ivo; Schweinlin, Matthias; Walles, Heike; Hansmann, Jan
2017-02-01
Tissue Engineering (TE) bears potential to overcome the persistent shortage of donor organs in transplantation medicine. Additionally, TE products are applied as human test systems in pharmaceutical research to close the gap between animal testing and the administration of drugs to human subjects in clinical trials. However, generating a tissue requires complex culture conditions provided by bioreactors. Currently, the translation of TE technologies into clinical and industrial applications is limited due to a wide range of different tissue-specific, non-disposable bioreactor systems. To ensure a high level of standardization, a suitable cost-effectiveness, and a safe graft production, a generic modular bioreactor platform was developed. Functional modules provide robust control of culture processes, e.g. medium transport, gas exchange, heating, or trapping of floating air bubbles. Characterization revealed improved performance of the modules in comparison to traditional cell culture equipment such as incubators, or peristaltic pumps. By combining the modules, a broad range of culture conditions can be achieved. The novel bioreactor platform allows using disposable components and facilitates tissue culture in closed fluidic systems. By sustaining native carotid arteries, engineering a blood vessel, and generating intestinal tissue models according to a previously published protocol the feasibility and performance of the bioreactor platform was demonstrated. © 2017 The Authors. Biotechnology Journal published by WILEY-VCH Verlag GmbH & Co. KGaA, Weinheim.
An Experimental Analysis of Children's Ability to Provide a False Report about a Crime
Wyman, Joshua; Foster, Ida; Talwar, Victoria
2016-01-01
A considerable amount of research has evaluated children's lie-telling behaviors and skills1-2; however, limitations with the tasks used for eliciting false testimonies and interviewing children have restricted the generalizability of the findings. The primary aim of the current study is to provide an easy-to-administer and ecologically valid method for measuring the veracity and quality of school-aged children's (ages 6-11) testimonies when they are asked to provide different types of true and false reports. Moreover, the methodology enables researchers to examine the social and developmental factors that could influence the credibility of a child's testimony. In the current study, children will witness a theft, and are then asked to either falsely deny the transgression, falsely accuse a researcher of the theft, or tell the truth. Afterwards, children are to be interviewed by a second researcher using a thorough and ecologically valid interview protocol that requires children to provide closed-ended and free-recall responses about the events with the instigator (E1). Coders then evaluate the length and number of theft-related details the children give throughout the interview, as well as their ability to maintain their true and false reports. The representative results indicate that the truth and lie-telling conditions elicit the intended behaviors from the children. The open-ended interview questions encouraged children to provide free-recall information about their experiences with E1. Moreover, findings from the closed-ended questions suggest that children are significantly better at maintaining their lies with age, and when producing a false denial compared to a false accusation. Results from the current study can be used to develop a greater understanding of the characteristics of children's true and false testimonies about crime, which can potentially benefit law enforcement, legal staff and professionals who interview children. PMID:27168278
An Experimental Analysis of Children's Ability to Provide a False Report about a Crime.
Wyman, Joshua; Foster, Ida; Talwar, Victoria
2016-05-03
A considerable amount of research has evaluated children's lie-telling behaviors and skills(1-2); however, limitations with the tasks used for eliciting false testimonies and interviewing children have restricted the generalizability of the findings. The primary aim of the current study is to provide an easy-to-administer and ecologically valid method for measuring the veracity and quality of school-aged children's (ages 6-11) testimonies when they are asked to provide different types of true and false reports. Moreover, the methodology enables researchers to examine the social and developmental factors that could influence the credibility of a child's testimony. In the current study, children will witness a theft, and are then asked to either falsely deny the transgression, falsely accuse a researcher of the theft, or tell the truth. Afterwards, children are to be interviewed by a second researcher using a thorough and ecologically valid interview protocol that requires children to provide closed-ended and free-recall responses about the events with the instigator (E1). Coders then evaluate the length and number of theft-related details the children give throughout the interview, as well as their ability to maintain their true and false reports. The representative results indicate that the truth and lie-telling conditions elicit the intended behaviors from the children. The open-ended interview questions encouraged children to provide free-recall information about their experiences with E1. Moreover, findings from the closed-ended questions suggest that children are significantly better at maintaining their lies with age, and when producing a false denial compared to a false accusation. Results from the current study can be used to develop a greater understanding of the characteristics of children's true and false testimonies about crime, which can potentially benefit law enforcement, legal staff and professionals who interview children.
Security of two quantum cryptography protocols using the same four qubit states
DOE Office of Scientific and Technical Information (OSTI.GOV)
Branciard, Cyril; Ecole Nationale Superieure des Telecommunications, 46, rue Barrault, 75013 Paris; Gisin, Nicolas
2005-09-15
The first quantum cryptography protocol, proposed by Bennett and Brassard in 1984 (BB84), has been widely studied in recent years. This protocol uses four states (more precisely, two complementary bases) for the encoding of the classical bit. Recently, it has been noticed that by using the same four states, but a different encoding of information, one can define a protocol which is more robust in practical implementations, specifically when attenuated laser pulses are used instead of single-photon sources [V. Scarani et al., Phys. Rev. Lett. 92, 057901 (2004), referred to as the SARG04 protocol]. We present a detailed study ofmore » SARG04 in two different regimes. In the first part, we consider an implementation with a single-photon source: we derive bounds on the error rate Q for security against all possible attacks by the eavesdropper. The lower and the upper bound obtained for SARG04 (Q < or approx. 10.95% and Q > or approx. 14.9%, respectively) are close to those obtained for BB84 (Q < or approx. 12.4% and Q > or approx. 14.6%, respectively). In the second part, we consider a realistic source consisting of an attenuated laser and improve on previous analysis by allowing Alice to optimize the mean number of photons as a function of the distance. The SARG04 protocol is found to perform better than BB84, both in secret-key rate and in maximal achievable distance, for a wide class of Eve's attacks.« less
Olswang, Lesley B.; Greenslade, Kathryn; Pinder, Gay Lloyd; Dowden, Patricia; Madden, Jodi
2017-01-01
Purpose This research investigated a first step in implementing the dynamic assessment (DA) component of Triadic Gaze Intervention (Olswang, Feuerstein, Pinder, & Dowden, 2013; Olswang et al., 2014), an evidence-based protocol for teaching early signals of communication to young children with physical disabilities. Clinician attitudes about adopting external evidence into practice and implementation fidelity in DA protocol delivery were examined following training. Method Seven early intervention clinicians from multiple disciplines were trained to deliver the four essential elements of the DA protocol: (a) provide communication opportunity, (b) recognize child's potentially communicative signal, (c) shape child's signal toward triadic gaze, and (d) reinforce with play. Clinician attitude regarding adopting evidence into practice was measured at baseline and follow-up, with the Evidence-Based Practice Attitude Scale (Aarons, 2004). Implementation fidelity in delivering the protocol was measured for adherence (accuracy) and competence (quality) during trial implementation. Results Clinicians' attitudes about trying new evidence that at first was perceived as incongruent with their practice improved over the course of the research. Clinicians demonstrated strong adherence to the DA protocol; however, competence varied across clinicians and appeared related to child performance. Conclusions The results provided insight into moving Triadic Gaze Intervention into practice and yielded valuable information regarding the implementation process, with implications for future research. PMID:28525577
Dealing With the Long-Term Social Implications of Research
Fleischman, Alan; Levine, Carol; Eckenwiler, Lisa; Grady, Christine; Hammerschmidt, Dale E.; Sugarman, Jeremy
2016-01-01
Biomedical and behavioral research may affect strongly held social values and thereby create significant controversy over whether such research should be permitted in the first place. Institutional review boards (IRBs) responsible for protecting the rights and welfare of participants in research are sometimes faced with review of protocols that have significant implications for social policy and the potential for negative social consequences. Although IRB members often raise concerns about potential long-term social implications in protocol review, federal regulations strongly discourage IRBs from considering them in their decisions. Yet IRBs often do consider the social implications of research protocols and sometimes create significant delays in initiating or even prevent such research. The social implications of research are important topics for public scrutiny and professional discussion. This article examines the reasons that the federal regulations preclude IRBs from assessing the social risks of research, and examines alternative approaches that have been used with varying success by national advisory groups to provide such guidance. The article concludes with recommendations for characteristics of a national advisory group that could successfully fulfill this need, including sustainability, independence, diverse and relevant expertise, and public transparency. PMID:21534138
Forni, Cristiana; Chiari, Paolo; Guarino, Lorenza; Tremosini, Morena; Trofa, Carmela; D'Alessandro, Fabio; Sabattini, Tania; Mini, Sandra; Zanotti, Enrichetta
2014-01-01
In Italy research conducted by non medical professions is scarce also for the lack of knowledge on methods. At Rizzoli hospital in Bologna in 2006 a Centre for research to educate and support health professionals was implemented. To assess the impact of the research centre on number of research articles and protocols produced by nurses. Interrupted time series. In the five years before and after the implementation of the centre data on the number of protocols approved by Ethical Committee with a nurse as principal investigator and on the number of articles published on impacted journals with a nurse as first author were collected. The number of nurses authors of the publications was also collected. For all the variables an increasing trend, starting from 2006 was observed, with statistically significant differences from 2008 for the number of research protocols presented (p=0.037), the number of nurses authors of scientific articles (p=0.027). Although the number of publications on impacted journals increased from 2006, differences were not statistically significant after 2008. An hospital based Centre for education and support to research for health professionals may facilitate the scientific and research production.
Developing a guideline for clinical trial protocol content: Delphi consensus survey
2012-01-01
Background Recent evidence has highlighted deficiencies in clinical trial protocols, having implications for many groups. Existing guidelines for randomized clinical trial (RCT) protocol content vary substantially and most do not describe systematic methodology for their development. As one of three prespecified steps for the systematic development of a guideline for trial protocol content, the objective of this study was to conduct a three-round Delphi consensus survey to develop and refine minimum content for RCT protocols. Methods Panellists were identified using a multistep iterative approach, met prespecified minimum criteria and represented key stakeholders who develop or use clinical trial protocols. They were asked to rate concepts for importance in a minimum set of items for RCT protocols. The main outcome measures were degree of importance (scale of 1 to 10; higher scores indicating higher importance) and level of consensus for items. Results were presented as medians, interquartile ranges, counts and percentages. Results Ninety-six expert panellists participated in the Delphi consensus survey including trial investigators, methodologists, research ethics board members, funders, industry, regulators and journal editors. Response rates were between 88 and 93% per round. Overall, panellists rated 63 of 88 concepts of high importance (of which 50 had a 25th percentile rating of 8 or greater), 13 of moderate importance (median 6 or 7) and 12 of low importance (median less than or equal to 5) for minimum trial protocol content. General and item-specific comments and subgroup results provided valuable insight for further discussions. Conclusions This Delphi process achieved consensus from a large panel of experts from diverse stakeholder groups on essential content for RCT protocols. It also highlights areas of divergence. These results, complemented by other empirical research and consensus meetings, are helping guide the development of a guideline for protocol content. PMID:23006145
2016-10-01
ARL-TR-7860 ● OCT 2016 US Army Research Laboratory Design and Calibration of the US Army Research Laboratory (ARL) Closed Loop ...ARL-TR-7860 ● OCT 2016 US Army Research Laboratory Design and Calibration of the US Army Research Laboratory (ARL) Closed Loop Laboratory...Design and Calibration of the US Army Research Laboratory (ARL) Closed Loop Laboratory Radio Frequency (RF) Propagation Section 5a. CONTRACT NUMBER
ERIC Educational Resources Information Center
Papadopoulos, Pantelis M.; Lagkas, Thomas D.; Demetriadis, Stavros N.
2012-01-01
This study provides field research evidence on the efficiency of a "free-selection" peer review assignment protocol as compared to the typically implemented "assigned-pair" protocol. The study employed 54 sophomore students who were randomly assigned into three groups: Assigned-Pair (AP) (the teacher assigns student works for review to student…
NASA Technical Reports Server (NTRS)
Bishop, Matt
1991-01-01
The Network Time Protocol is being used throughout the Internet to provide an accurate time service. The security requirements are examined of such a service, version 2 of the NTP protocol is analyzed to determine how well it meets these requirements, and improvements are suggested where appropriate.
A Standardized Protocol for the Prospective Follow-Up of Cleft Lip and Palate Patients.
Salimi, Negar; Jolanta, Aleksejūnienė; Edwin, Yen; Angelina, Loo
2018-01-01
To develop a standardized all-encompassing protocol for the assessment of cleft lip and palate patients with clinical and research implications. Electronic database searches were conducted and 13 major cleft centers worldwide were contacted in order to prepare for the development of the protocol. In preparation, the available evidence was reviewed and potential fistula-related risk determinants from 4 different domains were identified. No standardized protocol for the assessment of cleft patients could be found in any of the electronic database searches that were conducted. Interviews with representatives from several major centers revealed that the majority of centers do not have a standardized comprehensive strategy for the reporting and follow-up of cleft lip and palate patients. The protocol was developed and consisted of the following domains of determinants: (1) the sociodemographic domain, (2) the cleft defect domain, (3) the surgery domain, and (4) the fistula domain. The proposed protocol has the potential to enhance the quality of patient care by ensuring that multiple patient-related aspects are consistently reported. It may also facilitate future multicenter research, which could contribute to the reduction of fistula occurrence in cleft lip and palate patients.
Estimated cost of a health visitor-led protocol for perinatal mental health.
Oluboyede, Yemi; Lewis, Anne; Ilott, Irene; Lekka, Chrysanthi
2010-06-01
Anecdotally, protocols, care pathways and clinical guidelines are time consuming to develop and sustain, but there is little research about the actual costs of their development, use and audit.This is a notable gap considering the pervasiveness of such documents that are intended to reduce unacceptable variations in practice by standardising care processes. A case study research design was used to calculate the resource use costs of a protocol for perinatal mental health, part of the core programme for health visitors in a primary care trust in the west of England. The methods were in-depth interviews with the operational lead for the protocol (a health visitor) and documentary analysis. The total estimated cost of staff time over a five-year period (2004 to 2008) was Euro 73,598, comprising Euro 36,162 (49%) for development and Euro 37,436 (51%) for implementation. Although these are best estimates dependent upon retrospective data, they indicate the opportunity cost of staff time for a single protocol in one trust over five years. When new protocols, care pathways or clinical guidelines are proposed, the costs need to be considered and weighed against the benefits of engaging frontline staff in service improvements.
Privacy-preserving data aggregation protocols for wireless sensor networks: a survey.
Bista, Rabindra; Chang, Jae-Woo
2010-01-01
Many wireless sensor network (WSN) applications require privacy-preserving aggregation of sensor data during transmission from the source nodes to the sink node. In this paper, we explore several existing privacy-preserving data aggregation (PPDA) protocols for WSNs in order to provide some insights on their current status. For this, we evaluate the PPDA protocols on the basis of such metrics as communication and computation costs in order to demonstrate their potential for supporting privacy-preserving data aggregation in WSNs. In addition, based on the existing research, we enumerate some important future research directions in the field of privacy-preserving data aggregation for WSNs.
NASA Astrophysics Data System (ADS)
Nikitin, I. A.; Sherstnev, V. S.; Sherstneva, A. I.; Botygin, I. A.
2017-02-01
The results of the research of existent routing protocols in wireless networks and their main features are discussed in the paper. Basing on the protocol data, the routing protocols in wireless networks, including search routing algorithms and phone directory exchange algorithms, are designed with the ‘WiFi-Direct’ technology. Algorithms without IP-protocol were designed, and that enabled one to increase the efficiency of the algorithms while working only with the MAC-addresses of the devices. The developed algorithms are expected to be used in the mobile software engineering with the Android platform taken as base. Easier algorithms and formats of the well-known route protocols, rejection of the IP-protocols enables to use the developed protocols on more primitive mobile devices. Implementation of the protocols to the engineering industry enables to create data transmission networks among working places and mobile robots without any access points.
NASA Astrophysics Data System (ADS)
Xi, Huixing
2017-05-01
Neighbor discovery protocol (NDP) is the underlying protocol in the IPv6 protocol, which is mainly used to solve the problem of interconnection between nodes on the same link. But with wide use of IPV6, NDP becomes the main objects of a variety of attacks due to a lack of security mechanism. The paper introduces the working principle of the NDP and methods of how the SEND protocol to enhance NDP security defense. It also analyzes and summarizes the security threats caused by the defects of the protocol itself. On the basis of the SEND protocol, the NDP data packet structure is modified to enhance the security of the SEND. An improved NDP cheating defense technology is put forward to make up the defects of the SEND protocol which can't verify the correctness of the public key and cannot bind the MAC address.
Compositional Verification of a Communication Protocol for a Remotely Operated Vehicle
NASA Technical Reports Server (NTRS)
Goodloe, Alwyn E.; Munoz, Cesar A.
2009-01-01
This paper presents the specification and verification in the Prototype Verification System (PVS) of a protocol intended to facilitate communication in an experimental remotely operated vehicle used by NASA researchers. The protocol is defined as a stack-layered com- position of simpler protocols. It can be seen as the vertical composition of protocol layers, where each layer performs input and output message processing, and the horizontal composition of different processes concurrently inhabiting the same layer, where each process satisfies a distinct requirement. It is formally proven that the protocol components satisfy certain delivery guarantees. Compositional techniques are used to prove these guarantees also hold in the composed system. Although the protocol itself is not novel, the methodology employed in its verification extends existing techniques by automating the tedious and usually cumbersome part of the proof, thereby making the iterative design process of protocols feasible.
DeAtley, Heather N; Burton, Amanda; Fraley, Michelle DeLuca; Haltom, Joan
2017-07-01
The authors sought to evaluate the impact on length of hospital stay and treatment duration of morphine after implementation of a change in the institutional protocol for managing neonatal abstinence syndrome (NAS) in an effort to improve patient outcomes. A single-center, retrospective chart review was conducted at a Level II nursery in a community hospital in Kentucky. Fifty-nine neonates born between January 1, 2014, and December 31, 2015, who were diagnosed with NAS and received morphine for treatment were included. The protocol 1 group consisted of 33 neonates who received an initial dose of morphine 0.04 mg/kg/dose administered orally every 4 hours (January 1-December 31, 2014), and the protocol 2 group consisted of 26 neonates who received an initial dose of morphine 0.06 mg/kg/dose administered orally every 3 hours (January 1-November 30, 2015), after a change in the protocol for managing NAS was implemented on January 1, 2015. Data were reviewed and compared between the two protocol groups to determine the impact that the dosage change had on length of hospital stay and morphine treatment duration. The average length of stay decreased by 7 days in the protocol 2 group compared with the protocol 1 group (21 vs 28.65 days). The average duration of treatment decreased by 7 days in the protocol 2 group compared with the protocol 1 group (18.3 vs 25.4 days). These differences between groups were not statistically significant, however, because the population size was not large enough to achieve adequate power. These results indicate that protocol 2 displayed the potential to decrease length of stay and duration of treatment compared with protocol 1 at this facility; however, balancing higher starting doses with the risk of oversedation will continue to challenge the health care team. Concern for oversedation when using the higher starting dose in protocol 2 has prompted further research (e.g., protocol 3, initial morphine 0.05 mg/kg/dose every 3 hrs). Continued research is also necessary with larger patient populations to enable generalizability to other institutions. © 2017 Pharmacotherapy Publications, Inc.
ERIC Educational Resources Information Center
Lamb, Michael; Orbach, Yael; Hershkowitz, Irit; Esplin, Phillip W.; Horowitz, Dvora
2007-01-01
Objective: To show how the results of research on children's memory, communicative skills, social knowledge, and social tendencies can be translated into guidelines that improve the quality of forensic interviews of children. Method: We review studies designed to evaluate children's capacities as witnesses, explain the development of the…
E Pluribus Analysis: Applying a Superforecasting Methodology to the Detection of Homegrown Violence
2018-03-01
actor violence and a set of predefined decision-making protocols. This research included running four simulations using the Monte Carlo technique, which...actor violence and a set of predefined decision-making protocols. This research included running four simulations using the Monte Carlo technique...PREDICTING RANDOMNESS.............................................................24 1. Using a “ Runs Test” to Determine a Temporal Pattern in Lone
NASA Astrophysics Data System (ADS)
Wegner, K.; Branch, B. D.; Smith, S. C.
2013-12-01
The Global Learning and Observations to Benefit the Environment (GLOBE) program is a worldwide hands-on, primary and secondary school-based science and education program (www.globe.gov). GLOBE's vision promotes and supports students, teachers and scientists to collaborate on inquiry-based authentic science investigations of the environment and the Earth system working in close partnership with NASA, NOAA and NSF Earth System Science Projects (ESSP's) in study and research about the dynamics of Earth's environment. GLOBE Partners conduct face-to-face Professional Development in more than 110 countries, providing authentic scientific research experience in five investigation areas: atmosphere, earth as a system, hydrology, land cover, and soil. This presentation will provide a sample for a new framework of Professional Development that was implemented in July 2013 at Purdue University lead by Mr. Steven Smith who has tested GLOBE training materials for future training. The presentation will demonstrate how institutions can provide educators authentic scientific research opportunities through various components, including: - Carrying out authentic research investigations - Learning how to enter their authentic research data into the GLOBE database and visualize it on the GLOBE website - Learn how to access to NASA's Earth System Science resources via GLOBE's new online 'e-Training Program' - Exploring the connections of their soil protocol measurements and the history of the soil in their area through iPad soils app - LIDAR data exposure, Hydrology data exposure
Hanson, Bridget L; Faulkner, Sherilyn A; Brems, Christiane; Corey, Staci L; Eldridge, Gloria D; Johnson, Mark E
2015-10-01
Understanding motivations of research participants is crucial for developing ethical research protocols, especially for research with vulnerable populations. Through interviews with 92 institutional review board members, prison administrators, research ethicists, and researchers, we explored key stakeholders' perceptions of what motivates incarcerated individuals to participate in research. Primary motivators identified were a desire to contribute to society, gaining knowledge and health care, acquiring incentives, and obtaining social support. The potential for undue influence or coercion were also identified as motivators. These results highlight the need for careful analysis of what motivates incarcerated individuals to participate in research as part of developing or reviewing ethically permissible and responsible research protocols. Future research should expand this line of inquiry to directly include perspectives of incarcerated individuals. © The Author(s) 2015.
Vahabzadeh, Massoud; Lin, Jia-Ling; Mezghanni, Mustapha; Epstein, David H.; Preston, Kenzie L.
2009-01-01
Issues A challenge in treatment research is the necessity of adhering to protocol and regulatory strictures while maintaining flexibility to meet patients’ treatment needs and accommodate variations among protocols. Another challenge is the acquisition of large amounts of data in an occasionally hectic environment, along with provision of seamless methods for exporting, mining, and querying the data. Approach We have automated several major functions of our outpatient treatment research clinic for studies in drug abuse and dependence. Here we describe three such specialized applications: the Automated Contingency Management (ACM) system for delivery of behavioral interventions, the Transactional Electronic Diary (TED) system for management of behavioral assessments, and the Protocol Workflow System (PWS) for computerized workflow automation and guidance of each participant’s daily clinic activities. These modules are integrated into our larger information system to enable data sharing in real time among authorized staff. Key Findings ACM and TED have each permitted us to conduct research that was not previously possible. In addition, the time to data analysis at the end of each study is substantially shorter. With the implementation of the PWS, we have been able to manage a research clinic with an 80-patient capacity having an annual average of 18,000 patient-visits and 7,300 urine collections with a research staff of five. Finally, automated data management has considerably enhanced our ability to monitor and summarize participant-safety data for research oversight. Implications and conclusion When developed in consultation with end users, automation in treatment-research clinics can enable more efficient operations, better communication among staff, and expansions in research methods. PMID:19320669
Brasil, Raquel Ferreira Gomes; Silva, Maria Josefina da; Moura, Escolástica Rejane Ferreira
2018-01-01
To evaluate the quality of a clinical protocol for family planning care for people living with HIV/AIDS. An evaluative study based on the six domains of the Appraisal of Guidelines for Research & Evaluation II and on Pearson's Coefficient of Variation. The protocol reached between 88.8% and 100.0% quality in the domains of the Appraisal of Guidelines for Research & Evaluation II and 93.3% in the overall evaluation. The obtained Pearson's coefficient of variation was between zero and 18.6. Considering that a minimum percentage of 70.0% was adopted for the quality attributed by the evaluators, quality has been achieved for all domains of the Appraisal of Guidelines for Research & Evaluation II. As a coefficient for all domains was less than 25%, we can infer that the scores attributed by the evaluators were linear or homogeneous, meaning high agreement between them. The protocol was evaluated as a quality instrument, recommended for use by health professionals who deal with family planning for people living with HIV/AIDS.
NASA Astrophysics Data System (ADS)
Muhammad, Umar B.; Ezugwu, Absalom E.; Ofem, Paulinus O.; Rajamäki, Jyri; Aderemi, Adewumi O.
2017-06-01
Recently, researchers in the field of wireless sensor networks have resorted to energy harvesting techniques that allows energy to be harvested from the ambient environment to power sensor nodes. Using such Energy harvesting techniques together with proper routing protocols, an Energy Neutral state can be achieved so that sensor nodes can run perpetually. In this paper, we propose an Energy Neutral LEACH routing protocol which is an extension to the traditional LEACH protocol. The goal of the proposed protocol is to use Gateway node in each cluster so as to reduce the data transmission ranges of cluster head nodes. Simulation results show that the proposed routing protocol achieves a higher throughput and ensure the energy neutral status of the entire network.
Practical Qualitative Research Strategies: Training Interviewers and Coders.
Goodell, L Suzanne; Stage, Virginia C; Cooke, Natalie K
2016-09-01
The increased emphasis on incorporating qualitative methodologies into nutrition education development and evaluation underscores the importance of using rigorous protocols to enhance the trustworthiness of the findings. A 5-phase protocol for training qualitative research assistants (data collectors and coders) was developed as an approach to increase the consistency of the data produced. This training provides exposure to the core principles of qualitative research and then asks the research assistant to apply those principles through practice in a setting structured on critical reflection. Copyright © 2016 Society for Nutrition Education and Behavior. Published by Elsevier Inc. All rights reserved.
Debellemaniere, Eden; Chambon, Stanislas; Pinaud, Clemence; Thorey, Valentin; Dehaene, David; Léger, Damien; Chennaoui, Mounir; Arnal, Pierrick J.; Galtier, Mathieu N.
2018-01-01
Recent research has shown that auditory closed-loop stimulation can enhance sleep slow oscillations (SO) to improve N3 sleep quality and cognition. Previous studies have been conducted in lab environments. The present study aimed to validate and assess the performance of a novel ambulatory wireless dry-EEG device (WDD), for auditory closed-loop stimulation of SO during N3 sleep at home. The performance of the WDD to detect N3 sleep automatically and to send auditory closed-loop stimulation on SO were tested on 20 young healthy subjects who slept with both the WDD and a miniaturized polysomnography (part 1) in both stimulated and sham nights within a double blind, randomized and crossover design. The effects of auditory closed-loop stimulation on delta power increase were assessed after one and 10 nights of stimulation on an observational pilot study in the home environment including 90 middle-aged subjects (part 2).The first part, aimed at assessing the quality of the WDD as compared to a polysomnograph, showed that the sensitivity and specificity to automatically detect N3 sleep in real-time were 0.70 and 0.90, respectively. The stimulation accuracy of the SO ascending-phase targeting was 45 ± 52°. The second part of the study, conducted in the home environment, showed that the stimulation protocol induced an increase of 43.9% of delta power in the 4 s window following the first stimulation (including evoked potentials and SO entrainment effect). The increase of SO response to auditory stimulation remained at the same level after 10 consecutive nights. The WDD shows good performances to automatically detect in real-time N3 sleep and to send auditory closed-loop stimulation on SO accurately. These stimulation increased the SO amplitude during N3 sleep without any adaptation effect after 10 consecutive nights. This tool provides new perspectives to figure out novel sleep EEG biomarkers in longitudinal studies and can be interesting to conduct broad studies on the effects of auditory stimulation during sleep. PMID:29568267
SPIRIT 2013 Statement: defining standard protocol items for clinical trials.
Chan, An-Wen; Tetzlaff, Jennifer M; Altman, Douglas G; Laupacis, Andreas; Gøtzsche, Peter C; Krle A-Jerić, Karmela; Hrobjartsson, Asbjørn; Mann, Howard; Dickersin, Kay; Berlin, Jesse A; Dore, Caroline J; Parulekar, Wendy R; Summerskill, William S M; Groves, Trish; Schulz, Kenneth F; Sox, Harold C; Rockhold, Frank W; Rennie, Drummond; Moher, David
2015-12-01
The protocol of a clinical trial serves as the foundation for study planning, conduct, reporting, and appraisal. However, trial protocols and existing protocol guidelines vary greatly in content and quality. This article describes the systematic development and scope of SPIRIT (Standard Protocol Items: Recommendations for Interventional Trials) 2013, a guideline for the minimum content of a clinical trial protocol. The 33-item SPIRIT checklist applies to protocols for all clinical trials and focuses on content rather than format. The checklist recommends a full description of what is planned; it does not prescribe how to design or conduct a trial. By providing guidance for key content, the SPIRIT recommendations aim to facilitate the drafting of high-quality protocols. Adherence to SPIRIT would also enhance the transparency and completeness of trial protocols for the benefit of investigators, trial participants, patients, sponsors, funders, research ethics committees or institutional review boards, peer reviewers, journals, trial registries, policymakers, regulators, and other key stakeholders.
SPIRIT 2013 Statement: Defining Standard Protocol Items for Clinical Trials
Chan, An-Wen; Tetzlaff, Jennifer M.; Altman, Douglas G.; Laupacis, Andreas; Gøtzsche, Peter C.; Krleža-Jerić, Karmela; Hróbjartsson, Asbjørn; Mann, Howard; Dickersin, Kay; Berlin, Jesse A.; Doré, Caroline J.; Parulekar, Wendy R.; Summerskill, William S.M.; Groves, Trish; Schulz, Kenneth F.; Sox, Harold C.; Rockhold, Frank W.; Rennie, Drummond; Moher, David
2016-01-01
The protocol of a clinical trial serves as the foundation for study planning, conduct, reporting, and appraisal. However, trial protocols and existing protocol guidelines vary greatly in content and quality. This article describes the systematic development and scope of SPIRIT (Standard Protocol Items: Recommendations for Interventional Trials) 2013, a guideline for the minimum content of a clinical trial protocol. The 33-item SPIRIT checklist applies to protocols for all clinical trials and focuses on content rather than format. The checklist recommends a full description of what is planned; it does not prescribe how to design or conduct a trial. By providing guidance for key content, the SPIRIT recommendations aim to facilitate the drafting of high-quality protocols. Adherence to SPIRIT would also enhance the transparency and completeness of trial protocols for the benefit of investigators, trial participants, patients, sponsors, funders, research ethics committees or institutional review boards, peer reviewers, journals, trial registries, policymakers, regulators, and other key stakeholders. PMID:23295957
SPIRIT 2013 statement: defining standard protocol items for clinical trials.
Chan, An-Wen; Tetzlaff, Jennifer M; Altman, Douglas G; Laupacis, Andreas; Gøtzsche, Peter C; Krleža-Jerić, Karmela; Hróbjartsson, Asbjørn; Mann, Howard; Dickersin, Kay; Berlin, Jesse A; Doré, Caroline J; Parulekar, Wendy R; Summerskill, William S M; Groves, Trish; Schulz, Kenneth F; Sox, Harold C; Rockhold, Frank W; Rennie, Drummond; Moher, David
2013-02-05
The protocol of a clinical trial serves as the foundation for study planning, conduct, reporting, and appraisal. However, trial protocols and existing protocol guidelines vary greatly in content and quality. This article describes the systematic development and scope of SPIRIT (Standard Protocol Items: Recommendations for Interventional Trials) 2013, a guideline for the minimum content of a clinical trial protocol.The 33-item SPIRIT checklist applies to protocols for all clinical trials and focuses on content rather than format. The checklist recommends a full description of what is planned; it does not prescribe how to design or conduct a trial. By providing guidance for key content, the SPIRIT recommendations aim to facilitate the drafting of high-quality protocols. Adherence to SPIRIT would also enhance the transparency and completeness of trial protocols for the benefit of investigators, trial participants, patients, sponsors, funders, research ethics committees or institutional review boards, peer reviewers, journals, trial registries, policymakers, regulators, and other key stakeholders.
De Baets, Liesbet; van der Straaten, Rob; Matheve, Thomas; Timmermans, Annick
2017-09-01
This review investigates current protocols using Inertial Measurement Units (IMUs) in shoulder research, and outlines future paths regarding IMU use for shoulder research. Different databases were searched for relevant articles. Criteria for study selection were (1) research in healthy persons or persons with shoulder problems, (2) IMUs applied as assessment tool for the shoulder (in healthy subjects and shoulder patients) or upper limb (in shoulder patients), (3) peer-reviewed, full-text papers in English or Dutch. Studies with less than five participants and without ethical approval were excluded. Data extraction included (1) study design, (2) participant characteristics, (3) type/brand of IMU, (4) tasks included in the assessment protocol, and (5) outcomes. Risk of bias was assessed using the Downs and Black checklist. Scapulothoracic/glenohumeral and humerothoracic kinematics were reported in respectively 10 and 27 of the 37 included papers. Only one paper in healthy persons assessed, next to scapulothoracic/glenohumeral kinematics, other upper limb joints. IMUs' validity and reliability to capture shoulder function was limited. Considering applied protocols, 39% of the protocols was located on the International-Classification-of-Functioning (ICF) function level, while 38% and 23% were on the 'capacity' and 'actual performance'-sublevel, of the ICF-activity level. Most available IMU-research regarding the shoulder is clinically less relevant, given the widely reported humerothoracic kinematics which do not add to clinical-decision-making, and the absence of protocols assessing the complete upper limb chain. Apart from knowledge on methodological pitfalls and opportunities regarding the use of IMUs, this review provides future research paths. Copyright © 2017 Elsevier B.V. All rights reserved.
Sarandi, S; Herbemont, C; Sermondade, N; Benoit, A; Sonigo, C; Poncelet, C; Benard, J; Gronier, H; Boujenah, J; Grynberg, M; Sifer, C
2016-05-01
Oocyte vitrification using an open device is thought to be a source of microbiological and chemical contaminations that can be avoided using a closed device. The principal purpose of this study was to compare the two vitrification protocols: closed and open system. The secondary aim was to study the effects of the storage in the vapor phase of nitrogen (VPN) on oocytes vitrified using an open system and to compare it to those of a storage in liquid nitrogen (LN). Forty-four patients have been included in our study between November 2014 and May 2015. Two hundred and fourteen oocytes have been vitrified at germinal vesicle (GV), metaphase I (0PB) and metaphase II (1PB) stages. We vitrified 96 oocytes (59 GV/37 0PB) using a closed vitrification device and 118 oocytes (57 GV/31 0PB/30 1PB) using an open device. The vitrified oocytes were then stored either in LN or in VPN. The main outcome measures were the survival rate after warming (SR), meiosis resumption rate (MRR) and maturation rate (MR). The global post-thaw SR was significantly higher for oocytes vitrified using an open system (93.2%) compared to those vitrified using a closed one (64.5%; P<0.001). On the contrary, there was no significant difference in terms of global MRR and MR (82.1% vs. 87.5% and 60.7% vs. 61.2% using closed and open system respectively). The SR, MRR and the MR were not significantly different when vitrified oocytes were stored in VPN or LN (91.6, 83.8, 64.5% vs. 93.9, 89.8, 59.1% respectively). Taking into account the limits of our protocol, the open vitrification system remains the more efficient system. The use of sterile liquid nitrogen for oocyte vitrification and the subsequent storage in vapor phase of nitrogen could minimize the hypothetical risks of biological and chemical contaminations. Copyright © 2016 Elsevier Masson SAS. All rights reserved.
Kesanakurti, Prasad; Belton, Mark; Saeed, Hanaa; Rast, Heidi; Boyes, Ian; Rott, Michael
2016-10-01
The majority of plant viruses contain RNA genomes. Detection of viral RNA genomes in infected plant material by next generation sequencing (NGS) is possible through the extraction and sequencing of total RNA, total RNA devoid of ribosomal RNA, small RNA interference (RNAi) molecules, or double stranded RNA (dsRNA). Plants do not typically produce high molecular weight dsRNA, therefore the presence of dsRNA makes it an attractive target for plant virus diagnostics. The sensitivity of NGS as a diagnostic method demands an effective dsRNA protocol that is both representative of the sample and minimizes sample cross contamination. We have developed a modified dsRNA extraction protocol that is more efficient compared to traditional protocols, requiring reduced amounts of starting material, that is less prone to sample cross contamination. This was accomplished by using bead based homogenization of plant material in closed, disposable 50ml tubes. To assess the quality of extraction, we also developed an internal control by designing a real-time (quantitative) PCR (qPCR) assay that targets endornaviruses present in Phaseolus vulgaris cultivar Black Turtle Soup (BTS). Crown Copyright © 2016. Published by Elsevier B.V. All rights reserved.
Blind quantum computing with weak coherent pulses.
Dunjko, Vedran; Kashefi, Elham; Leverrier, Anthony
2012-05-18
The universal blind quantum computation (UBQC) protocol [A. Broadbent, J. Fitzsimons, and E. Kashefi, in Proceedings of the 50th Annual IEEE Symposiumon Foundations of Computer Science (IEEE Computer Society, Los Alamitos, CA, USA, 2009), pp. 517-526.] allows a client to perform quantum computation on a remote server. In an ideal setting, perfect privacy is guaranteed if the client is capable of producing specific, randomly chosen single qubit states. While from a theoretical point of view, this may constitute the lowest possible quantum requirement, from a pragmatic point of view, generation of such states to be sent along long distances can never be achieved perfectly. We introduce the concept of ϵ blindness for UBQC, in analogy to the concept of ϵ security developed for other cryptographic protocols, allowing us to characterize the robustness and security properties of the protocol under possible imperfections. We also present a remote blind single qubit preparation protocol with weak coherent pulses for the client to prepare, in a delegated fashion, quantum states arbitrarily close to perfect random single qubit states. This allows us to efficiently achieve ϵ-blind UBQC for any ϵ>0, even if the channel between the client and the server is arbitrarily lossy.
Blind Quantum Computing with Weak Coherent Pulses
NASA Astrophysics Data System (ADS)
Dunjko, Vedran; Kashefi, Elham; Leverrier, Anthony
2012-05-01
The universal blind quantum computation (UBQC) protocol [A. Broadbent, J. Fitzsimons, and E. Kashefi, in Proceedings of the 50th Annual IEEE Symposiumon Foundations of Computer Science (IEEE Computer Society, Los Alamitos, CA, USA, 2009), pp. 517-526.] allows a client to perform quantum computation on a remote server. In an ideal setting, perfect privacy is guaranteed if the client is capable of producing specific, randomly chosen single qubit states. While from a theoretical point of view, this may constitute the lowest possible quantum requirement, from a pragmatic point of view, generation of such states to be sent along long distances can never be achieved perfectly. We introduce the concept of ɛ blindness for UBQC, in analogy to the concept of ɛ security developed for other cryptographic protocols, allowing us to characterize the robustness and security properties of the protocol under possible imperfections. We also present a remote blind single qubit preparation protocol with weak coherent pulses for the client to prepare, in a delegated fashion, quantum states arbitrarily close to perfect random single qubit states. This allows us to efficiently achieve ɛ-blind UBQC for any ɛ>0, even if the channel between the client and the server is arbitrarily lossy.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Fitzpatrick, L.C.; Goven, A.J.; Muratti-Ortiz, J.F.
Earthworms are ideal soil organisms for use in terrestrial ecotoxicology. As such, several earthworm protocols have been developed for testing toxic potential of chemicals and contaminated soils. Of these, the 48-h filter paper contact (FP) and the 14-d artificial soil exposure (AS) protocols, using mortality (LC50) as the toxic endpoint and Eisenia fetida as the test species, have received the most attention, with the latter being adopted by both OECD and EEC in Europe and the Environmental Protection Agency (USEPA) in the United States. Although the FP technique, adopted by EEC, provides for inexpensive reproducible toxicity screening for chemicals (i.e.more » establishing relative toxicities), it has been criticized for lacking the ecotoxicological relevance of the AS protocol. Choice of earthworm species for laboratory testing also has been controversial. The manure worm, E. fetida, is criticized for not being sufficiently sensitive to chemicals or representative of {open_quotes}typical{close_quotes} earthworms. Lumbricus terrestris and Apporectodea caliginosa have been suggested as more sensitive and ecologically relevant earthworms by Dean-Ross and Martin, respectively. This paper compares the AS and FP protocols in assessing toxicity of cadminum to L. terrestris and E. fetida using LC50s and LC50s. 19 refs., 2 tabs.« less
Bearer channel control protocol for the dynamic VB5.2 interface in ATM access networks
NASA Astrophysics Data System (ADS)
Fragoulopoulos, Stratos K.; Mavrommatis, K. I.; Venieris, Iakovos S.
1996-12-01
In the multi-vendor systems, a customer connected to an Access network (AN) must be capable of selecting a specific Service Node (SN) according to the services the SN provides. The multiplicity of technologically varying AN calls for the definition of a standard reference point between the AN and the SN widely known as the VB interface. Two versions are currently offered. The VB5.1 is simpler to implement but is not as flexible as the VB5.2, which supports switched connections. The VB5.2 functionality is closely coupled to the Broadband Bearer Channel Connection Protocol (B-BCCP). The B-BCCP is used for conveying the necessary information for dynamic resource allocation, traffic policing and routing in the AN as well as for information exchange concerning the status of the AN before a new call is established by the SN. By relying on such a protocol for the exchange of information instead of intercepting and interpreting signalling messages in the AN, the architecture of the AN is simplified because the functionality related to processing is not duplicated. In this paper a prominent B- BCCP candidate is defined, called the Service node Access network Interaction Protocol.
Llor, Jesús; Malumbres, Manuel P
2012-01-01
Several Medium Access Control (MAC) and routing protocols have been developed in the last years for Underwater Wireless Sensor Networks (UWSNs). One of the main difficulties to compare and validate the performance of different proposals is the lack of a common standard to model the acoustic propagation in the underwater environment. In this paper we analyze the evolution of underwater acoustic prediction models from a simple approach to more detailed and accurate models. Then, different high layer network protocols are tested with different acoustic propagation models in order to determine the influence of environmental parameters on the obtained results. After several experiments, we can conclude that higher-level protocols are sensitive to both: (a) physical layer parameters related to the network scenario and (b) the acoustic propagation model. Conditions like ocean surface activity, scenario location, bathymetry or floor sediment composition, may change the signal propagation behavior. So, when designing network architectures for UWSNs, the role of the physical layer should be seriously taken into account in order to assert that the obtained simulation results will be close to the ones obtained in real network scenarios.
Llor, Jesús; Malumbres, Manuel P.
2012-01-01
Several Medium Access Control (MAC) and routing protocols have been developed in the last years for Underwater Wireless Sensor Networks (UWSNs). One of the main difficulties to compare and validate the performance of different proposals is the lack of a common standard to model the acoustic propagation in the underwater environment. In this paper we analyze the evolution of underwater acoustic prediction models from a simple approach to more detailed and accurate models. Then, different high layer network protocols are tested with different acoustic propagation models in order to determine the influence of environmental parameters on the obtained results. After several experiments, we can conclude that higher-level protocols are sensitive to both: (a) physical layer parameters related to the network scenario and (b) the acoustic propagation model. Conditions like ocean surface activity, scenario location, bathymetry or floor sediment composition, may change the signal propagation behavior. So, when designing network architectures for UWSNs, the role of the physical layer should be seriously taken into account in order to assert that the obtained simulation results will be close to the ones obtained in real network scenarios. PMID:22438712
Scientific Research & Subsistence: Protocols to Ensure Co-Existence
NASA Astrophysics Data System (ADS)
Nachman, C.; Holman, A.; DeMaster, D.
2017-12-01
Commercial, industrial, and research interests in the Arctic are expanding rapidly. Potentials are numerous and exciting, giving rise to the need for guidelines to ensure interactions among waterway users do not conflict. Of particular concern is the potential for adverse impacts to U.S. Arctic coastal communities that rely on living marine resources for nutritional and cultural health, through subsistence hunts from small craft, ice edges, and shore. Recent events raised concerns over research surveys potentially interfering with subsistence hunts in the Bering, Chukchi, and Beaufort Seas. Incidents led to calls by Native Alaskan communities to restrict science activities with a mixed response from the scientific community (i.e., some sympathetic, some defensive). With a common goal of wanting to mitigate this potential interaction, Federal agencies made a commitment in the National Strategy for the Arctic Region to coordinate and consult with Alaska Natives and also to pursue responsible Arctic stewardship, with understanding through scientific research and traditional knowledge. The effort to create a "Standard of Care" for research surveys incorporates years of experience by subsistence hunters working to mitigate impacts of other anthropogenic activities in the region, as well as best practices by many in the research community. The protocols are designed to ensure potential conflicts between the scientific research community and subsistence hunters are avoided and to encourage mutual assistance and collaboration between researchers and hunters. The guidelines focus on enhancing communication between researchers and subsistence hunters before, during, and after research occurs. The best management practices outlined in the Standard of Care assist those overseeing and funding scientific research in making decisions about how best to accomplish the goals of the research while ensuring protection of the Alaska subsistence lifestyle. These protocols could also be used in a larger context to address concerns over increased vessel traffic from other activities. We will outline the importance of establishing the guidelines, describe the general process, and highlight examples of positive interactions with Alaska Native hunters during scientific research operations using this protocol.
Stahl, Dorina
2016-09-01
At the end of the nineteenth century, after twelve years of intensive research, the ophthalmologist Theodor Leber (1840-1917) established the chemotaxis of leukocytes as part of inflammation research. Although at the time his theory was smoothly enlisted into immunological research, up until now his name has been connected to chemotaxis only in the English-language literature. Leber was able to use his experimental system to develop a theory of the chemical attraction of the leukocytes during inflammation processes by the beginning of the 1880s, but his unconventional methodology-introducing chemically neutral contaminants in order to trigger inflammation in the eyes of rabbits-contradicted the basic bacteriological Denkstil (style of thought) of inflammation research at the time. Leber held fast to his research practice, which consisted of closely interlocking experimental and theoretical work. Only when an opening appeared in the bacteriological Denkstil was Leber able to transform his experimental observations, written on loose sheets of paper, into convincing evidence for his theory of inflammation. This micro-historical reconstruction of Leber's experimental and written work, based on his original lab protocols, opens up the research practice of a scientist who was not recognized by the established microbiological inflammation research of the time. Moreover, persistent factors in the generation of knowledge are revealed by connecting this micro-historical reconstruction with a macro-history analysis. Indeed Leber developed his specific paper technology in order to mobilise and stabilise the scientific findings gained through experiment because of the persistence of the bacteriological Denkstil.
Formation of amorphous calcium carbonate in caves and its implications for speleothem research.
Demény, Attila; Németh, Péter; Czuppon, György; Leél-Őssy, Szabolcs; Szabó, Máté; Judik, Katalin; Németh, Tibor; Stieber, József
2016-12-22
Speleothem deposits are among the most valuable continental formations in paleoclimate research, as they can be dated using absolute dating methods, and they also provide valuable climate proxies. However, alteration processes such as post-depositional mineralogical transformations can significantly influence the paleoclimatic application of their geochemical data. An innovative sampling and measurement protocol combined with scanning and transmission electron microscopy, X-ray diffraction and Fourier transform infrared spectroscopy is presented, demonstrating that carbonate precipitating from drip water in caves at ~10 °C contains amorphous calcium carbonate (ACC) that later transforms to nanocrystalline calcite. Stable oxygen isotope fractionations among calcite, ACC and water were also determined, proving that ACC is 18 O-depleted (by >2.4 ± 0.8‰) relative to calcite. This, in turn, has serious consequences for speleothem-based fluid inclusion research as closed system transformation of ACC to calcite may induce a negative oxygen isotope shift in fluid inclusion water, resulting in deterioration of the original compositions. ACC formation increases the speleothems' sensitivity to alteration as its interaction with external solutions may result in the partial loss of original proxy signals. Mineralogical analysis of freshly precipitating carbonate at the studied speleothem site is suggested in order to determine the potential influence of ACC formation.
Cognitive Protocol Stack Design
2015-12-30
SECURITY CLASSIFICATION OF: In the ARO “ Cognitive Protocol Stack Design" project we proposed cognitive networking solutions published in international...areas related to cognitive networking, opening also new lines of research that was not possible to forecast at the beginning of the project. In a...Distribution Unlimited Final Report: Cognitive Protocol Stack Design The views, opinions and/or findings contained in this report are those of the author(s
Magnitude and Time Course of Sleep Inertia
2008-10-10
laboratory protocol, and to avoid caffeinated drinks from midday the day before the laboratory protocol. • Non-smokers. • Non- or social drinkers only (0...see Figure 3), and snacks and non- caffeinated drinks were provided regularly throughout the protocol. Meals were balanced in terms of carbohydrate and...awakening) influences the magnitude or time course of sleep inertia effects under these conditions. 15. SUBJECT TERMS Sleep Research
Detecting Hidden Communications Protocols
2013-02-11
Protocols FA9550-09-1-0173 Richard R Brooks Clemson University PO Box 340915 Clemson, SC 29634-0915 Air Force Office of Scientific Research/RSL 875...two botnet detection methods: centralized botnet traffic detection using HMMs and probabilistic context-free grammars (PCFGs) for centralized and...final report for the Detecting Hidden Communications Protocols AFOSR grant with R. R. Brooks form Clemson University as PI. The work funded by the
Performance Evaluation of a Routing Protocol in Wireless Sensor Network
2005-12-01
OF A ROUTING PROTOCOL IN WIRELESS SENSOR NETWORKS by Cheng Kiat Amos, Teo December 2005 Thesis Advisors: Gurminder Singh John C...Evaluation of a Routing Protocol in Wireless Sensor Network 6. AUTHOR(S) Cheng Kiat Amos, Teo 5. FUNDING NUMBERS 7. PERFORMING ORGANIZATION NAME(S...need to be strategically positioned and have topologies engineered. As such, recent research into wireless sensor networks has attracted great
Closed-loop bird-computer interactions: a new method to study the role of bird calls.
Lerch, Alexandre; Roy, Pierre; Pachet, François; Nagle, Laurent
2011-03-01
In the field of songbird research, many studies have shown the role of male songs in territorial defense and courtship. Calling, another important acoustic communication signal, has received much less attention, however, because calls are assumed to contain less information about the emitter than songs do. Birdcall repertoire is diverse, and the role of calls has been found to be significant in the area of social interaction, for example, in pair, family, and group cohesion. However, standard methods for studying calls do not allow precise and systematic study of their role in communication. We propose herein a new method to study bird vocal interaction. A closed-loop computer system interacts with canaries, Serinus canaria, by (1) automatically classifying two basic types of canary vocalization, single versus repeated calls, as they are produced by the subject, and (2) responding with a preprogrammed call type recorded from another bird. This computerized animal-machine interaction requires no human interference. We show first that the birds do engage in sustained interactions with the system, by studying the rate of single and repeated calls for various programmed protocols. We then show that female canaries differentially use single and repeated calls. First, they produce significantly more single than repeated calls, and second, the rate of single calls is associated with the context in which they interact, whereas repeated calls are context independent. This experiment is the first illustration of how closed-loop bird-computer interaction can be used productively to study social relationships. © Springer-Verlag 2010
Mn/ROAD testing protocols : vol. 1
DOT National Transportation Integrated Search
1997-12-01
This report presents a series of testing protocols used at the Minnesota Road Research Project (Mn/ROAD), the Minnesota Department of Transportation's (Mn/DOT) pavement testing facility. This report helps establish a history of the tests conducted an...
WASP (Write a Scientific Paper): Ethics approval for a research study (2).
Mallia, Pierre
2018-05-03
Research Ethics Committees are composed of a minimum of five members which include a lay person, a member from a different institution and at least another three members which should be versed in ethics. Legal and expert advisors can be sought by the committee. The REC will require a detailed protocol from the researcher including the curriculum of the principal investigator and all other researchers under him/her. The protocol should include all details of the research to be undertaken including a detailed description, the reasons for the research, literature pertaining to the research, a clear description of the target population, the actual consent form including what information is to be given to the participants, a declaration where necessary that things prohibited by the law (such as use of embryonic stem cells if this is the case in the country [2] will not be researchers, and a declaration that the relevant directives and rules and procedures which the REC falls under will be followed. The REC will also require a description of any risks and what actions are to be undertaken to eliminate hazards. The researchers must adhere only to the protocol given and any changes, minor or major, must be reported to the REC and approved. Copyright © 2018. Published by Elsevier B.V.
Shiel, Flinn; Persson, Carl; Simas, Vini; Furness, James; Climstein, Mike; Schram, Ben
2017-01-01
Dual energy X-ray absorptiometry (DXA) is a commonly used instrument for analysing segmental body composition (BC). The information from the scan guides the clinician in the treatment of conditions such as obesity and can be used to monitor recovery of lean mass following injury. Two commonly used DXA positioning protocols have been identified-the Nana positioning protocol and the National Health and Nutrition Examination Survey (NHANES). Both protocols have been shown to be reliable. However, only one study has assessed the level of agreement between the protocols and ascertained the participants' preference of protocol based upon comfort. Given the paucity of research in the field and the growing use of DXA in both healthy and pathological populations further research determining the most appropriate positioning protocol is warranted. Therefore, the aims of this study were to assess the level of agreement between results from the NHANES protocol and Nana protocol, and the participants' preference of protocol based on comfort. Thirty healthy participants (15 males, 15 females, aged 23-59 years) volunteered to participate in this study. These participants underwent two whole body DXA scans in a single morning (Nana positioning protocol and NHANES positioning protocol), in a randomised order. Each participant attended for scanning wearing minimal clothing and having fasted overnight, refrained from exercise in the past 24 h and voided their bladders. Level of agreement, comparing NAHNES to Nana protocol was assessed using an intra-class correlation coefficient (ICC), concordance correlation coefficient (CCC) and percentage change in mean. Limit of agreement comparing the two protocols were assessed using plots, mean difference and confidence limits. Participants were asked to indicate the protocol they found most comfortable. When assessing level of agreement between protocols both the ICC and CCC scores were very high and ranged from 0.987 to 0.997 for whole body composition, indicating excellent agreement between the Nana and NHANES protocols. Regional analysis (arms, legs, trunk) ICC scores, ranged between 0.966 and 0.996, CCC ranged between 0.964 and 0.997, change in mean percentage ranged between -0.58% and 0.37% which indicated a very high level of agreement. Limit of agreement analysis using mean difference ranged between -0.223 and 0.686 kg and 95% CL produced results ranging between -1.262 kg and 1.630 kg. The majority (80%) of participants found the NHANES positioning protocol more comfortable. This study reveals a strong level of agreement as illustrated by high ICC's and CCC's between the positioning protocols, however systematic bias within limit of agreement plot and a large difference in 95% confidence limits indicates that the protocols should not be interchanged when assessing an individual. The NHANES protocol affords greater participant comfort.
A Concurrent Multiple Negotiation Protocol Based on Colored Petri Nets.
Niu, Lei; Ren, Fenghui; Zhang, Minjie; Bai, Quan
2017-11-01
Concurrent multiple negotiation (CMN) provides a mechanism for an agent to simultaneously conduct more than one negotiation. There may exist different interdependency relationships among these negotiations and these interdependency relationships can impact the outcomes of these negotiations. The outcomes of these concurrent negotiations contribute together for the agent to achieve an overall negotiation goal. Handling a CMN while considering interdependency relationships among multiple negotiations is a challenging research problem. This paper: 1) comprehensively highlights research problems of negotiations at concurrent negotiation level; 2) provides a graph-based CMN model with consideration of the interdependency relationships; and 3) proposes a colored Petri net-based negotiation protocol for conducting CMNs. With the proposed protocol, a CMN can be efficiently and concurrently processed and negotiation agreements can be efficiently achieved. Experimental results indicate the effectiveness and efficiency of the proposed protocol in terms of the negotiation success rate, the negotiation time and the negotiation outcome.
Biofeedback treatment of constipation: a critical review.
Heymen, Steve; Jones, Kenneth R; Scarlett, Yolanda; Whitehead, William E
2003-09-01
This review was designed to 1) critically examine the research design used in investigations of biofeedback for pelvic floor dyssynergia, 2) compare the various biofeedback treatment protocols for pelvic floor dyssynergia-type constipation used in this research, 3) identify factors that influence treatment outcome, and 4) identify goals for future biofeedback research for pelvic floor dyssynergia. A comprehensive review of both the pediatric and adult research from 1970 to 2002 on "biofeedback for constipation" was conducted using a Medline search in all languages. Only prospective studies including five or more subjects that described the treatment protocol were included. In addition, a meta-analysis of these studies was performed to compare the outcome of different biofeedback protocols for treating constipation. Thirty-eight studies were reviewed, and sample size, treatment protocol, outcome rates, number of sessions, and etiology are shown in a table. Ten studies using a parallel treatment design were reviewed in detail, including seven that randomized subjects to treatment groups. A meta-analysis (weighted by subjects) was performed to compare the results of two treatment protocols prevalent in the literature. The mean success rate of studies using pressure biofeedback (78 percent) was superior (P = 0.018) to the mean success rate for studies using electromyography biofeedback (70 percent). However, the mean success rates comparing studies using intra-anal electromyography sensors to studies using perianal electromyography sensors were 69 and 72 percent, respectively, indicating no advantages for one type of electromyography protocol over the other (P = 0.428). In addition to the varied protocols and instrumentation used, there also are inconsistencies in the literature regarding the severity and etiology of symptoms, patient selection criteria, and the definition of a successful outcome. Finally, no anatomic, physiologic, or demographic variables were identified that would assist in predicting successful outcome. Having significant psychological symptoms was identified as a factor that may influence treatment outcome, but this requires further study. Although most studies report positive results using biofeedback to treat constipation, quality research is lacking. Specific recommendations are made for future investigations to 1) improve experimental design, 2) clearly define outcome measures, 3) identify the etiology and severity of symptoms, 4) determine which treatment protocol and which component of treatment is most effective for different types of subjects, 5) systematically explore the role of psychopathology in this population, 6) use an adequate sample size that allows for meaningful analysis, and 7) include long-term follow-up data.
Water, Water, Everywhere: Defining and Assessing Data Sharing in Academia.
Van Tuyl, Steven; Whitmire, Amanda L
2016-01-01
Sharing of research data has begun to gain traction in many areas of the sciences in the past few years because of changing expectations from the scientific community, funding agencies, and academic journals. National Science Foundation (NSF) requirements for a data management plan (DMP) went into effect in 2011, with the intent of facilitating the dissemination and sharing of research results. Many projects that were funded during 2011 and 2012 should now have implemented the elements of the data management plans required for their grant proposals. In this paper we define 'data sharing' and present a protocol for assessing whether data have been shared and how effective the sharing was. We then evaluate the data sharing practices of researchers funded by the NSF at Oregon State University in two ways: by attempting to discover project-level research data using the associated DMP as a starting point, and by examining data sharing associated with journal articles that acknowledge NSF support. Sharing at both the project level and the journal article level was not carried out in the majority of cases, and when sharing was accomplished, the shared data were often of questionable usability due to access, documentation, and formatting issues. We close the article by offering recommendations for how data producers, journal publishers, data repositories, and funding agencies can facilitate the process of sharing data in a meaningful way.
Koschmieder, S; Brümmendorf, T H
2018-04-05
The requirements for optimal biobanking from the point of view of the clinical partner can be highly variable. Depending on the material, processing, storage conditions, clinical data, and involvement of external partners, there will be special requirements for the participating clinician and specialist areas. What they all have in common is that the goal of any biobanking must be to improve clinical, translational, and basic research. While in the past biomaterials often had to be individually stored for each research project, modern biobanking offers decisive advantages: a comprehensive ethics vote fulfilling state-of-the-art data safety requirements, standardized processing and storage protocols, specialized biobank software for pseudonymization and localization, protection against power failures and defects of the equipment, centralized and sustainable storage, easy localization and return of samples, and their destruction or anonymization after completion of an individual project. In addition to this important pure storage function, central biobanking can provide a link to clinical data as well as the anonymous use of samples for project-independent research. Both biobank functions serve different purposes, are associated with specific requirements, and should be pursued in parallel. If successful, central biomaterial management can achieve a sustainable improvement of academic and non-academic biomedical research and the optimal use of resources. The close collaboration between clinicians and non-clinicians is a crucial prerequisite for this.
Design of Light-Controlled Protein Conformations and Functions.
Ritterson, Ryan S; Hoersch, Daniel; Barlow, Kyle A; Kortemme, Tanja
2016-01-01
In recent years, interest in controlling protein function with light has increased. Light offers a number of unique advantages over other methods, including spatial and temporal control and high selectivity. Here, we describe a general protocol for engineering a protein to be controllable with light via reaction with an exogenously introduced photoisomerizable small molecule and illustrate our protocol with two examples from the literature: the engineering of the calcium affinity of the cell-cell adhesion protein cadherin, which is an example of a protein that switches from a native to a disrupted state (Ritterson et al. J Am Chem Soc (2013) 135:12516-12519), and the engineering of the opening and closing of the chaperonin Mm-cpn, an example of a switch between two functional states (Hoersch et al.: Nat Nanotechn (2013) 8:928-932). This protocol guides the user from considering which proteins may be most amenable to this type of engineering, to considerations of how and where to make the desired changes, to the assays required to test for functionality.
Optimizing Variational Quantum Algorithms Using Pontryagin’s Minimum Principle
Yang, Zhi -Cheng; Rahmani, Armin; Shabani, Alireza; ...
2017-05-18
We use Pontryagin’s minimum principle to optimize variational quantum algorithms. We show that for a fixed computation time, the optimal evolution has a bang-bang (square pulse) form, both for closed and open quantum systems with Markovian decoherence. Our findings support the choice of evolution ansatz in the recently proposed quantum approximate optimization algorithm. Focusing on the Sherrington-Kirkpatrick spin glass as an example, we find a system-size independent distribution of the duration of pulses, with characteristic time scale set by the inverse of the coupling constants in the Hamiltonian. The optimality of the bang-bang protocols and the characteristic time scale ofmore » the pulses provide an efficient parametrization of the protocol and inform the search for effective hybrid (classical and quantum) schemes for tackling combinatorial optimization problems. Moreover, we find that the success rates of our optimal bang-bang protocols remain high even in the presence of weak external noise and coupling to a thermal bath.« less
Hieu, Tran Dinh; Duy, Tran Trung; Dung, Le The; Choi, Seong Gon
2018-06-05
To solve the problem of energy constraints and spectrum scarcity for cognitive radio wireless sensor networks (CR-WSNs), an underlay decode-and-forward relaying scheme is considered, where the energy constrained secondary source and relay nodes are capable of harvesting energy from a multi-antenna power beacon (PB) and using that harvested energy to forward the source information to the destination. Based on the time switching receiver architecture, three relaying protocols, namely, hybrid partial relay selection (H-PRS), conventional opportunistic relay selection (C-ORS), and best opportunistic relay selection (B-ORS) protocols are considered to enhance the end-to-end performance under the joint impact of maximal interference constraint and transceiver hardware impairments. For performance evaluation and comparison, we derive the exact and asymptotic closed-form expressions of outage probability (OP) and throughput (TP) to provide significant insights into the impact of our proposed protocols on the system performance over Rayleigh fading channel. Finally, simulation results validate the theoretical results.
NASA Astrophysics Data System (ADS)
Zdravković, Nemanja; Cvetkovic, Aleksandra; Milic, Dejan; Djordjevic, Goran T.
2017-09-01
This paper analyses end-to-end packet error rate (PER) of a free-space optical decode-and-forward cooperative network over a gamma-gamma atmospheric turbulence channel in the presence of temporary random link blockage. Closed-form analytical expressions for PER are derived for the cases with and without transmission links being prone to blockage. Two cooperation protocols (denoted as 'selfish' and 'pilot-adaptive') are presented and compared, where the latter accounts for the presence of blockage and adapts transmission power. The influence of scintillation, link distance, average transmitted signal power, network topology and probability of an uplink and/or internode link being blocked are discussed when the destination applies equal gain combining. The results show that link blockage caused by obstacles can degrade system performance, causing an unavoidable PER floor. The implementation of the pilot-adaptive protocol improves performance when compared to the selfish protocol, diminishing internode link blockage and lowering the PER floor, especially for larger networks.
Optimizing Variational Quantum Algorithms Using Pontryagin’s Minimum Principle
DOE Office of Scientific and Technical Information (OSTI.GOV)
Yang, Zhi -Cheng; Rahmani, Armin; Shabani, Alireza
We use Pontryagin’s minimum principle to optimize variational quantum algorithms. We show that for a fixed computation time, the optimal evolution has a bang-bang (square pulse) form, both for closed and open quantum systems with Markovian decoherence. Our findings support the choice of evolution ansatz in the recently proposed quantum approximate optimization algorithm. Focusing on the Sherrington-Kirkpatrick spin glass as an example, we find a system-size independent distribution of the duration of pulses, with characteristic time scale set by the inverse of the coupling constants in the Hamiltonian. The optimality of the bang-bang protocols and the characteristic time scale ofmore » the pulses provide an efficient parametrization of the protocol and inform the search for effective hybrid (classical and quantum) schemes for tackling combinatorial optimization problems. Moreover, we find that the success rates of our optimal bang-bang protocols remain high even in the presence of weak external noise and coupling to a thermal bath.« less
Clock Scan Protocol for Image Analysis: ImageJ Plugins.
Dobretsov, Maxim; Petkau, Georg; Hayar, Abdallah; Petkau, Eugen
2017-06-19
The clock scan protocol for image analysis is an efficient tool to quantify the average pixel intensity within, at the border, and outside (background) a closed or segmented convex-shaped region of interest, leading to the generation of an averaged integral radial pixel-intensity profile. This protocol was originally developed in 2006, as a visual basic 6 script, but as such, it had limited distribution. To address this problem and to join similar recent efforts by others, we converted the original clock scan protocol code into two Java-based plugins compatible with NIH-sponsored and freely available image analysis programs like ImageJ or Fiji ImageJ. Furthermore, these plugins have several new functions, further expanding the range of capabilities of the original protocol, such as analysis of multiple regions of interest and image stacks. The latter feature of the program is especially useful in applications in which it is important to determine changes related to time and location. Thus, the clock scan analysis of stacks of biological images may potentially be applied to spreading of Na + or Ca ++ within a single cell, as well as to the analysis of spreading activity (e.g., Ca ++ waves) in populations of synaptically-connected or gap junction-coupled cells. Here, we describe these new clock scan plugins and show some examples of their applications in image analysis.
Influence of the Distribution of Tag IDs on RFID Memoryless Anti-Collision Protocols
Cmiljanic, Nikola; Landaluce, Hugo; Perallos, Asier; Arjona, Laura
2017-01-01
In recent years, Radio Frequency Identification (RFID) has become very popular. The main feature of this technology is that RFID tags do not require close handling and no line of sight is required between the reader and the tags. RFID is a technology that uses radio frequencies in order to identify tags, which do not need to be positioned accurately relative to the reader. Tags share the communication channel, increasing the likelihood of causing a problem, viz., a message collision. Tree based protocols can resolve these collisions, but require a uniform tag ID distribution. This means they are very dependent of the distribution of the IDs of the tags. Tag IDs are written in the tag and contain a predefined bit string of data. A study of the influence of the tag ID distribution on the protocols’ behaviour is proposed here. A new protocol, called the Flexible Query window Tree (FQwT) is presented to estimate the tag ID distribution, taking into consideration the type of distribution. The aim is to create a flexible anti-collision protocol in order to identify a set of tags that constitute an ID distribution. As a result, the reader classifies tags into groups determined by using a distribution estimator. Simulations show that the FQwT protocol contributes to significant reductions in identification time and energy consumption regardless of the type of ID distribution. PMID:28817070
Bardon, Cécile; Mishara, Brian L
2015-09-01
This article presents a strategy to prevent trauma, support and care for railway personnel who experience critical incidents (CI) on the job, usually fatalities by accident or suicide. We reviewed all publications on CI management, support and care practices in the railway industry, as well as practices in place in Canada (unpublished protocols). Semi structured interviews were conducted with 40 train engineers and conductors involved in CIs and the content was coded and analysed quantitatively. Employees' satisfaction with the help received after the incident varies according to the behaviour of the local manager, company officers and police, the level of compliance with existing company protocols to help them, the presence of unmet expectations for support and care, their perceived competency of clinicians they consulted and the level of trust toward their employers. On the basis of the interview results, the review of existing railway practices and discussions with railway stakeholders, a model protocol was developed for a comprehensive workplace prevention, support and care protocol to reduce the negative impact of railway critical incidents on employees. This protocol includes preventive actions before traumatic events occur, immediate responses at the site of incident, interventions within the first few days after the incident and longer term support and interventions provided by the company and by outsourced experts.
2009-01-01
Background In recent years, the genome biology community has expended considerable effort to confront the challenges of managing heterogeneous data in a structured and organized way and developed laboratory information management systems (LIMS) for both raw and processed data. On the other hand, electronic notebooks were developed to record and manage scientific data, and facilitate data-sharing. Software which enables both, management of large datasets and digital recording of laboratory procedures would serve a real need in laboratories using medium and high-throughput techniques. Results We have developed iLAP (Laboratory data management, Analysis, and Protocol development), a workflow-driven information management system specifically designed to create and manage experimental protocols, and to analyze and share laboratory data. The system combines experimental protocol development, wizard-based data acquisition, and high-throughput data analysis into a single, integrated system. We demonstrate the power and the flexibility of the platform using a microscopy case study based on a combinatorial multiple fluorescence in situ hybridization (m-FISH) protocol and 3D-image reconstruction. iLAP is freely available under the open source license AGPL from http://genome.tugraz.at/iLAP/. Conclusion iLAP is a flexible and versatile information management system, which has the potential to close the gap between electronic notebooks and LIMS and can therefore be of great value for a broad scientific community. PMID:19941647
Open solutions to distributed control in ground tracking stations
NASA Technical Reports Server (NTRS)
Heuser, William Randy
1994-01-01
The advent of high speed local area networks has made it possible to interconnect small, powerful computers to function together as a single large computer. Today, distributed computer systems are the new paradigm for large scale computing systems. However, the communications provided by the local area network is only one part of the solution. The services and protocols used by the application programs to communicate across the network are as indispensable as the local area network. And the selection of services and protocols that do not match the system requirements will limit the capabilities, performance, and expansion of the system. Proprietary solutions are available but are usually limited to a select set of equipment. However, there are two solutions based on 'open' standards. The question that must be answered is 'which one is the best one for my job?' This paper examines a model for tracking stations and their requirements for interprocessor communications in the next century. The model and requirements are matched with the model and services provided by the five different software architectures and supporting protocol solutions. Several key services are examined in detail to determine which services and protocols most closely match the requirements for the tracking station environment. The study reveals that the protocols are tailored to the problem domains for which they were originally designed. Further, the study reveals that the process control model is the closest match to the tracking station model.
Experience with Delay-Tolerant Networking from Orbit
NASA Technical Reports Server (NTRS)
Ivancic, W.; Eddy, W. M.; Stewart, D.; Wood, L.; Northam, J.; Jackson, C.
2010-01-01
We describe the first use from space of the Bundle Protocol for Delay-Tolerant Networking (DTN) and lessons learned from experiments made and experience gained with this protocol. The Disaster Monitoring Constellation (DMC), constructed by Surrey Satellite Technology Ltd (SSTL), is a multiple-satellite Earth-imaging low-Earth-orbit sensor network in which recorded image swaths are stored onboard each satellite and later downloaded from the satellite payloads to a ground station. Store-and-forward of images with capture and later download gives each satellite the characteristics of a node in a disruption-tolerant network. Originally developed for the Interplanetary Internet, DTNs are now under investigation in an Internet Research Task Force (IRTF) DTN research group (RG), which has developed a bundle architecture and protocol. The DMC is technically advanced in its adoption of the Internet Protocol (IP) for its imaging payloads and for satellite command and control, based around reuse of commercial networking and link protocols. These satellites use of IP has enabled earlier experiments with the Cisco router in Low Earth Orbit (CLEO) onboard the constellation s UK-DMC satellite. Earth images are downloaded from the satellites using a custom IP-based high-speed transfer protocol developed by SSTL, Saratoga, which tolerates unusual link environments. Saratoga has been documented in the Internet Engineering Task Force (IETF) for wider adoption. We experiment with the use of DTNRG bundle concepts onboard the UK-DMC satellite, by examining how Saratoga can be used as a DTN convergence layer to carry the DTNRG Bundle Protocol, so that sensor images can be delivered to ground stations and beyond as bundles. Our practical experience with the first successful use of the DTNRG Bundle Protocol in a space environment gives us insights into the design of the Bundle Protocol and enables us to identify issues that must be addressed before wider deployment of the Bundle Protocol. Published in 2010 by John Wiley & Sons, Ltd. KEY WORDS: Internet; UK-DMC; satellite; Delay-Tolerant Networking (DTN); Bundle Protocol
SCPS-TP, TCP, and Rate-Based Protocol Evaluation. Revised
NASA Technical Reports Server (NTRS)
Tran, Diepchi T.; Lawas-Grodek, Frances J.; Dimond, Robert P.; Ivancic, William D.
2005-01-01
Tests were performed at Glenn Research Center to compare the performance of the Space Communications Protocol Standard Transport Protocol (SCPS TP, otherwise known as "TCP Tranquility") relative to other variants of TCP and to determine the implementation maturity level of these protocols, particularly for higher speeds. The testing was performed over reasonably high data rates of up to 100 Mbps with delays that are characteristic of near-planetary environments. The tests were run for a fixed packet size, but for variously errored environments. This report documents the testing performed to date.
Department of Clinical Investigation Annual Research Progress Report, Fiscal Year 1993. Volume 1
1993-10-01
monocytes, total periphernuclear cells, and alveolar macrophages from four study groups : patients with concurrent Mycobacterium tuberculosis (MTBI and...research design, similar to the Solomon Four Group design will be utilized to determine if the educational intervention provided has an impact on nurses...members with approved protocols: 173 Number of approved protocols held by this group : 230 Drug evaluation/comparison studies : 94 (Does not include
Biometrics IRB best practices and data protection
NASA Astrophysics Data System (ADS)
Boehnen, Christopher; Bolme, David; Flynn, Patrick
2015-05-01
The collection of data from human subjects for biometrics research in the United States requires the development of a data collection protocol that is reviewed by a Human Subjects Institutional Review Board (IRB). The IRB reviews the protocol for risks and approves it if it meets the criteria for approval specified in the relevant Federal regulations (45 CFR 46). Many other countries operate similar mechanisms for the protection of human subjects. IRBs review protocols for safety, confidentiality, and for minimization of risk associated with identity disclosure. Since biometric measurements are potentially identifying, IRB scrutiny of biometrics data collection protocols can be expected to be thorough. This paper discusses the intricacies of IRB best practices within the worldwide biometrics community. This is important because research decisions involving human subjects are made at a local level and do not set a precedent for decisions made by another IRB board. In many cases, what one board approves is not approved by another board, resulting in significant inconsistencies that prove detrimental to both researchers and human subjects. Furthermore, the level of biometrics expertise may be low on IRBs, which can contribute to the unevenness of reviews. This publication will suggest possible best practices for designing and seeking IRB approval for human subjects research involving biometrics measurements. The views expressed are the opinions of the authors.
Predicting Silk Fiber Mechanical Properties through Multiscale Simulation and Protein Design.
Rim, Nae-Gyune; Roberts, Erin G; Ebrahimi, Davoud; Dinjaski, Nina; Jacobsen, Matthew M; Martín-Moldes, Zaira; Buehler, Markus J; Kaplan, David L; Wong, Joyce Y
2017-08-14
Silk is a promising material for biomedical applications, and much research is focused on how application-specific, mechanical properties of silk can be designed synthetically through proper amino acid sequences and processing parameters. This protocol describes an iterative process between research disciplines that combines simulation, genetic synthesis, and fiber analysis to better design silk fibers with specific mechanical properties. Computational methods are used to assess the protein polymer structure as it forms an interconnected fiber network through shearing and how this process affects fiber mechanical properties. Model outcomes are validated experimentally with the genetic design of protein polymers that match the simulation structures, fiber fabrication from these polymers, and mechanical testing of these fibers. Through iterative feedback between computation, genetic synthesis, and fiber mechanical testing, this protocol will enable a priori prediction capability of recombinant material mechanical properties via insights from the resulting molecular architecture of the fiber network based entirely on the initial protein monomer composition. This style of protocol may be applied to other fields where a research team seeks to design a biomaterial with biomedical application-specific properties. This protocol highlights when and how the three research groups (simulation, synthesis, and engineering) should be interacting to arrive at the most effective method for predictive design of their material.
de Lecuona, Itziar
2013-01-01
The article explores and analyses the content of the Council of Europe's Additional Protocol to the Convention on Human Rights and Biomedicine concerning Biomedical Research regarding the standard legal instrument in biomedical research, issued by an international organization with leadership in bioethics. This implies ethics committees are mechanisms of protection of humans in biomedical research and not mere bureaucratic agencies and that a sound inescapable international regulatory framework exists for States to regulate biomedical research. The methodology used focuses on the analysis of the background, the context in which it is made and the nature and scope of the Protocol. It also identifies and analyses the characteristics and functions of ethics committees in biomedical research and, in particular, the information that should be provided to this bodies to develop their functions previously, during and at the end of research projects. This analysis will provide guidelines, suggestions and conclusions for the awareness and training of members of these committees in order to influence the daily practice. This paper may also be of interest to legal practitioners who work in different areas of biomedical research. From this practical perspective, the article examines the legal treatment of the Protocol to meet new challenges and classic issues in research: the treatment of human biological samples, the use of placebos, avoiding double standards, human vulnerability, undue influence and conflicts of interest, among others. Also, from a critical view, this work links the legal responses to develop work procedures that are required for an effective performance of the functions assigned of ethics committees in biomedical research. An existing international legal response that lacks doctrinal standards and provides little support should, however, serve as a guide and standard to develop actions that allow ethics committees -as key bodies for States- to advance in the protection of humans in biomedical research.
Martins Pereira, Sandra; de Sá Brandão, Patrícia Joana; Araújo, Joana; Carvalho, Ana Sofia
2017-01-01
Introduction Antimicrobial resistance (AMR) is a challenging global and public health issue, raising bioethical challenges, considerations and strategies. Objectives This research protocol presents a conceptual model leading to formulating an empirically based bioethics framework for antibiotic use, AMR and designing ethically robust strategies to protect human health. Methods Mixed methods research will be used and operationalized into five substudies. The bioethical framework will encompass and integrate two theoretical models: global bioethics and ethical decision-making. Results Being a study protocol, this article reports on planned and ongoing research. Conclusions Based on data collection, future findings and using a comprehensive, integrative, evidence-based approach, a step-by-step bioethical framework will be developed for (i) responsible use of antibiotics in healthcare and (ii) design of strategies to decrease AMR. This will entail the analysis and interpretation of approaches from several bioethical theories, including deontological and consequentialist approaches, and the implications of uncertainty to these approaches. PMID:28459355
Tross, Susan; Campbell, Aimee N. C.; Calsyn, Donald A.; Metsch, Lisa R.; Sorensen, James L.; Shoptaw, Steven; Haynes, Louise; Woody, George E.; Malow, Robert M.; Brown, Lawrence S.; Feaster, Daniel J.; Booth, Robert E.; Mandler, Raul N.; Masson, Carmen; Holmes, Beverly W.; Colfax, Grant; Brooks, Audrey J.; Hien, Denise A.; Schackman, Bruce R.; Korthuis, P. Todd; Miele, Gloria M.
2012-01-01
Background/Objectives HIV continues to be a significant problem among substance users and their sexual partners in the United States. The National Drug Abuse Treatment Clinical Trials Network (CTN) offers a national platform for effectiveness trials of HIV interventions in community substance abuse treatment programs. This article presents the HIV activities of the CTN during its first 10 years. Results While emphasizing CTN HIV protocols, this article reviews the (1) HIV context for this work; (2) the collaborative process among providers, researchers, and National Institute on Drug Abuse CTN staff, on which CTN HIV work was based; (3) results of CTN HIV protocols and HIV secondary analyses in CTN non-HIV protocols; and (4) implications for future HIV intervention effectiveness research in community substance abuse treatment programs. Conclusion/Significance While the feasibility of engaging frontline providers in this research is highlighted, the limitations of small to medium effect sizes and weak adoption and sustainability in everyday practice are also discussed. PMID:21854270
Tross, Susan; Campbell, Aimee N C; Calsyn, Donald A; Metsch, Lisa R; Sorensen, James L; Shoptaw, Steven; Haynes, Louise; Woody, George E; Malow, Robert M; Brown, Lawrence S; Feaster, Daniel J; Booth, Robert E; Mandler, Raul N; Masson, Carmen; Holmes, Beverly W; Colfax, Grant; Brooks, Audrey J; Hien, Denise A; Schackman, Bruce R; Korthuis, P Todd; Miele, Gloria M
2011-09-01
HIV continues to be a significant problem among substance users and their sexual partners in the United States. The National Drug Abuse Treatment Clinical Trials Network (CTN) offers a national platform for effectiveness trials of HIV interventions in community substance abuse treatment programs. This article presents the HIV activities of the CTN during its first 10 years. While emphasizing CTN HIV protocols, this article reviews the (1) HIV context for this work; (2) the collaborative process among providers, researchers, and National Institute on Drug Abuse CTN staff, on which CTN HIV work was based; (3) results of CTN HIV protocols and HIV secondary analyses in CTN non-HIV protocols; and (4) implications for future HIV intervention effectiveness research in community substance abuse treatment programs. While the feasibility of engaging frontline providers in this research is highlighted, the limitations of small to medium effect sizes and weak adoption and sustainability in everyday practice are also discussed.
Yushkevich, Paul A.; Amaral, Robert S. C.; Augustinack, Jean C.; Bender, Andrew R.; Bernstein, Jeffrey D.; Boccardi, Marina; Bocchetta, Martina; Burggren, Alison C.; Carr, Valerie A.; Chakravarty, M. Mallar; Chetelat, Gael; Daugherty, Ana M.; Davachi, Lila; Ding, Song-Lin; Ekstrom, Arne; Geerlings, Mirjam I.; Hassan, Abdul; Huang, Yushan; Iglesias, Eugenio; La Joie, Renaud; Kerchner, Geoffrey A.; LaRocque, Karen F.; Libby, Laura A.; Malykhin, Nikolai; Mueller, Susanne G.; Olsen, Rosanna K.; Palombo, Daniela J.; Parekh, Mansi B; Pluta, John B.; Preston, Alison R.; Pruessner, Jens C.; Ranganath, Charan; Raz, Naftali; Schlichting, Margaret L.; Schoemaker, Dorothee; Singh, Sachi; Stark, Craig E. L.; Suthana, Nanthia; Tompary, Alexa; Turowski, Marta M.; Van Leemput, Koen; Wagner, Anthony D.; Wang, Lei; Winterburn, Julie L.; Wisse, Laura E.M.; Yassa, Michael A.; Zeineh, Michael M.
2015-01-01
OBJECTIVE An increasing number of human in vivo magnetic resonance imaging (MRI) studies have focused on examining the structure and function of the subfields of the hippocampal formation (the dentate gyrus, CA fields 1–3, and the subiculum) and subregions of the parahippocampal gyrus (entorhinal, perirhinal, and parahippocampal cortices). The ability to interpret the results of such studies and to relate them to each other would be improved if a common standard existed for labeling hippocampal subfields and parahippocampal subregions. Currently, research groups label different subsets of structures and use different rules, landmarks, and cues to define their anatomical extents. This paper characterizes, both qualitatively and quantitatively, the variability in the existing manual segmentation protocols for labeling hippocampal and parahippocampal substructures in MRI, with the goal of guiding subsequent work on developing a harmonized substructure segmentation protocol. METHOD MRI scans of a single healthy adult human subject were acquired both at 3 Tesla and 7 Tesla. Representatives from 21 research groups applied their respective manual segmentation protocols to the MRI modalities of their choice. The resulting set of 21 segmentations was analyzed in a common anatomical space to quantify similarity and identify areas of agreement. RESULTS The differences between the 21 protocols include the region within which segmentation is performed, the set of anatomical labels used, and the extents of specific anatomical labels. The greatest overall disagreement among the protocols is at the CA1/subiculum boundary, and disagreement across all structures is greatest in the anterior portion of the hippocampal formation relative to the body and tail. CONCLUSIONS The combined examination of the 21 protocols in the same dataset suggests possible strategies towards developing a harmonized subfield segmentation protocol and facilitates comparison between published studies. PMID:25596463
A protocol of rope skipping exercise for primary school children: A pilot test
NASA Astrophysics Data System (ADS)
Radzi, A. N. M.; Rambely, A. S.; Chellapan, K.
2014-06-01
This paper aims to investigate the methods and sample used in rope skipping as an exercise approach. A systematic literature review was approached in identifying skipping performance in the related researches. The methods were compared to determine the best methodological approach for the targeted skipping based research measure. A pilot test was performed among seven students below 12 years old. As the outcome of the review, a skipping protocol design has been proposed for 10 years old primary school students. The proposed protocol design is to be submitted to PPUKM Ethical Committee for approval prior to its implementation in investigation memory enhancement in relation to designed skipping activities.
Critical point relascope sampling for unbiased volume estimation of downed coarse woody debris
Jeffrey H. Gove; Michael S. Williams; Mark J. Ducey; Mark J. Ducey
2005-01-01
Critical point relascope sampling is developed and shown to be design-unbiased for the estimation of log volume when used with point relascope sampling for downed coarse woody debris. The method is closely related to critical height sampling for standing trees when trees are first sampled with a wedge prism. Three alternative protocols for determining the critical...
Monitoring bird migration in the Caribbean basin: multi-national cooperation can close the loop
Paul B. Hamel; Cecilia M. Riley; W. C. Hunter; Mark S. Woodrey
2005-01-01
The Gulf Coast Bird Observatory (GCBO) and the Southeastern Working Group of Partners in Flight have developed a protocol to monitor landbirds with volunteer observers performing avian censuses in the field. Field observations are compiled within a powerful internet database, and recording and summary capability is maintained by the GCBO. More than 100 observers have...
Code of Federal Regulations, 2014 CFR
2014-07-01
... test evaluates base fluid biodegradation rates by monitoring gas production due to microbial... ppm) evaluates the anaerobic (redox) condition of the bottles (dye is blue when oxygen is present... this publication is for descriptive use only, and does not constitute endorsement by EPA or the authors...
Code of Federal Regulations, 2012 CFR
2012-07-01
... test evaluates base fluid biodegradation rates by monitoring gas production due to microbial... ppm) evaluates the anaerobic (redox) condition of the bottles (dye is blue when oxygen is present... this publication is for descriptive use only, and does not constitute endorsement by EPA or the authors...
Code of Federal Regulations, 2013 CFR
2013-07-01
... test evaluates base fluid biodegradation rates by monitoring gas production due to microbial... ppm) evaluates the anaerobic (redox) condition of the bottles (dye is blue when oxygen is present... this publication is for descriptive use only, and does not constitute endorsement by EPA or the authors...
Research Protocol: Collections Related to Synthetic Turf ...
The “Federal Research Action Plan on Recycled Tire Crumb Used on Playing Fields and Playgrounds” (referred to subsequently as the Federal Research Action Plan or FRAP) was finalized in February 2016. The U.S. EPA and CDC/ATSDR, in collaboration with CPSC, have prepared this research protocol to implement portions of the research activities outlined under the FRAP. Specifically, this research protocol is designed to implement three of the research elements described in the Federal Research Action Plan: Conduct a literature review and data gaps analysis; Perform tire crumb rubber characterization research; Perform human exposure characterization research. Concerns have been raised by the public about the safety of recycled tire crumb rubber used in synthetic turf fields and playgrounds in the United States. Several studies have been identified that examine exposure to tire crumb rubber infill in these settings. While, in general, these studies have not provided evidence for these health concerns, the existing studies do not comprehensively evaluate all aspects of exposure associated with these use scenarios. Additional research is needed to help fill important data gaps that will lead to improved exposure assessment and risk evaluation for children and adults using synthetic turf fields and playgrounds with tire crumb rubber. In response, the U.S. Environmental Protection Agency (EPA), the Centers for Disease Control and Prevention/Agency for Toxic Su
Li, Jingjian; Xiong, Chao; He, Xia; Lu, Zhaocen; Zhang, Xin; Chen, Xiaoyang; Sun, Wei
2018-01-01
Traditional herbal medicines have played important roles in the ways of life of people around the world since ancient times. Despite the advanced medical technology of the modern world, herbal medicines are still used as popular alternatives to synthetic drugs. Due to the increasing demand for herbal medicines, plant species identification has become an important tool to prevent substitution and adulteration. Here we propose a method for biological assessment of the quality of prescribed species in the Chinese Pharmacopoeia by use of high resolution melting (HRM) analysis of microsatellite loci. We tested this method on licorice, a traditional herbal medicine with a long history. Results showed that nine simple sequence repeat (SSR) markers produced distinct melting curve profiles for the five licorice species investigated using HRM analysis. These results were validated by capillary electrophoresis. We applied this protocol to commercially available licorice products, thus enabling the consistent identification of 11 labels with non-declared Glycyrrhiza species. This novel strategy may thus facilitate DNA barcoding as a method of identification of closely related species in herbal medicine products. Based on this study, a brief operating procedure for using the SSR-HRM protocol for herbal authentication is provided.
Li, Jingjian; Xiong, Chao; He, Xia; Lu, Zhaocen; Zhang, Xin; Chen, Xiaoyang; Sun, Wei
2018-01-01
Traditional herbal medicines have played important roles in the ways of life of people around the world since ancient times. Despite the advanced medical technology of the modern world, herbal medicines are still used as popular alternatives to synthetic drugs. Due to the increasing demand for herbal medicines, plant species identification has become an important tool to prevent substitution and adulteration. Here we propose a method for biological assessment of the quality of prescribed species in the Chinese Pharmacopoeia by use of high resolution melting (HRM) analysis of microsatellite loci. We tested this method on licorice, a traditional herbal medicine with a long history. Results showed that nine simple sequence repeat (SSR) markers produced distinct melting curve profiles for the five licorice species investigated using HRM analysis. These results were validated by capillary electrophoresis. We applied this protocol to commercially available licorice products, thus enabling the consistent identification of 11 labels with non-declared Glycyrrhiza species. This novel strategy may thus facilitate DNA barcoding as a method of identification of closely related species in herbal medicine products. Based on this study, a brief operating procedure for using the SSR-HRM protocol for herbal authentication is provided. PMID:29740326
Closed-Loop Analysis of Soft Decisions for Serial Links
NASA Technical Reports Server (NTRS)
Lansdowne, Chatwin A.; Steele, Glen F.; Zucha, Joan P.; Schlesinger, Adam M.
2013-01-01
We describe the benefit of using closed-loop measurements for a radio receiver paired with a counterpart transmitter. We show that real-time analysis of the soft decision output of a receiver can provide rich and relevant insight far beyond the traditional hard-decision bit error rate (BER) test statistic. We describe a Soft Decision Analyzer (SDA) implementation for closed-loop measurements on single- or dual- (orthogonal) channel serial data communication links. The analyzer has been used to identify, quantify, and prioritize contributors to implementation loss in live-time during the development of software defined radios. This test technique gains importance as modern receivers are providing soft decision symbol synchronization as radio links are challenged to push more data and more protocol overhead through noisier channels, and software-defined radios (SDRs) use error-correction codes that approach Shannon's theoretical limit of performance.
PROTOCOL FOR LABORATORY TESTING OF CRUDE-OIL BIOREMEDIATION PRODUCTS IN FRESHWATER CONDITIONS
In 1993, the Environmental Protection Agency, National Risk Management Research Laboratory (EPA, NRMRL), with the National Environmental Technology Application Center (NETAC), developed a protocol for evaluation of bioremediation products in marine environments. The marine proto...
Use of Flowchart for Automation of Clinical Protocols in mHealth.
Dias, Karine Nóra; Welfer, Daniel; Cordeiro d'Ornellas, Marcos; Pereira Haygert, Carlos Jesus; Dotto, Gustavo Nogara
2017-01-01
For healthcare professionals to use mobile applications we need someone who knows software development, provide them. In healthcare institutions, health professionals use clinical protocols to govern care, and sometimes these documents are computerized through mobile applications to assist them. This work aims to present a proposal of an application of flow as a way of describing clinical protocols for automatic generation of mobile applications to assist health professionals. The purpose of this research is to enable health professionals to develop applications from the description of their own clinical protocols. As a result, we developed a web system that automates clinical protocols for an Android platform, and we validated with two clinical protocols used in a Brazilian hospital. Preliminary results of the developed architecture demonstrate the feasibility of this study.
A Standard Mutual Authentication Protocol for Cloud Computing Based Health Care System.
Mohit, Prerna; Amin, Ruhul; Karati, Arijit; Biswas, G P; Khan, Muhammad Khurram
2017-04-01
Telecare Medical Information System (TMIS) supports a standard platform to the patient for getting necessary medical treatment from the doctor(s) via Internet communication. Security protection is important for medical records (data) of the patients because of very sensitive information. Besides, patient anonymity is another most important property, which must be protected. Most recently, Chiou et al. suggested an authentication protocol for TMIS by utilizing the concept of cloud environment. They claimed that their protocol is patient anonymous and well security protected. We reviewed their protocol and found that it is completely insecure against patient anonymity. Further, the same protocol is not protected against mobile device stolen attack. In order to improve security level and complexity, we design a light weight authentication protocol for the same environment. Our security analysis ensures resilience of all possible security attacks. The performance of our protocol is relatively standard in comparison with the related previous research.
NASA Technical Reports Server (NTRS)
Powell, John D.
2003-01-01
This document discusses the verification of the Secure Socket Layer (SSL) communication protocol as a demonstration of the Model Based Verification (MBV) portion of the verification instrument set being developed under the Reducing Software Security Risk (RSSR) Trough an Integrated Approach research initiative. Code Q of the National Aeronautics and Space Administration (NASA) funds this project. The NASA Goddard Independent Verification and Validation (IV&V) facility manages this research program at the NASA agency level and the Assurance Technology Program Office (ATPO) manages the research locally at the Jet Propulsion Laboratory (California institute of Technology) where the research is being carried out.
Ethics and epistemology of accurate prediction in clinical research.
Hey, Spencer Phillips
2015-07-01
All major research ethics policies assert that the ethical review of clinical trial protocols should include a systematic assessment of risks and benefits. But despite this policy, protocols do not typically contain explicit probability statements about the likely risks or benefits involved in the proposed research. In this essay, I articulate a range of ethical and epistemic advantages that explicit forecasting would offer to the health research enterprise. I then consider how some particular confidence levels may come into conflict with the principles of ethical research. Published by the BMJ Publishing Group Limited. For permission to use (where not already granted under a licence) please go to http://group.bmj.com/group/rights-licensing/permissions.
Current options for the treatment of facial angiofibromas.
Salido-Vallejo, R; Garnacho-Saucedo, G; Moreno-Giménez, J C
2014-01-01
Facial angiofibromas are hamartomatous growths that are closely associated with tuberous sclerosis complex and, in fact, they constitute one of the main diagnostic criteria for that disease. These lesions composed of blood vessels and fibrous tissue appear on the face at an early age. Since they have important physical and psychological repercussions for patients, several treatment options have been used to remove them or improve their appearance. However, the lack of treatment guidelines prevents us from developing a common protocol for patients with this condition. The present article aims to review the treatments for facial angiofibromas used to date and to propose a new evidence-based treatment protocol. Copyright © 2012 Elsevier España, S.L. and AEDV. All rights reserved.
Organizational principles of cloud storage to support collaborative biomedical research.
Kanbar, Lara J; Shalish, Wissam; Robles-Rubio, Carlos A; Precup, Doina; Brown, Karen; Sant'Anna, Guilherme M; Kearney, Robert E
2015-08-01
This paper describes organizational guidelines and an anonymization protocol for the management of sensitive information in interdisciplinary, multi-institutional studies with multiple collaborators. This protocol is flexible, automated, and suitable for use in cloud-based projects as well as for publication of supplementary information in journal papers. A sample implementation of the anonymization protocol is illustrated for an ongoing study dealing with Automated Prediction of EXtubation readiness (APEX).
A native Bayesian classifier based routing protocol for VANETS
NASA Astrophysics Data System (ADS)
Bao, Zhenshan; Zhou, Keqin; Zhang, Wenbo; Gong, Xiaolei
2016-12-01
Geographic routing protocols are one of the most hot research areas in VANET (Vehicular Ad-hoc Network). However, there are few routing protocols can take both the transmission efficient and the usage of ratio into account. As we have noticed, different messages in VANET may ask different quality of service. So we raised a Native Bayesian Classifier based routing protocol (Naive Bayesian Classifier-Greedy, NBC-Greedy), which can classify and transmit different messages by its emergency degree. As a result, we can balance the transmission efficient and the usage of ratio with this protocol. Based on Matlab simulation, we can draw a conclusion that NBC-Greedy is more efficient and stable than LR-Greedy and GPSR.
An Argument for Fewer Clinical Trials.
Borgerson, Kirstin
2016-11-01
The volume of clinical research is increasing exponentially-far beyond our ability to process and absorb the results. Given this situation, it may be beneficial to consider reducing the flow at its source. In what follows, I will motivate and critically evaluate the following proposal: researchers should conduct fewer clinical trials. More specifically, I c onsider whether researchers should be permitted to conduct only clinical research of very high quality and, in turn, whether research ethics committees (RECs) should prohibit all other, lower-quality research, even when it might appear to meet some minimal ethical standard. Following a close analysis of the social-value requirement of ethical clinical research, I argue that this proposal is defensible. The problem identified in this paper has two parts, quantity and quality, and some clarification is needed about the latter because "quality" is a highly contested term in the medical literature. When some scholars advocate for high-quality trials, they mean large-scale, simple, explanatory randomized controlled trials. Others, including myself, have defended a different characterization of high-quality research that tends more toward pragmatic trial design and the use of methods other than RCTs. Pragmatic trials aim to provide evidence that directly supports clinical decision-making in "usual" care settings. Unlike explanatory trials, which aim to abstract away from particular settings and patients, in the hopes of creating ideal conditions for the success of an intervention, pragmatic trials deliberately pursue knowledge of high applicability, through the use of representative subjects, clinically important questions, flexible treatment protocols, patient-oriented outcome measures, and so on. I see applicability as a marker of high-quality research. The context in which research is meant to be applied should be the context in which new interventions are evaluated. © 2016 The Hastings Center.