Science.gov

Sample records for des protocoles experimentaux

  1. Etude des defauts microscopiques et des proprietes optiques, electroniques et magnetiques du compose neodyme cerium oxyde de cuivre

    NASA Astrophysics Data System (ADS)

    Richard, Pierre

    La presente these, qui combine des mesures de diffusion Raman, de transmission infrarouge, de conductivite hyperfrequence et d'interferometrie ultrasonore sur les composes Nd 2-xCexCuO 4, traite des defauts d'oxygene, ainsi que des proprietes optiques, electroniques et magnetiques de ces materiaux. Les resultats experimentaux obtenus sont correles avec plusieurs donnees experimentales disponibles dans la litterature. D'abord, la caracterisation des modes Raman et des niveaux d'energie de champ cristallin de l'ion Nd3+ au moyen de techniques optiques, en fonction du dopage en cerium et du contenu en oxygene, permettent de conclure a la presence de defauts lies a une non-stoechiometrie en oxygene dans ces composes. En effet, des excitations de champ cristallin assignees a des ions Nd3+ en sites irreguliers sont observees, en plus des bandes d'absorption associees aux ions Nd3+ en site regulier, dans les spectres correspondant aux multiplets 4I11/2, 4I13/2 et 4I 15/2 de l'ion Nd3+. Les resultats experimentaux indiquent que, contrairement a la croyance largement repandue, les oxygenes apicaux, bien que presents dans les echantillons dopes, ne sont pas enleves lors du processus de reduction des echantillons necessaire pour faire apparaitre la supraconductivite dans cette famille de cuprates. Au contraire, des lacunes d'oxygene, dont le type varie en fonction du dopage, sont creees lors de ce processus. En particulier, il est montre dans ce travail que la reduction des echantillons dopes de maniere optimale conduit a la creation de lacunes d'oxygene dans les plans CuO2. Les consequences de telles lacunes sont largement discutees. En outre, il est suggere que de telles lacunes sont responsables de la perte de l'ordre antiferromagnetique a longue portee des ions Cu2+. Finalement, l'interaction d'echange anisotrope Nd3+-Cu 2+ dans le compose nondope est caracterisee au moyen de la transmission infrarouge sous champ magnetique. L'eclatement des doublets de Kramers mesure

  2. Modelisations des effets de surface sur les jets horizontaux subsoniques d'hydrogene et de methane

    NASA Astrophysics Data System (ADS)

    Gomez, Luis Fernando

    Le developpement des codes et de normes bases sur une methodologie scientifique requiert la capacite de predire l'etendue inflammable de deversements gazeux d'hydrogene sous differentes conditions. Des etudes anterieures ont deja etabli des modeles bases sur les lois de conservation de la mecanique des fluides basees sur des correlations experimentales qui permettent de predire la decroissance de la concentration et de la vitesse d'un gaz le long de l'axe d'un jet libre vertical. Cette etude s'interesse aux effets de proximite a une surface horizontale parallele sur un jet turbulent. Nous nous interessons a son impact sur l'etendue du champ de la concentration et sur l'enveloppe inflammable en particulier. Cette etude est comparative : l'hydrogene est compare au methane. Ceci permet de degager l'influence des effets de difference de la densite sur le comportement du jet, et de comparer le comportement de l'hydrogene aux correlations experimentales, qui ont ete essentiellement etablies pour le methane. Un modele decrivant l'evolution spatio-temporelle du champ de concentration du gaz dilue est propose, base sur la mecanique des fluides computationnelle. Cette approche permet de varier systematiquement les conditions aux frontieres (proximite du jet a la surface, par exemple) et de connaitre en detail les proprietes de l'ecoulement. Le modele est implemente dans le code de simulations par volumes finis de FLUENT. Les resultats des simulations sont compares avec les lois de similitudes decoulant de la theorie des jets d'ecoulements turbulents libres ainsi qu'avec les resultats experimentaux disponibles. L'effet de la difference des masses molaires des constituantes du jet et des constituantes du milieu de dispersion est egalement etudie dans le contexte du comportement d'echelle de la region developpee du jet.

  3. Impact de la preparation des anodes crues et des conditions de cuisson sur la fissuration dans des anodes denses

    NASA Astrophysics Data System (ADS)

    Amrani, Salah

    La fabrication de l'aluminium est realisee dans une cellule d'electrolyse, et cette operation utilise des anodes en carbone. L'evaluation de la qualite de ces anodes reste indispensable avant leur utilisation. La presence des fissures dans les anodes provoque une perturbation du procede l'electrolyse et une diminution de sa performance. Ce projet a ete entrepris pour determiner l'impact des differents parametres de procedes de fabrication des anodes sur la fissuration des anodes denses. Ces parametres incluent ceux de la fabrication des anodes crues, des proprietes des matieres premieres et de la cuisson. Une recherche bibliographique a ete effectuee sur tous les aspects de la fissuration des anodes en carbone pour compiler les travaux anterieurs. Une methodologie detaillee a ete mise au point pour faciliter le deroulement des travaux et atteindre les objectifs vises. La majorite de ce document est reservee pour la discussion des resultats obtenus au laboratoire de l'UQAC et au niveau industriel. Concernant les etudes realisees a l'UQAC, une partie des travaux experimentaux est reservee a la recherche des differents mecanismes de fissuration dans les anodes denses utilisees dans l'industrie d'aluminium. L'approche etait d'abord basee sur la caracterisation qualitative du mecanisme de la fissuration en surface et en profondeur. Puis, une caracterisation quantitative a ete realisee pour la determination de la distribution de la largeur de la fissure sur toute sa longueur, ainsi que le pourcentage de sa surface par rapport a la surface totale de l'echantillon. Cette etude a ete realisee par le biais de la technique d'analyse d'image utilisee pour caracteriser la fissuration d'un echantillon d'anode cuite. L'analyse surfacique et en profondeur de cet echantillon a permis de voir clairement la formation des fissures sur une grande partie de la surface analysee. L'autre partie des travaux est basee sur la caracterisation des defauts dans des echantillons d'anodes crues

  4. Etude experimentale des excitations topologiques de l'effet Hall quantique a nu = 1 dans les heterostructures semiconductrices a double puits quantique

    NASA Astrophysics Data System (ADS)

    Charlebois, Serge

    De nombreux travaux theoriques et experimentaux ont ete publies sur les excitations topologiques de gaz electroniques bidimensionnels (GE2D), appellees skyrmions, dans le regime de l'effet Hall quantique a remplissage unitaire. On attend des excitations semblables appellees bimerons dans les systemes formes de deux GE2D couples. Contrairement au cas des GE2D simples, aucune experience n'a, a notre connaissance, presente la mesure d'une propriete specifique aux bimerons. Nous presentons dans cette these des travaux experimentaux ayant pour objectif l'etude d'excitations topologiques dans les heterostructures a double puits quantique. Une manifestation attendue (les bimerons est la presence d'une anisotropie dans la conductivite a travers une constriction. Nous avons concu un dispositif original a point de contact a trois grilles non-coplanaires. Ce dispositif a trois grilles a la particularite de permettre la creation d'une constriction etroite dans le double GE2D tout en permettant l'equilibrage de la densite electronique entre les deux puits dans l'etroit canal de conduction. Nous avons fabrique ce dispositif de taille submicronique par electrolithographie sur des heterostructures a double puits. Les dispositifs ainsi fabriques ont ete etudies a basse temperature (0.3K) et ont montre un fonctionnement conforme aux attentes. Les travaux n'ont pas permis de mettre en evidence une anisotropie de transport revelatrice de l'existence de bimerons. Cette these est a notre connaissance la premiere etude experimentale visant la realisation de l'experience d'anisotropie de transport et est ainsi une contribution significative a l'avancement des connaissances dans ce domaine. Les travaux theoriques que nous presentons ont permis de montrer l'effet des excitations topologiques sur la capacite grille-GE2D du systeme. Ces travaux ouvrent la voie de la detection des bimerons par l'intermediaire de la mesure de la capacite grille-GE2D ou encore de la susceptibilite electrique du

  5. Etude et simulation du protocole TTEthernet sur un sous-systeme de gestion de vols et adaptation de la planification des tâches a des fins de simulation

    NASA Astrophysics Data System (ADS)

    Abidi, Dhafer

    TTEthernet is a deterministic network technology that makes enhancements to Layer 2 Quality-of-Service (QoS) for Ethernet. The components that implement its services enrich the Ethernet functionality with distributed fault-tolerant synchronization, robust temporal partitioning bandwidth and synchronous communication with fixed latency and low jitter. TTEthernet services can facilitate the design of scalable, robust, less complex distributed systems and architectures tolerant to faults. Simulation is nowadays an essential step in critical systems design process and represents a valuable support for validation and performance evaluation. CoRE4INET is a project bringing together all TTEthernet simulation models currently available. It is based on the extension of models of OMNeT ++ INET framework. Our objective is to study and simulate the TTEthernet protocol on a flight management subsystem (FMS). The idea is to use CoRE4INET to design the simulation model of the target system. The problem is that CoRE4INET does not offer a task scheduling tool for TTEthernet network. To overcome this problem we propose an adaptation for simulation purposes of a task scheduling approach based on formal specification of network constraints. The use of Yices solver allowed the translation of the formal specification into an executable program to generate the desired transmission plan. A case study allowed us at the end to assess the impact of the arrangement of Time-Triggered frames offsets on the performance of each type of the system traffic.

  6. Analyse de L'ancrage des Vortex Intergrains pour le Yttrium BARYUM(2) CUIVRE(3) OXYGENE(7) Polycristallin

    NASA Astrophysics Data System (ADS)

    Fournier, Patrick

    Le Modele de l'Etat Critique Generalise (MECG) est utilise pour decrire les proprietes magnetiques et de transport du YBa_2Cu_3O _7 polycristallin. Ce modele empirique permet de relier la densite de courant critique a la densite de lignes de flux penetrant dans la region intergrain. Deux techniques de mesures sont utilisees pour caracteriser nos materiaux. La premiere consiste a mesurer le champ au centre d'un cylindre creux en fonction du champ magnetique applique pour des temperatures comprises entre 20 et 85K. En variant l'epaisseur de la paroi du cylindre creux, il est possible de suivre l'evolution des cycles d'hysteresis et de determiner des champs caracteristiques qui varient en fonction de cette dimension. En utilisant un lissage des resultats experimentaux, nous determinons J _{co}, H_ {o} et n, les parametres du MECG. La forme des cylindres, avec une longueur comparable au diametre externe, entrai ne la presence d'un champ demagnetisant qui peut etre inclus dans le modele theorique. Ceci nous permet d'evaluer la fraction du volume ecrante, f _{g}, ainsi que le facteur demagnetisant N. Nous trouvons que J_{ co}, H_{o} et f_{g} dependent de la temperature, tandis que n et N (pour une epaisseur de paroi fixe) n'en dependent pas. La deuxieme technique consiste a mesurer le courant critique de lames minces en fonction du champ applique pour differentes temperatures. Nous utilisons un montage que nous avons developpe permettant d'effectuer ces mesures en contact direct avec le liquide refrigerant, i.e. dans l'azote liquide. Nous varions la temperature du liquide en variant la pression du gaz au-dessus du bain d'azote. Cette methode nous permet de balayer des temperatures entre 65K et la temperature critique du materiau ({~ }92K). Nous effectuons le lissage des courbes de courant critique en fonction du champ applique encore a l'aide du MECG, pour a nouveau obtenir ses parametres. Pour trois echantillons avec des traitements thermiques differents, les parametres

  7. Etude Par Spectroscopie Infrarouge des Oxydes Moleculaires Superoxyde de Potassium, Peroxyde de Potassium et Trioxyde de Silicium Isoles EN Matrice D'argon

    NASA Astrophysics Data System (ADS)

    Tremblay, Benoit

    1995-01-01

    A l'aide de la spectroscopie d'absorption infrarouge et de la technique d'isolation en matrice d'argon, nous avons repris l'etude des differents oxydes moleculaires qui se forment lorsque l'oxygene moleculaire se trouve dans des agregats avec du potassium, du silicium et de l'oxyde de silicium SiO. Le choix des oxydes moleculaires KO_2 et K_2O_2 a ete motive par le fait qu'ils ont souvent ete mis en evidence dans tres travaux en physique des surfaces lors de letude du systeme O_2/K/Si. Ces oxydes avaient deja ete identifies par spectroscopie infrarouge en matrice d'argon au debut des annees soixante-dix. Pour KO_2, l'observation des modes nu_2 et nu_3 pour de nombreuses especes isotopiques nous a permis de deduire la longueur de la liaison K-O et de l'angle O-K-O. En effet, la construction d'un champ de force harmonique nous a permis de determiner sa structure et des constantes de force qui reprodusient tres bien les frequences experimentales observees. L'etude de l'oxyde K_2O _2 s'est averee interessante car avant notre travail, seule une vibration avait ete mise en evidence. Nous avons reussi a observer deux nouvelles vibrations fondamentales: une bande infrarouge faible a 185 cm^{-1}, avec les isotopes ^{16}O _2, ^{18}O _2 et ^{16} O^{18}O de l'oxygene, et une autre, activee en infrarouge avec l'isotope ^{16}O^{18 }O a 405 cm^{-1}. Les donnees experimentales etant insuffisantes pour deduire la structure de la molecule, des calculs theoriques avec la methode de la fonctionnelle de la densite ont donne le structure et les vibrations non observees du K _2O_2. Ces donnees supplementaires sont venues completer les resultats experimentaux et nous ont permis de construire un champ de force harmonique avec <=uel nous avons trouve des constantes de force qui reproduisent tres bien les frequences observees. Les calculs theoriques ont monte que K_2O _2 doit etre de structure C_ {rm 2v}, bien que la structure D _{rm 2h} ne puisse pas etre rejetee, puisque qu'il y a un

  8. Communications protocol

    NASA Technical Reports Server (NTRS)

    Zhou, Xiaoming (Inventor); Baras, John S. (Inventor)

    2010-01-01

    The present invention relates to an improved communications protocol which increases the efficiency of transmission in return channels on a multi-channel slotted Alohas system by incorporating advanced error correction algorithms, selective retransmission protocols and the use of reserved channels to satisfy the retransmission requests.

  9. Des Moines.

    ERIC Educational Resources Information Center

    Gore, Deborah, Ed.

    1988-01-01

    This document, intended for elementary students, contains articles and activities designed to acquaint young people with the history of Des Moines, Iowa. The articles are short, and new or difficult words are highlighted and defined for young readers. "The Raccoon River Indian Agency" discusses the archeological exploration of the indian…

  10. Etude de l'influence de la temperature et de l'humidite sur les proprietes mecaniques en traction des fibres de chanvre et de coco

    NASA Astrophysics Data System (ADS)

    Ho Thi, Thu Nga

    L'objectif de cette etude fut d'etablir l'effet de l'humidite et de la temperature sur la resistance en traction et le module elastique des fibres de chanvre et de coco. Deux etudes ont ete realisees afin d'atteindre cet objectif. La premiere vise l'absorption de l'humidite dans ces fibres en exposition dans l'air (de 0%RH a 80%RH) ainsi que l'absorption de l'eau dans ces fibres immergees dans l'eau aux differentes temperatures. La deuxieme consiste a mesurer la resistance en traction et le module elastique de ces fibres sous differentes conditions d'humidite et de temperature. En basant sur les resultats experimentaux obtenus, les methodes semi empiriques et de reseaux de neurones ont ete utilisees pour but de predire les proprietes en traction (resistance et module d'elasticite) des fibres de chanvre et de coco sous l'influence de l'humidite et de la temperature.

  11. Evolution des quasiparticules nodales du cuprate supraconducteur YBa2Cu3Oy en conductivite thermique

    NASA Astrophysics Data System (ADS)

    Rene de Cotret, Samuel

    Ce memoire presente des mesures de conductivite thermique sur les supraconducteurs YBCO et Tl-2201 afin de statuer sur la presence possible d'un point critique quantique (QCP) dans le diagramme de phase de cuprates. Ce point critique quantique serait a l'origine de la reconstruction de la surface de Fermi, d'un large cylindre de trous en de petites poches de trous et d'electrons. La conductivite thermique dans le regime T → 0 permet d'extraire une quantite purement electronique liee aux vitesses de Fermi et du gap, au noeud. Une discontinuite dans cette quantite pourrait signaler la traversee du dopage critique qui reconstruit la surface de Fermi. Plusieurs sondes experimentales distinguent une transition de phase ou un crossover a T* a temperature finie. D'autres sondes mettent en evidence une transition de phase sous l'effet d'un champ magnetique. La presence ou non de cet ordre, a temperature et champ magnetique nul questionne la communaute depuis plusieurs annees. Dans cette etude, nous detectons une variation brusque de kappa0/T a p = 0.18 dans YBCO et a p = 0.20 dans Tl-2201. Ces sauts sont interpretes comme un signe de la transition a temperature nulle et sont en faveur d'un QCP. Le manque de donnees d'un meme materiau a ces dopages ne permet pas de valider hors de tout doute l'existence d'un point critique quantique. Le modele theorique YRZ decrit aussi bien les donnees de conductivite thermique. Des pistes de travaux experimentaux a poursuivre sont proposees pour determiner la presence ou non du QCP de facon franche. Mots-cles : Supraconducteurs, cuprates, conductivite thermique, point critique quantique.

  12. Synthese et utilisation de fibres cellulosiques phosphatees pour la valorisation de la fibre vegetale dans l'amelioration des proprietes de surface du papier et la fabrication de materiaux ignifuges

    NASA Astrophysics Data System (ADS)

    Lentsolo Yalli, Gym Clerc

    Dans cette etude, nous souhaitions principalement greffer des groupements phosphates directement sur la cellulose comme materiau modele, et par la suite transposer les conditions optimales du design concu pour la cellulose, determine par modelisation a l'aide de l'outil JMP, sur la pate kraft. Ensuite, evaluer les proprietes physico-chimiques, optiques, d'hydrophilie, thermiques et d'inflammabilite des materiaux fabriques (feuilles ou pastilles fabriquees) a partir des fibres phosphorylees. Pour ce faire, nous avons pretraite la cellulose et la pate kraft dans une solution aqueuse de 10 a 15 % de LiCl a 70°C pendant 7 heures. Par la suite, nous avons procede a la reaction de phosphorylation in situ avec l'acide phosphorique et l'uree, dans des conditions de temperatures et de reactifs decrites par un design experimental, pendant 3 heures. La reaction de phosphorylation s'est realisee avec succes pour l'ensemble des resultats sur la cellulose, avec des taux de greffage variables selon les conditions operatoires. Les degres de substitutions (DSP), determines par ICP-OES, et les degres de polymerisation (DP), determines par viscosimetrie, etaient aussi variables, selon les conditions. L'etude des parametres experimentaux a permis de determiner les conditions optimales transposables sur la pate kraft (DSP = 1,47 et DP = 142,42 pour la cellulose, qui represente un taux de coupure de 38% de la fibre) et les facteurs critiques de la reaction. Les resultats de la reaction sur la fibre ont permis, non seulement de constater que les conditions utilisees pour la cellulose n'etaient directement transposables a la fibre, mais permettaient quand d'obtenir un DSP interessant ≥ a 1 avec un taux de coupure de 50 a 60 %. La structure du produit principal de la reaction (le sel de calcium du pyrophosphate d'ester de cellulose ou de pate kraft) a ete determinee par les analyses FTIR, XPS, RMN-13C et RMN-31P. L'etude de l'effet de la reaction de phosphorylation sur les proprietes

  13. Rational Protocols

    NASA Astrophysics Data System (ADS)

    Cachin, Christian

    Security research continues to provide a plethora of new protocols and mechanisms; these solutions patch either existing vulnerabilities found in practical systems or solve hypothetical security problems in the sense that the problem is often conceived at the same time when the first solution is proposed. Yet only a very small fraction of this research is relevant to ordinary users in the sense that they are willing to actually deploy the technology.

  14. Fluctuations Magnetiques des Gaz D'electrons Bidimensionnels: Application AU Compose Supraconducteur LANTHANE(2-X) Strontium(x) Cuivre OXYGENE(4)

    NASA Astrophysics Data System (ADS)

    Benard, Pierre

    . Il est ensuite demontre que le modele a trois bandes predit les memes resultats pour la position des structures du facteur de structure magnetique que le modele a une bande, dans la limite ou l'hybridation des orbitales des atomes d'oxygene des plans Cu-O_2 et l'amplitude de sauts vers les seconds voisins sont nulles. Il est de plus constate que l'effet de l'hybridation des orbitales des atomes d'oxygene est bien modelise par le terme de saut vers les seconds voisins. Meme si ils decrivent correctement le comportement qualitatif des maximums du facteur de structure magnetique, les modeles a trois bandes et a une bande ne permettent pas d'obtenir une position de ces structures conforme avec les mesures experimentales, si on suppose que la bande est rigide, c'est-a-dire que les parametres du Hamiltonien sont independants de la concentration de strontium. Ceci peut etre cause par la dependance des parametres du Hamiltonien sur la concentration de strontium. Finalement, les resultats sont compares avec les experiences de diffusion de neutrons et les autres theories, en particulier celles de Littlewood et al. (1993) et de Q. Si et al. (1993). La comparaison avec les resultats experimentaux pour le compose de lanthane suggere que le liquide de Fermi possede une surface de Fermi disjointe, et qu'il est situe pres d'une instabilite magnetique incommensurable.

  15. Des ballons pour demain

    NASA Astrophysics Data System (ADS)

    Régipa, R.

    A partir d'une théorie sur la détermination des formes et des contraintes globales d'un ballon de révolution, ou s'en rapprochant, une nouvelle famille de ballons a été définie. Les ballons actuels, dits de ``forme naturelle'', sont calculés en général pour une tension circonférencielle nulle. Ainsi, pour une mission donnée, la tension longitudinale et la forme de l'enveloppe sont strictement imposées. Les ballons de la nouvelle génération sont globalement cylindriques et leurs pôles sont réunis par un câble axial, chargé de transmettre une partie des efforts depuis le crochet (pôle inférieur), directement au pôle supérieur. De plus, la zone latérale cylindrique est soumise à un faible champ de tensions circonférencielles. Ainsi, deux paramètres permettent de faire évoluer la distribution des tensions et la forme de l'enveloppe: - la tension du câble de liaison entre pôles (ou la longueur de ce câble) - la tension circonférencielle moyenne désirée (ou le rayon du ballon). On peut donc calculer et réaliser: - soit des ballons de forme adaptée, comme les ballons à fond plat pour le bon fonctionnement des montgolfières infrarouge (projet MIR); - soit des ballons optimisés pour une bonne répartition des contraintes et une meilleure utilisation des matériaux d'enveloppe, pour l'ensemble des programmes stratosphériques. Il s'ensuit une économie sensible des coûts de fabrication, une fiabilité accrue du fonctionnement de ces ballons et une rendement opérationnel bien supérieur, permettant entre autres, d'envisager des vols à très haute altitude en matériaux très légers.

  16. Alternative parallel ring protocols

    NASA Technical Reports Server (NTRS)

    Mukkamala, R.; Foudriat, E. C.; Maly, Kurt J.; Kale, V.

    1990-01-01

    Communication protocols are know to influence the utilization and performance of communication network. The effect of two token ring protocols on a gigabit network with multiple ring structure is investigated. In the first protocol, a mode sends at most one message on receiving a token. In the second protocol, a mode sends all the waiting messages when a token is received. The behavior of these protocols is shown to be highly dependent on the number of rings as well as the load in the network.

  17. The RTS2 protocol

    NASA Astrophysics Data System (ADS)

    Kubánek, Petr; Jelínek, Martin; French, John; Prouza, Michal; Vítek, Stanislav; Castro-Tirado, Alberto J.; Reglero, Victor

    2008-07-01

    Remote Telescope System 2nd version (RTS2) is an open source project aimed at developing a software environment to control a fully robotic observatory. RTS2 consists of various components, which communicate via an ASCII based protocol. As the protocol was from the beginning designed as an observatory control system, it provides some unique features, which are hard to find in the other communication systems. These features include advanced synchronisation mechanisms and strategies for setting variables. This presentation describes the protocol and its unique features. It also assesses protocol performance, and provides examples how the RTS2 library can be used to quickly build an observatory control system.

  18. Des Vents et des Jets Astrophysiques

    NASA Astrophysics Data System (ADS)

    Sauty, C.

    well expected result from the theory. Although, collimation may be conical, paraboloidal or cylindrical (Part 4), cylindrical collimation is the more likely to occur. The shape of outflows may then be used as a tool to predict physical conditions on the flows or on their source. L'éjection continue de plasma autour d'objets massifs est un phénomène largement répandu en astrophysique, que ce soit sous la forme du vent solaire, de vents stellaires, de jets d'étoiles en formation, de jets stellaires autour d'objets compacts ou de jets extra-galactiques. Cette zoologie diversifiée fait pourtant l'objet d'un commun effort de modélisation. Le but de cette revue est d'abord de présenter qualitativement le développement, depuis leur origine, des diverses théories de vents (Partie 1) et l'inter disciplinarité dans ce domaine. Il s'agit d'une énumération, plus ou moins exhaustive, des idées proposées pour expliquer l'accélération et la morphologie des vents et des jets, accompagnée d'une présentation sommaire des aspects observationnels. Cette partie s'abstient de tout aspect faisant appel au formalisme mathématique. Ces écoulements peuvent être décrits, au moins partiellement, en résolvant les équations magnétohydrodynamiques, axisymétriques et stationnaires. Ce formalisme, à la base de la plupart des théories, est exposé dans la Partie 2. Il permet d'introduire quantitativement les intégrales premières qu'un tel système possède. Ces dernières sont amenées à jouer un rôle important dans la compréhension des phénomènes d'accélération ou de collimation, en particulier le taux de perte de masse, le taux de perte de moment angulaire ou l'énergie du rotateur magnétique. La difficulté de modélisation réside dans l'existence de points critiques, propres aux équations non linéaires, qu'il faut franchir. La nature physique et la localisation de ces points critiques fait l'objet d'un débat important car ils sont la clef de voute de la r

  19. National Sample Assessment Protocols

    ERIC Educational Resources Information Center

    Ministerial Council on Education, Employment, Training and Youth Affairs (NJ1), 2012

    2012-01-01

    These protocols represent a working guide for planning and implementing national sample assessments in connection with the national Key Performance Measures (KPMs). The protocols are intended for agencies involved in planning or conducting national sample assessments and personnel responsible for administering associated tenders or contracts,…

  20. Montreal protocol: Business opportunites

    SciTech Connect

    1998-12-31

    The Montreal Protocol on Substances that Deplete the Ozone Layer was signed by 24 countries in 1987, establishing measures for controlling the production and consumption of ozone-depleting substances. This publication begins with some background information on ozone depletion and the history of the Protocol. It then describes aspects of the Protocol`s Multilateral Fund, created to assist developing countries to meet Protocol deadlines: Its administration, structure, and how projects are initiated. Names, addresses, and phone/fax numbers of Fund contacts are provided. Canadian projects under the Fund are then reviewed and opportunities for Canadian environmental companies are noted. Finally, information sheets are presented which summarize Fund-related Canadian bilateral projects undertaken to date.

  1. Reliable broadcast protocols

    NASA Technical Reports Server (NTRS)

    Joseph, T. A.; Birman, Kenneth P.

    1989-01-01

    A number of broadcast protocols that are reliable subject to a variety of ordering and delivery guarantees are considered. Developing applications that are distributed over a number of sites and/or must tolerate the failures of some of them becomes a considerably simpler task when such protocols are available for communication. Without such protocols the kinds of distributed applications that can reasonably be built will have a very limited scope. As the trend towards distribution and decentralization continues, it will not be surprising if reliable broadcast protocols have the same role in distributed operating systems of the future that message passing mechanisms have in the operating systems of today. On the other hand, the problems of engineering such a system remain large. For example, deciding which protocol is the most appropriate to use in a certain situation or how to balance the latency-communication-storage costs is not an easy question.

  2. Injectabilite des coulis de ciment dans des milieux fissures

    NASA Astrophysics Data System (ADS)

    Mnif, Thameur

    Le travail presente ici est un bilan du travaux de recherche effectues sur l'injectabilite des coulis de ciment dans lu milieux fissures. Un certain nombre de coulis a base de ciment Portland et microfin ont ete selectionnes afin de caracteriser leur capacite a penetrer des milieux fissures. Une partie des essais a ete menee en laboratoire. L'etude rheologique des differents melanges a permis de tester l'influence de l'ajout de superplastifiant et/ou de fumee de silice sur la distribution granulometrique des coulis et par consequent sur leur capacite a injecter des colonnes de sable simulant un milieu fissure donne. La classe granulometrique d'un coulis, sa stabilite et sa fluidite sont apparus comme les trois facteurs principaux pour la reussite d'une injection. Un facteur de finesse a ete defini au cours de cette etude: base sur la classe granulometrique du ciment et sa stabilite, il peut entrer dans la formulation theorique du debit d'injection avant application sur chantier. La deuxieme et derniere partie de l'etude presente les resultats de deux projets de recherche sur l'injection realises sur chantier. L'injection de dalles de beton fissurees a permis le suivi de l'evolution des pressions avec la distance au point d'injection. L'injection de murs de maconnerie a caractere historique a montre l'importance de la definition de criteres de performance des coulis a utiliser pour traiter un milieu donne et pour un objectif donne. Plusieurs melanges peuvent ainsi etre predefinis et mis a disposition sur le chantier. La complementarite des ciments traditionnels et des ciments microfins devient alors un atout important. Le choix d'utilisation de ces melanges est fonction du terrain rencontre. En conclusion, cette recherche etablit une methodologie pour la selection des coulis a base de ciment et des pressions d'injection en fonction de l'ouverture des fissures ou joints de construction.

  3. Reliable multicast protocol specifications protocol operations

    NASA Technical Reports Server (NTRS)

    Callahan, John R.; Montgomery, Todd; Whetten, Brian

    1995-01-01

    This appendix contains the complete state tables for Reliable Multicast Protocol (RMP) Normal Operation, Multi-RPC Extensions, Membership Change Extensions, and Reformation Extensions. First the event types are presented. Afterwards, each RMP operation state, normal and extended, is presented individually and its events shown. Events in the RMP specification are one of several things: (1) arriving packets, (2) expired alarms, (3) user events, (4) exceptional conditions.

  4. Traitements didactiques preventifs d'un type de conceptions erronees en sciences physiques chez des eleves du secondaire

    NASA Astrophysics Data System (ADS)

    Blondin, Andre

    hypotheses avec la cohorte suivante d'eleves chez qui se repetaient les memes conditions d'apprentissage. Nous avons utilise le design de recherche "posttest only" de Campbell et Stanley. En mai, apres le moment prevu dans la planification du programme pour donner le probleme aux eleves, nous avons suggere deux facons differentes de reviser la solution de ce probleme. Les eleves du premier groupe experimental ont revise sans que soit activee la connaissance anterieure apprehendee de la rotation de la Terre. Les eleves du deuxieme groupe experimental ont ete confrontes, par des questions et une simulation, au fait que la rotation de la Terre n'est pas une connaissance pertinente pour resoudre le probleme. Les groupes temoins et les groupes experimentaux ont ete choisis au hasard dans le bassin des ecoles secondaires de la commission scolaire. (Abstract shortened by UMI.)

  5. Grundlagen des Tissue Engineering

    NASA Astrophysics Data System (ADS)

    Mayer, Jörg; Blum, Janaki; Wintermantel, Erich

    Die Organtransplantation stellt eine verbreitete Therapie dar, um bei krankheitsoder unfallbedingter Schädigung eines Organs die Gesamtheit seiner Funktionen wieder herzustellen, indem es durch ein Spenderorgan ersetzt wird. Organtransplantationen werden für die Leber, die Niere, die Lunge, das Herz oder bei schweren grossflächigen Verbrennungen der Haut vorgenommen. Der grosse apparative, personelle und logistische Aufwand und die Risiken der Transplantationschirurgie (Abstossungsreaktionen) sowie die mangelnde Verfügbarkeit von immunologisch kompatiblen Spenderorganen führen jedoch dazu, dass der Bedarf an Organtransplantaten nur zu einem sehr geringen Teil gedeckt werden kann. Sind Spenderorgane nicht verfügbar, können in einzelnen Fällen lebenswichtige Teilfunktionen, wie beispielsweise die Filtrationsfunktion der Niere durch die Blutreinigung mittels Dialyse ersetzt oder, bei mangelnder Funktion der Bauchspeicheldrüse (Diabetes), durch die Verabreichung von Insulin ein normaler Zustand des Gesamtorganismus auch über Jahre hinweg erhalten werden. Bei der notwendigen lebenslangen Anwendung apparativer oder medikamentöser Therapie können für den Patienten jedoch häufig schwerwiegende, möglicherweise lebensverkürzende Nebenwirkungen entstehen. Daher werden in der Forschung Alternativen gesucht, um die Funktionen des ausgefallenen Organs durch die Implantation von Zellen oder in vitro gezüchteten Geweben möglichst umfassend wieder herzustellen. Dies erfordert biologisch aktive Implantate, welche die für den Stoffwechsel des Organs wichtigen Zellen enthalten und einen organtypischen Stoffwechsel entfalten.

  6. Extraction and anonymity protocol of medical file.

    PubMed Central

    Bouzelat, H.; Quantin, C.; Dusserre, L.

    1996-01-01

    To carry out the epidemiological study of patients suffering from a given cancer, the Department of Medical Informatics (DIM) has to link information coming from different hospitals and medical laboratories in the Burgundy region. Demands from the French department for computerized information security (Commission Nationale de l'Informatique et des Libertés: CNIL), in regard to abiding by the law of January 6, 1978, completed by the law of July 1st, 1994 on nominal data processing in the framework of medical research have to be taken into account. Notably, the CNIL advised to render anonymous patient identities before the extraction of each establishment file. This paper describes a recently implemented protocol, registered with the French department for computerized information security (Service Central de la Sécurité des Systèmes d'information : SCSSI) whose purpose is to render anonymous medical files in view of their extraction. Once rendered anonymous, these files will be exportable so as to be merged with other files and used in a framework of epidemiological studies. Therefore, this protocol uses the Standard Hash Algorithm (SHA) which allows the replacement of identities by their imprints while ensuring a minimal collision rate in order to allow a correct linkage of the different information concerning the same patient. A first evaluation of the extraction and anonymity software with regard to the purpose of an epidemiological survey is described here. In this paper, we also show how it would be possible to implement this system by means of the Internet communication network. PMID:8947681

  7. Reticulation des fibres lignocellulosiques

    NASA Astrophysics Data System (ADS)

    Landrevy, Christel

    Pour faire face à la crise économique la conception de papier à valeur ajoutée est développée par les industries papetières. Le but de se projet est l'amélioration des techniques actuelles de réticulation des fibres lignocellulosiques de la pâte à papier visant à produire un papier plus résistant. En effet, lors des réactions de réticulation traditionnelles, de nombreuses liaisons intra-fibres se forment ce qui affecte négativement l'amélioration anticipée des propriétés physiques du papier ou du matériau produit. Pour éviter la formation de ces liaisons intra-fibres, un greffage sur les fibres de groupements ne pouvant pas réagir entre eux est nécessaire. La réticulation des fibres par une réaction de « click chemistry » appelée cycloaddition de Huisgen entre un azide et un alcyne vrai, catalysée par du cuivre (CuAAC) a été l'une des solutions trouvée pour remédier à ce problème. De plus, une adaptation de cette réaction en milieux aqueux pourrait favoriser son utilisation en milieu industriel. L'étude que nous désirons entreprendre lors de ce projet vise à optimiser la réaction de CuAAC et les réactions intermédiaires (propargylation, tosylation et azidation) sur la pâte kraft, en milieu aqueux. Pour cela, les réactions ont été adaptées en milieu aqueux sur la cellulose microcristalline afin de vérifier sa faisabilité, puis transférée à la pâte kraft et l'influence de différents paramètres comme le temps de réaction ou la quantité de réactifs utilisée a été étudiée. Dans un second temps, une étude des différentes propriétés conférées au papier par les réactions a été réalisée à partir d'une série de tests papetiers optiques et physiques. Mots Clés Click chemistry, Huisgen, CuAAC, propargylation, tosylation, azidation, cellulose, pâte kraft, milieu aqueux, papier.

  8. Precise clock synchronization protocol

    NASA Astrophysics Data System (ADS)

    Luit, E. J.; Martin, J. M. M.

    1993-12-01

    A distributed clock synchronization protocol is presented which achieves a very high precision without the need for very frequent resynchronizations. The protocol tolerates failures of the clocks: clocks may be too slow or too fast, exhibit omission failures and report inconsistent values. Synchronization takes place in synchronization rounds as in many other synchronization protocols. At the end of each round, clock times are exchanged between the clocks. Each clock applies a convergence function (CF) to the values obtained. This function estimates the difference between its clock and an average clock and corrects its clock accordingly. Clocks are corrected for drift relative to this average clock during the next synchronization round. The protocol is based on the assumption that clock reading errors are small with respect to the required precision of synchronization. It is shown that the CF resynchronizes the clocks with high precision even when relatively large clock drifts are possible. It is also shown that the drift-corrected clocks remain synchronized until the end of the next synchronization round. The stability of the protocol is proven.

  9. InterGroup Protocols

    2003-04-02

    Existing reliable ordered group communication protocols have been developed for local-area networks and do not in general scale well to a large number of nodes and wide-area networks. The InterGroup suite of protocols is a scalable group communication system that introduces an unusual approach to handling group membership, and supports a receiver-oriented selection of service. The protocols are intended for a wide-area network, with a large number of nodes, that has highly variable delays andmore » a high message loss rate, such as the Internet. The levels of the message delivery service range from unreliable unordered to reliable timestamp ordered.« less

  10. Optimal protocols for nonlocality distillation

    SciTech Connect

    Hoeyer, Peter; Rashid, Jibran

    2010-10-15

    Forster et al. recently showed that weak nonlocality can be amplified by giving the first protocol that distills a class of nonlocal boxes (NLBs) [Phys. Rev. Lett. 102, 120401 (2009)] We first show that their protocol is optimal among all nonadaptive protocols. We next consider adaptive protocols. We show that the depth-2 protocol of Allcock et al. [Phys. Rev. A 80, 062107 (2009)] performs better than previously known adaptive depth-2 protocols for all symmetric NLBs. We present a depth-3 protocol that extends the known region of distillable NLBs. We give examples of NLBs for which each of the Forster et al., the Allcock et al., and our protocols perform best. The understanding we develop is that there is no single optimal protocol for NLB distillation. The choice of which protocol to use depends on the noise parameters for the NLB.

  11. WOODSTOVE DURABILITY TESTING PROTOCOL

    EPA Science Inventory

    The report discusses the development of an accelerated laboratory test to simulate in-home woodstove aging and degradation. nown as a stress test, the protocol determines the long-term durability of woodstove models in a 1- to 2-week time frame. wo avenues of research have been t...

  12. Médecine des voyages

    PubMed Central

    Aw, Brian; Boraston, Suni; Botten, David; Cherniwchan, Darin; Fazal, Hyder; Kelton, Timothy; Libman, Michael; Saldanha, Colin; Scappatura, Philip; Stowe, Brian

    2014-01-01

    Résumé Objectif Définir la pratique de la médecine des voyages, présenter les éléments fondamentaux d’une consultation complète préalable aux voyages à des voyageurs internationaux et aider à identifier les patients qu’il vaudrait mieux envoyer en consultation auprès de professionnels de la médecine des voyages. Sources des données Les lignes directrices et les recommandations sur la médecine des voyages et les maladies liées aux voyages publiées par les autorités sanitaires nationales et internationales ont fait l’objet d’un examen. Une recension des ouvrages connexes dans MEDLINE et EMBASE a aussi été effectuée. Message principal La médecine des voyages est une spécialité très dynamique qui se concentre sur les soins préventifs avant un voyage. Une évaluation exhaustive du risque pour chaque voyageur est essentielle pour mesurer avec exactitude les risques particuliers au voyageur, à son itinéraire et à sa destination et pour offrir des conseils sur les interventions les plus appropriées en gestion du risque afin de promouvoir la santé et prévenir les problèmes médicaux indésirables durant le voyage. Des vaccins peuvent aussi être nécessaires et doivent être personnalisés en fonction des antécédents d’immunisation du voyageur, de son itinéraire et du temps qu’il reste avant son départ. Conclusion La santé et la sécurité d’un voyageur dépendent du degré d’expertise du médecin qui offre le counseling préalable à son voyage et les vaccins, au besoin. On recommande à ceux qui donnent des conseils aux voyageurs d’être conscients de l’ampleur de cette responsabilité et de demander si possible une consultation auprès de professionnels de la médecine des voyages pour tous les voyageurs à risque élevé.

  13. Protocols for distributive scheduling

    NASA Technical Reports Server (NTRS)

    Richards, Stephen F.; Fox, Barry

    1993-01-01

    The increasing complexity of space operations and the inclusion of interorganizational and international groups in the planning and control of space missions lead to requirements for greater communication, coordination, and cooperation among mission schedulers. These schedulers must jointly allocate scarce shared resources among the various operational and mission oriented activities while adhering to all constraints. This scheduling environment is complicated by such factors as the presence of varying perspectives and conflicting objectives among the schedulers, the need for different schedulers to work in parallel, and limited communication among schedulers. Smooth interaction among schedulers requires the use of protocols that govern such issues as resource sharing, authority to update the schedule, and communication of updates. This paper addresses the development and characteristics of such protocols and their use in a distributed scheduling environment that incorporates computer-aided scheduling tools. An example problem is drawn from the domain of space shuttle mission planning.

  14. Generalized teleportation protocol

    SciTech Connect

    Gordon, Goren; Rigolin, Gustavo

    2006-04-15

    A generalized teleportation protocol (GTP) for N qubits is presented, where the teleportation channels are nonmaximally entangled and all the free parameters of the protocol are considered: Alice's measurement basis, her sets of acceptable results, and Bob's unitary operations. The full range of fidelity (F) of the teleported state and the probability of success (P{sub suc}) to obtain a given fidelity are achieved by changing these free parameters. A channel efficiency bound is found, where one can determine how to divide it between F and P{sub suc}. A one-qubit formulation is presented and then expanded to N qubits. A proposed experimental setup that implements the GTP is given using linear optics.

  15. Dysphonia risk screening protocol

    PubMed Central

    Nemr, Katia; Simões-Zenari, Marcia; da Trindade Duarte, João Marcos; Lobrigate, Karen Elena; Bagatini, Flavia Alves

    2016-01-01

    OBJECTIVE: To propose and test the applicability of a dysphonia risk screening protocol with score calculation in individuals with and without dysphonia. METHOD: This descriptive cross-sectional study included 365 individuals (41 children, 142 adult women, 91 adult men and 91 seniors) divided into a dysphonic group and a non-dysphonic group. The protocol consisted of 18 questions and a score was calculated using a 10-cm visual analog scale. The measured value on the visual analog scale was added to the overall score, along with other partial scores. Speech samples allowed for analysis/assessment of the overall degree of vocal deviation and initial definition of the respective groups and after six months, the separation of the groups was confirmed using an acoustic analysis. RESULTS: The mean total scores were different between the groups in all samples. Values ranged between 37.0 and 57.85 in the dysphonic group and between 12.95 and 19.28 in the non-dysphonic group, with overall means of 46.09 and 15.55, respectively. High sensitivity and specificity were demonstrated when discriminating between the groups with the following cut-off points: 22.50 (children), 29.25 (adult women), 22.75 (adult men), and 27.10 (seniors). CONCLUSION: The protocol demonstrated high sensitivity and specificity in differentiating groups of individuals with and without dysphonia in different sample groups and is thus an effective instrument for use in voice clinics. PMID:27074171

  16. Mars Communication Protocols

    NASA Technical Reports Server (NTRS)

    Kazz, G. J.; Greenberg, E.

    2000-01-01

    Over the next decade, international plans and commitments are underway to develop an infrastructure at Mars to support future exploration of the red planet. The purpose of this infrastructure is to provide reliable global communication and navigation coverage for on-approach, landed, roving, and in-flight assets at Mars. The claim is that this infrastructure will: 1) eliminate the need of these assets to carry Direct to Earth (DTE) communications equipment, 2) significantly increase data return and connectivity, 3) enable small mission exploration of Mars without DTE equipment, 4) provide precision navigation i.e., 10 to 100m position resolution, 5) supply timing reference accurate to 10ms. This paper in particular focuses on two CCSDS recommendations for that infrastructure: CCSDS Proximity-1 Space Link Protocol and CCSDS File Delivery Protocol (CFDP). A key aspect of Mars exploration will be the ability of future missions to interoperate. These protocols establish a framework for interoperability by providing standard communication, navigation, and timing services. In addition, these services include strategies to recover gracefully from communication interruptions and interference while ensuring backward compatibility with previous missions from previous phases of exploration.

  17. Satellite Communications Using Commercial Protocols

    NASA Technical Reports Server (NTRS)

    Ivancic, William D.; Griner, James H.; Dimond, Robert; Frantz, Brian D.; Kachmar, Brian; Shell, Dan

    2000-01-01

    NASA Glenn Research Center has been working with industry, academia, and other government agencies in assessing commercial communications protocols for satellite and space-based applications. In addition, NASA Glenn has been developing and advocating new satellite-friendly modifications to existing communications protocol standards. This paper summarizes recent research into the applicability of various commercial standard protocols for use over satellite and space- based communications networks as well as expectations for future protocol development. It serves as a reference point from which the detailed work can be readily accessed. Areas that will be addressed include asynchronous-transfer-mode quality of service; completed and ongoing work of the Internet Engineering Task Force; data-link-layer protocol development for unidirectional link routing; and protocols for aeronautical applications, including mobile Internet protocol routing for wireless/mobile hosts and the aeronautical telecommunications network protocol.

  18. Robust Optimization of Biological Protocols

    PubMed Central

    Flaherty, Patrick; Davis, Ronald W.

    2015-01-01

    When conducting high-throughput biological experiments, it is often necessary to develop a protocol that is both inexpensive and robust. Standard approaches are either not cost-effective or arrive at an optimized protocol that is sensitive to experimental variations. We show here a novel approach that directly minimizes the cost of the protocol while ensuring the protocol is robust to experimental variation. Our approach uses a risk-averse conditional value-at-risk criterion in a robust parameter design framework. We demonstrate this approach on a polymerase chain reaction protocol and show that our improved protocol is less expensive than the standard protocol and more robust than a protocol optimized without consideration of experimental variation. PMID:26417115

  19. Overview of wideband packet protocols

    NASA Astrophysics Data System (ADS)

    Sherif, M. H.

    1992-10-01

    Wideband packet networks operate at rates equal to, or higher than, 64 kb/s, but lower than the basic broadband rate of 150 Mb/s, on cables or satellite links. Wideband packet protocols are the transmission protocols for these networks. They define open interfaces that can be used for public and private ISDNs. The protocols are defined in CCITT Recommendations G.764 and G.765. This paper describes the objectives of the wideband protocols, and how the objectives were achieved.

  20. Communication complexity protocols for qutrits

    SciTech Connect

    Tamir, Boaz

    2007-03-15

    Consider a function where its entries are distributed among many parties. Suppose each party is allowed to send only a limited amount of information to a referee. The referee can use a classical protocol to compute the value of the global function. Is there a quantum protocol improving the results of all classical protocols? In a recent work Brukner et al. showed the deep connection between such problems and the theory of Bell inequalities. Here we generalize the theory to trits. There, the best classical protocol fails whereas the quantum protocol yields the correct answer.

  1. Les Protheses d'Expansion dans le Traitement des Sequelles de Brulures

    PubMed Central

    Tourabi, K.; Ribag, Y.; Arrob, A.; Moussaoui, A.; Ihrai, H.

    2010-01-01

    Summary Les Auteurs présentent leur protocole pour l'expansion cutanée et rapportent quatre cas colligés au service des brûlures de leur hôpital au Maroc. Ils décrivent leur technique opératoire et les résultats obtenus. L'expansion cutanée reste la méthode de choix pour la couverture des pertes de substance étendues et la correction des séquelles de brûlure, et l'expérience rapportée par les Auteurs confirme les bons résultats que l'on peut obtenir avec cette technique, y compris les résultats esthétiques. PMID:21991194

  2. Optical Circuit Switched Protocol

    NASA Technical Reports Server (NTRS)

    Monacos, Steve P. (Inventor)

    2000-01-01

    The present invention is a system and method embodied in an optical circuit switched protocol for the transmission of data through a network. The optical circuit switched protocol is an all-optical circuit switched network and includes novel optical switching nodes for transmitting optical data packets within a network. Each optical switching node comprises a detector for receiving the header, header detection logic for translating the header into routing information and eliminating the header, and a controller for receiving the routing information and configuring an all optical path within the node. The all optical path located within the node is solely an optical path without having electronic storage of the data and without having optical delay of the data. Since electronic storage of the header is not necessary and the initial header is eliminated by the first detector of the first switching node. multiple identical headers are sent throughout the network so that subsequent switching nodes can receive and read the header for setting up an optical data path.

  3. Protocol Architecture Model Report

    NASA Technical Reports Server (NTRS)

    Dhas, Chris

    2000-01-01

    NASA's Glenn Research Center (GRC) defines and develops advanced technology for high priority national needs in communications technologies for application to aeronautics and space. GRC tasked Computer Networks and Software Inc. (CNS) to examine protocols and architectures for an In-Space Internet Node. CNS has developed a methodology for network reference models to support NASA's four mission areas: Earth Science, Space Science, Human Exploration and Development of Space (REDS), Aerospace Technology. This report applies the methodology to three space Internet-based communications scenarios for future missions. CNS has conceptualized, designed, and developed space Internet-based communications protocols and architectures for each of the independent scenarios. The scenarios are: Scenario 1: Unicast communications between a Low-Earth-Orbit (LEO) spacecraft inspace Internet node and a ground terminal Internet node via a Tracking and Data Rela Satellite (TDRS) transfer; Scenario 2: Unicast communications between a Low-Earth-Orbit (LEO) International Space Station and a ground terminal Internet node via a TDRS transfer; Scenario 3: Multicast Communications (or "Multicasting"), 1 Spacecraft to N Ground Receivers, N Ground Transmitters to 1 Ground Receiver via a Spacecraft.

  4. Peste des petits ruminants.

    PubMed

    Parida, S; Muniraju, M; Mahapatra, M; Muthuchelvan, D; Buczkowski, H; Banyard, A C

    2015-12-14

    Peste des petits ruminants virus causes a highly infectious disease of small ruminants that is endemic across Africa, the Middle East and large regions of Asia. The virus is considered to be a major obstacle to the development of sustainable agriculture across the developing world and has recently been targeted by the World Organisation for Animal Health (OIE) and the Food and Agriculture Organisation (FAO) for eradication with the aim of global elimination of the disease by 2030. Fundamentally, the vaccines required to successfully achieve this goal are currently available, but the availability of novel vaccine preparations to also fulfill the requisite for differentiation between infected and vaccinated animals (DIVA) may reduce the time taken and the financial costs of serological surveillance in the later stages of any eradication campaign. Here, we overview what is currently known about the virus, with reference to its origin, updated global circulation, molecular evolution, diagnostic tools and vaccines currently available to combat the disease. Further, we comment on recent developments in our knowledge of various recombinant vaccines and on the potential for the development of novel multivalent vaccines for small ruminants.

  5. Peste des petits ruminants.

    PubMed

    Parida, S; Muniraju, M; Mahapatra, M; Muthuchelvan, D; Buczkowski, H; Banyard, A C

    2015-12-14

    Peste des petits ruminants virus causes a highly infectious disease of small ruminants that is endemic across Africa, the Middle East and large regions of Asia. The virus is considered to be a major obstacle to the development of sustainable agriculture across the developing world and has recently been targeted by the World Organisation for Animal Health (OIE) and the Food and Agriculture Organisation (FAO) for eradication with the aim of global elimination of the disease by 2030. Fundamentally, the vaccines required to successfully achieve this goal are currently available, but the availability of novel vaccine preparations to also fulfill the requisite for differentiation between infected and vaccinated animals (DIVA) may reduce the time taken and the financial costs of serological surveillance in the later stages of any eradication campaign. Here, we overview what is currently known about the virus, with reference to its origin, updated global circulation, molecular evolution, diagnostic tools and vaccines currently available to combat the disease. Further, we comment on recent developments in our knowledge of various recombinant vaccines and on the potential for the development of novel multivalent vaccines for small ruminants. PMID:26443889

  6. Peste des petits ruminants

    PubMed Central

    Parida, S.; Muniraju, M.; Mahapatra, M.; Muthuchelvan, D.; Buczkowski, H.; Banyard, A.C.

    2015-01-01

    Peste des petits ruminants virus causes a highly infectious disease of small ruminants that is endemic across Africa, the Middle East and large regions of Asia. The virus is considered to be a major obstacle to the development of sustainable agriculture across the developing world and has recently been targeted by the World Organisation for Animal Health (OIE) and the Food and Agriculture Organisation (FAO) for eradication with the aim of global elimination of the disease by 2030. Fundamentally, the vaccines required to successfully achieve this goal are currently available, but the availability of novel vaccine preparations to also fulfill the requisite for differentiation between infected and vaccinated animals (DIVA) may reduce the time taken and the financial costs of serological surveillance in the later stages of any eradication campaign. Here, we overview what is currently known about the virus, with reference to its origin, updated global circulation, molecular evolution, diagnostic tools and vaccines currently available to combat the disease. Further, we comment on recent developments in our knowledge of various recombinant vaccines and on the potential for the development of novel multivalent vaccines for small ruminants. PMID:26443889

  7. Place de la bili-IRM dans le diagnostic etiologique des icteres cholestatiques à Dakar

    PubMed Central

    Badji, Nfally; Akpo, Geraud; Deme, Hamidou; Toure, Mouhamadou Hamine; Ly, Mamadou; Ndong, Boucar; Niang, El Hadji

    2016-01-01

    La Bili-IRM est une méthode diagnostique d’introduction relativement récente dans l’arsenal d’exploration de la pathologie bilio-pancréatique. Il s’agit d’une technique fiable reproductible et non invasive, permettant la visualisation directe des voies biliaires et pancréatiques. Le but de ce travail était d’étudier les aspects morphologiques des principales anomalies et d’évaluer la place de la bili-IRM dans le diagnostic étiologique des ictères cholestatiques. Il s’agit d’une étude rétrospective réalisée sur 4 ans et six mois (Janvier 2008 à Juillet 2012) portant sur 17 patients colligés dans les services d’imagerie médicale du CHUN de Fann et de l’hôpital Principal de Dakar. Tous les patients ont bénéficié d’une IRM (1,5T) avec des protocoles adaptés en fonction de la pathologie explorée. Les dossiers retenus sont ceux dont le diagnostic a été établi à partir du bilan biologique et ayant bénéficié à la fois d’une bili-IRM et d’une exploration chirurgicale. Il s’agissait de 05 femmes et de 12 hommes soit un sexe ratio de 2.4. L’âge moyen des patients était de 58 ans avec des extrêmes de 35 et 81 ans. Les tumeurs de Klatskin étaient observées chez 07 patients avec une forme infiltrante dans 71% des cas et une forme exophytique dans 28% des cas. Les cancers de la vésicule biliaire étaient notés dans 28% des cas. Les cancers de la tête du pancréas représentaient 28% des cas. La lithiase de la voie biliaire principale était présente chez 05 patients avec un empierrement cholédocien dans 60% des cas et une lithiase unique dans 40% des cas. Toutes ces lésions étaient responsables d’une dilatation des VBIH. Un cas de dilatation des voies biliaires intra et extra hépatiques était retrouvé sans cause bilio-pancréatique. La bili-IRM est l’examen de choix dans l’exploration des ictères cholestatiques. Elle doit être demandée en première intention lorsqu’on suspecte une lithiase r

  8. Licklider Transmission Protocol Implementation

    NASA Technical Reports Server (NTRS)

    Burleigh, Scott C.; Krupiarz, Chris

    2011-01-01

    This software is an implementation of the Licklider Transmission Protocol (LTP), a communications protocol intended to support the Bundle Protocol in Delay-Tolerant Network (DTN) operations. LTP is designed to provide retransmission-based reliability over links characterized by extremely long message round-trip times and/or frequent interruptions in connectivity. Communication in interplanetary space is the most prominent example of this sort of environment, and LTP is principally aimed at supporting long-haul reliable transmission over deep-space RF links. Like any reliable transport service employing ARQ (Automatic Repeat re-Quests), LTP is stateful. In order to assure the reception of a block of data it has sent, LTP must retain for possible retransmission all portions of that block which might not have been received yet. In order to do so, it must keep track of which portions of the block are known to have been received so far, and which are not, together with any additional information needed for purposes of retransmitting part, or all, of the block. Long round-trip times mean substantial delay between the transmission of a block of data and the reception of an acknowledgement from the block s destination, signaling arrival of the block. If LTP postponed transmission of additional blocks of data until it received acknowledgement of the arrival of all prior blocks, valuable opportunities to use what little deep space transmission bandwidth is available would be forever lost. For this reason, LTP is based in part on a notion of massive state retention. Any number of requested transmission conversations (sessions) may be concurrently in flight at various displacements along the link between two LTP engines, and the LTP engines must necessarily retain transmission status and retransmission resources for all of them. Moreover, if any of the data of a given block are lost en route, it will be necessary to retain the state of that transmission during an additional

  9. Clinical Protocol Information System

    PubMed Central

    Wirtschafter, David D.; Gams, Richard; Ferguson, Carol; Blackwell, William; Boackle, Paul

    1980-01-01

    The Clinical Protocol Information System (CPIS) supports the clinical research and patient care objectives of the SouthEastern Cancer Study Group (SEG). The information system goals are to improve the evaluability of clinical trials, decrease the frequency of adverse patient events, implement drug toxicity surveillance, improve the availability of study data and demonstrate the criteria for computer networks that can impact on the general medical care of the community. Nodes in the network consist of Data General MicroNova MP-100 minicomputers that drive the interactive data dialogue and communicate with the network concentrator (another DG MicroNova) in Birmingham. Functions supported include: source data editing, care “advice,” care “audit,” care “explanation,” and treatment note printing. The complete database is updated nightly and resides on UAB's IBM 370/158-AP.

  10. Outcome of and prognostic factors for relapse in children and adolescents with mature B-cell lymphoma and leukemia treated in three consecutive prospective “Lymphomes Malins B” protocols. A Société Française des Cancers de l’Enfant study

    PubMed Central

    Jourdain, Anne; Auperin, Anne; Minard-Colin, Véronique; Aladjidi, Nathalie; Zsiros, Josef; Coze, Carole; Gandemer, Virginie; Bertrand, Yves; Leverger, Guy; Bergeron, Christophe; Michon, Jean; Patte, Catherine

    2015-01-01

    To describe relapsed B-cell lymphoma or leukemia in children/adolescents treated with a “Lymphomes Malins B” regimen and their outcome and to identify prognostic factors for survival, we studied relapses in the LMB89, 96 and 2001 studies of the Société Française d’Oncologie Pédiatrique (Société Française des Cancers de l’Enfant). Therapeutic guidelines at relapse were to obtain a second complete remission and to consolidate the remission with high-dose chemotherapy followed by autologous stem-cell transplantation. Between July 1989 and March 2007, 67 patients of 1322 (5%) relapsed: 57 had Burkitt lymphoma and 10 had large-cell histology. Three patients were initially treated in risk group A, 41 in group B and 23 in group C. Thirty-three patients had a relapse in one site (15 in the central nervous system) and 34 at multiple sites. Sixty-five patients received salvage chemotherapy and 33 achieved complete remission. Forty-one patients also received high-dose chemotherapy followed by autologous (n=33) or allogeneic (n=8) transplantation. With a median follow-up of 6.4 years, the 5-year survival rate was 29.9%. Nineteen patients were still alive, all but one (group A) received consolidation treatment. Multivariate analysis showed the following factors to be significantly associated with better survival: relapse at one site (P=0.0006), large-cell histology (P=0.012), initial prognostic group A or B with lactate dehydrogenase level below twice the normal value (P=0.005), and time to relapse more than 6 months (P=0.04). PMID:25724577

  11. Indoor air quality investigation protocols

    SciTech Connect

    Greene, R.E.; Williams, P.L.

    1996-10-01

    Over the past 10 to 15 years, an increasing number of complaints about discomfort and health effects related to indoor air quality (IAQ) have been reported. The increase in complaints has been accompanied by an increase in requests for IAQ investigations. This study presents an overview of the many IAQ investigation protocols published since 1984. For analysis, the protocols are divided into four categories: solution-oriented, building diagnostics, industrial hygiene, and epidemiology. In general, the protocols begin with general observations, proceed to collect more specific data as indicated, and end with conclusions and recommendations. A generic IAQ protocol is presented that incorporates the common aspects of the various protocols. All of the current protocols place heavy emphasis on the ventilation system during the investigation. A major problem affecting all of the current protocols is the lack of generally accepted IAQ standards. IN addition, the use of questionnaires, occupant interviews, and personal diaries (as well as the point in the investigation at which they are administered) differs among the protocols. Medical evaluations and verification procedures also differ among the protocols.

  12. Etude des Abondances de MG et de fe dans la Composante Stellaire des Disques des Galaxies Spirales

    NASA Astrophysics Data System (ADS)

    Beauchamp, Dominique

    Je presente ici une technique d'observation par imagerie des disques stellaires des galaxies spirales. Je tente, a l'aide d'un modele evolutif multiphase, de determiner les abondances de fer et de magnesium dans les disques. Dans ce but, je mesure les indices Mg2 et Fe5270 du systeme de Lick. Ces elements representent un choix judicieux d'indicateurs car ils sont formes par des supernovae de deux types differents ayant des durees de vie differentes. Le rapport d'abondances de ces deux elements est un indicateur du taux de formation des populations stellaires. Je decris, en premier lieu, les observations, la technique de mesure, ainsi que son application. J'analyse ensuite les indices mesures. A partir du modele multiphase, j'explore differents parametres physiques des spirales comme le taux de formation stellaire, l'evolution des abondances, les effets possibles de la presence de la barre, etc.

  13. Classification of 20 DES Supernova with OzDES

    NASA Astrophysics Data System (ADS)

    Davis, T. M.; Kim, A. G.; Macualay, E.; Lidman, C.; Sharp, R.; Tucker, B. E.; Yuan, F.; Zhang, B.; Lewis, G. F.; Sommer, N. E.; Martini, P.; Mould, J.; Ahn, E.; Finley, D. A.; Frieman, J.; Marriner, J.; Wester, W.; Aldering, G.; Thomas, R. C.; Barbary, K.; Bloom, J. S.; Goldstein, D.; Nugent, P.; Perlmutter, S.; Foley, R. J.; Pan, Y.-C.; Casas, R.; Castander, F. J.; Desai, S.; Paech, K.; Smith, R. C.; Schubnell, M.; Kessler, R.; Lasker, J.; Scolnic, D.; Brout, D. J.; Gladney, L.; Sako, M.; Wolf, R. C.; Brown, P. J.; Krisciunas, K.; Suntzeff, N.; Nichol, R.; Papadopoulos, A.; Childress, M.; D'Andrea, C.; Smith, M.; Sullivan, M.; Maartens, R.; Gupta, R.; Kovacs, E.; Kuhlmann, S.; Spinka, H.

    2015-12-01

    We report new spectroscopic classifications by OzDES of supernovae discovered by the Dark Energy Survey (ATEL #4668). The spectra (370-885nm) were obtained with the AAOmega Spectrograph (Saunders et al. 2004, SPIE, 5492, 389) and the 2dF fibre positioner at the Anglo-Australian Telescope (AAT).

  14. Classification of 8 DES Supernova with OzDES

    NASA Astrophysics Data System (ADS)

    King, A.; Moller, A.; Sommer, N. E.; Tucker, B. E.; Childress, M. J.; Lewis, G. F.; Lidman, C.; OâNeill, C.; Casas, R.; Castander, F. J.; Desai, S.; Paech, K.; Smith, R. C.; Schubnell, M.; Kessler, R.; Lasker, J.; Scolnic, D.; Brout, D. J.; Gladney, L.; Sako, M.; Wolf, R. C.; Brown, P. J.; Krisciunas, K.; Suntzeff, N.; Nichol, R.; Papadopoulos, A.; D'Andrea, C.; Prajs, S.; Smith, M.; Sullivan, M.; Maartens, R.; Gupta, R.; Kovacs, E.; Kuhlmann, S.; Spinka, H.; Ahn, E.; Finley, D. A.; Frieman, J.; Marriner, J.; Wester, W.; Aldering, G.; Kim, A. G.; Thomas, R. C.; Barbary, K.; Bloom, J. S.; Goldstein, D.; Nugent, P.; Perlmutter, S.; Foley, R. J.; Pan, Y.-C.

    2016-09-01

    We report new spectroscopic classifications by OzDES of supernovae discovered by the Dark Energy Survey (ATEL #4668). The spectra (370-885nm) were obtained with the AAOmega Spectrograph (Saunders et al. 2004, SPIE, 5492, 389) and the 2dF fibre positioner at the Anglo-Australian Telescope (AAT).

  15. Classification of 13 DES supernova with OzDES

    NASA Astrophysics Data System (ADS)

    Sommer, N.; Tucker, B. E.; Moller, A.; Zhang, B.; Macualay, E.; Lidman, C.; Gshwend, J.; Martini, P.; Foley, R. J.; Pan, Y.-C.; Casas, R.; Castander, F. J.; Desai, S.; Paech, K.; Smith, R. C.; Schubnell, M.; Kessler, R.; Lasker, J.; Scolnic, D.; Brout, D. J.; Gladney, L.; Sako, M.; Wolf, R. C.; Brown, P. J.; Krisciunas, K.; Suntzeff, N.; Nichol, R.; Papadopoulos, A.; Childress, M.; D'Andrea, C.; Prajs, S.; Smith, M.; Sullivan, M.; Maartens, R.; Gupta, R.; Kovacs, E.; Kuhlmann, S.; Spinka, H.; Ahn, E.; Finley, D. A.; Frieman, J.; Marriner, J.; Wester, W.; Aldering, G.; Kim, A. G.; Thomas, R. C.; Barbary, K.; Bloom, J. S.; Goldstein, D.; Nugent, P.; Perlmutter, S.

    2016-09-01

    We report new spectroscopic classifications by OzDES of supernovae discovered by the Dark Energy Survey (ATEL #4668). The spectra (370-885nm) were obtained with the AAOmega Spectrograph (Saunders et al. 2004, SPIE, 5492, 389) and the 2dF fibre positioner at the Anglo-Australian Telescope (AAT).

  16. Classification of 3 DES Supernovae with OzDES

    NASA Astrophysics Data System (ADS)

    Moller, A.; Tucker, B. E.; Yuan, F.; Lewis, G.; Lidman, C.; Macaulay, E.; Nichol, R.; Papadopoulos, A.; Childress, M.; D'Andrea, C.; Smith, M.; Sullivan, M.; Maartens, R.; Gupta, R.; Kovacs, E.; Kuhlmann, S.; Spinka, H.; Ahn, E.; Finley, D. A.; Frieman, J.; Marriner, J.; Wester, W.; Aldering, G.; Kim, A. G.; Thomas, R. C.; Barbary, K.; Bloom, J. S.; Goldstein, D.; Nugent, P.; Perlmutter, S.; Foley, R. J.; Pan, Y.-C.; Casas, R.; Castander, F. J.; Desai, S.; Paech, K.; Smith, R. C.; Schubnell, M.; Kessler, R.; Lasker, J.; Scolnic, D.; Brout, D. J.; Gladney, L.; Sako, M.; Wolf, R. C.; Brown, P. J.; Krisciunas, K.; Suntzeff, N.

    2016-02-01

    We report new spectroscopic classifications by OzDES of supernovae discovered by the Dark Energy Survey (ATEL #4668). The spectra (370-885nm) were obtained with the AAOmega Spectrograph (Saunders et al. 2004, SPIE, 5492, 389) and the 2dF fibre positioner at the Anglo-Australian Telescope (AAT).

  17. Classification of 2 DES supernova with OzDES

    NASA Astrophysics Data System (ADS)

    O'Neill, C. R.; Moller, A.; Sommer, N. E.; Tucker, B. E.; Childress, M. J.; Lewis, G. F.; Lidman, C.; Desai, S.; Paech, K.; Smith, R. C.; Schubnell, M.; Kessler, R.; Lasker, J.; Scolnic, D.; Brout, D. J.; D'Andrea, C.; Gladney, L.; March, M.; Sako, M.; Wolf, R. C.; Brown, P. J.; Krisciunas, K.; Suntzeff, N.; Macaulay, E.; Nichol, R.; Prajs, S.; Smith, M.; Sullivan, M.; Maartens, R.; Kovacs, E.; Kuhlmann, S.; Spinka, H.; Ahn, E.; Finley, D. A.; Frieman, J.; Marriner, J.; Wester, W.; Aldering, G.; Kim, A. G.; Thomas, R. C.; Barbary, K.; Bloom, J. S.; Goldstein, D.; Gupta, R.; Nugent, P.; Perlmutter, S.; Foley, R. J.; Pan, Y.-C.; Casas, R.; Castander, F. J.; Papadopoulos, A.; Morganson, E.

    2016-10-01

    We report new spectroscopic classifications by OzDES of supernovae discovered by the Dark Energy Survey (ATEL #4668). The spectra (370-885nm) were obtained with the AAOmega Spectrograph (Saunders et al. 2004, SPIE, 5492, 389) and the 2dF fibre positioner at the Anglo-Australian Telescope (AAT).

  18. Publishing protocols for partnered research.

    PubMed

    Hysong, Sylvia J; Woodard, LeChauncy; Garvin, Jennifer H; Murawsky, Jeffrey; Petersen, Laura A

    2014-12-01

    Published scientific protocols are advocated as a means of controlling bias in research reporting. Indeed, many journals require a study protocol with manuscript submission. However, publishing protocols of partnered research (PPR) can be challenging in light of the research model's dynamic nature, especially as no current reporting standards exist. Nevertheless, as these protocols become more prevalent, a priori documentation of methods in partnered research studies becomes increasingly important. Using as illustration a suite of studies aimed at improving coordination and communication in the primary care setting, we sought to identify challenges in publishing PPR relative to traditional designs, present alternative solutions to PPR publication, and propose an initial checklist of content to be included in protocols of partnered research. Challenges to publishing PPR include reporting details of research components intended to be co-created with operational partners, changes to sampling and entry strategy, and alignment of scientific and operational goals. Proposed solutions include emulating reporting standards of qualitative research, participatory action research, and adaptive trial designs, as well as embracing technological tools that facilitate publishing adaptive protocols, with version histories that are able to be updated as major protocol changes occur. Finally, we present a proposed checklist of reporting elements for partnered research protocols. PMID:25355092

  19. The simulation of communication protocols

    NASA Astrophysics Data System (ADS)

    de Carvalho Viola, F. E.

    1985-12-01

    Simulators for communication protocols specified in the ESTELLE and LC/1 languages are developed. The general principles of protocol simulation are reviewed; ESTELLE and LC/1 are characterized; a prototype LC/1 simulator based on predicate Petri nets is described; and a detailed specification for a driving interface for an ESTELLE simulator is given.

  20. Publishing protocols for partnered research.

    PubMed

    Hysong, Sylvia J; Woodard, LeChauncy; Garvin, Jennifer H; Murawsky, Jeffrey; Petersen, Laura A

    2014-12-01

    Published scientific protocols are advocated as a means of controlling bias in research reporting. Indeed, many journals require a study protocol with manuscript submission. However, publishing protocols of partnered research (PPR) can be challenging in light of the research model's dynamic nature, especially as no current reporting standards exist. Nevertheless, as these protocols become more prevalent, a priori documentation of methods in partnered research studies becomes increasingly important. Using as illustration a suite of studies aimed at improving coordination and communication in the primary care setting, we sought to identify challenges in publishing PPR relative to traditional designs, present alternative solutions to PPR publication, and propose an initial checklist of content to be included in protocols of partnered research. Challenges to publishing PPR include reporting details of research components intended to be co-created with operational partners, changes to sampling and entry strategy, and alignment of scientific and operational goals. Proposed solutions include emulating reporting standards of qualitative research, participatory action research, and adaptive trial designs, as well as embracing technological tools that facilitate publishing adaptive protocols, with version histories that are able to be updated as major protocol changes occur. Finally, we present a proposed checklist of reporting elements for partnered research protocols.

  1. L'astronomie des Anciens

    NASA Astrophysics Data System (ADS)

    Nazé, Yaël

    2009-04-01

    Quelle que soit la civilisation à laquelle il appartient, l'être humain cherche dans le ciel des réponses aux questions qu'il se pose sur son origine, son avenir et sa finalité. Le premier mérite de ce livre est de nous rappeler que l'astronomie a commencé ainsi à travers les mythes célestes imaginés par les Anciens pour expliquer l'ordre du monde et la place qu'ils y occupaient. Mais les savoirs astronomiques passés étaient loin d'être négligeables et certainement pas limités aux seuls travaux des Grecs : c'est ce que l'auteur montre à travers une passionnante enquête, de Stonehenge à Gizeh en passant par Pékin et Mexico, fondée sur l'étude des monuments anciens et des sources écrites encore accessibles. Les tablettes mésopotamiennes, les annales chinoises, les chroniques médiévales, etc. sont en outre d'une singulière utilité pour les astronomes modernes : comment sinon remonter aux variations de la durée du jour au cours des siècles, ou percer la nature de l'explosion qui a frappé tant d'observateurs en 1054 ? Ce livre offre un voyage magnifiquement illustré à travers les âges, entre astronomie et archéologie.

  2. Protocols.io: Virtual Communities for Protocol Development and Discussion.

    PubMed

    Teytelman, Leonid; Stoliartchouk, Alexei; Kindler, Lori; Hurwitz, Bonnie L

    2016-08-01

    The detailed know-how to implement research protocols frequently remains restricted to the research group that developed the method or technology. This knowledge often exists at a level that is too detailed for inclusion in the methods section of scientific articles. Consequently, methods are not easily reproduced, leading to a loss of time and effort by other researchers. The challenge is to develop a method-centered collaborative platform to connect with fellow researchers and discover state-of-the-art knowledge. Protocols.io is an open-access platform for detailing, sharing, and discussing molecular and computational protocols that can be useful before, during, and after publication of research results.

  3. [Diagnostic protocol and special tests].

    PubMed

    Bellia, M; Pennarola, R

    2008-01-01

    Diagnostic protocol and special tests to ionizing radiations have a preventive function in the medical surveillance of the exposed worker. This protocol must be provided with laboratory and special test assessing fitness for working at the risk of ionizing radiations. The health of workers must be compatible with working conditions and radiation risk. This healthiness of workers is evalued in the time to give an assessment fitness for working at ionizing radiations. For this purpose the basic diagnostic protocol must guarantee minimum information about state of organs and apparatus in addition to the normality of the metabolisms. The diagnostic protocol of the exposed worker to ionizing radiations must be adapted to the specific clinical situation so as to finally make a costs-benefits balance sheet. PMID:19288808

  4. EPA Protocol Gas Verification Program

    EPA Science Inventory

    Accurate compressed gas calibration standards are needed to calibrate continuous emission monitors (CEMs) and ambient air quality monitors that are being used for regulatory purposes. US Environmental Protection Agency (EPA) established its traceability protocol to ensure that co...

  5. QUALITY CONTROL - VARIABILITY IN PROTOCOLS

    EPA Science Inventory

    The EPA Risk Reduction Engineering Laboratory’s Quality Assurance Office, which published the popular pocket guide Preparing Perfect Project Plans, is now introducing another quality assurance reference aid. The document Variability in Protocols (VIP) was initially designed as a ...

  6. Transport quantique dans des nanostructures

    NASA Astrophysics Data System (ADS)

    Naud, C.

    2002-09-01

    structure des oscillations de conductance en fonction du flux du champ magnétique de période h/e dont l'amplitude est beaucoup plus importante que celle mesurée sur un réseau carré de même dimension. Cette différence constitue une signature d'un effet de localisation induit par le champ magnétique sur la topologie mathcal{T}3. Pour des valeurs spécifiques du champ magnétique, du fait des interférences destructives Aharonov-Bohm, la propagation des fonctions d'ondes est limitée à un ensemble fini de cellule du réseau appelé cage. De la dépendance en température des oscillations de période h/e mesurées sur le réseau mathcal{T}3 nous avons tiré une longueur caractéristique qui peut être rattachée au périmètre des cages. Un phénomène inattendu fut l'observation, pour des champs magnétiques plus importants, d'un doublement de fréquence des oscillations. Ces oscillations de période h/2e pouvant avoir une amplitude supérieure aux oscillations de période h/e, une interprétation en terme d'harmonique n'est pas possible. Enfin, l'influence de la largeur électrique des fils constituant le réseau et donc celle du nombre de canaux par brin a été étudiée en réalisant des grilles électrostatique. Les variations de l'amplitude des signaux en h/e et h/2e en fonction de la tension de grille ont été mesurés.

  7. Protocols.io: Virtual Communities for Protocol Development and Discussion

    PubMed Central

    Stoliartchouk, Alexei; Kindler, Lori; Hurwitz, Bonnie L.

    2016-01-01

    The detailed know-how to implement research protocols frequently remains restricted to the research group that developed the method or technology. This knowledge often exists at a level that is too detailed for inclusion in the methods section of scientific articles. Consequently, methods are not easily reproduced, leading to a loss of time and effort by other researchers. The challenge is to develop a method-centered collaborative platform to connect with fellow researchers and discover state-of-the-art knowledge. Protocols.io is an open-access platform for detailing, sharing, and discussing molecular and computational protocols that can be useful before, during, and after publication of research results. PMID:27547938

  8. Protocols.io: Virtual Communities for Protocol Development and Discussion.

    PubMed

    Teytelman, Leonid; Stoliartchouk, Alexei; Kindler, Lori; Hurwitz, Bonnie L

    2016-08-01

    The detailed know-how to implement research protocols frequently remains restricted to the research group that developed the method or technology. This knowledge often exists at a level that is too detailed for inclusion in the methods section of scientific articles. Consequently, methods are not easily reproduced, leading to a loss of time and effort by other researchers. The challenge is to develop a method-centered collaborative platform to connect with fellow researchers and discover state-of-the-art knowledge. Protocols.io is an open-access platform for detailing, sharing, and discussing molecular and computational protocols that can be useful before, during, and after publication of research results. PMID:27547938

  9. Lightweight Distance Bounding Protocol against Relay Attacks

    NASA Astrophysics Data System (ADS)

    Kim, Jin Seok; Cho, Kookrae; Yum, Dae Hyun; Hong, Sung Je; Lee, Pil Joong

    Traditional authentication protocols are based on cryptographic techniques to achieve identity verification. Distance bounding protocols are an enhanced type of authentication protocol built upon both signal traversal time measurement and cryptographic techniques to accomplish distance verification as well as identity verification. A distance bounding protocol is usually designed to defend against the relay attack and the distance fraud attack. As there are applications to which the distance fraud attack is not a serious threat, we propose a streamlined distance bounding protocol that focuses on the relay attack. The proposed protocol is more efficient than previous protocols and has a low false acceptance rate under the relay attack.

  10. A Simple XML Producer-Consumer Protocol

    NASA Technical Reports Server (NTRS)

    Smith, Warren; Gunter, Dan; Quesnel, Darcy

    2000-01-01

    This document describes a simple XML-based protocol that can be used for producers of events to communicate with consumers of events. The protocol described here is not meant to be the most efficient protocol, the most logical protocol, or the best protocol in any way. This protocol was defined quickly and it's intent is to give us a reasonable protocol that we can implement relatively easily and then use to gain experience in distributed event services. This experience will help us evaluate proposals for event representations, XML-based encoding of information, and communication protocols. The next section of this document describes how we represent events in this protocol and then defines the two events that we choose to use for our initial experiments. These definitions are made by example so that they are informal and easy to understand. The following section then proceeds to define the producer-consumer protocol we have agreed upon for our initial experiments.

  11. The Dutch Linguistic Intraoperative Protocol: a valid linguistic approach to awake brain surgery.

    PubMed

    De Witte, E; Satoer, D; Robert, E; Colle, H; Verheyen, S; Visch-Brink, E; Mariën, P

    2015-01-01

    Intraoperative direct electrical stimulation (DES) is increasingly used in patients operated on for tumours in eloquent areas. Although a positive impact of DES on postoperative linguistic outcome is generally advocated, information about the neurolinguistic methods applied in awake surgery is scarce. We developed for the first time a standardised Dutch linguistic test battery (measuring phonology, semantics, syntax) to reliably identify the critical language zones in detail. A normative study was carried out in a control group of 250 native Dutch-speaking healthy adults. In addition, the clinical application of the Dutch Linguistic Intraoperative Protocol (DuLIP) was demonstrated by means of anatomo-functional models and five case studies. A set of DuLIP tests was selected for each patient depending on the tumour location and degree of linguistic impairment. DuLIP is a valid test battery for pre-, intraoperative and postoperative language testing and facilitates intraoperative mapping of eloquent language regions that are variably located.

  12. The Dutch Linguistic Intraoperative Protocol: a valid linguistic approach to awake brain surgery.

    PubMed

    De Witte, E; Satoer, D; Robert, E; Colle, H; Verheyen, S; Visch-Brink, E; Mariën, P

    2015-01-01

    Intraoperative direct electrical stimulation (DES) is increasingly used in patients operated on for tumours in eloquent areas. Although a positive impact of DES on postoperative linguistic outcome is generally advocated, information about the neurolinguistic methods applied in awake surgery is scarce. We developed for the first time a standardised Dutch linguistic test battery (measuring phonology, semantics, syntax) to reliably identify the critical language zones in detail. A normative study was carried out in a control group of 250 native Dutch-speaking healthy adults. In addition, the clinical application of the Dutch Linguistic Intraoperative Protocol (DuLIP) was demonstrated by means of anatomo-functional models and five case studies. A set of DuLIP tests was selected for each patient depending on the tumour location and degree of linguistic impairment. DuLIP is a valid test battery for pre-, intraoperative and postoperative language testing and facilitates intraoperative mapping of eloquent language regions that are variably located. PMID:25526520

  13. Developing protocols for obstetric emergencies.

    PubMed

    Roth, Cheryl K; Parfitt, Sheryl E; Hering, Sandra L; Dent, Sarah A

    2014-01-01

    There is potential for important steps to be missed in emergency situations, even in the presence of many health care team members. Developing a clear plan of response for common emergencies can ensure that no tasks are redundant or omitted, and can create a more controlled environment that promotes positive health outcomes. A multidisciplinary team was assembled in a large community hospital to create protocols that would help ensure optimum care and continuity of practice in cases of postpartum hemorrhage, shoulder dystocia, emergency cesarean surgical birth, eclamptic seizure and maternal code. Assignment of team roles and responsibilities led to the evolution of standardized protocols for each emergency situation.

  14. FTP Extensions for Variable Protocol Specification

    NASA Technical Reports Server (NTRS)

    Allman, Mark; Ostermann, Shawn

    2000-01-01

    The specification for the File Transfer Protocol (FTP) assumes that the underlying network protocols use a 32-bit network address and a 16-bit transport address (specifically IP version 4 and TCP). With the deployment of version 6 of the Internet Protocol, network addresses will no longer be 32-bits. This paper species extensions to FTP that will allow the protocol to work over a variety of network and transport protocols.

  15. Apport de l’IRM dans la prise en charge des compressions médullaires lentes non traumatiques

    PubMed Central

    Badji, Nfally; Deme, Hamidou; Akpo, Geraud; Ndong, Boucar; Toure, Mouhamadou Hamine; Diop, Sokhna Ba; Niang, El Hadji

    2016-01-01

    Les compressions médullaires lentes sont dues au développement dans le canal médullaire d’une lésion expansive. C’est une pathologie très fréquente dont le diagnostic est essentiellement clinique. L’imagerie par résonnance magnétique occupe une place incontournable dans le diagnostic de localisation et la recherche étiologique. En Europe l’étiologie tumorale est prépondérante. Le but de cette étude était de décrire les aspects IRM des compressions médullaires lentes et de déterminer le profil étiologique. Il s’agit d’une étude rétrospective portant sur 97 observations colligées au service de radiologie du CHUN de Fann sur une période de 30 mois (du 08/03/10 au 29/09/12). On été inclus dans l’étude, tous les patients adressés pour un tableau de compression médullaire lente survenu dans un contexte non traumatique. L’âge moyen des patients était de 42,6 ans avec des extrêmes compris entre 04 mois et 85 ans. Nous avons étudié la topographie des lésions (étage rachidien, compartiments canalaires) leur rehaussement et les critères d’orientation étiologique. Le protocole d’examen permettait la réalisation de séquence pondérées T1 sans avec injection de gado, T2, STIR et T2 DRIVE centrées sur les niveaux lésionnels ou les zones suspectes. L’IRM a permis de préciser le siège exact et l’étendue des lésions. L’atteinte du rachis dorsal représentait 42% des cas, suivi du rachis cervical avec 32% des cas. Les atteintes lombo-sacrées et pluri-étagées représentaient respectivement 18% et 08% des cas. Les lésions extradurales représentaient 87% des cas, suivi des lésions intradurales extramédullaires avec 08% des cas et des lésions intramédullaires dans 05% des cas. La particularité du profil étiologique de notre étude est la prédominance des épidurites infectieuses et la fréquence relative des épidurites métastatiques comparée aux séries occidentales. L’IRM vertébro-médullaire occupe

  16. Etude des effets du martelage repetitif sur les contraintes residuelles

    NASA Astrophysics Data System (ADS)

    Hacini, Lyes

    L'assemblage par soudage peut engendrer des contraintes residuelles. Ces contraintes provoquent des fissurations prematurees et un raccourcissement de la duree de vie des composants. Dans ce contexte, le martelage robotise est utilise pour relaxer ces contraintes residuelles. Trois volets sont presentes: le premier est l'evaluation des effets des impacts unitaires repetes sur le champ de contraintes developpe dans des plaques d'acier inoxydable austenitique 304L vierges ou contenant des contraintes residuelles initiales. Dans la deuxieme partie de ce projet, le martelage est applique grace au robot SCOMPI. Les contraintes residuelles induites et relaxees par martelage sont ensuite mesurees par la methode des contours, qui a ete adaptee a cet effet. Dans la troisieme partie, le martelage est modelise par la methode des elements finis. Un modele axisymetrique developpe grace au logiciel ANSYS permet de simuler des impacts repetes d'un marteau elastique sur une plaque ayant un comportement elastoplastique.

  17. FIELD SAMPLING PROTOCOLS AND ANALYSIS

    EPA Science Inventory

    I have been asked to speak again to the environmental science class regarding actual research scenarios related to my work at Kerr Lab. I plan to discuss sampling protocols along with various field analyses performed during sampling activities. Many of the students have never see...

  18. A Student Teamwork Induction Protocol

    ERIC Educational Resources Information Center

    Kamau, Caroline; Spong, Abigail

    2015-01-01

    Faulty group processes have harmful effects on performance but there is little research about intervention protocols to pre-empt them in higher education. This naturalistic experiment compared a control cohort with an inducted cohort. The inducted cohort attended a workshop, consultations, elected a leader and used tools (a group log and group…

  19. Bundle Security Protocol for ION

    NASA Technical Reports Server (NTRS)

    Burleigh, Scott C.; Birrane, Edward J.; Krupiarz, Christopher

    2011-01-01

    This software implements bundle authentication, conforming to the Delay-Tolerant Networking (DTN) Internet Draft on Bundle Security Protocol (BSP), for the Interplanetary Overlay Network (ION) implementation of DTN. This is the only implementation of BSP that is integrated with ION.

  20. Ostéosynthèse des fractures des métacarpiens et des phalanges de la main par mini plaque: à propos de 12 cas

    PubMed Central

    Moncef, Erraji; Abdelhafid, Derfoufi; Abdessamad, Kharraji; Omar, Agoumi; Najib, Abdeljaouad; Abdelkrim, Daoudi; Hicham, Yacoubi

    2016-01-01

    Le traitement des fractures instables des métacarpes et des phalanges reste un objet de controverse. Peu de séries ont été rapportées dans la littérature, rendant leur analyse difficile. Nous rapportons une étude rétrospective comportant 12 patients, opérés par cette technique, ayant eu des fractures déplacées des métacarpes ou des phalanges, sur une période de deux ans. Les résultats globaux ont été bons dans 75% des cas, moyenne dans 16,5% des cas et mauvais dans 8,5% des cas. La stabilité du montage par mini plaques des fractures instables des métacarpiens et des phalanges ont permis une mobilisation précoce des articulations de la main, évitant ainsi la raideur. PMID:27800079

  1. Implementation and evaluation of a protocol management system for automated review of CT protocols.

    PubMed

    Grimes, Joshua; Leng, Shuai; Zhang, Yi; Vrieze, Thomas; McCollough, Cynthia

    2016-09-08

    Protocol review is important to decrease the risk of patient injury and increase the consistency of CT image quality. A large volume of CT protocols makes manual review labor-intensive, error-prone, and costly. To address these challenges, we have developed a software system for automatically managing and monitoring CT proto-cols on a frequent basis. This article describes our experiences in the implementation and evaluation of this protocol monitoring system. In particular, we discuss various strategies for addressing each of the steps in our protocol-monitoring workflow, which are: maintaining an accurate set of master protocols, retrieving protocols from the scanners, comparing scanner protocols to master protocols, reviewing flagged differences between the scanner and master protocols, and updating the scanner and/or master protocols. In our initial evaluation focusing only on abdo-men and pelvis protocols, we detected 309 modified protocols in a 24-week trial period. About one-quarter of these modified protocols were determined to contain inappropriate (i.e., erroneous) protocol parameter modifications that needed to be corrected on the scanner. The most frequently affected parameter was the series description, which was inappropriately modified 47 times. Two inappropriate modifications were made to the tube current, which is particularly important to flag as this parameter impacts both radiation dose and image quality. The CT protocol changes detected in this work provide strong motivation for the use of an automated CT protocol quality control system to ensure protocol accuracy and consistency.

  2. Implementation and evaluation of a protocol management system for automated review of CT protocols.

    PubMed

    Grimes, Joshua; Leng, Shuai; Zhang, Yi; Vrieze, Thomas; McCollough, Cynthia

    2016-01-01

    Protocol review is important to decrease the risk of patient injury and increase the consistency of CT image quality. A large volume of CT protocols makes manual review labor-intensive, error-prone, and costly. To address these challenges, we have developed a software system for automatically managing and monitoring CT proto-cols on a frequent basis. This article describes our experiences in the implementation and evaluation of this protocol monitoring system. In particular, we discuss various strategies for addressing each of the steps in our protocol-monitoring workflow, which are: maintaining an accurate set of master protocols, retrieving protocols from the scanners, comparing scanner protocols to master protocols, reviewing flagged differences between the scanner and master protocols, and updating the scanner and/or master protocols. In our initial evaluation focusing only on abdo-men and pelvis protocols, we detected 309 modified protocols in a 24-week trial period. About one-quarter of these modified protocols were determined to contain inappropriate (i.e., erroneous) protocol parameter modifications that needed to be corrected on the scanner. The most frequently affected parameter was the series description, which was inappropriately modified 47 times. Two inappropriate modifications were made to the tube current, which is particularly important to flag as this parameter impacts both radiation dose and image quality. The CT protocol changes detected in this work provide strong motivation for the use of an automated CT protocol quality control system to ensure protocol accuracy and consistency. PMID:27685112

  3. Chapter 14: Chiller Evaluation Protocol

    SciTech Connect

    Tiessen, A.

    2014-09-01

    This protocol defines a chiller measure as a project that directly impacts equipment within the boundary of a chiller plant. A chiller plant encompasses a chiller--or multiple chillers--and associated auxiliary equipment. This protocol primarily covers electric-driven chillers and chiller plants. It does not include thermal energy storage and absorption chillers fired by natural gas or steam, although a similar methodology may be applicable to these chilled water system components. Chillers provide mechanical cooling for commercial, institutional, multiunit residential, and industrial facilities. Cooling may be required for facility heating, ventilation, and air conditioning systems or for process cooling loads (e.g., data centers, manufacturing process cooling). The vapor compression cycle, or refrigeration cycle, cools water in the chilled water loop by absorbing heat and rejecting it to either a condensing water loop (water cooled chillers) or to the ambient air (air-cooled chillers).

  4. Neonatal euthanasia: The Groningen Protocol.

    PubMed

    Vizcarrondo, Felipe E

    2014-11-01

    For the past thirty years, voluntary euthanasia and physician-assisted suicide of adult patients have been common practice in the Netherlands. Neonatal euthanasia was recently legalized in the Netherlands and the Groningen Protocol (GP) was developed to regulate the practice. Supporters claim compliance with the GP criteria makes neonatal euthanasia ethically permissible. An examination of the criteria used by the Protocol to justify the euthanasia of seriously ill neonates reveals the criteria are not based on firm moral principles. The taking of the life of a seriously ill person is not the solution to the pain and suffering of the dying process. It is the role of the medical professional to care for the ailing patient with love and compassion, always preserving the person's dignity. Neonatal euthanasia is not ethically permissible. PMID:25473136

  5. Peste des Petits Ruminants Virus.

    PubMed

    Baron, M D; Diallo, A; Lancelot, R; Libeau, G

    2016-01-01

    Peste des petits ruminants virus (PPRV) causes a severe contagious disease of sheep and goats and has spread extensively through the developing world. Because of its disproportionately large impact on the livelihoods of low-income livestock keepers, and the availability of effective vaccines and good diagnostics, the virus is being targeted for global control and eventual eradication. In this review we examine the origin of the virus and its current distribution, and the factors that have led international organizations to conclude that it is eradicable. We also review recent progress in the molecular and cellular biology of the virus and consider areas where further research is required to support the efforts being made by national, regional, and international bodies to tackle this growing threat. PMID:27112279

  6. Building America House Simulation Protocols

    SciTech Connect

    Hendron, Robert; Engebrecht, Cheryn

    2010-09-01

    The House Simulation Protocol document was developed to track and manage progress toward Building America's multi-year, average whole-building energy reduction research goals for new construction and existing homes, using a consistent analytical reference point. This report summarizes the guidelines for developing and reporting these analytical results in a consistent and meaningful manner for all home energy uses using standard operating conditions.

  7. Cancer risk in DES daughters

    PubMed Central

    Verloop, Janneke; van Leeuwen, Flora E.; Helmerhorst, Theo J. M.; van Boven, Hester H.

    2010-01-01

    Objective We examined long-term risk of cancer in women exposed to diethylstilbestrol (DES) in utero. Methods A total of 12,091 DES-exposed women in the Netherlands were followed prospectively from December 1992 till June 2008. Cancer incidence was assessed through linkage with the Dutch pathology database (PALGA) and the Netherlands Cancer Registry and compared with the Dutch female population. Results A total of 348 medically verified cancers occurred; median age at end of follow-up was 44.0 years. No overall increased risk of cancer was found (standardized incidence ratio [SIR] = 1.01; 95% confidence interval [CI] = 0.91, 1.13). The risk of clear cell adenocarcinoma of the vagina and cervix (CCA) was statistically significantly increased (SIR = 24.23; 95% CI = 8.89, 52.74); the elevated risk persisted above 40 years of age. The risk of melanoma diagnosed before age 40 was increased (SIR = 1.59; 95% CI = 1.08, 2.26). No excess risks were found for other sites, including breast cancer. Conclusions Except for an elevated risk of CCA, persisting at older ages, and an increased risk of melanoma at young ages, we found no increased risk of cancer. Longer follow-up is warranted to examine cancer risk at ages when cancer occurs more frequently. Electronic supplementary material The online version of this article (doi:10.1007/s10552-010-9526-5) contains supplementary material, which is available to authorized users. PMID:20204493

  8. The enhancement of existing DES Maplet interface

    NASA Astrophysics Data System (ADS)

    Abdullah, Nur Lina; Mutalip, Rasidah Abdull; Abdullah, Kamilah

    2014-07-01

    This study pertains to the process of Data Encryption Standard, DES. DES consists of encryption and decryption processes linked with mathematical elements such as algebra and number theory. Preliminary, studies revealed that most of mathematics students face a problem in understanding the complicated process of DES. In modern learning methods, learning environment becomes more interesting with the use of computer and a variety of mathematical software packages. Several mathematical softwares such as Maple, Mathematica, Mathlab and Sage were developed in order to fulfill the specific calculation requirements. Correspondingly, motivated from that, this study incorporated with Maple to enhance the existing DES Maplet interface to be more interactive and user-friendly compared to the original version.

  9. Multiple protocol fluorometer and method

    DOEpatents

    Kolber, Zbigniew S.; Falkowski, Paul G.

    2000-09-19

    A multiple protocol fluorometer measures photosynthetic parameters of phytoplankton and higher plants using actively stimulated fluorescence protocols. The measured parameters include spectrally-resolved functional and optical absorption cross sections of PSII, extent of energy transfer between reaction centers of PSII, F.sub.0 (minimal), F.sub.m (maximal) and F.sub.v (variable) components of PSII fluorescence, photochemical and non-photochemical quenching, size of the plastoquinone (PQ) pool, and the kinetics of electron transport between Q.sub.a and PQ pool and between PQ pool and PSI. The multiple protocol fluorometer, in one embodiment, is equipped with an excitation source having a controlled spectral output range between 420 nm and 555 nm and capable of generating flashlets having a duration of 0.125-32 .mu.s, an interval between 0.5 .mu.s and 2 seconds, and peak optical power of up to 2 W/cm.sup.2. The excitation source is also capable of generating, simultaneous with the flashlets, a controlled continuous, background illumination.

  10. The reliable multicast protocol application programming interface

    NASA Technical Reports Server (NTRS)

    Montgomery , Todd; Whetten, Brian

    1995-01-01

    The Application Programming Interface for the Berkeley/WVU implementation of the Reliable Multicast Protocol is described. This transport layer protocol is implemented as a user library that applications and software buses link against.

  11. Integrating protocol schedules with patients' personal calendars.

    PubMed

    Civan, Andrea; Gennari, John H; Pratt, Wanda

    2006-01-01

    We propose a new approach for integrating protocol care schedules into patients' personal calendars. This approach could provide patients with greater control over their current and future scheduling demands as they seek and receive protocol-based care. PMID:17238511

  12. A Wiki Based CT Protocol Management System.

    PubMed

    Szczykutowicz, Timothy P; Rubert, Nicholas; Belden, Daryn; Ciano, Amanda; Duplissis, Andrew; Hermanns, Ashley; Monette, Stephen; Saldivar, Elliott Janssen

    2015-01-01

    At the University of Wisconsin Madison Department of Radiology, CT protocol management requires maintenance of thousands of parameters for each scanner. Managing CT protocols is further complicated by the unique configurability of each scanner. Due to recent Joint Commission requirements, now all CT protocol changes must be documented and reviewed by a site's CT protocol optimization team. The difficulty of managing the CT protocols was not in assembling the protocols, but in managing and implementing changes. This is why a wiki based solution for protocol management was implemented. A wiki inherently keeps track of all changes, logging who made the changes and when, allowing for editing and viewing permissions to be controlled, as well as allowing protocol changes to be instantly relayed to all scanner locations.

  13. Developing family planning nurse practitioner protocols.

    PubMed

    Hawkins, J W; Roberto, D

    1984-01-01

    This article focuses on the process of development of protocols for family planning nurse practitioners. A rationale for the use of protocols, a definition of the types and examples, and the pros and cons of practice with protocols are presented. A how-to description for the development process follows, including methods and a suggested tool for critique and evaluation. The aim of the article is to assist nurse practitioners in developing protocols for their practice.

  14. 40 CFR 792.120 - Protocol.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... 40 Protection of Environment 33 2012-07-01 2012-07-01 false Protocol. 792.120 Section 792.120 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY (CONTINUED) TOXIC SUBSTANCES CONTROL ACT (CONTINUED) GOOD LABORATORY PRACTICE STANDARDS Protocol for and Conduct of A Study § 792.120 Protocol. (a)...

  15. Cryptanalysis on Cheng et al. protocol

    NASA Astrophysics Data System (ADS)

    Thakur, Tejeshwari

    2016-06-01

    Deployment of new node in any wireless sensor network is a sensitive task. This is the reason why, an Access Control Protocol is required in WSN. In this paper, we demonstrate that Access Control Protocol proposed by Cheng et al.[1] for Wireless Sensor Network is insecure. The reason is that this protocol fails to resist the active attack.

  16. 21 CFR 312.83 - Treatment protocols.

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ... 21 Food and Drugs 5 2013-04-01 2013-04-01 false Treatment protocols. 312.83 Section 312.83 Food...-debilitating Illnesses § 312.83 Treatment protocols. If the preliminary analysis of phase 2 test results appears promising, FDA may ask the sponsor to submit a treatment protocol to be reviewed under...

  17. 21 CFR 312.83 - Treatment protocols.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... 21 Food and Drugs 5 2011-04-01 2011-04-01 false Treatment protocols. 312.83 Section 312.83 Food...-debilitating Illnesses § 312.83 Treatment protocols. If the preliminary analysis of phase 2 test results appears promising, FDA may ask the sponsor to submit a treatment protocol to be reviewed under...

  18. 21 CFR 312.83 - Treatment protocols.

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ... 21 Food and Drugs 5 2012-04-01 2012-04-01 false Treatment protocols. 312.83 Section 312.83 Food...-debilitating Illnesses § 312.83 Treatment protocols. If the preliminary analysis of phase 2 test results appears promising, FDA may ask the sponsor to submit a treatment protocol to be reviewed under...

  19. 21 CFR 312.83 - Treatment protocols.

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ... 21 Food and Drugs 5 2014-04-01 2014-04-01 false Treatment protocols. 312.83 Section 312.83 Food...-debilitating Illnesses § 312.83 Treatment protocols. If the preliminary analysis of phase 2 test results appears promising, FDA may ask the sponsor to submit a treatment protocol to be reviewed under...

  20. New practical treadmill protocol for clinical use.

    PubMed

    Wolthuis, R A; Froelicher, V F; Fischer, J; Noguera, I; Davis, G; Stewart, A J; Triebwasser, J H

    1977-05-01

    A new continuous treadmill protocol (USAFSAM) has been designed using a constant treadmill speed (3.3 miles/hour) and regular equal increments in treadmill grade (5%/3min). The constant treadmill speed requires only initial adaptation in patient stride, reduces technician adjustments and produces less electrocardiographic motion artifact than do protocols using multiple or higher treadmill speeds, or both. The regular equal increments in treadmill grade are easy to implement and provide a larger number of work loads than do protocols that are discontinuous or require larger changes in work load. The USAFSAM protocol was compared with the older Balke-Ware protocol in 26 healthy men (aged 30 to 59 years). Each fasting subject completed two maximal treadmill tests from each protocol. Measurements included minute heart rate from the electrocardiogram, auscultatory blood pressures and oxygen consumption obtained with standard techniques. Similarities in between-protocol measurements for submaximal and maximal treadmill efforts were impressive; differences were small and unimportant. Further, both protocols showed equal reproducibility for the measurements noted. Importantly, time to maximal effort was reduced by 24% with the USAFSAM protocol. The USAFSAM treadmill protocol has since been used in more than 500 clinical and screening examinations, thus confirming its advantages and practicality for routine clinical stress testing. Normal reference values previously established for the Balke-Ware protocol are shown to apply to the new USAFSAM protocol as well. PMID:857630

  1. Reactive broadcasting protocol for video on demand

    NASA Astrophysics Data System (ADS)

    Paris, Jehan-Francois; Carter, Steven W.; Long, Darrell D. E.

    1999-12-01

    We propose a reactive broadcasting protocol that addresses the problem of distributing moderately popular videos in a more efficient fashion. Like all efficient broadcasting protocols, reactive broadcasting assumes that the customer set-top box has enough local storage to store at least one half of each video being watched. Unlike other broadcasting protocols, reactive broadcasting only broadcasts the later portions of each video. the initial segment of each video is distributed on demand using a stream tapping protocol. Our simulations show that reactive broadcasting outperforms both conventional broadcasting protocols and pure stream tapping for a wide range of video request rates.

  2. Nonblocking and orphan free message logging protocols

    NASA Technical Reports Server (NTRS)

    Alvisi, Lorenzo; Hoppe, Bruce; Marzullo, Keith

    1992-01-01

    Currently existing message logging protocols demonstrate a classic pessimistic vs. optimistic tradeoff. We show that the optimistic-pessimistic tradeoff is not inherent to the problem of message logging. We construct a message-logging protocol that has the positive features of both optimistic and pessimistic protocol: our protocol prevents orphans and allows simple failure recovery; however, it requires no blocking in failure-free runs. Furthermore, this protocol does not introduce any additional message overhead as compared to one implemented for a system in which messages may be lost but processes do not crash.

  3. Effets perturbateurs endocriniens des pesticides organochlores.

    PubMed

    Charlier, C; Plomteux, G

    2002-01-01

    Xenoestrogens such organochlorine pesticides are known to induce changes in reproductive development, function or behaviour in wildlife. Because these compounds are able to modify the estrogens metabolism, or to compete with estradiol for binding to the estrogen receptor, it may be possible that these products affect the risk of developing impaired fertility, precocious puberty or some kinds of cancer in man. Le plus ancien récit de lutte contre la pollution remonte à une légende indienne racontant que la divinité Sing-bonga était incommodée par les émanations des fours dans lesquels les Asuras fondaient leurs métaux (1). Evidemment depuis, la problématique n-a cessé de s-accroître et la contamination de la Terre par de nombreux polluants est devenue aujourd-hui un problème majeur de notre Société. La protection de notre environnement est une question capitale qui doit être respectée malgré la pression économique actuelle et qui ne cessera de croître au cours des prochaines années même si l-identification objective et indiscutable de ce qui est essentiel - donc devant être prioritairement garanti sur la planète - est difficile à cerner (2). « Un oiseau en mauvais état ne pond pas de bons oeufs » disait un proverbe grec. Mais ce n-est qu-à partir de la seconde moitié du XXème siècle que les toxicologues ont commencé à identifier les effets qu-avaient entraînés à l-échelle mondiale les pollutions émises aux XIXème siècle sur la faune sauvage et sur le cheptel (3). L-histoire contemporaine des pesticides industriels commence vers 1874 (synthèse des organochlorés) et se poursuit tout au long de ces 2 siècles en passant par la synthèse des organophosphorés (1950), des carbamates (1970) et des pyréthroïdes (1975) (4). Le dichlorodiphényltrichloroéthane (DDT) a été synthétisé pour la première fois par un étudiant en cours de préparation de sa thèse de doctorat : Othmer Zeidler. La production, reprise par les

  4. INEEL AIR MODELING PROTOCOL ext

    SciTech Connect

    C. S. Staley; M. L. Abbott; P. D. Ritter

    2004-12-01

    Various laws stemming from the Clean Air Act of 1970 and the Clean Air Act amendments of 1990 require air emissions modeling. Modeling is used to ensure that air emissions from new projects and from modifications to existing facilities do not exceed certain standards. For radionuclides, any new airborne release must be modeled to show that downwind receptors do not receive exposures exceeding the dose limits and to determine the requirements for emissions monitoring. For criteria and toxic pollutants, emissions usually must first exceed threshold values before modeling of downwind concentrations is required. This document was prepared to provide guidance for performing environmental compliance-driven air modeling of emissions from Idaho National Engineering and Environmental Laboratory facilities. This document assumes that the user has experience in air modeling and dose and risk assessment. It is not intended to be a "cookbook," nor should all recommendations herein be construed as requirements. However, there are certain procedures that are required by law, and these are pointed out. It is also important to understand that air emissions modeling is a constantly evolving process. This document should, therefore, be reviewed periodically and revised as needed. The document is divided into two parts. Part A is the protocol for radiological assessments, and Part B is for nonradiological assessments. This document is an update of and supersedes document INEEL/INT-98-00236, Rev. 0, INEEL Air Modeling Protocol. This updated document incorporates changes in some of the rules, procedures, and air modeling codes that have occurred since the protocol was first published in 1998.

  5. Planetary Protection Alternate Protocol Certification

    NASA Astrophysics Data System (ADS)

    Baker, Amy; Barengoltz, Jack; Tisdale, David

    The talk presents a standardized approach for new method certification or alterative testing protocol (ATP) certification against the existing U.S. Planetary Protection Standards. In consideration of new method certification there are two phases of activities that are relevant to the certification process. The first is sample acquisition which typically incorporates swab or wipes sampling on relevant hardware, associated facilities and ground support equipment. The sampling methods introduce considerations of field sampling efficiency as it relates to spore distribution on the spacecraft, spacecraft material influences on the ability of the swab or wipe to remove spores from the hardware, the types of swabs and wipes used (polyester, cotton, macrofoam), and human sampling influences. The second portion of a new protocol certification looks specifically at the lab work-up or analysis of the samples provided to the laboratory. Variables in this process include selection of appropriate biomarkers, extraction efficiencies (removal of spores or constituents of interest from the sampling device), and a method's ability to accurately determine the number of spores present in the sample with a statistically valid level of confidence as described by parameters such as precision, accuracy, robustness, specificity and sensitivity. Considerations for alternative testing protocols such as those which utilize bioburden reduction techniques include selection of appropriate biomarkers for testing, test materials and a defined statistical approach that provides sufficient scientific data to support the modification of an existing NASA specification or the generation of a new NASA specification. Synergies between the U.S. and European Space Agency approaches will also be discussed.

  6. Effect of PCB and DES on rat monoamine oxidase, acetylcholinesterase, testosterone, and estradiol ontogeny

    SciTech Connect

    Vincent, D.R.; Bradshaw, W.S.; Booth, G.M.; Seegmiller, R.E.; Allen, S.D.

    1992-06-01

    Diethylstilbestrol (DES) and polychlorinated biphenyl (PCB) have been documented as potentially hazardous environmental agents. In utero exposure to DES produces human vaginal adenocarcinoma, male reproductive tract lesions in mice, and has been correlated with personality changes in human males. PCB (Kanechlor) was found to be the major toxin in the {open_quotes}Yusho{close_quotes} rice oil poisoning in Japan in 1968. Other investigators have shown in rats that PCB (Arochlor) causes liver adenofibrosis, thyroid dysfunction, atypical mitochondria, and dilation of both smooth and rough endoplasmic reticulum. Matthews et al. (1978) also reported that 4, 4{prime} chlorinated biphenyl was the most potent inducer of monooxygenases, irrespective of chlorination at other sites. Although these compounds have been studied extensively in mammals, there is a paucity of data examining their effects when non-fetotoxic amounts are administered chronically and orally during gestation. The present study is part of a larger effort designed to establish a protocol for testing the developmental effects of xenobiotics such as DES and PCB. Levels of acetylcholinesterase (AChE) were measured as an indicator of the integrity of nerve transmission in the central nervous system. Monoamine oxidase (MAO) is a marker for the outer mitochondrial membrane and is an important amine metabolizing enzyme. Testosterone and estradiol are important sex steroids in mammals, and effects upon levels of the two hormones may signal anomalies in development of sex characteristics. 35 refs., 3 figs., 1 tab.

  7. Effective Protocols for Mobile Communications and Networking

    SciTech Connect

    Espinoza, J.; Sholander, P.; Van Leeuwen, B,

    1998-12-01

    This report examines methods of mobile communications with an emphasis on mobile computing and wireless communications. Many of the advances in communications involve the use of Internet Protocol (IP), Asynchronous Transfer Mode (ATM), and ad hoc network protocols. However, many of the advances in these protocols have been focused on wired communications. Recently much focus has been directed at advancing communication technology in the area of mobile wireless networks. This report discusses various protocols used in mobile communications and proposes a number of extensions to existing protocols. A detailed discussion is also included on desirable protocol characteristics and evaluation criteria. In addition, the report includes a discussion on several network simulation tools that maybe used to evaluate network protocols.

  8. Protocolized Resuscitation of Burn Patients.

    PubMed

    Cancio, Leopoldo C; Salinas, Jose; Kramer, George C

    2016-10-01

    Fluid resuscitation of burn patients is commonly initiated using modified Brooke or Parkland formula. The fluid infusion rate is titrated up or down hourly to maintain adequate urine output and other endpoints. Over-resuscitation leads to morbid complications. Adherence to paper-based protocols, flow sheets, and clinical practice guidelines is associated with decreased fluid resuscitation volumes and complications. Computerized tools assist providers. Although completely autonomous closed-loop control of resuscitation has been demonstrated in animal models of burn shock, the major advantages of open-loop and decision-support systems are identifying trends, enhancing situational awareness, and encouraging burn team communication. PMID:27600131

  9. A structured data transfer protocol

    NASA Technical Reports Server (NTRS)

    Barrett, P.; Rots, A.

    1992-01-01

    The transfer of data between different computers and programs can be a major obstacle during data analysis. We present a new data transfer protocol which is based on a simple structure containing a value, an error, and a unit. Each of these members can be arrays or another structure. The ability to nest structures allows for the concept of objects. When using an object-oriented language such as C++, reference can be made to the object name instead of each element explicitly. Prototype code has been written which implements the basic design with enhancements planned for the future.

  10. Mars Sample Quarantine Protocol Workshop

    NASA Technical Reports Server (NTRS)

    DeVincenzi, Donald L. (Editor); Bagby, John (Editor); Race, Margaret (Editor); Rummel, John (Editor)

    1999-01-01

    The Mars Sample Quarantine Protocol (QP) Workshop was convened to deal with three specific aspects of the initial handling of a returned Mars sample: 1) biocontainment, to prevent uncontrolled release of sample material into the terrestrial environment; 2) life detection, to examine the sample for evidence of live organisms; and 3) biohazard testing, to determine if the sample poses any threat to terrestrial life forms and the Earth's biosphere. During the first part of the Workshop, several tutorials were presented on topics related to the workshop in order to give all participants a common basis in the technical areas necessary to achieve the objectives of the Workshop.

  11. Analyzing the effect of routing protocols on media access control protocols in radio networks

    SciTech Connect

    Barrett, C. L.; Drozda, M.; Marathe, A.; Marathe, M. V.

    2002-01-01

    We study the effect of routing protocols on the performance of media access control (MAC) protocols in wireless radio networks. Three well known MAC protocols: 802.11, CSMA, and MACA are considered. Similarly three recently proposed routing protocols: AODV, DSR and LAR scheme 1 are considered. The experimental analysis was carried out using GloMoSim: a tool for simulating wireless networks. The main focus of our experiments was to study how the routing protocols affect the performance of the MAC protocols when the underlying network and traffic parameters are varied. The performance of the protocols was measured w.r.t. five important parameters: (i) number of received packets, (ii) average latency of each packet, (iii) throughput (iv) long term fairness and (v) number of control packets at the MAC layer level. Our results show that combinations of routing and MAC protocols yield varying performance under varying network topology and traffic situations. The result has an important implication; no combination of routing protocol and MAC protocol is the best over all situations. Also, the performance analysis of protocols at a given level in the protocol stack needs to be studied not locally in isolation but as a part of the complete protocol stack. A novel aspect of our work is the use of statistical technique, ANOVA (Analysis of Variance) to characterize the effect of routing protocols on MAC protocols. This technique is of independent interest and can be utilized in several other simulation and empirical studies.

  12. Protocols for calibrating multibeam sonar.

    PubMed

    Foote, Kenneth G; Chu, Dezhang; Hammar, Terence R; Baldwin, Kenneth C; Mayer, Larry A; Hufnagle, Lawrence C; Jech, J Michael

    2005-04-01

    Development of protocols for calibrating multibeam sonar by means of the standard-target method is documented. Particular systems used in the development work included three that provide the water-column signals, namely the SIMRAD SM2000/90- and 200-kHz sonars and RESON SeaBat 8101 sonar, with operating frequency of 240 kHz. Two facilities were instrumented specifically for the work: a sea well at the Woods Hole Oceanographic Institution and a large, indoor freshwater tank at the University of New Hampshire. Methods for measuring the transfer characteristics of each sonar, with transducers attached, are described and illustrated with measurement results. The principal results, however, are the protocols themselves. These are elaborated for positioning the target, choosing the receiver gain function, quantifying the system stability, mapping the directionality in the plane of the receiving array and in the plane normal to the central axis, measuring the directionality of individual beams, and measuring the nearfield response. General preparations for calibrating multibeam sonars and a method for measuring the receiver response electronically are outlined. Advantages of multibeam sonar calibration and outstanding problems, such as that of validation of the performance of multibeam sonars as configured for use, are mentioned.

  13. 33 CFR 117.439 - Des Allemands Bayou.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 33 Navigation and Navigable Waters 1 2011-07-01 2011-07-01 false Des Allemands Bayou. 117.439... DRAWBRIDGE OPERATION REGULATIONS Specific Requirements Louisiana § 117.439 Des Allemands Bayou. (a) The draw of the S631 bridge, mile 13.9 at Des Allemands, shall open on signal if at least four hours notice...

  14. 33 CFR 117.439 - Des Allemands Bayou.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 33 Navigation and Navigable Waters 1 2010-07-01 2010-07-01 false Des Allemands Bayou. 117.439... DRAWBRIDGE OPERATION REGULATIONS Specific Requirements Louisiana § 117.439 Des Allemands Bayou. (a) The draw of the S631 bridge, mile 13.9 at Des Allemands, shall open on signal if at least four hours notice...

  15. 75 FR 63714 - Drawbridge Operation Regulation; Des Allemands Bayou, LA

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-10-18

    ... SECURITY Coast Guard 33 CFR Part 117 Drawbridge Operation Regulation; Des Allemands Bayou, LA AGENCY: Coast... Burlington Northern Santa Fe Railway swing bridge across Des Allemands Bayou, mile 14.0, in St. Charles and... INFORMATION: The Burlington Northern Santa Fe Railway swing span drawbridge across Bayou Des Allemands,...

  16. Statutes of limitations: the special problem of DES suits.

    PubMed

    Feigin, C A

    1981-01-01

    In 1971, medical studies determined that DES causes a rare type of vaginal cancer in a small number of daughters of mothers who took DES during pregnancy. Subsequently, medical studies determined that exposure to DES can cause other vaginal abnormalities in the daughters, some of which may be precancerous. As a result of these discoveries, many lawsuits have been filed by these daughters against DES manufacturers. Many DES suits may be barred by statutes of limitations, both because the number of years between the daughters' exposure to DES in utero and the discovery that DES can cause injuries exceeds the statutory period, and because the cancer or other injuries caused by DES may not develop for many additional years. This Note discusses two methods that DES plaintiffs may be able to use to overcome the potential statutes of limitations bar: the discovery rule, and state provisions which toll the statute of limitations for minors. The Note contends that courts should apply an expanded discovery rule to DES suits to avoid the unfair result of barring a claim before the plaintiff could have known that she had a cause of action. In addition, the Note argues that the injury which causes the statute of limitations to begin to run in DES suits should not be rigidly defined. Finally, the Note urges that courts allow eligible DES plaintiffs to take advantage of applicable state provisions that toll the statute of limitations for minors.

  17. A simple, efficient and environmentally benign synthetic protocol for the synthesis of spirooxindoles using choline chloride-oxalic acid eutectic mixture as catalyst/solvent system.

    PubMed

    Khandelwal, Sarita; Rajawat, Anshu; Tailor, Yogesh Kumar; Kumar, Mahendra

    2014-01-01

    An efficient and environmentally benign domino protocol has been presented for the synthesis of structurally diverse spirooxindoles spiroannulated with pyranopyridopyrimidines, indenopyridopyrimidines, and chromenopyridopyrimidines involving three-component reaction of aminouracils, isatins and cyclic carbonyl compounds in deep eutectic solvent (choline chloride-oxalic acid: 1:1) which acts as efficient catalyst and environmentally benign reaction medium. The present protocol offers several advantages such as operational simplicity with easy workup, shorter reaction times excellent yields with superior atom economy and environmentally benign reaction conditions with the use of cost-effective, recyclable, non-toxic and bio-degradable DES as catalyst/solvent.

  18. A simple, efficient and environmentally benign synthetic protocol for the synthesis of spirooxindoles using choline chloride-oxalic acid eutectic mixture as catalyst/solvent system.

    PubMed

    Khandelwal, Sarita; Rajawat, Anshu; Tailor, Yogesh Kumar; Kumar, Mahendra

    2014-01-01

    An efficient and environmentally benign domino protocol has been presented for the synthesis of structurally diverse spirooxindoles spiroannulated with pyranopyridopyrimidines, indenopyridopyrimidines, and chromenopyridopyrimidines involving three-component reaction of aminouracils, isatins and cyclic carbonyl compounds in deep eutectic solvent (choline chloride-oxalic acid: 1:1) which acts as efficient catalyst and environmentally benign reaction medium. The present protocol offers several advantages such as operational simplicity with easy workup, shorter reaction times excellent yields with superior atom economy and environmentally benign reaction conditions with the use of cost-effective, recyclable, non-toxic and bio-degradable DES as catalyst/solvent. PMID:25329839

  19. Caracterisation pratique des systemes quantiques et memoires quantiques auto-correctrices 2D

    NASA Astrophysics Data System (ADS)

    Landon-Cardinal, Olivier

    Cette these s'attaque a deux problemes majeurs de l'information quantique: - Comment caracteriser efficacement un systeme quantique? - Comment stocker de l'information quantique? Elle se divise done en deux parties distinctes reliees par des elements techniques communs. Chacune est toutefois d'un interet propre et se suffit a elle-meme. Caracterisation pratique des systemes quantiques. Le calcul quantique exige un tres grand controle des systemes quantiques composes de plusieurs particules, par exemple des atomes confines dans un piege electromagnetique ou des electrons dans un dispositif semi-conducteur. Caracteriser un tel systeme quantique consiste a obtenir de l'information sur l'etat grace a des mesures experimentales. Or, chaque mesure sur le systeme quantique le perturbe et doit done etre effectuee apres avoir reprepare le systeme de facon identique. L'information recherchee est ensuite reconstruite numeriquement a partir de l'ensemble des donnees experimentales. Les experiences effectuees jusqu'a present visaient a reconstruire l'etat quantique complet du systeme, en particulier pour demontrer la capacite de preparer des etats intriques, dans lesquels les particules presentent des correlations non-locales. Or, la procedure de tomographie utilisee actuellement n'est envisageable que pour des systemes composes d'un petit nombre de particules. Il est donc urgent de trouver des methodes de caracterisation pour les systemes de grande taille. Dans cette these, nous proposons deux approches theoriques plus ciblees afin de caracteriser un systeme quantique en n'utilisant qu'un effort experimental et numerique raisonnable. - La premiere consiste a estimer la distance entre l'etat realise en laboratoire et l'etat cible que l'experimentateur voulait preparer. Nous presentons un protocole, dit de certification, demandant moins de ressources que la tomographie et tres efficace pour plusieurs classes d'etats importantes pour l'informatique quantique. - La seconde

  20. A Unified Fault-Tolerance Protocol

    NASA Technical Reports Server (NTRS)

    Miner, Paul; Gedser, Alfons; Pike, Lee; Maddalon, Jeffrey

    2004-01-01

    Davies and Wakerly show that Byzantine fault tolerance can be achieved by a cascade of broadcasts and middle value select functions. We present an extension of the Davies and Wakerly protocol, the unified protocol, and its proof of correctness. We prove that it satisfies validity and agreement properties for communication of exact values. We then introduce bounded communication error into the model. Inexact communication is inherent for clock synchronization protocols. We prove that validity and agreement properties hold for inexact communication, and that exact communication is a special case. As a running example, we illustrate the unified protocol using the SPIDER family of fault-tolerant architectures. In particular we demonstrate that the SPIDER interactive consistency, distributed diagnosis, and clock synchronization protocols are instances of the unified protocol.

  1. [The research protocol. Part I].

    PubMed

    Miranda-Novales, María Guadalupe; Villasís-Keever, Miguel Ángel

    2015-01-01

    One of the principal aims in research is the publication of the study in scientific journals. This implies two challenges: the first one, the election of an adequate research design, and the second one, the concrete and simple wording of the results for the study to be accepted in the most appropriate journal according to the scope. Despite numerous supporting documents are available for both issues, the publication process is long, tiresome, and can discourage the most enthusiastic researcher. This is the first of a series of articles with the objective to describe the steps from the research question to the publication of the study. First of all, the importance of the research design will be addressed. The structure of the protocol is essential to achieve the objectives, and provides a way to organize the investigation in a logic, comprehensible and efficient manner.

  2. [Climate change and Kyoto protocol].

    PubMed

    Ergasti, G; Pippia, V; Murzilli, G; De Luca D'Alessandro, E

    2009-01-01

    Due to industrial revolution and the heavy use of fossil fuels, the concentration of greenhouse gases in the atmosphere has increased dramatically during the last hundred years, and this has lead to an increase in mean global temperature. The environmental consequences of this are: the melting of the ice caps, an increase in mean sea-levels, catastrophic events such as floodings, hurricanes and earthquakes, changes to the animal and vegetable kingdoms, a growth in vectors and bacteria in water thus increasing the risk of infectious diseases and damage to agriculture. The toxic effects of the pollution on human health are both acute and chronic. The Kyoto Protocol is an important step in the campaign against climatic changes but it is not sufficient. A possible solution might be for the States which produce the most of pollution to adopt a better political stance for the environment and to use renewable resources for the production of energy.

  3. Canine adenovirus downstream processing protocol.

    PubMed

    Puig, Meritxell; Piedra, Jose; Miravet, Susana; Segura, María Mercedes

    2014-01-01

    Adenovirus vectors are efficient gene delivery tools. A major caveat with vectors derived from common human adenovirus serotypes is that most adults are likely to have been exposed to the wild-type virus and exhibit active immunity against the vectors. This preexisting immunity limits their clinical success. Strategies to circumvent this problem include the use of nonhuman adenovirus vectors. Vectors derived from canine adenovirus type 2 (CAV-2) are among the best-studied representatives. CAV-2 vectors are particularly attractive for the treatment of neurodegenerative disorders. In addition, CAV-2 vectors have shown great promise as oncolytic agents in virotherapy approaches and as vectors for recombinant vaccines. The rising interest in CAV-2 vectors calls for the development of scalable GMP compliant production and purification strategies. A detailed protocol describing a complete scalable downstream processing strategy for CAV-2 vectors is reported here. Clarification of CAV-2 particles is achieved by microfiltration. CAV-2 particles are subsequently concentrated and partially purified by ultrafiltration-diafiltration. A Benzonase(®) digestion step is carried out between ultrafiltration and diafiltration operations to eliminate contaminating nucleic acids. Chromatography purification is accomplished in two consecutive steps. CAV-2 particles are first captured and concentrated on a propyl hydrophobic interaction chromatography column followed by a polishing step using DEAE anion exchange monoliths. Using this protocol, high-quality CAV-2 vector preparations containing low levels of contamination with empty viral capsids and other inactive vector forms are typically obtained. The complete process yield was estimated to be 38-45 %. PMID:24132487

  4. Layered protocols in voice interaction with computers

    NASA Astrophysics Data System (ADS)

    Taylor, M. M.

    1987-02-01

    The Layered Protocol model for human computer interfaces is described, with special reference to the problems of voice input and output. In a layered protocol, each level passes virtual messages back and forth between human and computer. These virtual messages are realized in the form of interchanges at the level below. The protocol at a level is analogous to the syntax of a sentence, in that it is the method by which the content of a message can be given an agreed interpretation. Each protocol can be designed or evaluated independently of all the others in an interface. The stability of a protocol is determined by its response delays and by the channel capacity of the lower level protocols that support its messages. Sometimes an unstable protocol can be stabilized and speeded by reducing the message rate of the supporting protocols. Users have been observed to do this intuitively. Voice input provides special problems because of the relatively high error probability inherent in the recognizer: errors in other modalities are likely to be due to operator fault. This tends to lead to unwarranted distrust of voice input, and to demands for types of feedback that are probably inappropriate to the level of protocol to which the recognizer is suited. Voice output can be used by the computer to initiate protocols, or to provide a response channel for protocols under conditions where the user's eyes are otherwise occupied. Consideration of protocol demands helps to clarify the requirements for precision in recognition, and for the characteristics of computer responses to voice input; it helps also in judging appropriate conditions for the use of voice output.

  5. Status Report on the UNIDROIT Space Protocol

    NASA Astrophysics Data System (ADS)

    Larsen, Paul B.

    2002-01-01

    In my status report on the UNIDROIT Space Protocol I will describe the history and purpose of the Space Protocol; I will state the Protocol's relationship to the UNIDROIT Convention on International Interests in Mobile Equipment in particular after the 2001 Cape Town Diplomatic Conference on the Convention. I will describe the COPUOS study of possible conflicts with the existing space law treaties and explain UNIDROIT's objective of avoiding conflicts between existing space law and the Space Protocol. Finally I will describe future steps to be taken.

  6. Quantum three-pass cryptography protocol

    NASA Astrophysics Data System (ADS)

    Yang, Li; Wu, Ling-An; Liu, Songhao

    2002-09-01

    We present a new kind of quantum cryptography protocol based on Shamir's three-pass protocol of classical cryptography, which allows the transmission of qubits directly and secretly via the aid of an unjammable classical channel. In this protocol we implement the encryption and decryption transformations via rotations on the Poincare sphere of the photons polarization parameters. The key technique is that Bob's encryption rotation must be commutative with Alice s decryption rotation; this means that the axes of these two rotations must be parallel. We also present a security analysis of the protocol under a man-in-the-middle attack.

  7. GENERIC VERIFICATION PROTOCOL: DISTRIBUTED GENERATION AND COMBINED HEAT AND POWER FIELD TESTING PROTOCOL

    EPA Science Inventory

    This report is a generic verification protocol by which EPA’s Environmental Technology Verification program tests newly developed equipment for distributed generation of electric power, usually micro-turbine generators and internal combustion engine generators. The protocol will ...

  8. Note des Éditeurs scientifiques

    NASA Astrophysics Data System (ADS)

    Averbuch, P.

    Cette série d'articles est une revue de résultats expérimentaux sur différents "fluides" moléculaires, dans lesquels la cohésion est due à des forces de Van der Waals et à des liaisons hydrogène, l'eau étant un de ces fluides. Ces résultats sont présentés de façon à justifier expérimentalement un modèle original, non extensif, des propriétés de ces fluides, et l'ensemble se présente sous la forme de trois articles décrivant le modèle, suivis chacun par un article le comparant aux résultats expérimentaux publiés par de nombreux auteurs. Le caractère non extensif des propriétés physiques des fluides est choquant, contraire à beaucoup d'idées établies, il semble n'avoir en sa faveur qu'un argument, la comparaison avec un nombre de résultats expérimentaux assez grand pour que l'effet du hasard soit difficilement soupçonnable. En particulier, les écarts entre des résultats de mesures faits par des auteurs différents dans des conditions différentes sont expliqués, le sérieux et la compétence des différents expérimentateurs ne sont plus mis en doute : mais l'interprétation de ces résultats avec un modèle extensif non adapté est seule mise en cause. Les modèles extensifs étant utilisés systématiquement, au delà des expériences de physiciens, dans les calculs d'ingénieurs, et dans la modélisation d'appareils qui fonctionnent et de phénomènes naturels observés par tout le monde, il fallait expliquer pourquoi on pouvait renoncer à l'extensivité. Les raisons du succès pratique des modèles extensifs sont données, d'abord dans le cas des nématiques, puis dans celui des liquides ordinaires, et c'est ce qui rend l'ensemble cohérent, tant avec les mesures physiques fines qu'avec les observations quotidiennes. Il n'en reste pas moins que si l'interprétation donnée dans cette série d'articles est généralisable, une justification théorique du modèle utilisé devient nécessaire. Pour ce qui est des propriétés d

  9. EXACT2: the semantics of biomedical protocols

    PubMed Central

    2014-01-01

    Background The reliability and reproducibility of experimental procedures is a cornerstone of scientific practice. There is a pressing technological need for the better representation of biomedical protocols to enable other agents (human or machine) to better reproduce results. A framework that ensures that all information required for the replication of experimental protocols is essential to achieve reproducibility. Methods We have developed the ontology EXACT2 (EXperimental ACTions) that is designed to capture the full semantics of biomedical protocols required for their reproducibility. To construct EXACT2 we manually inspected hundreds of published and commercial biomedical protocols from several areas of biomedicine. After establishing a clear pattern for extracting the required information we utilized text-mining tools to translate the protocols into a machine amenable format. We have verified the utility of EXACT2 through the successful processing of previously 'unseen' (not used for the construction of EXACT2) protocols. Results The paper reports on a fundamentally new version EXACT2 that supports the semantically-defined representation of biomedical protocols. The ability of EXACT2 to capture the semantics of biomedical procedures was verified through a text mining use case. In this EXACT2 is used as a reference model for text mining tools to identify terms pertinent to experimental actions, and their properties, in biomedical protocols expressed in natural language. An EXACT2-based framework for the translation of biomedical protocols to a machine amenable format is proposed. Conclusions The EXACT2 ontology is sufficient to record, in a machine processable form, the essential information about biomedical protocols. EXACT2 defines explicit semantics of experimental actions, and can be used by various computer applications. It can serve as a reference model for for the translation of biomedical protocols in natural language into a semantically

  10. Developpement des betons semi autoplacants a rheologie adaptee pour des infrastructures

    NASA Astrophysics Data System (ADS)

    Sotomayor Cruz, Cristian Daniel

    Au cours des dernières décennies, les infrastructures canadiennes et québécoises comportent plusieurs structures en béton armé présentant des problèmes de durabilité dus aux conditions climatiques sévères, à la mauvaise conception des structures, à la qualité des matériaux, aux types des bétons choisis, aux systèmes de construction ou à l'existence d'événements incontrôlables. En ce qui concerne le choix du béton pour la construction des infrastructures, une vaste gamme de béton divisée en deux principaux types peut être utilisée: le béton conventionnel vibré (BCV) et le béton autoplaçant (BAP). Dans le cas d'un BCV, la consolidation inadéquate par vibration a été un problème récurrent, occasionnant des dommages structuraux. Ceci a conduit à une réduction de la durabilité et à une augmentation du coût d'entretien et de réparation des infrastructures. Rien que l'utilisation d'un BAP a des avantages tels que l'élimination de la vibration, la réduction des coûts de main d'oeuvre et l'amélioration de la qualité des structures, néanmoins, le coût initial d'un BAP par rapport à un BCV ne permet pas encore de généraliser son utilisation dans l'industrie de la construction. Ce mémoire présente la conception d'une nouvelle gamme de béton semi-autoplaçant pour la construction des infrastructures (BSAP-I) exigeant une vibration minimale. Il s'agit de trouver un équilibre optimal entre la rhéologie et le coût initial du nouveau béton pour conférer une bonne performance structurale et économique aux structures. Le programme expérimental établi a premièrement permis d'évaluer la faisabilité d'utilisation des BSAP-I pour la mise en place des piliers d'une infrastructure de pont à Sherbrooke. En plus, l'utilisation d'un plan d'expériences a permis l'évaluation de trois paramètres de formulation sur les propriétés des mélanges de BSAP-I à l'état frais et durci. Finalement, l'évaluation de la performance des

  11. Etude theorique et experimentale des evaporateurs de dioxyde de carbone operant dans des conditions de givrage

    NASA Astrophysics Data System (ADS)

    Bendaoud, Adlane Larbi

    Les evaporateurs de refrigeration sont surtout du type tube a ailettes, appeles serpentins, et fonctionnent dans l'une des conditions suivantes: seche, humide ou avec formation de givre. Il a ete demontre que la formation du givre sur la paroi exterieure de l'echangeur engendre une surconsommation energetique a cause des operations de degivrage puisque 15 a 20% seulement de la chaleur produite sert au degivrage tandis que le reste est dissipee dans l'environnement [1]. Avec l'avenement des nouveaux refrigerants, moins nocifs envers l'environnement, l'industrie du froid se trouve penalisee du fait que peu ou pas de composantes mecaniques (compresseur, pompe, echangeur...etc.) adaptees sont disponibles [3]. Il s'agit pour la communaute des frigoristes de combler ce retard technologique en redeveloppant ces composantes mecaniques afin qu'elles soient adaptees aux nouveaux refrigerants. Dans cette optique, et afin de mieux comprendre le comportement thermique des evaporateurs au CO2 fonctionnant dans des conditions seches, qu'un groupe de chercheurs du CanmetENERGIE avaient lance, en 2000, un programme de R & D. Dans le cadre de programme un outil de simulation des evaporateurs au CO2 a ete developpe et un banc d'essai contenant une boucle secondaire de refrigeration utilisant le CO2 comme refrigerant a ete construit. Comme continuite de ce travail de recherche, en 2006 ce meme groupe de recherche a lance un nouveau projet qui consiste a faire une etude theorique et experimentale des evaporateurs au CO2 operants dans des conditions de givrage. Et, c'est exactement dans le cadre de ce projet que se positionne ce travail de these. Ce travail de recherche a ete entrepris pour mieux comprendre le comportement thermique et hydrodynamique des serpentins fonctionnant dans des conditions de givrage, l'effet des circuits de refrigerant ainsi que celui des parametres geometriques et d'operation. Pour cela, un travail theorique supporte par une etude experimentale a ete effectue

  12. Effets des electrons secondaires sur l'ADN

    NASA Astrophysics Data System (ADS)

    Boudaiffa, Badia

    Les interactions des electrons de basse energie (EBE) representent un element important en sciences des radiations, particulierement, les sequences se produisant immediatement apres l'interaction de la radiation ionisante avec le milieu biologique. Il est bien connu que lorsque ces radiations deposent leur energie dans la cellule, elles produisent un grand nombre d'electrons secondaires (4 x 104/MeV), qui sont crees le long de la trace avec des energies cinetiques initiales bien inferieures a 20 eV. Cependant, il n'y a jamais eu de mesures directes demontrant l'interaction de ces electrons de tres basse energie avec l'ADN, du principalement aux difficultes experimentales imposees par la complexite du milieu biologique. Dans notre laboratoire, les dernieres annees ont ete consacrees a l'etude des phenomenes fondamentaux induits par impact des EBE sur differentes molecules simples (e.g., N2, CO, O2, H2O, NO, C2H 4, C6H6, C2H12) et quelques molecules complexes dans leur phase solide. D'autres travaux effectues recemment sur des bases de l'ADN et des oligonucleotides ont montre que les EBE produisent des bris moleculaires sur les biomolecules. Ces travaux nous ont permis d'elaborer des techniques pour mettre en evidence et comprendre les interactions fondamentales des EBE avec des molecules d'interet biologique, afin d'atteindre notre objectif majeur d'etudier l'effet direct de ces particules sur la molecule d'ADN. Les techniques de sciences des surfaces developpees et utilisees dans les etudes precitees peuvent etre etendues et combinees avec des methodes classiques de biologie pour etudier les dommages de l'ADN induits par l'impact des EBE. Nos experiences ont montre l'efficacite des electrons de 3--20 eV a induire des coupures simple et double brins dans l'ADN. Pour des energies inferieures a 15 eV, ces coupures sont induites par la localisation temporaire d'un electron sur une unite moleculaire de l'ADN, ce qui engendre la formation d'un ion negatif transitoire

  13. Le domaine des co-infections et des maladies concomitantes du Réseau canadien pour les essais VIH des IRSC : lignes directrices canadiennes pour la prise en charge et le traitement de la co-infection par le VIH et l’hépatite C chez les adultes

    PubMed Central

    Hull, Mark; Giguère, Pierre; Klein, Marina; Shafran, Stephen; Tseng, Alice; Côté, Pierre; Poliquin, Marc; Cooper, Curtis

    2014-01-01

    HISTORIQUE : De 20 % à 30 % des Canadiens qui vivent avec le VIH sont co-infectés par le virus de l’hépatite C (VHC), lequel est responsable d’une morbidité et d’une mortalité importantes. La prise en charge du VIH et du VHC est plus complexe en raison de l’évolution accélérée de la maladie hépatique, du choix et des critères d’initiation de la thérapie antirétrovirale et du traitement anti-VHC, de la prise en charge de la santé mentale et des toxicomanies, des obstacles socioéconomiques et des interactions entre les nouvelles thérapies antivirales à action directe du VHC et les antirétroviraux OBJECTIF : Élaborer des normes nationales de prise en charge des adultes co-infectés par le VHC et le VIH dans le contexte canadien. MÉTHODOLOGIE : Le Réseau canadien pour les essais VIH des Instituts de recherche en santé du Canada a réuni un groupe d’experts possédant des compétences cliniques en co-infection par le VIH et le VHC pour réviser les publications à jour ainsi que les lignes directrices et les protocoles en place. Après une vaste sollicitation afin d’obtenir des points de vue, le groupe de travail a approuvé des recommandations consensuelles, qu’il a caractérisées au moyen d’une échelle de qualité des preuves fondée sur la classe (bienfaits par rapport aux préjudices) et sur la catégorie (degré de certitude). RÉSULTATS : Toutes les personnes co-infectées par le VIH et le VHC devraient subir une évaluation en vue de recevoir un traitement du VHC. Les personnes qui ne sont pas en mesure d’entreprendre un traitement du VHC devraient être soignées pour le VIH afin de ralentir l’évolution de la maladie hépatique. La norme de traitement du VHC de génotype 1 est un régime comprenant de l’interféron pégylé et de la ribavirine dosée en fonction du poids, associés à un inhibiteur de la protéase du VHC. Pour les génotypes 2 ou 3, une bithérapie classique est recommandée pendant 24 semaines s

  14. 21 CFR 1301.18 - Research protocols.

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ... to 21 U.S.C. 355(i) and 21 CFR 130.3, I, (Name and Address of IND Sponsor) submitted a Notice of... 21 Food and Drugs 9 2014-04-01 2014-04-01 false Research protocols. 1301.18 Section 1301.18 Food..., DISTRIBUTORS, AND DISPENSERS OF CONTROLLED SUBSTANCES Registration § 1301.18 Research protocols. (a) A...

  15. Delay Tolerant Networking - Bundle Protocol Simulation

    NASA Technical Reports Server (NTRS)

    SeGui, John; Jenning, Esther

    2006-01-01

    In this paper, we report on the addition of MACHETE models needed to support DTN, namely: the Bundle Protocol (BP) model. To illustrate the useof MACHETE with the additional DTN model, we provide an example simulation to benchmark its performance. We demonstrate the use of the DTN protocol and discuss statistics gathered concerning the total time needed to simulate numerous bundle transmissions.

  16. STANDARD MEASUREMENT PROTOCOLS - FLORIDA RADON RESEARCH PROGRAM

    EPA Science Inventory

    The manual, in support of the Florida Radon Research Program, contains standard protocols for key measurements where data quality is vital to the program. t contains two sections. he first section, soil measurements, contains field sampling protocols for soil gas permeability and...

  17. Open commit protocols tolerating commission failures

    SciTech Connect

    Rothermel, K.; Pappe, S. )

    1993-06-01

    To ensure atomicity of transactions in disturbed systems so-called 2-phase commit (2PC) protocols have been proposed. The basic assumption of these protocols is that the processing nodes involved in transactions are [open quotes]sane,[close quotes] i.e., they only fail with omission failures, and nodes eventually recover from failures. Unfortunately, this assumption is not realistic for so-called Open Distributed Systems (ODSs), in which nodes may have totally different reliability characteristics. In ODSs, nodes can be classified into trusted nodes (e.g., a banking server) and nontrusted nodes (e.g., a home PC requesting a remote banking service). While trusted nodes are assumed to be sane, nontrusted nodes may fail permanently and even cause commission failures to occur. In this paper, we propose a family of 2PC protocols that tolerate any number of omission failures at trusted nodes and any number of commission and omission failures at nontrusted nodes. The proposed protocols ensure that (at least) the trusted nodes participating in a transaction eventually terminate the transaction in a consistent manner. Unlike Byzantine commit protocols, our protocols do not incorporate mechanisms for achieving Byzantine agreement, which has advantages in terms of complexity: Our protocols have the same or only a slightly higher message complexity than traditional 2PC protocols. 31 refs., 10 figs., 3 tabs.

  18. Communication protocol standards for space data systems

    NASA Technical Reports Server (NTRS)

    Hooke, Adrian J.; Desjardins, Richard

    1990-01-01

    The main elements and requirements of advanced space data networks are identified. The communication protocol standards for use on space missions during the coming decades are described. In particular, the blending of high-performance space-unique data transmission techniques with off-the-shelf open systems interconnection (OSI) protocols is described.

  19. 21 CFR 1301.18 - Research protocols.

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ... 21 Food and Drugs 9 2013-04-01 2013-04-01 false Research protocols. 1301.18 Section 1301.18 Food... duration of the project. (v) Location where the research will be conducted. (vi) Statement of the security... security provisions (as proscribed in paragraph (a)(2)(vi) of this section for a research protocol) to,...

  20. 21 CFR 1301.18 - Research protocols.

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ... 21 Food and Drugs 9 2012-04-01 2012-04-01 false Research protocols. 1301.18 Section 1301.18 Food... duration of the project. (v) Location where the research will be conducted. (vi) Statement of the security... security provisions (as proscribed in paragraph (a)(2)(vi) of this section for a research protocol) to,...

  1. Massive transfusion and massive transfusion protocol

    PubMed Central

    Patil, Vijaya; Shetmahajan, Madhavi

    2014-01-01

    Haemorrhage remains a major cause of potentially preventable deaths. Rapid transfusion of large volumes of blood products is required in patients with haemorrhagic shock which may lead to a unique set of complications. Recently, protocol based management of these patients using massive transfusion protocol have shown improved outcomes. This section discusses in detail both management and complications of massive blood transfusion. PMID:25535421

  2. 16 CFR 1212.4 - Test protocol.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 16 Commercial Practices 2 2012-01-01 2012-01-01 false Test protocol. 1212.4 Section 1212.4... STANDARD FOR MULTI-PURPOSE LIGHTERS Requirements for Child-Resistance § 1212.4 Test protocol. (a) Child test panel. (1) The test to determine if a multi-purpose lighter is resistant to successful...

  3. 16 CFR 1210.4 - Test protocol.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 16 Commercial Practices 2 2012-01-01 2012-01-01 false Test protocol. 1210.4 Section 1210.4... STANDARD FOR CIGARETTE LIGHTERS Requirements for Child Resistance § 1210.4 Test protocol. (a) Child test panel. (1) The test to determine if a lighter is resistant to successful operation by children uses...

  4. Massive transfusion and massive transfusion protocol.

    PubMed

    Patil, Vijaya; Shetmahajan, Madhavi

    2014-09-01

    Haemorrhage remains a major cause of potentially preventable deaths. Rapid transfusion of large volumes of blood products is required in patients with haemorrhagic shock which may lead to a unique set of complications. Recently, protocol based management of these patients using massive transfusion protocol have shown improved outcomes. This section discusses in detail both management and complications of massive blood transfusion.

  5. The "Conservatoire National des Arts et Metiers"

    ERIC Educational Resources Information Center

    Kuhn, Gerard

    2004-01-01

    The overall mission of the Conservatoire national des arts et metiers--(CNAM) [National Conservatory of Industrial Arts and Trades] is outlined. One of its centers, the "Centre national de l'entrepreneuriat"--(CNE) [National Center for Entrepreneurship] is described in greater detail. In particular, this center offers various services, notably…

  6. Fiabilité des structures mécaniques adaptatives: effet de la panne des actionneurs ou des capteurs sur la stabilité

    NASA Astrophysics Data System (ADS)

    Fall, H.; Charon, W.; Kouta, R.

    2002-12-01

    Ces dernières décennies, des activités significatives dans le monde étaient dirigées autour du contrôle actif. Le but de ces recherches était essentiellement d'améliorer les performances, la fiabilité et la sécurité des systèmes. Notamment dans le cas des structures soumises à des vibrations aléatoires. D'importants travaux ont été consacré à l'utilisation des “matériaux intelligents” comme capteurs et actionneurs. Cette article propose l'analyse de la fiabilité des systèmes mécaniques en étudiant les pannes des actionneurs ou des capteurs. L'effet de ces pannes sur la stabilité et la performance du système y est démontré. Les méthodologies de conception y sont rappelées. Des exemples numériques sont fournis à travers le contrôle d'un panneau sous chargement dynamique pour illustrer la méthode proposée.

  7. Cryptanalysis of the arbitrated quantum signature protocols

    SciTech Connect

    Gao Fei; Qin Sujuan; Guo Fenzhuo; Wen Qiaoyan

    2011-08-15

    As a new model for signing quantum messages, arbitrated quantum signature (AQS) has recently received a lot of attention. In this paper we study the cryptanalysis of previous AQS protocols from the aspects of forgery and disavowal. We show that in these protocols the receiver, Bob, can realize existential forgery of the sender's signature under known message attack. Bob can even achieve universal forgery when the protocols are used to sign a classical message. Furthermore, the sender, Alice, can successfully disavow any of her signatures by simple attack. The attack strategies are described in detail and some discussions about the potential improvements of the protocols are given. Finally we also present several interesting topics on AQS protocols that can be studied in future.

  8. Accuracy of NHANES periodontal examination protocols.

    PubMed

    Eke, P I; Thornton-Evans, G O; Wei, L; Borgnakke, W S; Dye, B A

    2010-11-01

    This study evaluates the accuracy of periodontitis prevalence determined by the National Health and Nutrition Examination Survey (NHANES) partial-mouth periodontal examination protocols. True periodontitis prevalence was determined in a new convenience sample of 454 adults ≥ 35 years old, by a full-mouth "gold standard" periodontal examination. This actual prevalence was compared with prevalence resulting from analysis of the data according to the protocols of NHANES III and NHANES 2001-2004, respectively. Both NHANES protocols substantially underestimated the prevalence of periodontitis by 50% or more, depending on the periodontitis case definition used, and thus performed below threshold levels for moderate-to-high levels of validity for surveillance. Adding measurements from lingual or interproximal sites to the NHANES 2001-2004 protocol did not improve the accuracy sufficiently to reach acceptable sensitivity thresholds. These findings suggest that NHANES protocols produce high levels of misclassification of periodontitis cases and thus have low validity for surveillance and research.

  9. Security Weaknesses in Arbitrated Quantum Signature Protocols

    NASA Astrophysics Data System (ADS)

    Liu, Feng; Zhang, Kejia; Cao, Tianqing

    2014-01-01

    Arbitrated quantum signature (AQS) is a cryptographic scenario in which the sender (signer), Alice, generates the signature of a message and then a receiver (verifier), Bob, can verify the signature with the help of a trusted arbitrator, Trent. In this paper, we point out there exist some security weaknesses in two AQS protocols. Our analysis shows Alice can successfully disavow any of her signatures by a simple attack in the first protocol. Furthermore, we study the security weaknesses of the second protocol from the aspects of forgery and disavowal. Some potential improvements of this kind of protocols are given. We also design a new method to authenticate a signature or a message, which makes AQS protocols immune to Alice's disavowal attack and Bob's forgery attack effectively.

  10. Cryptanalysis of the arbitrated quantum signature protocols

    NASA Astrophysics Data System (ADS)

    Gao, Fei; Qin, Su-Juan; Guo, Fen-Zhuo; Wen, Qiao-Yan

    2011-08-01

    As a new model for signing quantum messages, arbitrated quantum signature (AQS) has recently received a lot of attention. In this paper we study the cryptanalysis of previous AQS protocols from the aspects of forgery and disavowal. We show that in these protocols the receiver, Bob, can realize existential forgery of the sender's signature under known message attack. Bob can even achieve universal forgery when the protocols are used to sign a classical message. Furthermore, the sender, Alice, can successfully disavow any of her signatures by simple attack. The attack strategies are described in detail and some discussions about the potential improvements of the protocols are given. Finally we also present several interesting topics on AQS protocols that can be studied in future.

  11. The EXACT description of biomedical protocols

    PubMed Central

    Soldatova, Larisa N.; Aubrey, Wayne; King, Ross D.; Clare, Amanda

    2008-01-01

    Motivation: Many published manuscripts contain experiment protocols which are poorly described or deficient in information. This means that the published results are very hard or impossible to repeat. This problem is being made worse by the increasing complexity of high-throughput/automated methods. There is therefore a growing need to represent experiment protocols in an efficient and unambiguous way. Results: We have developed the Experiment ACTions (EXACT) ontology as the basis of a method of representing biological laboratory protocols. We provide example protocols that have been formalized using EXACT, and demonstrate the advantages and opportunities created by using this formalization. We argue that the use of EXACT will result in the publication of protocols with increased clarity and usefulness to the scientific community. Availability: The ontology, examples and code can be downloaded from http://www.aber.ac.uk/compsci/Research/bio/dss/EXACT/ Contact: Larisa Soldatova lss@aber.ac.uk PMID:18586727

  12. A Simple XML Producer-Consumer Protocol

    NASA Technical Reports Server (NTRS)

    Smith, Warren; Gunter, Dan; Quesnel, Darcy; Biegel, Bryan (Technical Monitor)

    2001-01-01

    There are many different projects from government, academia, and industry that provide services for delivering events in distributed environments. The problem with these event services is that they are not general enough to support all uses and they speak different protocols so that they cannot interoperate. We require such interoperability when we, for example, wish to analyze the performance of an application in a distributed environment. Such an analysis might require performance information from the application, computer systems, networks, and scientific instruments. In this work we propose and evaluate a standard XML-based protocol for the transmission of events in distributed systems. One recent trend in government and academic research is the development and deployment of computational grids. Computational grids are large-scale distributed systems that typically consist of high-performance compute, storage, and networking resources. Examples of such computational grids are the DOE Science Grid, the NASA Information Power Grid (IPG), and the NSF Partnerships for Advanced Computing Infrastructure (PACIs). The major effort to deploy these grids is in the area of developing the software services to allow users to execute applications on these large and diverse sets of resources. These services include security, execution of remote applications, managing remote data, access to information about resources and services, and so on. There are several toolkits for providing these services such as Globus, Legion, and Condor. As part of these efforts to develop computational grids, the Global Grid Forum is working to standardize the protocols and APIs used by various grid services. This standardization will allow interoperability between the client and server software of the toolkits that are providing the grid services. The goal of the Performance Working Group of the Grid Forum is to standardize protocols and representations related to the storage and distribution of

  13. STANDARD OPERATING PROTOCOLS FOR DECOMMISSIONING

    SciTech Connect

    Foss, D. L.; Stevens, J. L.; Gerdeman, F. W.

    2002-02-25

    Decommissioning projects at Comprehensive Environmental Response, Compensation, and Liability Act (CERCLA) sites are conducted under project-specific decision documents, which involve extensive preparation time, public comment periods, and regulatory approvals. Often, the decision documents must be initiated at least one year before commencing the decommissioning project, and they are expensive and time consuming to prepare. The Rocky Flats Environmental Technology Site (RFETS) is a former nuclear weapons production plant at which hazardous substances and wastes were released or disposed during operations. As a result of the releases, RFETS was placed on the National Priorities List in 1989, and is conducting cleanup activities under a federal facilities compliance agreement. Working closely with interested stakeholders and state and federal regulatory agencies, RFETS has developed and implemented an improved process for obtaining the approvals. The key to streamlining the approval process has been the development of sitewide decision documents called Rocky Flats Cleanup Agreement Standard Operating Protocols or ''RSOPs.'' RSOPs have broad applicability, and could be used instead of project-specific documents. Although no two decommissioning projects are exactly the same and they may vary widely in contamination and other hazards, the basic steps taken for cleanup are usually similar. Because of this, using RSOPs is more efficient than preparing a separate project-specific decision documents for each cleanup action. Over the Rocky Flats cleanup life cycle, using RSOPs has the potential to: (1) Save over 5 million dollars and 6 months on the site closure schedule; (2) Eliminate preparing one hundred and twenty project-specific decision documents; and (3) Eliminate writing seventy-five closure description documents for hazardous waste unit closure and corrective actions.

  14. Per-packet reservation MAC protocols

    NASA Astrophysics Data System (ADS)

    Hrasnica, Halid

    2006-10-01

    Recent and future communications networks have to provide QoS guarantees for a rapidly growing number of various telecommunications services. Therefore, various communications systems, such as wireless and fixed access networks, apply reservation MAC protocols, providing a good network utilization, which is particularly important access networks with typically limited data rates, and ensuring realization of different QoS guarantees for various telecommunications services. This is important because of a hard competition among communications technologies applied in the access area. The considered MAC protocols apply a per-packet reservation method to avoid the transmission gaps caused by per-burst reservation, and accordingly to achieve a better network utilization. However, the per-packet reservation increases the network load caused by the signaling, which calls for an efficient resource sharing strategy in the signaling channel. There are two basic solutions for capacity sharing in the signaling channel: random access, usually using slotted ALOHA, and dedicated access, realized by a polling method. Performance improvement of basic protocols can be carried out in different ways; by protocol extensions, a combination of different protocol solutions, and the application of adaptive protocols providing a change of access parameters according to the current network status. The best network performance is achieved by application of two-step reservation protocol, which combined with additional features, such as appropriate signaling procedure, priority and fairness mechanisms, and combined reservation domains, can fulfill requirements of services with high QoS demands.

  15. New logistics protocols for distributed interactive simulation

    NASA Astrophysics Data System (ADS)

    Taylor, Darrin; Morrison, John; Katz, Warren; Felton, Erik; Herman, Deborah A.

    1995-06-01

    In today's environment, the transportation and maintenance of military forces is nearly as important as combat operations. Rapid deployment to regions of low-intensity conflict will become a very common training scenario for the U.S. military. Thus it is desirable to apply distributed simulation technology to train logistics personnel in their combat support roles. Currently, distributed interactive simulation (DIS) only contains rudimentary logistics protocols. This paper introduces new protocols designed to handle the logistics problem. The Newtonian protocol takes a physics-based approach to modeling interactions on the simulation network. This protocol consists of a family of protocol data units (PDUs) which are used to communicate forces in different circumstances. The protocol implements a small set of physical relations. This represents a flexible and general mechanism to describe battlefield interactions between network entities. The migratory object protocol (MOP) family addresses the transfer of control. General mechanisms provide the means to simulate resupply, repair, and maintenance of entities at any level of abstraction (individual soldier to division). It can also increase the fidelity of mine laying, enable handover of weapons for terminal guidance, allow for the distribution of aggregate-level simulation entities, provide capabilities for the simulation of personnel, etc.

  16. Snakebite management in Iran: Devising a protocol

    PubMed Central

    Monzavi, Seyed Mostafa; Dadpour, Bita; Afshari, Reza

    2014-01-01

    Background: Snakebite in Iran has been a health concern. However, management of snakebite is not standardized and varies from center to center. This study is aimed at devising an evidence-based comprehensive protocol for snakebite management in Iran, to reduce unnecessary variations in practice. Materials and Methods: A narrative search in electronic databases was performed. Fifty peer-reviewed articles, guidelines, and textbooks were reviewed and practical details were extracted. Our currently used protocol in the Mashhad Toxicology Center was supplemented with this information. Consequently an improved wide-range protocol was developed. The protocol was then discussed and amended within a focus group comprised of medical toxicologists and internal medicine specialists. The amended version was finally discussed with expert physicians specialized in different areas of medicine, to be optimized by supplementing other specific considerations. Results: During a one-year process, the protocol was finalized. The final version of the protocol, which was designed in six steps, comprised of three components: A schematic algorithm, a severity grading scale, and instructions for supportive and adjunctive treatments. The algorithm pertains to both Viperidae and Elapidae snakebite envenomations and consists of a planned course of action and dosing of antivenom, based on the severity of the envenomation. Conclusion: Snakebite envenomation is a clinical toxicologic emergency, which needs to be treated in a timely and organized manner. Hence, a multi-aspect protocol was designed to improve the clinical outcomes, reduce unnecessary administration of antivenom, and help physicians make more proper clinical judgments. PMID:24778670

  17. Etude du processus de changement vecu par des familles ayant decide d'adopter volontairement des comportements d'attenuation des changements climatiques

    NASA Astrophysics Data System (ADS)

    Leger, Michel T.

    Les activites humaines energivores telles l'utilisation intensive de l'automobile, la surconsommation de biens et l'usage excessif d'electricite contribuent aux changements climatiques et autres problemes environnementaux. Bien que plusieurs recherches rapportent que l'etre humain est de plus en plus conscient de ses impacts sur le climat de la planete, ces memes recherches indiquent qu'en general, les gens continuent a se comporter de facon non ecologique. Que ce soit a l'ecole ou dans la communaute, plusieurs chercheurs en education relative a l'environnement estiment qu'une personne bien intentionnee est capable d'adopter des comportements plus respectueux de l'environnement. Le but de cette these etait de comprendre le processus d'integration de comportements d'attenuation des changements climatiques dans des familles. A cette fin, nous nous sommes fixe deux objectifs : 1) decrire les competences et les procedes qui favorisent l'adoption de comportements d'attenuation des changements climatiques dans des familles et 2) decrire les facteurs et les dynamiques familiales qui facilitent et limitent l'adoption de comportements d'attenuation des changements climatiques dans des familles. Des familles ont ete invitees a essayer des comportements personnels et collectifs d'attenuation des changements climatiques de sorte a integrer des modes de vie plus ecologiques. Sur une periode de huit mois, nous avons suivi leur experience de changement afin de mieux comprendre comment se produit le processus de changement dans des familles qui decident volontairement d'adopter des comportements d'attenuation des changements climatiques. Apres leur avoir fourni quelques connaissances de base sur les changements climatiques, nous avons observe le vecu de changement des familles durant huit mois d'essais a l'aide de journaux reflexifs, d'entretiens d'explicitation et du journal du chercheur. La these comporte trois articles scientifiques. Dans le premier article, nous presentons une

  18. Quantum key distribution protocol using random bases

    NASA Astrophysics Data System (ADS)

    Meslouhi, A.; Amellal, H.; Hassouni, Y.; El Baz, M.; El Allati, A.

    2016-04-01

    In order to enhance the quantum key distribution (QKD) security, a new protocol, “QKDPRB” based on random bases is proposed. It consists of using standard encoding bases moving circularly with a variable rotational angle α which depends on angular velocity ω(t); thus, the traditional bases turn into relative ones. To prove the security and the efficiency of the protocol, we present a universal demonstration which proves a high level security of the proposed protocol, even in the presence of the intercept and resend attack. Finally, the QKDPRB may improve the security of QKD.

  19. Performance evaluation of TCP over ABT protocols

    NASA Astrophysics Data System (ADS)

    Ata, Shingo; Murata, Masayuki; Miyahara, Hideo

    1998-10-01

    ABT is promising for effectively transferring a highly bursty data traffic in ATM networks. Most of past studies focused on the data transfer capability of ABT within the ATM layer. In actual, however, we need to consider the upper layer transport protocol since the transport layer protocol also supports a network congestion control mechanism. One such example is TCP, which is now widely used in the Internet. In this paper, we evaluate the performance of TCP over ABT protocols. Simulation results show that the retransmission mechanism of ABT can effectively overlay the TCP congestion control mechanism so that TCP operates in a stable fashion and works well only as an error recovery mechanism.

  20. La microscopie ionique analytique des tissus biologiques

    NASA Astrophysics Data System (ADS)

    Galle, P.

    Proposed in 1960 by R. Castaing and G. Slodzian, secondary ion emission microanalysis is a microanalytical method which is now largely used for the study of inert material. The instrument called the analytical ion microscope can also be used for the study of biological spécimens ; images representing the distribution of a given stable or radioactive isotope in a tissue section are obtained with a resolution of 0.5 μm. Among the characteristics of this method, two are of particular interest in biological research : its capacity for isotopic analysis and its very high sensitivity which makes possible for the first time a chemical analysis of element at a very low or even at a trace concentration in a microvolume. Proposé en 1960 par R. Castaing et G. Slodzian, la microanalyse par émission ionique secondaire est une méthode qui permet, entre autre, d'obtenir des images représentant la distribution des isotopes présents à la surface d'un échantillon solide avec une résolution de 0,5 μm. D'intérêt très général, cette méthode a été d'abord largement utilisée pour l'étude des matériaux inertes. Elle offre en outre des possibilités entièrement nouvelles dans le domaine de la recherche biomédicale. L'instrument réalisé, le microscope ionique analytique présente deux caractéristiques particulièrement intéressantes pour la biologie : la possibilité d'analyse isotopique, et l'extrême sensibilité permettant de détecter et de localiser dans une coupe histologique des éléments à des concentrations très faibles voire à l'état de trace.

  1. Elaboration de nouvelles approches micromecaniques pour l'optimisation des performances mecaniques des materiaux heterogenes

    NASA Astrophysics Data System (ADS)

    Aboutajeddine, Ahmed

    Les modeles micromecaniques de transition d'echelles qui permettent de determiner les proprietes effectives des materiaux heterogenes a partir de la microstructure sont consideres dans ce travail. L'objectif est la prise en compte de la presence d'une interphase entre la matrice et le renforcement dans les modeles micromecaniques classiques, de meme que la reconsideration des approximations de base de ces modeles, afin de traiter les materiaux multiphasiques. Un nouveau modele micromecanique est alors propose pour tenir compte de la presence d'une interphase elastique mince lors de la determination des proprietes effectives. Ce modele a ete construit grace a l'apport de l'equation integrale, des operateurs interfaciaux de Hill et de la methode de Mori-Tanaka. Les expressions obtenues pour les modules globaux et les champs dans l'enrobage sont de nature analytique. L'approximation de base de ce modele est amelioree par la suite dans un nouveau modele qui s'interesse aux inclusions enrobees avec un enrobage mince ou epais. La resolution utilisee s'appuie sur une double homogeneisation realisee au niveau de l'inclusion enrobee et du materiau. Cette nouvelle demarche, permettra d'apprehender completement les implications des approximations de la modelisation. Les resultats obtenus sont exploites par la suite dans la solution de l'assemblage de Hashin. Ainsi, plusieurs modeles micromecaniques classiques d'origines differentes se voient unifier et rattacher, dans ce travail, a la representation geometrique de Hashin. En plus de pouvoir apprecier completement la pertinence de l'approximation de chaque modele dans cette vision unique, l'extension correcte de ces modeles aux materiaux multiphasiques est rendue possible. Plusieurs modeles analytiques et explicites sont alors proposee suivant des solutions de differents ordres de l'assemblage de Hashin. L'un des modeles explicite apparait comme une correction directe du modele de Mori-Tanaka, dans les cas ou celui ci echoue a

  2. Étude des déplacements induits par des précipités dans des alliages à base de cuivre

    NASA Astrophysics Data System (ADS)

    Guillon, I.; Servant, C.; Lyon, O.

    2004-11-01

    Cette étude a pour but de mieux comprendre les premières étapes des phénomènes se produisant lors de la formation de nanoprécipités. En effet, la microstructure des alliages conditionne leurs propriétés mécaniques, et donc l'emploi de ces matériaux. Alors que l'anisotropie des déformations élastiques permet d'expliquer la morphologie des précipités formés lors des traitements thermiques de revenu, peu d'études se sont attachées à les déterminer expérimentalement. Mots clés : transformations de phases, diffusion/diffraction, synchrotron, alliages à base Cu, déplacements

  3. Protocol dependence of the jamming transition

    NASA Astrophysics Data System (ADS)

    Bertrand, Thibault; Behringer, Robert P.; Chakraborty, Bulbul; O'Hern, Corey S.; Shattuck, Mark D.

    2016-01-01

    We propose a theoretical framework for predicting the protocol dependence of the jamming transition for frictionless spherical particles that interact via repulsive contact forces. We study isostatic jammed disk packings obtained via two protocols: isotropic compression and simple shear. We show that for frictionless systems, all jammed packings can be obtained via either protocol. However, the probability to obtain a particular jammed packing depends on the packing-generation protocol. We predict the average shear strain required to jam initially unjammed isotropically compressed packings from the density of jammed packings, shape of their basins of attraction, and path traversed in configuration space. We compare our predictions to simulations of shear strain-induced jamming and find quantitative agreement. We also show that the packing fraction range, over which shear strain-induced jamming occurs, tends to zero in the large system limit for frictionless packings with overdamped dynamics.

  4. Authentication Protocol using Quantum Superposition States

    SciTech Connect

    Kanamori, Yoshito; Yoo, Seong-Moo; Gregory, Don A.; Sheldon, Frederick T

    2009-01-01

    When it became known that quantum computers could break the RSA (named for its creators - Rivest, Shamir, and Adleman) encryption algorithm within a polynomial-time, quantum cryptography began to be actively studied. Other classical cryptographic algorithms are only secure when malicious users do not have sufficient computational power to break security within a practical amount of time. Recently, many quantum authentication protocols sharing quantum entangled particles between communicators have been proposed, providing unconditional security. An issue caused by sharing quantum entangled particles is that it may not be simple to apply these protocols to authenticate a specific user in a group of many users. An authentication protocol using quantum superposition states instead of quantum entangled particles is proposed. The random number shared between a sender and a receiver can be used for classical encryption after the authentication has succeeded. The proposed protocol can be implemented with the current technologies we introduce in this paper.

  5. Protocol to Exploit Waiting Resources for UASNs.

    PubMed

    Hung, Li-Ling; Luo, Yung-Jeng

    2016-01-01

    The transmission speed of acoustic waves in water is much slower than that of radio waves in terrestrial wireless sensor networks. Thus, the propagation delay in underwater acoustic sensor networks (UASN) is much greater. Longer propagation delay leads to complicated communication and collision problems. To solve collision problems, some studies have proposed waiting mechanisms; however, long waiting mechanisms result in low bandwidth utilization. To improve throughput, this study proposes a slotted medium access control protocol to enhance bandwidth utilization in UASNs. The proposed mechanism increases communication by exploiting temporal and spatial resources that are typically idle in order to protect communication against interference. By reducing wait time, network performance and energy consumption can be improved. A performance evaluation demonstrates that when the data packets are large or sensor deployment is dense, the energy consumption of proposed protocol is less than that of existing protocols as well as the throughput is higher than that of existing protocols.

  6. NREL Test-to-Failure Protocol (Presentation)

    SciTech Connect

    Hacke, P.

    2012-03-01

    The presentation describes the test-to-failure protocol that was developed and piloted at NREL, stressing PV modules with multiple applications of damp heat (with bias) and thermal cycling until they fail.

  7. Protocol to Exploit Waiting Resources for UASNs.

    PubMed

    Hung, Li-Ling; Luo, Yung-Jeng

    2016-01-01

    The transmission speed of acoustic waves in water is much slower than that of radio waves in terrestrial wireless sensor networks. Thus, the propagation delay in underwater acoustic sensor networks (UASN) is much greater. Longer propagation delay leads to complicated communication and collision problems. To solve collision problems, some studies have proposed waiting mechanisms; however, long waiting mechanisms result in low bandwidth utilization. To improve throughput, this study proposes a slotted medium access control protocol to enhance bandwidth utilization in UASNs. The proposed mechanism increases communication by exploiting temporal and spatial resources that are typically idle in order to protect communication against interference. By reducing wait time, network performance and energy consumption can be improved. A performance evaluation demonstrates that when the data packets are large or sensor deployment is dense, the energy consumption of proposed protocol is less than that of existing protocols as well as the throughput is higher than that of existing protocols. PMID:27005624

  8. Oncotherapy: A System for Requesting Chemotherapy Protocols.

    PubMed

    Righi, Laura Vera

    2015-01-01

    A clinical decision support system is able to provide oncologists with suitable treatment options at the moment of decision making regarding which chemotherapy protocol is the best to apply to a particular oncological case. The National Cancer Institute has created a Guidelines Committee that establishes therapeutical options for each clinical case. The Health Informatics Department has developed Oncotherapy, a knowledge database that incorporates information provided by the Guidelines Committee. Oncotherapy includes a tailored information repository to provide oncologists in the public health system with the chemotherapy protocols available given three types of data: clinical diagnosis, clinical stage and therapy criteria. The protocol selected by the treating oncologist is sent back to Oncotherapy, which may create new knowledge that can be incorporated into the knowledge database. In this way, the system supports making the best decision according to the chemotherapy protocol options available. Furthermore, it can warn of errors that could result from mistakenly chosen therapies. PMID:26262420

  9. Routing protocols in wireless sensor networks.

    PubMed

    Villalba, Luis Javier García; Orozco, Ana Lucila Sandoval; Cabrera, Alicia Triviño; Abbas, Cláudia Jacy Barenco

    2009-01-01

    The applications of wireless sensor networks comprise a wide variety of scenarios. In most of them, the network is composed of a significant number of nodes deployed in an extensive area in which not all nodes are directly connected. Then, the data exchange is supported by multihop communications. Routing protocols are in charge of discovering and maintaining the routes in the network. However, the appropriateness of a particular routing protocol mainly depends on the capabilities of the nodes and on the application requirements. This paper presents a review of the main routing protocols proposed for wireless sensor networks. Additionally, the paper includes the efforts carried out by Spanish universities on developing optimization techniques in the area of routing protocols for wireless sensor networks. PMID:22291515

  10. 21 CFR 58.120 - Protocol.

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ..., body weight range, sex, source of supply, species, strain, substrain, and age of the test system. (5... methods to be used. (b) All changes in or revisions of an approved protocol and the reasons...

  11. Routing Protocols in Wireless Sensor Networks

    PubMed Central

    Villalba, Luis Javier García; Orozco, Ana Lucila Sandoval; Cabrera, Alicia Triviño; Abbas, Cláudia Jacy Barenco

    2009-01-01

    The applications of wireless sensor networks comprise a wide variety of scenarios. In most of them, the network is composed of a significant number of nodes deployed in an extensive area in which not all nodes are directly connected. Then, the data exchange is supported by multihop communications. Routing protocols are in charge of discovering and maintaining the routes in the network. However, the appropriateness of a particular routing protocol mainly depends on the capabilities of the nodes and on the application requirements. This paper presents a review of the main routing protocols proposed for wireless sensor networks. Additionally, the paper includes the efforts carried out by Spanish universities on developing optimization techniques in the area of routing protocols for wireless sensor networks. PMID:22291515

  12. Evolution of Natural Attenuation Evaluation Protocols

    EPA Science Inventory

    Traditionally the evaluation of the efficacy of natural attenuation was based on changes in contaminant concentrations and mass reduction. Statistical tools and models such as Bioscreen provided evaluation protocols which now are being approached via other vehicles including m...

  13. A practical quantum bit commitment protocol

    NASA Astrophysics Data System (ADS)

    Arash Sheikholeslam, S.; Aaron Gulliver, T.

    2012-01-01

    In this paper, we introduce a new quantum bit commitment protocol which is secure against entanglement attacks. A general cheating strategy is examined and shown to be practically ineffective against the proposed approach.

  14. Putting the Human Back in the Protocol

    NASA Astrophysics Data System (ADS)

    Christianson, Bruce

    Hello, everyone, and welcome to the 14th International Security Protocols Workshop. I’m going to start with a quotation from someone who, at least in principle, is in charge of a very different security community than ours:

  15. A Look Back at the Montreal Protocol

    NASA Video Gallery

    The Montreal Protocol is an international treaty designed to protect the ozone layer. This video takes a look back at how scientists, industry leaders, and policy makers came together to regulate C...

  16. Protocol dependence of the jamming transition.

    PubMed

    Bertrand, Thibault; Behringer, Robert P; Chakraborty, Bulbul; O'Hern, Corey S; Shattuck, Mark D

    2016-01-01

    We propose a theoretical framework for predicting the protocol dependence of the jamming transition for frictionless spherical particles that interact via repulsive contact forces. We study isostatic jammed disk packings obtained via two protocols: isotropic compression and simple shear. We show that for frictionless systems, all jammed packings can be obtained via either protocol. However, the probability to obtain a particular jammed packing depends on the packing-generation protocol. We predict the average shear strain required to jam initially unjammed isotropically compressed packings from the density of jammed packings, shape of their basins of attraction, and path traversed in configuration space. We compare our predictions to simulations of shear strain-induced jamming and find quantitative agreement. We also show that the packing fraction range, over which shear strain-induced jamming occurs, tends to zero in the large system limit for frictionless packings with overdamped dynamics. PMID:26871137

  17. TRANSPLANTATION EN MASSE DES ORGANES ABDOMINAUX

    PubMed Central

    STARZL, T.

    2010-01-01

    Les transplantations multi-organes, comprenant les blocs foie-duodénum-pancréas, foie-estomac-duodénum-pancréas, et foie-intestin sont réalisées avec un succés croissant Ces techniques et leurs combinaisons variées de transplantation monobloc ne sont pas de pratique courante. Les techniques de prélévement, de conservation et de soins post-opératoires sont décrites pour la transplantation multi-organes compléte ainsi que pour les variantes incomplétes. Le probléme particulier à ce type de transplantation est celui de la transplantation intestinale, c’est-à-dire la transplantation d’un organe à composante lymphoréticulaire complexe ce qui peut provoquer un syndrome greffon contre hôte. Par erreur de conception, et un peu par esprit de systéme, les efforts par le passé étaient dirigés sur la modification et la destruction des systémes lymphoréticulaires grâce au traitement préalable du donneur ou des organes transplantés, par médicaments, radiation ou autres moyens. Actuellement, I’idée directrice est de garder intacte les systémes lymphoréticulaires qui deviennent alors le site d’une circulation à double sens aprés transplantation. Avec la puissante immunodépression que fournit le FK 506, les cellules lymphoréticulaires du donneur peuvent circuler chez le receveur sans créer de syndrome du greffon contre hôte clinique et les cellules de la greffe s’assimilent à celles du receveur (chimérisme local) sans provoquer de rejet. Même si I’on évite le rejet ou le syndrome greffon contre hôte, il existe, à côté de ces entités, des relations métaboliques entre les organes greffés ainsi qu’entre les organes greffés et les viscéres du receveur laissés en place, qui peuvent influencer I’avenir soit des organes greffés, soit des organes laissés en place. Parmi les échanges métaboliques les mieux connus actuellement, il y a les facteurs splanchniques hépatotrophes endogénes, dont I’insuline est la mieux

  18. Protocol Development | Division of Cancer Prevention

    Cancer.gov

    The chemoprevention Phase I and II consortia must submit Letters of Intent for review and approval prior to the submission and review of the protocol. Letter of Intent (LOI) Process The chemoprevention Phase I and II consortia must submit Letters of Intent for review and approval prior to the submission and review of the protocol. DCP will solicit Letters of Intent from investigators who want to conduct clinical trials with specific agents. |

  19. Broadening and Simplifying the First SETI Protocol

    NASA Astrophysics Data System (ADS)

    Michaud, M. A. G.

    The Declaration of Principles Concerning Activities Following the Detection of Extraterrestrial Intelligence, known informally as the First SETI Protocol, is the primary existing international guidance on this subject. During the fifteen years since the document was issued, several people have suggested revisions or additional protocols. This article proposes a broadened and simplified text that would apply to the detection of alien technology in our solar system as well as to electromagnetic signals from more remote sources.

  20. Field Monitoring Protocol: Heat Pump Water Heaters

    SciTech Connect

    Sparn, B.; Earle, L.; Christensen, D.; Maguire, J.; Wilson, E.; Hancock, E.

    2013-02-01

    This document provides a standard field monitoring protocol for evaluating the installed performance of Heat Pump Water Heaters in residential buildings. The report is organized to be consistent with the chronology of field test planning and execution. Research questions are identified first, followed by a discussion of analysis methods, and then the details of measuring the required information are laid out. A field validation of the protocol at a house near the NREL campus is included for reference.

  1. Protocol for communications in potentially noisy environments

    DOEpatents

    Boyd, Gerlad M.; Farrow, Jeffrey

    2016-02-09

    A communications protocol that is designed for transmission of data in networks that are subjected to harsh conditions is described herein. A network includes a plurality of devices, where the devices comprise respective nodes. The nodes are in communication with one another by way of a central network hub. The protocol causes the nodes to transmit data over a network bus at different data rates depending upon whether the nodes are operating normally or an arbitration procedure has been invoked.

  2. Field Monitoring Protocol. Heat Pump Water Heaters

    SciTech Connect

    Sparn, B.; Earle, L.; Christensen, D.; Maguire, J.; Wilson, E.; Hancock, C. E.

    2013-02-01

    This document provides a standard field monitoring protocol for evaluating the installed performance of Heat Pump Water Heaters in residential buildings. The report is organized to be consistent with the chronology of field test planning and execution. Research questions are identified first, followed by a discussion of analysis methods, and then the details of measuring the required information are laid out. A field validation of the protocol at a house near the NREL campus is included for reference.

  3. A verification system of RMAP protocol controller

    NASA Astrophysics Data System (ADS)

    Khanov, V. Kh; Shakhmatov, A. V.; Chekmarev, S. A.

    2015-01-01

    The functional verification problem of IP blocks of RMAP protocol controller is considered. The application of the verification method using fully- functional models of the processor and the internal bus of a system-on-chip is justified. Principles of construction of a verification system based on the given approach are proposed. The practical results of creating a system of verification of IP block of RMAP protocol controller is presented.

  4. A Magellanic origin of the DES dwarfs

    NASA Astrophysics Data System (ADS)

    Jethwa, P.; Erkal, D.; Belokurov, V.

    2016-09-01

    We establish the connection between the Magellanic Clouds (MCs) and the dwarf galaxy candidates discovered in the Dark Energy Survey (DES) by building a dynamical model of the MC satellite populations, based on an extensive suite of tailor-made numerical simulations. Our model takes into account the response of the Galaxy to the MCs infall, the dynamical friction experienced by the MCs and the disruption of the MC satellites by their hosts. The simulation suite samples over the uncertainties in the MC's proper motions, the masses of the MW and the Clouds themselves, and allows for flexibility in the intrinsic volume density distribution of the MC satellites. As a result, we can accurately reproduce the DES satellites' observed positions and kinematics. Assuming that Milky Way (MW) dwarfs follow the distribution of sub-haloes in Λ cold dark matter, we further demonstrate that, of 14 observed satellites, the MW halo contributes fewer than 4(8) of these with 68(95) per cent confidence and that 7(12) DES dwarfs have probabilities greater than 0.7(0.5) of belonging to the Large Magellanic Cloud (LMC). Marginalizing over the entire suite, we constrain the number of Magellanic satellites in the range -7 < MV < -1 which exceed the DES surface brightness threshold at ˜70, and the mass of the LMC around 1011 M⊙. The data also strongly support a first-infall scenario for the LMC. Finally, we give predictions for the line-of-sight velocities and the proper motions of the satellites discovered in the vicinity of the LMC.

  5. Peste des petits ruminants in Arabian wildlife.

    PubMed

    Kinne, J; Kreutzer, R; Kreutzer, M; Wernery, U; Wohlsein, P

    2010-08-01

    Recurrence of peste des petits ruminants (PPR) was diagnosed in the United Arabian Emirates in several wild ruminants confirmed by morphological, immunohistochemical, serological and molecular findings. Phylogenetic analysis revealed that the virus strain belongs to lineage IV, which is different to some previously isolated PPR strains from the Arabian Peninsula. This study shows that wild ruminants may play an important epidemiological role as virus source for domestic small ruminants.

  6. The Variable Rate Intravenous Insulin Infusion Protocol.

    PubMed

    Collard, Benjamin; Sturgeon, Jonathan; Patel, Natasha; Asharia, Shabbar

    2014-01-01

    Insulin use among inpatients is high and associated with severe and regular medication errors. An initial baseline audit showed a wide variation in the prescription of intravenous insulin within the trust. These included variation in the choice of fluid prescribed, electrolyte levels not consistently checked, handwritten illegible prescriptions, and varying parameters set for adjustment of the prescription. A Variable Rate Intravenous Insulin Infusion protocol (VRIII)) was introduced to standardize intravenous insulin prescription throughout the trust by all members of the clinical team. We looked at and measured uptake and effects of the VRIII protocol in improving standardization of insulin prescription for inpatients on insulin at St George's NHS trust. The protocol was uploaded to the intranet to allow access 24 hours a day and the staff educated about it. The VRIII protocol was routinely used successfully throughout the trust. Any initial problems were addressed through education of clinical staff. The protocol has shown decreased prescribing and administrative errors, whilst demonstrating good glucose and electrolyte control. Use of a standardized protocol helps reduce medication errors and demonstrates good glycaemic control. Regular and continued education of clinical staff is necessary to maintain its efficacy. PMID:26734228

  7. Inhomogeneites dans le Vent des Etoiles Wolf-Rayet

    NASA Astrophysics Data System (ADS)

    Robert, Carmelle

    1992-01-01

    Des mesures spectroscopiques effectuees avec un haut rapport signal sur bruit et une bonne resolution ont demontre l'existence de regions perturbees en mouvement dans le vent d'etoiles Wolf-Rayet (WR). L'echantillon d'objets etudies ici comprend 9 etoiles WR couvrant differents sous-types WN et WC. De nombreuses petites structures variables superposees au profil des raies d'emission formees dans le vent stellaire signalent la presence des perturbations. L'etude des variations globales des raies et l'examen des micro-structures individuelles ont permis de decrire plusieurs caracteristiques des perturbations. Entre autres, on observe des correlations significatives entre le niveau de variabilite des raies et certains parametres des etoiles qui confirment que le phenomene de variabilite est intrinseque au vent stellaire. En comparant les changements des vitesses radiales et des largeurs equivalentes des differentes raies d'une meme etoile, on conclut que les regions perturbees ont une etendue finie par rapport a l'enveloppe des etoiles. On peut facilement suivre les structures individuelles sur une periode de temps couvrant ~eq8 heures (et peut etre meme 24 heures) avant qu'elles ne disparaissent. Durant ce temps les structures se deplacent en s'eloignant du centre de la raie. A partir des differents comportements notes lors de l'analyse des variations globales et lors de l'examen des structures individuelles, on propose de representer les perturbations par un modele d'inhomogeneites discretes en expansion dans le vent. On suppose simplement que les inhomogeneites emettent comme le vent global (et absorbent aussi si le vent global montre un profil P Cyg). La superposition du graphique de l'acceleration radiale moyenne des inhomogeneites de WR140 en fonction de leur vitesse radiale et du modele theorique d'inhomogeneites qui suivent la loi generale de vitesse donne un taux d'acceleration lent, avec beta >= 3 pour les inhomogeneites de cette etoile. On obtient, entre

  8. Dermatomyosite et panniculite: place des immunoglobulines

    PubMed Central

    Abdelhafidh, Nadia Ben; Toujeni, Sana; Kefi, Asma; Bousetta, Najeh; Sayhi, Sameh; Gharsallah, Imen; Othmani, Salah

    2016-01-01

    La panniculite est une maladie inflammatoire du tissu adipeux sous-cutané rarement associée à la dermatomyosite. Elle peut survenir avant, après ou en même temps que l'atteinte musculaire. Dans la plupart des cas, l’évolution de la panniculite et des autres atteintes de la dermatomyosite est favorable sous traitement corticoïde et/ou immunosuppresseur. Nous rapportons le cas d'une patiente âgée de 48 ans ayant présenté des lésions de panniculite précédant de 2 mois les signes musculaires. L'atteinte cutanée était résistante au traitement corticoïde associés aux immunosuppresseurs ce qui a nécessité le recours au traitement par Immunoglobulines polyvalentes permettant ainsi une amélioration à la fois de l'atteinte cutanée et musculaire. PMID:27516827

  9. Profil anthropometrique des enfants scolarises tananariviens

    PubMed Central

    Razafimanantsoa, Fetralinjiva; Razafindramaro, Notahiana; Raherimandimby, Hasina; Robinson, Annick; RakotoAlson, Olivat; Rasamindrakotroka, Andry

    2013-01-01

    Les enfants tananariviens sont en état de malnutrition chronique. Notre objectif est d’évaluer l'indice de masse corporelle (IMC) pour estimer les enfants apparemment "sains". Une enquête et une mesure de la taille et du poids des enfants scolarisés tananariviens de 6 à 11 ans ont été réalisées. Après leur accord, la taille et l'indice de masse corporelle des 442 enfants tirés au hasard ont été ainsi obtenus. L'analyse de la moyenne de la taille a révélé une différence significative à 8 ans, une différence non évidente sur l'indice de masse corporelle. La comparaison avec les valeurs de référence (OMS 2006) a montré un retard statural de 34% avec une tendance globale à la hausse et un déficit pondéral égal à 5,5% selon le z score. Ainsi, au sein d'une population malnutrie, l'indice de masse corporelle pourrait être utilisé comme un des paramètres à considérer dans l’évaluation de l’état de santé pour classer ces enfants en bonne santé apparente. PMID:24711862

  10. Newtons Universum. Materialien zur Geschichte des Kraftbegriffes.

    NASA Astrophysics Data System (ADS)

    Mit einem Vorwort von E. Seibold und einer Einführung von W. Neuser. This book is a selection of 15 articles published in the journal "Spektrum der Wissenschaft". The original English versions of the papers were first published in "Scientific American". Contents: 1. Impetustheorie und Intuition in der Physik (M. McCloskey). 2. Mittelalterliche Ursprünge der industriellen Revolution (T. S. Reynolds). 3. Leonardo da Vincis Beiträge zur theoretischen Mechanik (V. Foley, W. Soedel). 4. Nikolaus Kopernikus und Tycho Brahe (O. Gingerich). 5. Keplers Entdeckung der ersten beiden Planetengesetze (C. Wilson). 6. Galileis Entdeckung des Fallgesetzes (S. Drake). 7. Galileis Beobachtung des Neptun (S. Drake, C. T. Kowal). 8. Galileo Galilei und der Schatten des Giordano Bruno (L. S. Lerner, E. A. Gosselin). 9. Der Fall Galilei (O. Gingerich). 10. Newtons Apfel und Galileis "Dialog" (S. Drake). 11. Newtons Gravitationsgesetz - aus Formeln wird eine Idee (I. B. Cohen). 12. Christopher Wren: Astronom und Architekt (H. Dorn, R. Mark). 13. Atomismus und Kräfte in der Geschichte (L. Holliday). 14. Ein Elitezirkel vor 200 Jahren: Die Lunar Society von Birmingham (L. Ritchie-Calder). 15. Sadi Carnot: Technik und Theorie der Dampfmaschine (S. S. Wilson).

  11. Sécurité au-delà des mythes et des croyances

    SciTech Connect

    2010-06-24

    Présentation orale en français, support visuel en français et en anglais. La pire des failles de sécurité est l'impression de sécurité. Le décalage entre la compréhension que l’on a des technologies utilisées, et leurs potentiels réels, ainsi que l'impact potentiellement négatif qu'elles peuvent avoir sur nos vies, n'est pas toujours compris, ou pris en compte par la plupart d'entre-nous. On se contente de nos perceptions pour ne pas avoir à se confronter à la réalité... Alors qu'en est-il vraiment ? En matière de sécurité qui de l'humain ou des technologies a le contrôle ?

  12. Paternité des articles et intérêts concurrents : une analyse des recommandations aux auteurs des journaux traitant de pratique pharmaceutique

    PubMed Central

    Courbon, Ève; Tanguay, Cynthia; Lebel, Denis; Bussières, Jean-François

    2014-01-01

    RÉSUMÉ Contexte : La présence d’auteurs honorifiques et fantômes ainsi que les intérêts concurrents représentent des difficultés bien documentées, liées à la publication d’articles scientifiques. Il existe des lignes directrices encadrant la rédaction et la publication de manuscrits scientifiques, notamment celles de l’International Committee of Medical Journal Editors (ICMJE). Objectifs : L’objectif principal de cette étude descriptive et transversale visait à recenser les instructions portant sur la paternité des articles et les intérêts concurrents provenant des recommandations aux auteurs des journaux traitant de pratique pharmaceutique. L’objectif secondaire visait à déterminer des mesures correctrices pour une paternité des articles plus transparente. Méthode : La recherche a débuté par l’identification des journaux traitant de pratique pharmaceutique. La consultation des instructions aux auteurs des journaux a permis ensuite de recenser les recommandations destinées à éviter les problèmes de paternité des articles et d’intérêts concurrents. Finalement, les membres de l’équipe de recherche se sont consultés afin de définir des mesures correctrices possibles à l’intention des chercheurs. Résultats : Des 232 journaux traitant de pharmacie, 33 ont été définis comme traitant de pratique pharmaceutique. Un total de 24 (73 %) journaux mentionnaient suivre la politique de l’ICMJE, 14 (42 %) demandaient aux auteurs de remplir un formulaire de déclaration d’intérêts concurrents au moment de la soumission de l’article, 17 (52 %) présentaient une définition de la qualité d’auteur et 5 (15 %) demandaient de détailler les contributions de chaque auteur. Une grille de 40 critères a été élaborée pour définir l’attribution du statut d’auteur. Conclusion : Moins de la moitié des journaux demandait aux auteurs de transmettre un formulaire de déclaration des intérêts concurrents au moment de la

  13. Les effets du travail en equipe dans l'apprentissage par projets sur la motivation des etudiantes et des etudiants en formation des ingenieurs

    NASA Astrophysics Data System (ADS)

    Fernandez, Nicolas

    Les representants des secteurs industriels et les, milieux professionnels en Amerique du Nord reprochaient aux universites de former des ingenieurs avec peu d'experience pratique en resolution de problemes et en conception. Quelques programmes de genie ont alors mis en place le travail en equipe dans l'apprentissage par projets. Beaucoup d'ecrits font valoir les benefices de l'apprentissage par projets sur la motivation des etudiants. Or, ces benefices commencent a peine a faire l'objet de recherches visant a produire des donnees probantes a ce sujet. Les travaux sur la motivation en contexte d'apprentissage et les modeles theoriques developpes sont issus d'environnements d'apprentissage marques par l'enseignement magistral. Le modele de la valeur attendue de la tache (Eccles et Wigfield, 1995; Neuville, 2004) et le modele du systeme-groupe (St-Arnaud, 2008) ont ete retenus pour mesurer les effets du travail en equipe dans l'apprentissage par projets sur la motivation. La recherche visait aussi a approfondir et a nuancer la comprehension de la motivation des etudiants universitaires apprenant en contexte innovant. Les sujets constituent des etudiants (n=100) travaillant sur des projets d'integration au cours des trois sessions initiales du programme de genie mecanique d'une universite canadienne. L'analyse de regression multiple revele que les construits de la motivation expliquent un tiers de la variance de l'engagement academique dans la realisation du projet d'integration. Les perceptions de l' "expectancy", de la valeur intrinseque et utilitaire sont les determinants principaux de l'engagement des etudiants. L'analyse de variance multivariee a mesures repetees indique que la motivation des etudiants pour le travail sur les projets d'integration a augmente au cours des trois sessions initiales du parcours de formation. Finalement, malgre l'absence d'interaction significative entre les variables de motivation et de l'equipe, les reponses des sujets indiquent une

  14. Etude des phenomenes dynamiques ultrarapides et des caracteristiques impulsionnelles d'emission terahertz du supraconducteur YBCO

    NASA Astrophysics Data System (ADS)

    Savard, Stephane

    Les premieres etudes d'antennes a base de supraconducteurs a haute temperature critique emettant une impulsion electromagnetique dont le contenu en frequence se situe dans le domaine terahertz remontent a 1996. Une antenne supraconductrice est formee d'un micro-pont d'une couche mince supraconductrice sur lequel un courant continu est applique. Un faisceau laser dans le visible est focalise sur le micro-pont et place le supraconducteur dans un etat hors-equilibre ou des paires sont brisees. Grace a la relaxation des quasiparticules en surplus et eventuellement de la reformation des paires supraconductrices, nous pouvons etudier la nature de la supraconductivite. L'analyse de la cinetique temporelle du champ electromagnetique emis par une telle antenne terahertz supraconductrice s'est averee utile pour decrire qualitativement les caracteristiques de celle-ci en fonction des parametres d'operation tels que le courant applique, la temperature et la puissance d'excitation. La comprehension de l'etat hors-equilibre est la cle pour comprendre le fonctionnement des antennes terahertz supraconductrices a haute temperature critique. Dans le but de comprendre ultimement cet etat hors-equilibre, nous avions besoin d'une methode et d'un modele pour extraire de facon plus systematique les proprietes intrinseques du materiau qui compose l'antenne terahertz a partir des caracteristiques d'emission de celle-ci. Nous avons developpe une procedure pour calibrer le spectrometre dans le domaine temporel en utilisant des antennes terahertz de GaAs bombarde aux protons H+ comme emetteur et detecteur. Une fois le montage calibre, nous y avons insere une antenne emettrice dipolaire de YBa 2Cu3O7-delta . Un modele avec des fonctions exponentielles de montee et de descente du signal est utilise pour lisser le spectre du champ electromagnetique de l'antenne de YBa 2Cu3O7-delta, ce qui nous permet d'extraire les proprietes intrinseques de ce dernier. Pour confirmer la validite du modele

  15. Protocol for Communication Networking for Formation Flying

    NASA Technical Reports Server (NTRS)

    Jennings, Esther; Okino, Clayton; Gao, Jay; Clare, Loren

    2009-01-01

    An application-layer protocol and a network architecture have been proposed for data communications among multiple autonomous spacecraft that are required to fly in a precise formation in order to perform scientific observations. The protocol could also be applied to other autonomous vehicles operating in formation, including robotic aircraft, robotic land vehicles, and robotic underwater vehicles. A group of spacecraft or other vehicles to which the protocol applies could be characterized as a precision-formation- flying (PFF) network, and each vehicle could be characterized as a node in the PFF network. In order to support precise formation flying, it would be necessary to establish a corresponding communication network, through which the vehicles could exchange position and orientation data and formation-control commands. The communication network must enable communication during early phases of a mission, when little positional knowledge is available. Particularly during early mission phases, the distances among vehicles may be so large that communication could be achieved only by relaying across multiple links. The large distances and need for omnidirectional coverage would limit communication links to operation at low bandwidth during these mission phases. Once the vehicles were in formation and distances were shorter, the communication network would be required to provide high-bandwidth, low-jitter service to support tight formation-control loops. The proposed protocol and architecture, intended to satisfy the aforementioned and other requirements, are based on a standard layered-reference-model concept. The proposed application protocol would be used in conjunction with conventional network, data-link, and physical-layer protocols. The proposed protocol includes the ubiquitous Institute of Electrical and Electronics Engineers (IEEE) 802.11 medium access control (MAC) protocol to be used in the datalink layer. In addition to its widespread and proven use in

  16. The Space Communications Protocol Standards Program

    NASA Astrophysics Data System (ADS)

    Jeffries, Alan; Hooke, Adrian J.

    1994-11-01

    In the fall of 1992 NASA and the Department of Defense chartered a technical team to explore the possibility of developing a common set of space data communications standards for potential dual-use across the U.S. national space mission support infrastructure. The team focused on the data communications needs of those activities associated with on-lined control of civil and military aircraft. A two-pronged approach was adopted: a top-down survey of representative civil and military space data communications requirements was conducted; and a bottom-up analysis of available standard data communications protocols was performed. A striking intersection of civil and military space mission requirements emerged, and an equally striking consensus on the approach towards joint civil and military space protocol development was reached. The team concluded that wide segments of the U.S. civil and military space communities have common needs for: (1) an efficient file transfer protocol; (2) various flavors of underlying data transport service; (3) an optional data protection mechanism to assure end-to-end security of message exchange; and (4) an efficient internetworking protocol. These recommendations led to initiating a program to develop a suite of protocols based on these findings. This paper describes the current status of this program.

  17. Standardized North American marsh bird monitoring protocol

    USGS Publications Warehouse

    Conway, Courtney J.

    2011-01-01

    Little is known about the population status of many marsh-dependent birds in North America but recent efforts have focused on collecting more reliable information and estimates of population trends. As part of that effort, a standardized survey protocol was developed in 1999 that provided guidance for conducting marsh bird surveys throughout North America such that data would be consistent among locations. The original survey protocol has been revised to provide greater clarification on many issues as the number of individuals using the protocol has grown. The Standardized North American Marsh Bird Monitoring Protocol instructs surveyors to conduct an initial 5-minute passive point-count survey followed by a series of 1-minute segments during which marsh bird calls are broadcast into the marsh following a standardized approach. Surveyors are instructed to record each individual bird from the suite of 26 focal species that are present in their local area on separate lines of a datasheet and estimate the distance to each bird. Also, surveyors are required to record whether each individual bird was detected within each 1-minute subsegment of the survey. These data allow analysts to use several different approaches for estimating detection probability. The Standardized North American Marsh Bird Monitoring Protocol provides detailed instructions that explain the field methods used to monitor marsh birds in North America.

  18. Collaborative patient care protocols: a development process.

    PubMed

    Blaufuss, J; Wynn, J; Hujcs, M

    1993-01-01

    Computerization of these protocols is in progress. This project is funded for one year with projected completion in January 1994. This study will form a framework in which further research can be completed. Utilizing protocols will allow the measurement of nursing decision making by testing relationships between parameters and interventions and by identifying rules for decision making. For example, questions that may be answered include which physiologic parameters do clinicians treat and in what order or priority, as well as what is the impact on patient outcomes in regard to cost of care and complications. Computerized patient care protocols can be further developed to meet patient-specific needs. A computerized data base will facilitate managing large amounts of patient data and tailoring instructions to these patients. One of the goals of this project was to measure the feasibility of developing computerized patient care protocols and implementing them in a critical care setting. Eventually, this experience will facilitate implementing computerized protocols at other sites. An additional benefit is the ability to implement continuous quality improvement strategies in a prospective manner rather than by retrospective review. PMID:10171735

  19. Sensitive localized surface plasmon resonance multiplexing protocols.

    PubMed

    Jia, Kun; Bijeon, Jean L; Adam, Pierre M; Ionescu, Rodica E

    2012-09-18

    Herein are reported two new protocols to obtain different zones of localized surface plasmon resonance (LSPR) gold nanostructures on single glass substrate by using a vacuum evaporation technique followed by a high-temperature annealing (550 °C). The thickness of the gold film, considered as the essential parameter to determine specific LSPR properties, is successfully modulated. In the first protocol, a metal mask is integrated onto the glass substrate during vacuum evaporation to vary the gold film thickness by a "shadowing effect", while in the second protocol several evaporation cycles (up to four cycles) at predefined areas onto the single substrate are performed. The resulting gold-modified samples are characterized using a transmission UV-vis extinction optical setup and scanning electron microscopy (SEM). The size distribution histograms of nanoparticles are also acquired. By employing the first protocol, thanks to the presence of different zones of gold nanoparticles on a single substrate, optimized LSPR responses to different (bio)functionalization zones are rapidly screened. Independently, the second protocol exhibited an excellent correlation between the nominative evaporated gold film thickness, gold nanoparticle sizes, and plasmonic properties (resonant wavelength and peak amplitude). Such substrates are further used in the construction of LSPR immunosensors for the detection of atrazine herbicide.

  20. The Interplanetary Overlay Networking Protocol Accelerator

    NASA Technical Reports Server (NTRS)

    Pang, Jackson; Torgerson, Jordan L.; Clare, Loren P.

    2008-01-01

    A document describes the Interplanetary Overlay Networking Protocol Accelerator (IONAC) an electronic apparatus, now under development, for relaying data at high rates in spacecraft and interplanetary radio-communication systems utilizing a delay-tolerant networking protocol. The protocol includes provisions for transmission and reception of data in bundles (essentially, messages), transfer of custody of a bundle to a recipient relay station at each step of a relay, and return receipts. Because of limitations on energy resources available for such relays, data rates attainable in a conventional software implementation of the protocol are lower than those needed, at any given reasonable energy-consumption rate. Therefore, a main goal in developing the IONAC is to reduce the energy consumption by an order of magnitude and the data-throughput capability by two orders of magnitude. The IONAC prototype is a field-programmable gate array that serves as a reconfigurable hybrid (hardware/ firmware) system for implementation of the protocol. The prototype can decode 108,000 bundles per second and encode 100,000 bundles per second. It includes a bundle-cache static randomaccess memory that enables maintenance of a throughput of 2.7Gb/s, and an Ethernet convergence layer that supports a duplex throughput of 1Gb/s.

  1. STATISTICAL PRINCIPLES FOR PROSPECTIVE STUDY PROTOCOLS:

    PubMed Central

    Langberg, Henning

    2012-01-01

    In the design of scientific studies it is essential to decide on which scientific questions one aims to answer, just as it is important to decide on the correct statistical methods to use to answer these questions. The correct use of statistical methods is crucial in all aspects of research to quantify relationships in data. Despite an increased focus on statistical content and complexity of biomedical research these topics remain difficult for most researchers. Statistical methods enable researchers to condense large spreadsheets with data into means, proportions, and difference between means, risk differences, and other quantities that convey information. One of the goals in biomedical research is to develop parsimonious models ‐ meaning as simple as possible. This approach is valid if the subsequent research report (the article) is written independent of whether the results are “statistically significant” or not. In the present paper we outline the considerations and suggestions on how to build a trial protocol, with an emphasis on having a rigorous protocol stage, always leading to a full article manuscript, independent of statistical findings. We conclude that authors, who find (rigorous) protocol writing too troublesome, will realize that they have already written the first half of the final paper if they follow these recommendations; authors simply need to change the protocols future tense into past tense. Thus, the aim of this clinical commentary is to describe and explain the statistical principles for trial protocols in terms of design, analysis, and reporting of findings. PMID:23091782

  2. Les neuropeptides gastro-intestinaux cibles des effets des rayonnements ionisants : altérations fonctionnelles

    NASA Astrophysics Data System (ADS)

    Linard, C.; Esposito, V.; Wysocki, J.; Griffiths, N. M.

    1998-04-01

    The symptoms associated with exposure to ionizing radiation are nausea, vomiting, diarrhoea. The response of the gut is complex involving modifications of motility and fluid and electrolyte transport. Gastrointestinal regulatory peptides have an important role in these functions. This study showed that radiation-induced tissue variations of neuropeptides have some repercussions on intestinal biological activity of these peptides soon after irradiation. In addition such modifications are also seen a few years after irradiation. Les symptômes associés à l'exposition aux rayonnements ionisants sont des nausées, vomissements et diarrhées. La réponse du système digestif est complexe, impliquant des modifications de la motilité et du transport d'eau et d'électrolytes. les neuropeptides gastro-intestinaux ont un rôle important dans ces fonctions. Cette étude montre que les variations tissulaires de ces neuropeptides induites par l'irradiation ont des répercussions sur l'activité biologique intestinale pour des temps précoces mais que ces perturbations sont encore visibles quelques années après l'irradiation.

  3. Comparaison des effets des irradiations γ, X et UV dans les fibres optiques

    NASA Astrophysics Data System (ADS)

    Girard, S.; Ouerdane, Y.; Baggio, J.; Boukenter, A.; Meunier, J.-P.; Leray, J.-L.

    2005-06-01

    Les fibres optiques présentent de nombreux avantages incitant à les intégrer dans des applications devant résister aux environnements radiatifs associés aux domaines civil, spatial ou militaire. Cependant, leur exposition à un rayonnement entraîne la création de défauts ponctuels dans la silice amorphe pure ou dopée qui constitue les différentes parties de la fibre optique. Ces défauts causent, en particulier, une augmentation transitoire de l'atténuation linéique des fibres optiques responsable de la dégradation voire de la perte du signal propagé dans celles-ci. Dans cet article, nous comparons les effets de deux types d'irradiation: une impulsion X et une dose γ cumulée. Les effets de ces irradiations sont ensuite comparés avec ceux induits par une insolation ultraviolette (244 nm) sur les propriétés d'absorption des fibres optiques. Nous montrons qu'il existe des similitudes entre ces différentes excitations et qu'il est possible, sous certaines conditions, d'utiliser celles-ci afin d'évaluer la capacité de certaines fibres optiques à fonctionner dans un environnement nucléaire donné.

  4. 1. ORIGINAL STONE ARCH BRIDGE OVER THE DES PLAINES RIVER ...

    Library of Congress Historic Buildings Survey, Historic Engineering Record, Historic Landscapes Survey

    1. ORIGINAL STONE ARCH BRIDGE OVER THE DES PLAINES RIVER AT NINTH STREET IN LOCKPORT. THE BRIDGE WAS BUILT ABOUT 1865. NOTE METAL CLAMP ON THE NEAR PIER AND THE 20TH CENTURY REINFORCED CONCRETE ADDITION. - Lockport Historic District, Stone Arch Bridge, Spanning Des Plaines River at Ninth Street, Lockport, Will County, IL

  5. Vers des boites quantiques a base de graphene

    NASA Astrophysics Data System (ADS)

    Branchaud, Simon

    Le graphene est un materiau a base de carbone qui est etudie largement depuis 2004. De tres nombreux articles ont ete publies tant sur les proprietes electroniques, qu'optiques ou mecaniques de ce materiel. Cet ouvrage porte sur l'etude des fluctuations de conductance dans le graphene, et sur la fabrication et la caracterisation de nanostructures gravees dans des feuilles de ce cristal 2D. Des mesures de magnetoresistance a basse temperature ont ete faites pres du point de neutralite de charge (PNC) ainsi qu'a haute densite electronique. On trouve deux origines aux fluctuations de conductance pres du PNC, soit des oscillations mesoscopiques provenant de l'interference quantique, et des fluctuations dites Hall quantique apparaissant a plus haut champ (>0.5T), semblant suivre les facteurs de remplissage associes aux monocouches de graphene. Ces dernieres fluctuations sont attribuees a la charge d'etats localises, et revelent un precurseur a l'effet Hall quantique, qui lui, ne se manifeste pas avant 2T. On arrive a extraire les parametres caracterisant l'echantillon a partir de ces donnees. A la fin de cet ouvrage, on effectue des mesures de transport dans des constrictions et ilots de graphene, ou des boites quantiques sont formees. A partir de ces mesures, on extrait les parametres importants de ces boites quantiques, comme leur taille et leur energie de charge.

  6. Peste des petits ruminants virus in Heilongjiang province, China, 2014.

    PubMed

    Wang, Jingfei; Wang, Miao; Wang, Shida; Liu, Zaisi; Shen, Nan; Si, Wei; Sun, Gang; Drewe, Julian A; Cai, Xuehui

    2015-04-01

    During March 25-May 5, 2014, we investigated 11 outbreaks of peste des petits ruminants in Heilongjiang Province, China. We found that the most likely source of the outbreaks was animals from livestock markets in Shandong. Peste des petits ruminants viruses belonging to lineages II and IV were detected in sick animals. PMID:25811935

  7. Peste des petits ruminants virus in Heilongjiang province, China, 2014.

    PubMed

    Wang, Jingfei; Wang, Miao; Wang, Shida; Liu, Zaisi; Shen, Nan; Si, Wei; Sun, Gang; Drewe, Julian A; Cai, Xuehui

    2015-04-01

    During March 25-May 5, 2014, we investigated 11 outbreaks of peste des petits ruminants in Heilongjiang Province, China. We found that the most likely source of the outbreaks was animals from livestock markets in Shandong. Peste des petits ruminants viruses belonging to lineages II and IV were detected in sick animals.

  8. Incorporating ethical principles into clinical research protocols: a tool for protocol writers and ethics committees.

    PubMed

    Li, Rebecca H; Wacholtz, Mary C; Barnes, Mark; Boggs, Liam; Callery-D'Amico, Susan; Davis, Amy; Digilova, Alla; Forster, David; Heffernan, Kate; Luthin, Maeve; Lynch, Holly Fernandez; McNair, Lindsay; Miller, Jennifer E; Murphy, Jacquelyn; Van Campen, Luann; Wilenzick, Mark; Wolf, Delia; Woolston, Cris; Aldinger, Carmen; Bierer, Barbara E

    2016-04-01

    A novel Protocol Ethics Tool Kit ('Ethics Tool Kit') has been developed by a multi-stakeholder group of the Multi-Regional Clinical Trials Center of Brigham and Women's Hospital and Harvard. The purpose of the Ethics Tool Kit is to facilitate effective recognition, consideration and deliberation of critical ethical issues in clinical trial protocols. The Ethics Tool Kit may be used by investigators and sponsors to develop a dedicated Ethics Section within a protocol to improve the consistency and transparency between clinical trial protocols and research ethics committee reviews. It may also streamline ethics review and may facilitate and expedite the review process by anticipating the concerns of ethics committee reviewers. Specific attention was given to issues arising in multinational settings. With the use of this Tool Kit, researchers have the opportunity to address critical research ethics issues proactively, potentially speeding the time and easing the process to final protocol approval. PMID:26811365

  9. Incorporating ethical principles into clinical research protocols: a tool for protocol writers and ethics committees

    PubMed Central

    Li, Rebecca H; Wacholtz, Mary C; Barnes, Mark; Boggs, Liam; Callery-D'Amico, Susan; Davis, Amy; Digilova, Alla; Forster, David; Heffernan, Kate; Luthin, Maeve; Lynch, Holly Fernandez; McNair, Lindsay; Miller, Jennifer E; Murphy, Jacquelyn; Van Campen, Luann; Wilenzick, Mark; Wolf, Delia; Woolston, Cris; Aldinger, Carmen; Bierer, Barbara E

    2016-01-01

    A novel Protocol Ethics Tool Kit (‘Ethics Tool Kit’) has been developed by a multi-stakeholder group of the Multi-Regional Clinical Trials Center of Brigham and Women's Hospital and Harvard. The purpose of the Ethics Tool Kit is to facilitate effective recognition, consideration and deliberation of critical ethical issues in clinical trial protocols. The Ethics Tool Kit may be used by investigators and sponsors to develop a dedicated Ethics Section within a protocol to improve the consistency and transparency between clinical trial protocols and research ethics committee reviews. It may also streamline ethics review and may facilitate and expedite the review process by anticipating the concerns of ethics committee reviewers. Specific attention was given to issues arising in multinational settings. With the use of this Tool Kit, researchers have the opportunity to address critical research ethics issues proactively, potentially speeding the time and easing the process to final protocol approval. PMID:26811365

  10. Incorporating ethical principles into clinical research protocols: a tool for protocol writers and ethics committees.

    PubMed

    Li, Rebecca H; Wacholtz, Mary C; Barnes, Mark; Boggs, Liam; Callery-D'Amico, Susan; Davis, Amy; Digilova, Alla; Forster, David; Heffernan, Kate; Luthin, Maeve; Lynch, Holly Fernandez; McNair, Lindsay; Miller, Jennifer E; Murphy, Jacquelyn; Van Campen, Luann; Wilenzick, Mark; Wolf, Delia; Woolston, Cris; Aldinger, Carmen; Bierer, Barbara E

    2016-04-01

    A novel Protocol Ethics Tool Kit ('Ethics Tool Kit') has been developed by a multi-stakeholder group of the Multi-Regional Clinical Trials Center of Brigham and Women's Hospital and Harvard. The purpose of the Ethics Tool Kit is to facilitate effective recognition, consideration and deliberation of critical ethical issues in clinical trial protocols. The Ethics Tool Kit may be used by investigators and sponsors to develop a dedicated Ethics Section within a protocol to improve the consistency and transparency between clinical trial protocols and research ethics committee reviews. It may also streamline ethics review and may facilitate and expedite the review process by anticipating the concerns of ethics committee reviewers. Specific attention was given to issues arising in multinational settings. With the use of this Tool Kit, researchers have the opportunity to address critical research ethics issues proactively, potentially speeding the time and easing the process to final protocol approval.

  11. Automated plan-recognition of chemotherapy protocols

    PubMed Central

    Bhatia, Haresh; Levy, Mia

    2011-01-01

    Cancer patients are often treated with multiple sequential chemotherapy protocols ranging in complexity from simple to highly complex patterns of multiple repeating drugs. Clinical documentation procedures that focus on details of single drug events, however, make it difficult for providers and systems to efficiently abstract the sequence and nature of treatment protocols. We have developed a data driven method for cancer treatment plan recognition that takes as input pharmacy chemotherapy dispensing records and produces the sequence of identified chemotherapy protocols. Compared to a manually annotated gold standard, our method was 75% accurate and 80% precise for a breast cancer testing set (110 patients, 2,029 drug events), and 54% accurate and 63% precise for a lung cancer testing set (53 patients, 670 drug events). This method for cancer treatment plan recognition may provide clinicians and systems an abstracted view of the patient’s treatment history. PMID:22195061

  12. Efficient Controlled Quantum Secure Direct Communication Protocols

    NASA Astrophysics Data System (ADS)

    Patwardhan, Siddharth; Moulick, Subhayan Roy; Panigrahi, Prasanta K.

    2016-07-01

    We study controlled quantum secure direct communication (CQSDC), a cryptographic scheme where a sender can send a secret bit-string to an intended recipient, without any secure classical channel, who can obtain the complete bit-string only with the permission of a controller. We report an efficient protocol to realize CQSDC using Cluster state and then go on to construct a (2-3)-CQSDC using Brown state, where a coalition of any two of the three controllers is required to retrieve the complete message. We argue both protocols to be unconditionally secure and analyze the efficiency of the protocols to show it to outperform the existing schemes while maintaining the same security specifications.

  13. Chapter 22: Compressed Air Evaluation Protocol

    SciTech Connect

    Benton, N.

    2014-11-01

    Compressed-air systems are used widely throughout industry for many operations, including pneumatic tools, packaging and automation equipment, conveyors, and other industrial process operations. Compressed-air systems are defined as a group of subsystems composed of air compressors, air treatment equipment, controls, piping, pneumatic tools, pneumatically powered machinery, and process applications using compressed air. A compressed-air system has three primary functional subsystems: supply, distribution, and demand. Air compressors are the primary energy consumers in a compressed-air system and are the primary focus of this protocol. The two compressed-air energy efficiency measures specifically addressed in this protocol are: high-efficiency/variable speed drive (VSD) compressor replacing modulating compressor; compressed-air leak survey and repairs. This protocol provides direction on how to reliably verify savings from these two measures using a consistent approach for each.

  14. Chapter 15: Commercial New Construction Protocol

    SciTech Connect

    Keates, S.

    2014-09-01

    This protocol is intended to describe the recommended method when evaluating the whole-building performance of new construction projects in the commercial sector. The protocol focuses on energy conservation measures (ECMs) measures (or packages of measures) where evaluators can best analyze impacts using building simulation. These ECMs typically require the use of calibrated building simulations under Option D of the International Performance Measurement and Verification Protocol. Examples of such measures include Leadership in Energy and Environmental Design building certification, novel and/or efficient heating, ventilation, and air conditioning system designs, and extensive building controls systems. In general, it is best to evaluate any ECM (or set of measures) expected to significantly interact with other systems within the building and with savings sensitive to seasonal variations in weather.

  15. An object-oriented communication protocol

    NASA Astrophysics Data System (ADS)

    Chapman, Lee J.

    1990-08-01

    OOC is a high-level (OSI application layer and above) controls communication protocol. While natural languages are too complex for the controls environment, computer protocols are often insufficiently expressive. OOC is an attempt to balance simplicity and expressivity, and is sufficiently flexible to express data acquisition, control requests, alarm messages and error messages in a straightforward generic way. OOC supports dynamic creation of objects. It can be used in networks, for intertask and even for intratask communication. OOC, the protocol, is supported by OOC, the code, written in portable C. The lower level of this code supports a tagged-data scheme, with tags as elementary as INTEGER and BOOLEAN and as complex as OBJECT and MESSAGE. These tagged data can be evaluated in a LISP-like way.

  16. Etude du processus de changement vecu par des familles ayant decide d'adopter volontairement des comportements d'attenuation des changements climatiques

    NASA Astrophysics Data System (ADS)

    Leger, Michel T.

    Les activites humaines energivores telles l'utilisation intensive de l'automobile, la surconsommation de biens et l'usage excessif d'electricite contribuent aux changements climatiques et autres problemes environnementaux. Bien que plusieurs recherches rapportent que l'etre humain est de plus en plus conscient de ses impacts sur le climat de la planete, ces memes recherches indiquent qu'en general, les gens continuent a se comporter de facon non ecologique. Que ce soit a l'ecole ou dans la communaute, plusieurs chercheurs en education relative a l'environnement estiment qu'une personne bien intentionnee est capable d'adopter des comportements plus respectueux de l'environnement. Le but de cette these etait de comprendre le processus d'integration de comportements d'attenuation des changements climatiques dans des familles. A cette fin, nous nous sommes fixe deux objectifs : 1) decrire les competences et les procedes qui favorisent l'adoption de comportements d'attenuation des changements climatiques dans des familles et 2) decrire les facteurs et les dynamiques familiales qui facilitent et limitent l'adoption de comportements d'attenuation des changements climatiques dans des familles. Des familles ont ete invitees a essayer des comportements personnels et collectifs d'attenuation des changements climatiques de sorte a integrer des modes de vie plus ecologiques. Sur une periode de huit mois, nous avons suivi leur experience de changement afin de mieux comprendre comment se produit le processus de changement dans des familles qui decident volontairement d'adopter des comportements d'attenuation des changements climatiques. Apres leur avoir fourni quelques connaissances de base sur les changements climatiques, nous avons observe le vecu de changement des familles durant huit mois d'essais a l'aide de journaux reflexifs, d'entretiens d'explicitation et du journal du chercheur. La these comporte trois articles scientifiques. Dans le premier article, nous presentons une

  17. Etude des systèmes protoplanétaires

    NASA Astrophysics Data System (ADS)

    Augereau, Jean-Charles

    2000-11-01

    Les disques de poussières et de gaz autour des étoiles rejoignant la Séquence Principale sont les sites de formation des planètes extra-solaires dont l'existence s'est vu confirmée récemment. Cette thèse aborde l'étude de la poussière des environnements circumstellaires. Elle associe des observations spatiales à haute résolution angulaire, la modélisation des propriétés physico-chimiques des poussières et leur comportement optique, la modélisation des disques optiquement fins et la dynamique des planétésimaux à l'origine des grains observés autour des étoiles âgées. Les images obtenues avec le Télescope Spatial Hubble révèlent deux nouveaux disques circumstellaires autour des étoiles HD 141569 et HD 100546, parfois classées dans la catégorie des étoiles de Herbig. Bien que les systèmes présentent des âges proches (~10 millions d'années), les morphologies très différentes des disques mettent en évidence la difficulté pour élaborer un scénario unique d'évolution des systèmes protoplanétaires. L'anneau fin de poussières autour de HR 4796A, une étoile d'âge similaire aux précédentes, est marginalement résolu depuis le sol. La modélisation complète de ce disque permet de reproduire l'ensemble des observations disponibles. Ces résultats impliquent la présence de planétésimaux, à un âge aussi peu avancé, pour repeupler le disque en poussières poreuses et essentiellement amorphes qui sont soufflées par la pression de radiation. Une modélisation dynamique du prototypique disque autour de β Pictoris est proposée. Associée à une description réaliste du comportement optique des grains, cette approche reproduit les caractéristiques générales du disque ainsi que des asymétries plus fines en supposant la présence d'une planète dans un disque de planétésimaux et en tenant compte des effets différentiels de la pression de radiation sur les grains. Enfin, le modèle de disques que j'ai développé est exploit

  18. A class-chest for deriving transport protocols

    SciTech Connect

    Strayer, W.T.

    1996-10-01

    Development of new transport protocols or protocol algorithms suffers from the complexity of the environment in which they are intended to run. Modeling techniques attempt to avoid this by simulating the environment. Another approach to promoting rapid prototyping of protocols and protocol algorithms is to provide a pre-built infrastructure that is common to transport protocols, so that the focus is placed on the protocol-specific aspects. The Meta-Transport Library is a library of C++ base classes that implement or abstract out the mundane functions of a protocol, new protocol implementations are derived from base classes. The result is a fully viable user- level transport protocol implementation, with emphasis on modularity. The collection of base classes form a ``class-chest`` of tools .from which protocols can be developed and studied with as little change to a normal UNIX environment as possible.

  19. Etude de la dynamique des porteurs dans des nanofils de silicium par spectroscopie terahertz

    NASA Astrophysics Data System (ADS)

    Beaudoin, Alexandre

    Ce memoire presente une etude des proprietes de conduction electrique et de la dynamique temporelle des porteurs de charges dans des nanofils de silicium sondes par rayonnement terahertz. Les cas de nanofils de silicium non intentionnellement dopes et dopes type n sont compares pour differentes configurations du montage experimental. Les mesures de spectroscopie terahertz en transmission montre qu'il est possible de detecter la presence de dopants dans les nanofils via leur absorption du rayonnement terahertz (˜ 1--12 meV). Les difficultes de modelisation de la transmission d'une impulsion electromagnetique dans un systeme de nanofils sont egalement discutees. La detection differentielle, une modification au systeme de spectroscopie terahertz, est testee et ses performances sont comparees au montage de caracterisation standard. Les instructions et des recommendations pour la mise en place de ce type de mesure sont incluses. Les resultats d'une experience de pompe optique-sonde terahertz sont egalement presentes. Dans cette experience, les porteurs de charge temporairement crees suite a l'absorption de la pompe optique (lambda ˜ 800 nm) dans les nanofils (les photoporteurs) s'ajoutent aux porteurs initialement presents et augmentent done l'absorption du rayonnement terahertz. Premierement, l'anisotropie de l'absorption terahertz et de la pompe optique par les nanofils est demontree. Deuxiemement, le temps de recombinaison des photoporteurs est etudie en fonction du nombre de photoporteurs injectes. Une hypothese expliquant les comportements observes pour les nanofils non-dopes et dopes-n est presentee. Troisiemement, la photoconductivite est extraite pour les nanofils non-dopes et dopes-n sur une plage de 0.5 a 2 THz. Un lissage sur la photoconductivite permet d'estimer le nombre de dopants dans les nanofils dopes-n. Mots-cles: nanofil, silicium, terahertz, conductivite, spectroscopie, photoconductivite.

  20. Anisotropie des coefficients de diffusion dans des cristaux liquides discotiques hexagonaux

    NASA Astrophysics Data System (ADS)

    Daoud, M.; Gharbia, M.; Gharbi, A.

    1994-06-01

    The diffusion constants of dyes in several hexagonal discotic liquid crystals are measured and discussed. For all the liquid crystals studied, these constants are anisotropic : the diffusion in the direction parallel to the columns is faster than that in the perpendicular plane (frac{D_allel}{D_perp}>1). The effects of the length and shape of the chains bound to the triphenylene discs are shown. The effect of the dye molecular size is also described. The study of the diffusion coefficients of hexapentoxytriphenylene (C5HET) as a function of temperature has shown that the activation energies along the columns and perpendicular to the columns are comparable. The main features of dye diffusion in the hexagonal columnar liquid crystals studied are similar to those reported in nematic phases. Les mesures des constantes de diffusion de colorants dans plusieurs cristaux liquides discotiques hexagonaux sont présentées et discutées. Pour tous les cristaux liquides étudiés, ces constantes présentent une anisotropie, avec une diffusion plus rapide parallèlement aux colonnes que perpendiculairement à celles-ci (frac{D_allel}{D_perp}>1). Des effets de longueur et de forme des chaînes branchées sur les disques de triphénylène sont mis en évidence. Il en est de même pour la taille des molécules de colorants. L'étude en fonction de la température a montré que dans le cas de l'hexapentoxytriphénylène (C5HET), les énergies d'activation dans les directions parallèle et perpendiculaire aux colonnes sont comparables. Les caractéristiques de la diffusion de colorants dans les cristaux liquides colonnaires hexagonaux étudiés sont semblables à celles des nématiques.

  1. Cryptanalysis of the Quantum Group Signature Protocols

    NASA Astrophysics Data System (ADS)

    Zhang, Ke-Jia; Sun, Ying; Song, Ting-Ting; Zuo, Hui-Juan

    2013-11-01

    Recently, the researches of quantum group signature (QGS) have attracted a lot of attentions and some typical protocols have been designed for e-payment system, e-government, e-business, etc. In this paper, we analyze the security of the quantum group signature with the example of two novel protocols. It can be seen that both of them cannot be implemented securely since the arbitrator cannot solve the disputes fairly. In order to show that, some possible attack strategies, which can be used by the malicious participants, are proposed. Moreover, the further discussions of QGS are presented finally, including some insecurity factors and improved ideas.

  2. A Protocol for Evaluating Contextual Design Principles

    PubMed Central

    Stamps, Arthur

    2014-01-01

    This paper explains how scientific data can be incorporated into urban design decisions, such as evaluating contextual design principles. The recommended protocols are based on the Cochrane Reviews that have been widely used in medical research. The major concepts of a Cochrane Review are explained, as well as the underlying mathematics. The underlying math is meta-analysis. Data are reported for three applications and seven contextual design policies. It is suggested that use of the Cochrane protocols will be of great assistance to planners by providing scientific data that can be used to evaluate the efficacies of contextual design policies prior to implementing those policies. PMID:25431448

  3. Building multiservice Internet protocol virtual private networks

    NASA Astrophysics Data System (ADS)

    Cheung, William

    1999-11-01

    Multiservice Internet Protocol-based Virtual Private Networks (MIP- VPNs) with Quality of Service (QoS) are becoming a reality due to the availability of new standards from the Internet Engineering Task Force (IETF). This paper describes how components including security models, IP tunneling protocols, and service differentiation schemes fit together in order to construct such a VPN. First, the concept and rationale of VPN is presented, followed by a discussion of its supporting components. A comparison is made among the various VPN technologies.

  4. Social Protocols for Agile Virtual Teams

    NASA Astrophysics Data System (ADS)

    Picard, Willy

    Despite many works on collaborative networked organizations (CNOs), CSCW, groupware, workflow systems and social networks, computer support for virtual teams is still insufficient, especially support for agility, i.e. the capability of virtual team members to rapidly and cost efficiently adapt the way they interact to changes. In this paper, requirements for computer support for agile virtual teams are presented. Next, an extension of the concept of social protocol is proposed as a novel model supporting agile interactions within virtual teams. The extended concept of social protocol consists of an extended social network and a workflow model.

  5. In Brief: Kyoto Protocol moves forward

    NASA Astrophysics Data System (ADS)

    Showstack, Randy

    2004-10-01

    The Russian cabinet's 30 September endorsement of the Kyoto Protocol to the United Nations Framework Convention on Climate Change (UNFCCC) likely clears the way for the treaty's ratification by that country's parliament and for its entry into force. The protocol enters into force when not less than 55 Parties to the Convention, including industrialized countries (so called ``Annex I Parties'') which accounted in total for at least 55 % of the total carbon dioxide emissions for 1990 from that group, officially have agreed to the treaty.

  6. The Parasol Protocol for computational mutagenesis.

    PubMed

    Aronica, P G A; Verma, C; Popovic, B; Leatherbarrow, R J; Gould, I R

    2016-07-01

    To aid in the discovery and development of peptides and proteins as therapeutic agents, a virtual screen can be used to predict trends and direct workflow. We have developed the Parasol Protocol, a dynamic method implemented using the AMBER MD package, for computational site-directed mutagenesis. This tool can mutate between any pair of amino acids in a computationally expedient, automated manner. To demonstrate the potential of this methodology, we have employed the protocol to investigate a test case involving stapled peptides, and have demonstrated good agreement with experiment. PMID:27255759

  7. NADA protocol: integrative acupuncture in addictions.

    PubMed

    Carter, Kenneth; Olshan-Perlmutter, Michelle

    2014-01-01

    National Acupuncture Detoxification Association (NADA) acupuncture is a simple, standardized, 1- to 5-point auricular needling protocol that originated as a grass-roots response to the opiate epidemic of the 1970s. NADA acupuncture is increasingly recognized as a universally useful intervention in the treatment of addictions specifically and in behavior health more generally. It is recognized as a best practice in the treatment of substance use disorders. Integrative programs using the NADA protocol are likely to see improvements in engagement, retention, decreased drug cravings, anxiety, and less physical symptoms.

  8. The Kyoto Protocol: A business perspective

    SciTech Connect

    Malin, C.B.

    1998-01-19

    Governments have made a tentative start in responding to climate change. In marathon negotiating sessions that extended into an extra day Dec. 1--11 in Kyoto, Japan, representatives from more than 160 governments hammered out the Kyoto Protocol to the United Nations Framework Convention on Climate Change (FCCC). The protocol calls for developed countries to reduce emissions of greenhouse gases (GHGs) on averaged by 5.2% below 1990 levels by the years 2008--2012. Developing countries have no new obligations. The paper discusses the agreement, ratification, future questions, business role, and the challenge.

  9. Quantum Private Comparison Protocol with Linear Optics

    NASA Astrophysics Data System (ADS)

    Luo, Qing-bin; Yang, Guo-wu; She, Kun; Li, Xiaoyu

    2016-09-01

    In this paper, we propose an innovative quantum private comparison(QPC) protocol based on partial Bell-state measurement from the view of linear optics, which enabling two parties to compare the equality of their private information with the help of a semi-honest third party. Partial Bell-state measurement has been realized by using only linear optical elements in experimental measurement-device-independent quantum key distribution(MDI-QKD) schemes, which makes us believe that our protocol can be realized in the near future. The security analysis shows that the participants will not leak their private information.

  10. Hans Bethe : Des etoiles a la bombe

    NASA Astrophysics Data System (ADS)

    Bonnet-Bidaud, J. M.

    1996-06-01

    Il comprit le premier comment brillent les etoiles. Il fut aussi de cette poignee de scientifiques qui, dans le secret de Los Alamos, mirent au point la tristement celebre bombe atomique. Hans Bethe est l'un des derniers geants qui auront marque la physique de ce siecle d'une empreinte indelebile. C'est dans le bureau 01 du prestigieux laboratoire Kellog de l'institut Caltech qu'il a bien voulu retracer pour nous son impressionnante carriere, et revenir sur les motivations qui ont guide ses pas.

  11. Interpolation of recurrence and hashing entanglement distillation protocols

    SciTech Connect

    Vollbrecht, Karl Gerd H.; Verstraete, Frank

    2005-06-15

    We construct interesting entanglement distillation protocols by interpolating between the recurrence and hashing protocols. This leads to asymptotic two-way distillation protocols, resulting in an improvement of the distillation rate for all mixed Bell diagonal entangled states, even for the ones with very high fidelity. We also present a method for how entanglement-assisted distillation protocol can be converted into nonentanglement-assisted protocols with the same yield.

  12. From Postpartum Haemorrhage Guideline to Local Protocol: A Study of Protocol Quality.

    PubMed

    Woiski, Mallory D; van Vugt, Helena C; Dijkman, Anneke; Grol, Richard P; Marcus, Abraham; Middeldorp, Johanna M; Mol, Ben W; Mols, Femke; Oudijk, Martijn A; Porath, Martina; Scheepers, Hubertina J; Hermens, Rosella P

    2016-10-01

    Objective Postpartum hemorrhage (PPH) has a continuously rising incidence worldwide, suggesting suboptimal care. An important step in optimizing care is the translation of evidence-based guidelines into comprehensive hospital protocols. However, knowledge about the quality of these protocols is lacking. The objective of this study was to evaluate the quality of PPH-protocols on structure and content in the Netherlands. Methods We performed an observational multicenter study. Eighteen PPH-protocols from 3 University Hospitals (UH), 8 Teaching Hospitals (TH) and 7 Non-Teaching hospitals (NTH) throughout the Netherlands were acquired. The structure of the PPH-protocols was assessed using the Appraisal of Guidelines for Research and Evaluation (AGREE-II) Instrument. The content was appraised using previously developed quality indicators, based on international guidelines and Advance-Trauma-Life-Support (ATLS)-based course instructions. Results The quality of the protocols for postpartum hemorrhage for both structure and content varied widely between different hospitals, but all of them showed room for improvement. The protocols scored mainly below average on the different items of the AGREE-II instrument (8 of the 10 items scored <4 on a 1-7 scale). Regarding the content, adoption of guideline recommendations in protocols was 46 %. In addition, a timely indication of 'when to perform' a recommendation was lacking in three-fourths of the items. Conclusion This study shows that the quality of the PPH-protocols for both structure and content in the Netherlands is suboptimal. This makes adherence to the guideline and ATLS-based course instructions difficult. PMID:27395381

  13. Evaluating Computer-Tutors: A Protocol Study.

    ERIC Educational Resources Information Center

    Strickland, James

    A protocol study investigated whether computer tutors (programs that interactively guide writers while they freewrite with a word processing program) promote or hinder a richer understanding of the composing process. The analysis focused on writers' attitudes toward computer tutors in the invention process. Data were collected by tape recording a…

  14. 16 CFR 1212.4 - Test protocol.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... results and acceptance criterion. To determine whether a surrogate multi-purpose lighter resists operation... STANDARD FOR MULTI-PURPOSE LIGHTERS Requirements for Child-Resistance § 1212.4 Test protocol. (a) Child test panel. (1) The test to determine if a multi-purpose lighter is resistant to successful...

  15. A Bayesian approach to optimizing cryopreservation protocols.

    PubMed

    Sambu, Sammy

    2015-01-01

    Cryopreservation is beset with the challenge of protocol alignment across a wide range of cell types and process variables. By taking a cross-sectional assessment of previously published cryopreservation data (sample means and standard errors) as preliminary meta-data, a decision tree learning analysis (DTLA) was performed to develop an understanding of target survival using optimized pruning methods based on different approaches. Briefly, a clear direction on the decision process for selection of methods was developed with key choices being the cooling rate, plunge temperature on the one hand and biomaterial choice, use of composites (sugars and proteins as additional constituents), loading procedure and cell location in 3D scaffolding on the other. Secondly, using machine learning and generalized approaches via the Naïve Bayes Classification (NBC) method, these metadata were used to develop posterior probabilities for combinatorial approaches that were implicitly recorded in the metadata. These latter results showed that newer protocol choices developed using probability elicitation techniques can unearth improved protocols consistent with multiple unidimensionally-optimized physical protocols. In conclusion, this article proposes the use of DTLA models and subsequently NBC for the improvement of modern cryopreservation techniques through an integrative approach.

  16. Protocols for growing plant symbioses; mycorrhiza.

    PubMed

    Schultze, Michael

    2013-01-01

    Arbuscular mycorrhizal symbiosis is receiving increased attention as a potential contributor to sustainable crop plant nutrition. This chapter details a set of protocols for plant growth to study the development and physiology of the arbuscular mycorrhizal symbiosis, and how to establish root organ cultures for the production of axenic inoculum.

  17. Reliable multicasting in the Xpress Transport Protocol

    SciTech Connect

    Atwood, J.W.; Catrina, O.; Fenton, J.; Strayer, W.T.

    1996-12-01

    The Xpress Transport Protocol (XTP) is designed to meet the needs of distributed, real-time, and multimedia systems. This paper describes the genesis of recent improvements to XTP that provide mechanisms for reliable management of multicast groups, and gives details of the mechanisms used.

  18. A Geographical Heuristic Routing Protocol for VANETs.

    PubMed

    Urquiza-Aguiar, Luis; Tripp-Barba, Carolina; Aguilar Igartua, Mónica

    2016-01-01

    Vehicular ad hoc networks (VANETs) leverage the communication system of Intelligent Transportation Systems (ITS). Recently, Delay-Tolerant Network (DTN) routing protocols have increased their popularity among the research community for being used in non-safety VANET applications and services like traffic reporting. Vehicular DTN protocols use geographical and local information to make forwarding decisions. However, current proposals only consider the selection of the best candidate based on a local-search. In this paper, we propose a generic Geographical Heuristic Routing (GHR) protocol that can be applied to any DTN geographical routing protocol that makes forwarding decisions hop by hop. GHR includes in its operation adaptations simulated annealing and Tabu-search meta-heuristics, which have largely been used to improve local-search results in discrete optimization. We include a complete performance evaluation of GHR in a multi-hop VANET simulation scenario for a reporting service. Our study analyzes all of the meaningful configurations of GHR and offers a statistical analysis of our findings by means of MANOVA tests. Our results indicate that the use of a Tabu list contributes to improving the packet delivery ratio by around 5% to 10%. Moreover, if Tabu is used, then the simulated annealing routing strategy gets a better performance than the selection of the best node used with carry and forwarding (default operation). PMID:27669254

  19. 40 CFR 161.70 - Acceptable protocols.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... ingredient, mixture, or product. Accordingly, failure to follow a suggested protocol will not invalidate a... part. Readers should note, however, that certain of the OECD recommended test standards, such as test duration and selection of test species, are less restrictive than those recommended by EPA. Therefore,...

  20. 21 CFR 312.30 - Protocol amendments.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 21 Food and Drugs 5 2010-04-01 2010-04-01 false Protocol amendments. 312.30 Section 312.30 Food and Drugs FOOD AND DRUG ADMINISTRATION, DEPARTMENT OF HEALTH AND HUMAN SERVICES (CONTINUED) DRUGS FOR HUMAN USE INVESTIGATIONAL NEW DRUG APPLICATION Investigational New Drug Application (IND) §...

  1. 21 CFR 312.83 - Treatment protocols.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 21 Food and Drugs 5 2010-04-01 2010-04-01 false Treatment protocols. 312.83 Section 312.83 Food and Drugs FOOD AND DRUG ADMINISTRATION, DEPARTMENT OF HEALTH AND HUMAN SERVICES (CONTINUED) DRUGS FOR HUMAN USE INVESTIGATIONAL NEW DRUG APPLICATION Drugs Intended to Treat Life-threatening and...

  2. The Vocational Assessment Protocol: Development and Validation.

    ERIC Educational Resources Information Center

    Thomas, Dale F.; Menz, Fredrick E.

    This report describes a 48-month project which developed, field tested, and evaluated the utility of the Vocational Assessment Protocol (VAP) for use with persons with traumatic brain injury resulting in a severe and persistent disability. The VAP is intended to assist in the community-based vocational rehabilitation of these individuals. The VAP…

  3. A Geographical Heuristic Routing Protocol for VANETs.

    PubMed

    Urquiza-Aguiar, Luis; Tripp-Barba, Carolina; Aguilar Igartua, Mónica

    2016-09-23

    Vehicular ad hoc networks (VANETs) leverage the communication system of Intelligent Transportation Systems (ITS). Recently, Delay-Tolerant Network (DTN) routing protocols have increased their popularity among the research community for being used in non-safety VANET applications and services like traffic reporting. Vehicular DTN protocols use geographical and local information to make forwarding decisions. However, current proposals only consider the selection of the best candidate based on a local-search. In this paper, we propose a generic Geographical Heuristic Routing (GHR) protocol that can be applied to any DTN geographical routing protocol that makes forwarding decisions hop by hop. GHR includes in its operation adaptations simulated annealing and Tabu-search meta-heuristics, which have largely been used to improve local-search results in discrete optimization. We include a complete performance evaluation of GHR in a multi-hop VANET simulation scenario for a reporting service. Our study analyzes all of the meaningful configurations of GHR and offers a statistical analysis of our findings by means of MANOVA tests. Our results indicate that the use of a Tabu list contributes to improving the packet delivery ratio by around 5% to 10%. Moreover, if Tabu is used, then the simulated annealing routing strategy gets a better performance than the selection of the best node used with carry and forwarding (default operation).

  4. An international computer protocol standard is essential

    SciTech Connect

    Marks, J.

    1994-02-01

    This article examines the need for the development of an international communication protocol to avoid building or buying customized interfaces or gateways in order to connect two separate vendor's devices to the same computer. The article discuss the need for standards and details one electric cooperative's experience in converting their automated mapping and facilities management system to EPRI sponsored Utility Communications Architecture.

  5. Measurement Protocols for Optimized Fuel Assembly Tags

    SciTech Connect

    Gerlach, David C.; Mitchell, Mark R.; Reid, Bruce D.; Gesh, Christopher J.; Hurley, David E.

    2008-11-01

    This report describes the measurement protocols for optimized tags that can be applied to standard fuel assemblies used in light water reactors. This report describes work performed by the authors at Pacific Northwest National Laboratory for NA-22 as part of research to identify specific signatures that can be developed to support counter-proliferation technologies.

  6. Direct data access protocols benchmarking on DPM

    NASA Astrophysics Data System (ADS)

    Furano, Fabrizio; Devresse, Adrien; Keeble, Oliver; Mancinelli, Valentina

    2015-12-01

    The Disk Pool Manager is an example of a multi-protocol, multi-VO system for data access on the Grid that went though a considerable technical evolution in the last years. Among other features, its architecture offers the opportunity of testing its different data access frontends under exactly the same conditions, including hardware and backend software. This characteristic inspired the idea of collecting monitoring information from various testbeds in order to benchmark the behaviour of the HTTP and Xrootd protocols for the use case of data analysis, batch or interactive. A source of information is the set of continuous tests that are run towards the worldwide endpoints belonging to the DPM Collaboration, which accumulated relevant statistics in its first year of activity. On top of that, the DPM releases are based on multiple levels of automated testing that include performance benchmarks of various kinds, executed regularly every day. At the same time, the recent releases of DPM can report monitoring information about any data access protocol to the same monitoring infrastructure that is used to monitor the Xrootd deployments. Our goal is to evaluate under which circumstances the HTTP-based protocols can be good enough for batch or interactive data access. In this contribution we show and discuss the results that our test systems have collected under the circumstances that include ROOT analyses using TTreeCache and stress tests on the metadata performance.

  7. 40 CFR 792.120 - Protocol.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ...) Justification for selection of the test system. (6) Where applicable, the number, body weight, sex, source of... than established by the specifications. (10) The route of administration and the reason for its choice... changes in or revisions of an approved protocol and the reasons therefor shall be documented, signed...

  8. 40 CFR 160.120 - Protocol.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... selection of the test system. (6) Where applicable, the number, body weight range, sex, source of supply... specifications. (10) The route of administration and the reason for its choice. (11) Each dosage level, expressed... of an approved protocol and the reasons therefore shall be documented, signed by the study...

  9. 40 CFR 160.120 - Protocol.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... selection of the test system. (6) Where applicable, the number, body weight range, sex, source of supply... specifications. (10) The route of administration and the reason for its choice. (11) Each dosage level, expressed... of an approved protocol and the reasons therefore shall be documented, signed by the study...

  10. 40 CFR 160.120 - Protocol.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... selection of the test system. (6) Where applicable, the number, body weight range, sex, source of supply... specifications. (10) The route of administration and the reason for its choice. (11) Each dosage level, expressed... of an approved protocol and the reasons therefore shall be documented, signed by the study...

  11. Teledermatology protocol for screening of Skin Cancer*

    PubMed Central

    Piccoli, Maria Fernanda; Amorim, Bruna Dücker Bastos; Wagner, Harley Miguel; Nunes, Daniel Holthausen

    2015-01-01

    BACKGROUND Telemedicine refers to the use of technology as improvement of healthcare delivery to places where distance becomes an obstacle. Its use represents a great potential for dermatology, a specialty whose visual analysis phase is essential in diagnosis. OBJECTIVES To analyze the compatibility index of skin cancer diagnoses between primary care and teledermatology, and to validate a protocol for standardization of digital imaging to obtain the reports in teledermatology. METHODS An observational cross-sectional study developed through the census of 333 examination requests, received between January/2012 and July/2012, in the Center for Telemedicine and Telehealth of SES-SC. We used a protocol for photographic lesion standardization, consisting of three steps (panoramic photo, close-up with ruler and dermoscopy). After collection, the data were sent to a virtual site on the Internet, and recorded with the use of an electronic health record containing the images, the skin phototype and demographic characteristics. RESULTS The level of compatibility between the diagnosis of skin cancer in Santa Catarina's primary care and the diagnosis proposed by teledermatology was 19.02%. Proportionally, it was 21.21% for BCC, 44.44% for SCC and 6.98% for MM. The protocol was statistically significant (p <0.05), with an OR of 38.77. CONCLUSION The rate of diagnostic compatibility of skin cancer was low and the use of the protocol optimized the chance of validating requests for examination. PMID:25830990

  12. A Generic Archive Protocol and an Implementation

    NASA Astrophysics Data System (ADS)

    Jordan, J. M.; Jennings, D. G.; McGlynn, T. A.; Ruggiero, N. G.; Serlemitsos, T. A.

    1993-01-01

    Archiving vast amounts of data has become a major part of every scientific space mission today. GRASP, the Generic Retrieval/Ar\\-chive Services Protocol, addresses the question of how to archive the data collected in an environment where the underlying hardware archives and computer hosts may be rapidly changing.

  13. 16 CFR 1210.4 - Test protocol.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... of children from each 100-child test panel, photograph(s) or video tape to show how the lighter was... STANDARD FOR CIGARETTE LIGHTERS Requirements for Child Resistance § 1210.4 Test protocol. (a) Child test panel. (1) The test to determine if a lighter is resistant to successful operation by children uses...

  14. 16 CFR 1210.4 - Test protocol.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... of children from each 100-child test panel, photograph(s) or video tape to show how the lighter was... STANDARD FOR CIGARETTE LIGHTERS Requirements for Child Resistance § 1210.4 Test protocol. (a) Child test panel. (1) The test to determine if a lighter is resistant to successful operation by children uses...

  15. 16 CFR 1210.4 - Test protocol.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... of children from each 100-child test panel, photograph(s) or video tape to show how the lighter was... STANDARD FOR CIGARETTE LIGHTERS Requirements for Child Resistance § 1210.4 Test protocol. (a) Child test panel. (1) The test to determine if a lighter is resistant to successful operation by children uses...

  16. 16 CFR 1212.4 - Test protocol.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... STANDARD FOR MULTI-PURPOSE LIGHTERS Requirements for Child-Resistance § 1212.4 Test protocol. (a) Child... by children uses a panel of children to test a surrogate multi-purpose lighter representing the... of a child before the child participates in the test. (2) The test shall be conducted using at...

  17. 16 CFR 1212.4 - Test protocol.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... STANDARD FOR MULTI-PURPOSE LIGHTERS Requirements for Child-Resistance § 1212.4 Test protocol. (a) Child... by children uses a panel of children to test a surrogate multi-purpose lighter representing the... of a child before the child participates in the test. (2) The test shall be conducted using at...

  18. 16 CFR 1212.4 - Test protocol.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... STANDARD FOR MULTI-PURPOSE LIGHTERS Requirements for Child-Resistance § 1212.4 Test protocol. (a) Child... by children uses a panel of children to test a surrogate multi-purpose lighter representing the... of a child before the child participates in the test. (2) The test shall be conducted using at...

  19. 16 CFR 1210.4 - Test protocol.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... of children from each 100-child test panel, photograph(s) or video tape to show how the lighter was... STANDARD FOR CIGARETTE LIGHTERS Requirements for Child Resistance § 1210.4 Test protocol. (a) Child test panel. (1) The test to determine if a lighter is resistant to successful operation by children uses...

  20. Montreal Protocol benefits simulated with CCM SOCOL

    NASA Astrophysics Data System (ADS)

    Egorova, T.; Rozanov, E.; Gröbner, J.; Hauser, M.; Schmutz, W.

    2012-07-01

    Ozone depletion is caused by the anthropogenic increase of halogen containing species in the atmosphere, which results in the enhancement of the concentration of reactive chlorine and bromine in the stratosphere. To reduce the influence of anthropogenic ozone-depleting substances (ODS), the Montreal Protocol was agreed by Governments in 1987, with several Amendments adopted later. In order to assess the benefits of the Montreal Protocol and its Amendments (MPA) on ozone and UV radiation, two different runs of the chemistry-climate model (CCM) SOCOL have been carried out. The first run was driven by the emission of ozone depleting substances (ODS) prescribed according to the restrictions of the Montreal Protocol and all its Amendments. For the second run we allow the ODS to grow by 3% annually. We find that the MPA would have saved up to 80% of the global annual total ozone by the end of the 21st century. Our calculations also show substantial changes in surface temperature and precipitations that could occur in the world without MPA implementations. To illustrate the changes in UV radiation at the surface and to emphasize certain features which can only be seen for some particular regions if the influence of the cloud cover changes is accounted for, we calculate geographical distribution of the erythemally weighted irradiance (Eery). For the no Montreal Protocol simulation Eery increases by factor of 4 to 16 between the 1970s and 2100. For the scenario including the Montreal Protocol it is found that UV radiation starts to decrease in 2000, with continuous decline of 5% to 10% at middle latitudes in the Northern and Southern hemispheres.

  1. Protocol for determining bull trout presence

    USGS Publications Warehouse

    Peterson, James; Dunham, Jason B.; Howell, Philip; Thurow, Russell; Bonar, Scott

    2002-01-01

    The Western Division of the American Fisheries Society was requested to develop protocols for determining presence/absence and potential habitat suitability for bull trout. The general approach adopted is similar to the process for the marbled murrelet, whereby interim guidelines are initially used, and the protocols are subsequently refined as data are collected. Current data were considered inadequate to precisely identify suitable habitat but could be useful in stratifying sampling units for presence/absence surveys. The presence/absence protocol builds on previous approaches (Hillman and Platts 1993; Bonar et al. 1997), except it uses the variation in observed bull trout densities instead of a minimum threshold density and adjusts for measured differences in sampling efficiency due to gear types and habitat characteristics. The protocol consists of: 1. recommended sample sizes with 80% and 95% detection probabilities for juvenile and resident adult bull trout for day and night snorkeling and electrofishing adjusted for varying habitat characteristics for 50m and 100m sampling units, 2. sampling design considerations, including possible habitat characteristics for stratification, 3. habitat variables to be measured in the sampling units, and 3. guidelines for training sampling crews. Criteria for habitat strata consist of coarse, watershed-scale characteristics (e.g., mean annual air temperature) and fine-scale, reach and habitat-specific features (e.g., water temperature, channel width). The protocols will be revised in the future using data from ongoing presence/absence surveys, additional research on sampling efficiencies, and development of models of habitat/species occurrence.

  2. Bayesian adaptive survey protocols for resource management

    USGS Publications Warehouse

    Halstead, Brian J.; Wylie, Glenn D.; Coates, Peter S.; Casazza, Michael L.

    2011-01-01

    Transparency in resource management decisions requires a proper accounting of uncertainty at multiple stages of the decision-making process. As information becomes available, periodic review and updating of resource management protocols reduces uncertainty and improves management decisions. One of the most basic steps to mitigating anthropogenic effects on populations is determining if a population of a species occurs in an area that will be affected by human activity. Species are rarely detected with certainty, however, and falsely declaring a species absent can cause improper conservation decisions or even extirpation of populations. We propose a method to design survey protocols for imperfectly detected species that accounts for multiple sources of uncertainty in the detection process, is capable of quantitatively incorporating expert opinion into the decision-making process, allows periodic updates to the protocol, and permits resource managers to weigh the severity of consequences if the species is falsely declared absent. We developed our method using the giant gartersnake (Thamnophis gigas), a threatened species precinctive to the Central Valley of California, as a case study. Survey date was negatively related to the probability of detecting the giant gartersnake, and water temperature was positively related to the probability of detecting the giant gartersnake at a sampled location. Reporting sampling effort, timing and duration of surveys, and water temperatures would allow resource managers to evaluate the probability that the giant gartersnake occurs at sampled sites where it is not detected. This information would also allow periodic updates and quantitative evaluation of changes to the giant gartersnake survey protocol. Because it naturally allows multiple sources of information and is predicated upon the idea of updating information, Bayesian analysis is well-suited to solving the problem of developing efficient sampling protocols for species of

  3. The braided single-stage protocol for quantum secure communication

    NASA Astrophysics Data System (ADS)

    Darunkar, Bhagyashri; Verma, Pramode K.

    2014-05-01

    This paper presents the concept and implementation of a Braided Single-stage Protocol for quantum secure communication. The braided single-stage protocol is a multi-photon tolerant secure protocol. This multi-photon tolerant protocol has been implemented in the laboratory using free-space optics technology. The proposed protocol capitalizes on strengths of the three-stage protocol and extends it with a new concept of braiding. This protocol overcomes the limitations associated with the three-stage protocol in the following ways: It uses the transmission channel only once as opposed to three times in the three-stage protocol, and it is invulnerable to man-in-the-middle attack. This paper also presents the error analysis resulting from the misalignment of the devices in the implementation. The experimental results validate the efficient use of transmission resources and improvement in the data transfer rate.

  4. Hybrid protocol of remote implementations of quantum operations

    SciTech Connect

    Zhao Ningbo; Wang Anmin

    2007-12-15

    We propose a protocol of remote implementations of quantum operations by hybridizing bidirectional quantum-state teleportation (BQST) [Huelga et al., Phys. Rev. A 63, 042303 (2001)] and the Wang protocol [Wang, Phys. Rev. A 74, 032317 (2006)]. The protocol is available for remote implementations of quantum operations in the restricted sets specified in the paper. We also give a proof of the protocol and point out its optimization. As an extension, this hybrid protocol can be reduced to the BQST and Wang protocols.

  5. Sécurité au-delà des mythes et des croyances

    ScienceCinema

    None

    2016-07-12

    Présentation orale en français, support visuel en français et en anglais. La pire des failles de sécurité est l'impression de sécurité. Le décalage entre la compréhension que l’on a des technologies utilisées, et leurs potentiels réels, ainsi que l'impact potentiellement négatif qu'elles peuvent avoir sur nos vies, n'est pas toujours compris, ou pris en compte par la plupart d'entre-nous. On se contente de nos perceptions pour ne pas avoir à se confronter à la réalité... Alors qu'en est-il vraiment ? En matière de sécurité qui de l'humain ou des technologies a le contrôle ?

  6. Evaluation des connaissances des parents sur les bronchiolites aiguës

    PubMed Central

    Gueddari, Widad; Tazi, Abderrahmane; Ouardi, Amine; Nani, Samira; Zineddine, Abdelhadi

    2014-01-01

    Les infections respiratoires (IR) constituent la deuxième cause de mortalité infantile au Maroc, dû en partie à l'absence d'information et de sensibilisation. Le but de ce travail était d’évaluer les connaissances des parents sur la bronchiolite aiguë, infection respiratoire très fréquente. Nous avons réalisé une enquête basée sur un questionnaire, auprès de parents de nourrissons consultants pour toux, avec ou sans gêne respiratoire. 180 parents ont été inclus dans l’étude. Les parents pensaient que l'infection respiratoire était secondaire au climat froid (96%); seuls 4% ont évoqué une origine infectieuse. Aucun des parents ne savait que le lavage des mains était un moyen de prévention de la transmission. Les parents ont majoritairement répondu que la kinésithérapie respiratoire ne servait à rien (65%), et qu'elle était nocive (24.5%). Ce manque de connaissances fondamentales en matière d'IR et de bronchiolite en particulier, devrait inciter à entreprendre un programme de sensibilisation PMID:25328606

  7. Protocol Directed Patient Care using a Computer

    PubMed Central

    Blum, B.; Lenhard, R.; McColligan, E.

    1980-01-01

    The Johns Hopkins Oncology Center has developed a clinical information system which assists in the care of the 2,000 patients currently under treatment at the Center. The system maintains a data base containing a summary diagnostic and treatment history plus complete tabulations of laboratory results, therapies, and other clinical findings. These data are organized and displayed in formats which aid decision-making. For the past year the Center has been working with an extension to the data system which produces daily care plans for each inpatient and outpatient treated at the Center. These plans are a function of the disease, treatment protocol, and current clinical status of each patient. This paper describes the objectives, organization, and experience to date with the use of computer generated plans for protocol directed patient care.

  8. An Evaluation of UDP Transport Protocols

    SciTech Connect

    Carter, S

    2004-12-21

    Although the speed of LAN and WAN networking is growing at an exponential rate, the applications that use those networks have not followed suit. With fiber optic interconnects, gigahertz processor speeds, and 10 gigabit per second network interface cards, hardware does not seem to be the limiting factor. It is becoming increasingly obvious that the protocols that are the basis of networking today are ill-suited to a new generation of networking technology. For this reason, Oak Ridge National Laboratory is particularly interested in improving bulk transfers over high-bandwidth, high-latency networks because of its involvement in storage and in the transfer of data for cutting-edge scientific applications. This report summarizes our evaluation of a new group of protocols specifically designed to get more useful bandwidth from today's high speed, wide area networks.

  9. UV Impacts Avoided by the Montreal Protocol

    NASA Technical Reports Server (NTRS)

    Newman, Paul; McKenzie, Richard

    2010-01-01

    Temporal and geographical variabilities in the future "World Expected" UV environment are compared with the "World Avoided", which would have occurred without the Montreal Protocol on protection of the ozone layer and its subsequent amendments and adjustments. Based on calculations of clear-sky UV irradiances, the effects of the Montreal Protocol have been hugely beneficial to avoid the health risks, such as skin cancer, which are associated with high UV, while there is only a small increase in health risks, such as vitamin D deficiency, that are associated with low UV. However, interactions with climate change may lead to changes in cloud and albedo, and possibly behavioural changes which could also be important.

  10. Da Vinci robot emergency undocking protocol.

    PubMed

    O'Sullivan, O E; O'Sullivan, S; Hewitt, M; O'Reilly, B A

    2016-09-01

    The role of robot-assisted surgery across gynaecology is evolving with increasing numbers of procedures being undertaken with varying degrees of complexity. While the risk of conversion is low at approximately 1 %, the reasons for conversion are variable. These range from technical issues with the robot, surgical complications such as haemorrhage and anaesthetics issues such as an inability to ventilate the patient adequately. While many conversions to open or laparoscopic approach are not due to life-threatening indications, it is important that the theatre staff are aware of the indication and can perform an emergency undocking as effectively, efficiently and safely as possible when the need arises. Unfortunately, there is a paucity of the literature available outlining such protocols. For this reason, we developed an emergency undocking protocol clearly outlining the role of each theatre staff member and the need for clear concise communication. PMID:27126584

  11. Multipass Steering Protocols at Jefferson Lab

    SciTech Connect

    Ryan Bodenstein; Michael Tiefenback

    2007-06-22

    The CEBAF recirculating accelerator consists of two CW superconducting RF linacs, through which an electron beam is accelerated for up to 5 passes. Focusing and steering elements affect each pass differently, requiring a multipass steering protocol to correct the orbits. Perturbations include lens misalignments (including long-term ground motion), BPM offsets, and focusing and steering from RF fields inside the cavities. A previous treatment of this problem assumed all perturbations were localized at the quadrupoles and the absence of x-y coupling. Having analyzed the problem and characterized the solutions, we developed an empirical iterative protocol to compare against previous results in the presence of skew fields and cross-plane coupling. We plan to characterize static and acceleration-dependent components of the beam line perturbations to allow systematic and rapid configuration of the accelerator at different linac energy gains.

  12. Staining protocol for organotypic hippocampal slice cultures.

    PubMed

    Gogolla, Nadine; Galimberti, Ivan; DePaola, Vincenzo; Caroni, Pico

    2006-01-01

    This protocol details a method to immunostain organotypic slice cultures from mouse hippocampus. The cultures are based on the interface method, which does not require special equipment, is easy to execute and yields slice cultures that can be imaged repeatedly, from the time of isolation at postnatal day 6-9 up to 6 months in vitro. The preserved tissue architecture facilitates the analysis of defined hippocampal synapses, cells and entire projections. Time-lapse imaging is based on transgenes expressed in the mice or on constructs introduced through transfection or viral vectors; it can reveal processes that develop over periods ranging from seconds to months. Subsequent to imaging, the slices can be processed for immunocytochemistry to collect further information about the imaged structures. This protocol can be completed in 3 d.

  13. UV impacts avoided by the Montreal Protocol.

    PubMed

    Newman, Paul A; McKenzie, Richard

    2011-07-01

    Temporal and geographical variabilities in the future "world expected" UV environment are compared with the "world avoided", which would have occurred without the Montreal Protocol on Substances That Deplete the Ozone Layer and its subsequent amendments and adjustments. Based on calculations of clear-sky UV irradiances, the effects of the Montreal Protocol have been hugely beneficial to avoid the health risks, such as skin cancer, which are associated with high UV, while there is only a small increase in health risks, such as vitamin D deficiency, that are associated with low UV. However, interactions with climate change may lead to changes in cloud and albedo, and possibly behavioural changes that could also be important.

  14. DES the year in review: controversies.

    PubMed

    Garg, S; Bourantas, C; Serruys, P W

    2013-04-01

    Drug-eluting stents (DES) have transformed interventional cardiology over the past decade. Whilst their efficacy has rarely been called into question, there have been concerns over the safety of the early devices, which has prompted the development of new coronary stents. Many of these new devices have entered clinical practice, however questions remain as to whether they offer the improvements in clinical outcomes that were originally anticipated. In addition, there is a debate whether the reported high efficacy of these devices enables percutaneous coronary intervention (PCI) to be performed in patient and lesion sub-groups previous entirely the domain of the cardiac surgeon. This review paper addresses these outstanding questions. PMID:23492595

  15. Formation et Evolution des Quasars et Contraintes cosmologiques

    NASA Astrophysics Data System (ADS)

    Hatziminaoglou, Evanthia

    2000-06-01

    Cette thèse porte sur l'étude de l'évolution des quasars. Elle en aborde certains aspects théoriques et observationnels, ainsi que la construction des grands échantillons de quasars dans le but à long terme de combiner le tout dans un test cosmologique géométrique pour déterminer les valeurs des paramètres cosmologiques Omega et Lambda. Les paramètres cosmologiques Omegaspan>et Lambdaspan>décrivent la géométrie globale de l'Univers. En faisant des hypothèses raisonnables sur la distribution spatiale et l'évolution des objets astrophysiques (galaxies, amas des galaxies, quasars), on peut déterminer les valeurs de ces paramètres qui sont cohérentes avec ces hypothèses. Les tests cosmologiques traditionnels ont besoin de ''chandelles standards'', objets dont les propriétés intrinsèques sont indépendantes des distances. De tels objets sont probablement fictifs. Néanmoins, certains de ces tests cosmologiques peuvent être adaptés si l'évolution individuelle, ou au moins l'évolution statistique d'une population d'objets est connue. La question de la nature de l'évolution des quasars a très vite été posée et des réponses ''phénoménologiques'' ont d'abord été données. Ces réponses ne faisaient que donner une forme mathématique à l'évolution mais n'expliquaient rien de la physique duphénomène. Les premières tentatives de construction d'un modèle physique, liées au processus d'accrétion sur un trou noir et à la théorie de la formation de l'Univers ont commencé à la fin des années 80. Depuis, des dizaines de modèles tentent d'expliquer les observations, qui sont les résultats de l'étude d'objets de plus en plus nombreux. Au cours de cette thèse, le test V/Vmax a été appliqué sur l'échantillon du Large Bright Quasar Survey en montrant 1) que l'échantillon était biaisé à cause des critères de sélection et 2) que la (simple) loi de Pure Evolution en Luminosité n'était pas une bonne approximation à tout

  16. Montreal Protocol Benefits simulated with CCM SOCOL

    NASA Astrophysics Data System (ADS)

    Egorova, T.; Rozanov, E.; Gröbner, J.; Hauser, M.; Schmutz, W.

    2013-04-01

    Ozone depletion is caused by the anthropogenic increase of halogen-containing species in the atmosphere, which results in the enhancement of the concentration of reactive chlorine and bromine in the stratosphere. To reduce the influence of anthropogenic ozone-depleting substances (ODS), the Montreal Protocol was agreed by Governments in 1987, with several Amendments and Adjustments adopted later. In order to assess the benefits of the Montreal Protocol and its Amendments and Adjustments (MPA) on ozone and UV radiation, two different runs of the chemistry-climate model (CCM) SOCOL have been carried out. The first run was driven by the emission of ozone depleting substances (ODS) prescribed according to the restrictions of the MPA. For the second run we allow the ODS to grow by 3% annually. We find that the MPA would have saved up to 80% of the global annual total ozone by the end of the 21st century. Our calculations also show substantial changes of the stratospheric circulation pattern as well as in surface temperature and precipitations that could occur in the world without MPA implementations. To illustrate the changes in UV radiation at the surface and to emphasise certain features, which can only be seen for some particular regions if the influence of the cloud cover changes is accounted for, we calculate geographical distribution of the erythemally weighted irradiance (Eery). For the no Montreal Protocol simulation Eery increases by factor of 4 to 16 between the 1970s and 2100. For the scenario including the Montreal Protocol it is found that UV radiation starts to decrease in 2000, with continuous decline of 5% to 10% at middle latitudes in the both Northern and Southern Hemispheres.

  17. Mars Sample Handling Protocol Workshop Series

    NASA Technical Reports Server (NTRS)

    Rummel, John D. (Editor); Race, Margaret S. (Editor); Acevedo, Sara (Technical Monitor)

    2000-01-01

    This document is the report resulting from the first workshop of the series on development of the criteria for a Mars sample handling protocol. Workshop 1 was held in Bethesda, Maryland on March 20-22, 2000. This report serves to document the proceedings of Workshop 1; it summarizes relevant background information, provides an overview of the deliberations to date, and helps frame issues that will need further attention or resolution in upcoming workshops. Specific recommendations are not part of this report.

  18. D-RATS 2011: RAFT Protocol Overview

    NASA Technical Reports Server (NTRS)

    Utz, Hans

    2011-01-01

    A brief overview presentation on the protocol used during the D-RATS2011 field test for file transfer from the field-test robots at Black Point Lava Flow AZ to Johnson Space Center, Houston TX over a simulated time-delay. The file transfer actually uses a commercial implementation of an open communications standard. The focus of the work lies on how to make the state of the distributed system observable.

  19. Protocol for mosquito rearing (A. gambiae).

    PubMed

    Das, Suchismita; Garver, Lindsey; Dimopoulos, George

    2007-01-01

    This protocol describes mosquito rearing in the insectary. The insectary rooms are maintained at 28 degrees C and approximately 80% humidity, with a 12 hr. day/night cycle. For this procedure, you'll need mosquito cages, 10% sterile sucrose solution, paper towels, beaker, whatman filter paper, glass feeders, human blood and serum, water bath, parafilm, distilled water, clean plastic trays, mosquito food (described below), mosquito net to cover the trays, vacuum, and a collection chamber to collect adults. PMID:18979019

  20. Building America House Simulation Protocols (Revised)

    SciTech Connect

    Hendron, R.; Engebrecht, C.

    2010-10-01

    The House Simulation Protocol document was developed to track and manage progress toward Building America's multi-year, average whole-building energy reduction research goals for new construction and existing homes, using a consistent analytical reference point. This report summarizes the guidelines for developing and reporting these analytical results in a consistent and meaningful manner for all home energy uses using standard operating conditions.

  1. Avian study protocols and wind energy development

    SciTech Connect

    Fisher, K.

    1995-12-01

    This paper identifies the need to develop and use standardized avian study protocols to determine avian impacts at new and existing wind energy facilities. This will allow data collected from various sites to be correlated for better understanding wind energy related avian impacts. Factors contributing to an increased interest in wind energy facilities by electric utilities include: (1) Increased demand for electricity;(2) increased constraints on traditional electrical generating facilities (i.e. hydroelectric and nuclear power plants);(3) improved wind turbine technology. During the 1980`s generous tax credits spawned the development of wind energy facilities, known as wind farms, in California. Commercial scale wind farm proposals are being actively considered in states across the country - Washington, Oregon, Wyoming, Wisconsin, Texas, and Vermont to name a few. From the wind farms in California the unexpected issue of avian impacts, especially to birds-of-prey, or raptor, surfaced and continues to plague the wind industry. However, most of the avian studies did not followed a standardized protocol or methodology and, therefore, data is unavailable to analyze and compare impacts at different sites or with differing technologies and configurations. Effective mitigation can not be designed and applied until these differences are understood. The Bonneville Power Administration is using comparable avian study protocols to collect data for two environmental impact statements being prepared for two separate wind farm proposals. Similar protocol will be required for any other avian impact analysis performed by the agency on proposed or existing wind farms. The knowledge gained from these studies should contribute to a better understanding of avian interactions with wind energy facilities and the identification of effective mitigation measures.

  2. CREATION OF THE MODEL ADDITIONAL PROTOCOL

    SciTech Connect

    Houck, F.; Rosenthal, M.; Wulf, N.

    2010-05-25

    In 1991, the international nuclear nonproliferation community was dismayed to discover that the implementation of safeguards by the International Atomic Energy Agency (IAEA) under its NPT INFCIRC/153 safeguards agreement with Iraq had failed to detect Iraq's nuclear weapon program. It was now clear that ensuring that states were fulfilling their obligations under the NPT would require not just detecting diversion but also the ability to detect undeclared materials and activities. To achieve this, the IAEA initiated what would turn out to be a five-year effort to reappraise the NPT safeguards system. The effort engaged the IAEA and its Member States and led to agreement in 1997 on a new safeguards agreement, the Model Protocol Additional to the Agreement(s) between States and the International Atomic Energy Agency for the Application of Safeguards. The Model Protocol makes explicit that one IAEA goal is to provide assurance of the absence of undeclared nuclear material and activities. The Model Protocol requires an expanded declaration that identifies a State's nuclear potential, empowers the IAEA to raise questions about the correctness and completeness of the State's declaration, and, if needed, allows IAEA access to locations. The information required and the locations available for access are much broader than those provided for under INFCIRC/153. The negotiation was completed in quite a short time because it started with a relatively complete draft of an agreement prepared by the IAEA Secretariat. This paper describes how the Model Protocol was constructed and reviews key decisions that were made both during the five-year period and in the actual negotiation.

  3. Le syndrome des enfants battus: aspects cliniques et radiologiques

    PubMed Central

    Jlalia, Zied; Znaigui, Talel; Smida, Mahmoud

    2016-01-01

    La maltraitance physique des enfants ou le syndrome des enfants battus est responsable de plus de 75.000 décès par an en France. Ce problème de santé publique reste sous diagnostiqué en Tunisie et dans le monde. Le chemin a été laborieux pour la reconnaissance du syndrome des enfants battus dans certaines sociétés même occidentales. Nous avons voulus exposer ce problème aux praticiens afin qu'il soit mieux diagnostiqué et pris en charge. La maltraitance physique des enfants est appelée à tort syndrome de Silverman qui ne regroupe en fait que les lésions squelettiques chez ces enfants tels que les fractures. Mots clés: Fracture, maltraitance, enfant, neuro-radiologie PMID:27642408

  4. Discovery and Classification of DES15S2kqw

    NASA Astrophysics Data System (ADS)

    Kasai, E.; Bassett, B.; Crawford, S.; Kniazev, A.; Childress, M.; D'Andrea, C.; Smith, M.; Sullivan, M.; Maartens, R.; Gupta, R.; Kovacs, E.; Kuhlmann, S.; Spinka, H.; Ahn, E.; Finley, D. A.; Frieman, J.; Marriner, J.; Wester, W.; Aldering, G.; Kim, A. G.; Thomas, R. C.; Barbary, K.; Bloom, J. S.; Goldstein, D.; Nugent, P.; Perlmutter, S.; Foley, R. J.; Casas, R.; Castander, F. J.; Desai, S.; Paech, K.; Smith, R. C.; Schubnell, M.; Kessler, R.; Lasker, J.; Scolnic, D.; Brout, D. J.; Gladney, L.; Sako, M.; Wolf, R. C.; Brown, P. J.; Krisciunas, K.; Suntzeff, N.; Nichol, R.; Papadopoulos, A.

    2015-10-01

    We report optical spectroscopy of DES15S2kqw discovered by the Dark Energy Survey. The spectrum (380-820nm) was obtained using the Robert Stobie Spectrograph (RSS) on the South African Large Telescope (SALT).

  5. 2. Photocopied 1972 from Ecole imperiale des ponts et chaussees, ...

    Library of Congress Historic Buildings Survey, Historic Engineering Record, Historic Landscapes Survey

    2. Photocopied 1972 from Ecole imperiale des ponts et chaussees, Collection de Dessins Distribues aus eleves, (n.d. and no place), ORIGINAL FINK TRUSS BRIDGE, 1852. - Baltimore & Ohio Railroad, Fairmont Bridge, Spanning Monongahela River, Fairmont, Marion County, WV

  6. Protocols for Authorized Release of Concrete

    SciTech Connect

    Smith, Agatha Marie; Meservey, Richard Harlan; Chen, S.Y.; Powell, James Edward; PArker, F.

    2000-06-01

    Much of the clean or slightly contaminated concrete from Decontamination and Decommissioning (D&D) activities could be re-used. Currently, there is no standardized approach, or protocol, for managing the disposition of such materials. Namely, all potential disposition options for concrete, including authorized release for re-use, are generally not fully evaluated in D&D projects, so large quantities have been unduly disposed of as low-level radioactive waste. As a result, costs of D&D have become prohibitively high, hindering expedient cleanup of surplus facilities. The ability to evaluate and implement the option of authorized release of concrete from demolition would result in significant cost savings, while maintaining protection of environmental health and safety, across the Department of Energy (DOE) complex. The Idaho National Engineering and Environmental Laboratory (INEEL), Argonne National Laboratory East (ANL-E), and Vanderbilt University have teamed to develop a protocol for the authorized release of concrete, based on the existing DOE guidance of Order 5400.5, that applies across the DOE complex. The protocol will provide a streamlined method for assessing risks and costs, and reaching optimal disposal options, including re-use of the concrete within the DOE system.

  7. Analysis of Security Protocols for Mobile Healthcare.

    PubMed

    Wazid, Mohammad; Zeadally, Sherali; Das, Ashok Kumar; Odelu, Vanga

    2016-11-01

    Mobile Healthcare (mHealth) continues to improve because of significant improvements and the decreasing costs of Information Communication Technologies (ICTs). mHealth is a medical and public health practice, which is supported by mobile devices (for example, smartphones) and, patient monitoring devices (for example, various types of wearable sensors, etc.). An mHealth system enables healthcare experts and professionals to have ubiquitous access to a patient's health data along with providing any ongoing medical treatment at any time, any place, and from any device. It also helps the patient requiring continuous medical monitoring to stay in touch with the appropriate medical staff and healthcare experts remotely. Thus, mHealth has become a major driving force in improving the health of citizens today. First, we discuss the security requirements, issues and threats to the mHealth system. We then present a taxonomy of recently proposed security protocols for mHealth system based on features supported and possible attacks, computation cost and communication cost. Our detailed taxonomy demonstrates the strength and weaknesses of recently proposed security protocols for the mHealth system. Finally, we identify some of the challenges in the area of security protocols for mHealth systems that still need to be addressed in the future to enable cost-effective, secure and robust mHealth systems.

  8. Analysis of Security Protocols for Mobile Healthcare.

    PubMed

    Wazid, Mohammad; Zeadally, Sherali; Das, Ashok Kumar; Odelu, Vanga

    2016-11-01

    Mobile Healthcare (mHealth) continues to improve because of significant improvements and the decreasing costs of Information Communication Technologies (ICTs). mHealth is a medical and public health practice, which is supported by mobile devices (for example, smartphones) and, patient monitoring devices (for example, various types of wearable sensors, etc.). An mHealth system enables healthcare experts and professionals to have ubiquitous access to a patient's health data along with providing any ongoing medical treatment at any time, any place, and from any device. It also helps the patient requiring continuous medical monitoring to stay in touch with the appropriate medical staff and healthcare experts remotely. Thus, mHealth has become a major driving force in improving the health of citizens today. First, we discuss the security requirements, issues and threats to the mHealth system. We then present a taxonomy of recently proposed security protocols for mHealth system based on features supported and possible attacks, computation cost and communication cost. Our detailed taxonomy demonstrates the strength and weaknesses of recently proposed security protocols for the mHealth system. Finally, we identify some of the challenges in the area of security protocols for mHealth systems that still need to be addressed in the future to enable cost-effective, secure and robust mHealth systems. PMID:27640159

  9. 21 CFR 814.19 - Product development protocol (PDP).

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ...) MEDICAL DEVICES PREMARKET APPROVAL OF MEDICAL DEVICES General § 814.19 Product development protocol (PDP). A class III device for which a product development protocol has been declared completed by FDA...

  10. 21 CFR 814.19 - Product development protocol (PDP).

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ...) MEDICAL DEVICES PREMARKET APPROVAL OF MEDICAL DEVICES General § 814.19 Product development protocol (PDP). A class III device for which a product development protocol has been declared completed by FDA...

  11. 21 CFR 814.19 - Product development protocol (PDP).

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ...) MEDICAL DEVICES PREMARKET APPROVAL OF MEDICAL DEVICES General § 814.19 Product development protocol (PDP). A class III device for which a product development protocol has been declared completed by FDA...

  12. SPIRIT 2013 Statement: defining standard protocol items for clinical trials.

    PubMed

    Chan, An-Wen; Tetzlaff, Jennifer M; Altman, Douglas G; Laupacis, Andreas; Gøtzsche, Peter C; Krle A-Jerić, Karmela; Hrobjartsson, Asbjørn; Mann, Howard; Dickersin, Kay; Berlin, Jesse A; Dore, Caroline J; Parulekar, Wendy R; Summerskill, William S M; Groves, Trish; Schulz, Kenneth F; Sox, Harold C; Rockhold, Frank W; Rennie, Drummond; Moher, David

    2015-12-01

    The protocol of a clinical trial serves as the foundation for study planning, conduct, reporting, and appraisal. However, trial protocols and existing protocol guidelines vary greatly in content and quality. This article describes the systematic development and scope of SPIRIT (Standard Protocol Items: Recommendations for Interventional Trials) 2013, a guideline for the minimum content of a clinical trial protocol. The 33-item SPIRIT checklist applies to protocols for all clinical trials and focuses on content rather than format. The checklist recommends a full description of what is planned; it does not prescribe how to design or conduct a trial. By providing guidance for key content, the SPIRIT recommendations aim to facilitate the drafting of high-quality protocols. Adherence to SPIRIT would also enhance the transparency and completeness of trial protocols for the benefit of investigators, trial participants, patients, sponsors, funders, research ethics committees or institutional review boards, peer reviewers, journals, trial registries, policymakers, regulators, and other key stakeholders. PMID:27440100

  13. METHODS AND ANALYSES FOR IMPLEMENTING NATURAL ATTENUATION PROTOCOLS

    EPA Science Inventory

    Technical protocols for evaluating natural attenuation at petroleum hydrocarbon and chlorinated solvent contaminated sites specify the analysis of electron acceptors and metabolic by-products for identifying and quantifying natural attenuation processes. However, these protocols ...

  14. 21 CFR 814.19 - Product development protocol (PDP).

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ...) MEDICAL DEVICES PREMARKET APPROVAL OF MEDICAL DEVICES General § 814.19 Product development protocol (PDP). A class III device for which a product development protocol has been declared completed by FDA...

  15. Die Evolution des Universums. Eine Geschichte der Kosmologie.

    NASA Astrophysics Data System (ADS)

    Hiller, H.

    This volume covers in an elementary course a historical overview on cosmology ranging from the ancient aspects up to big bang theory and the concepts of inflationary universe and grand unified theories. Contents: 1. Auf dem Wege zur Wissenschaft. 2. Die neue Kosmologie. 3. Die Struktur des Weltalls. 4. Dramatik im Weltall. 5. Die endliche Welt. 6. Die Evolution des frühen Universums. 7. Die Zukunft. 8. Die neue Teleologie. 9. Das Leben.

  16. A Model Based Security Testing Method for Protocol Implementation

    PubMed Central

    Fu, Yu Long; Xin, Xiao Long

    2014-01-01

    The security of protocol implementation is important and hard to be verified. Since the penetration testing is usually based on the experience of the security tester and the specific protocol specifications, a formal and automatic verification method is always required. In this paper, we propose an extended model of IOLTS to describe the legal roles and intruders of security protocol implementations, and then combine them together to generate the suitable test cases to verify the security of protocol implementation. PMID:25105163

  17. Study on the conversion and test of protocols

    NASA Astrophysics Data System (ADS)

    Choi, Y.

    1984-06-01

    The conversion of protocols nonadapted to the open systems interconnection (OSI) architecture into compatibility with the OSI system and the test of the equipment for converting protocols are studied. Specification and validation of protocols are reviewed. The test of the X-21 procedure and the test of the signal management equipment, parts of the Telecom project, are analyzed. A specification method based on extended finite state machines is developed. A test system for protocol conversion equipment is described.

  18. 48 CFR 3439.701 - Internet Protocol version 6.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... 48 Federal Acquisition Regulations System 7 2014-10-01 2014-10-01 false Internet Protocol version... Requirements for Acquisition of Information Technology 3439.701 Internet Protocol version 6. The contracting officer must insert the clause at 3452.239-70 (Internet protocol version 6 (IPv6)) in all...

  19. 48 CFR 3439.701 - Internet Protocol version 6.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... 48 Federal Acquisition Regulations System 7 2013-10-01 2012-10-01 true Internet Protocol version 6... for Acquisition of Information Technology 3439.701 Internet Protocol version 6. The contracting officer must insert the clause at 3452.239-70 (Internet protocol version 6 (IPv6)) in all...

  20. 48 CFR 3439.701 - Internet Protocol version 6.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 48 Federal Acquisition Regulations System 7 2011-10-01 2011-10-01 false Internet Protocol version... Requirements for Acquisition of Information Technology 3439.701 Internet Protocol version 6. The contracting officer must insert the clause at 3452.239-70 (Internet protocol version 6 (IPv6)) in all...

  1. 48 CFR 3439.701 - Internet Protocol version 6.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... 48 Federal Acquisition Regulations System 7 2012-10-01 2012-10-01 false Internet Protocol version... Requirements for Acquisition of Information Technology 3439.701 Internet Protocol version 6. The contracting officer must insert the clause at 3452.239-70 (Internet protocol version 6 (IPv6)) in all...

  2. 21 CFR 814.19 - Product development protocol (PDP).

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... 21 Food and Drugs 8 2011-04-01 2011-04-01 false Product development protocol (PDP). 814.19 Section...) MEDICAL DEVICES PREMARKET APPROVAL OF MEDICAL DEVICES General § 814.19 Product development protocol (PDP). A class III device for which a product development protocol has been declared completed by FDA...

  3. Tendencies in the development of utilization protocols, seminar report

    NASA Astrophysics Data System (ADS)

    Roveri, A.

    1983-07-01

    The open system interconnections model (OSI) structured approach to specify protocols is discussed. A stratification in seven levels characterizes the architecture of the system. Transfer level protocol characterization of utilization protocols in the OSI model, data flow control, and presentation and application levels are described.

  4. The Interlibrary Loan Protocol: An OSI Solution to ILL Messaging.

    ERIC Educational Resources Information Center

    Turner, Fay

    1990-01-01

    Discusses the interlibrary loan (ILL) protocol, a standard based on the principles of the Open Systems Interconnection (OSI) Reference Model. Benefits derived from protocol use are described, the status of the protocol as an international standard is reviewed, and steps taken by the National Library of Canada to facilitate migration to an ILL…

  5. A Biometric Authenticated Key Agreement Protocol for Secure Token

    NASA Astrophysics Data System (ADS)

    Yoon, Eun-Jun; Yoo, Kee-Young

    This letter proposes a robust biometric authenticated key agreement (BAKA) protocol for a secure token to provide strong security and minimize the computation cost of each participant. Compared with other related protocols, the proposed BAKA protocol not only is secure against well-known cryptographical attacks but also provides various functionality and performance requirements.

  6. DEVELOPMENT OF MODELING PROTOCOLS FOR USE IN DETERMINING SEDIMENT TMDLS

    EPA Science Inventory

    Modeling protocols for use in determining sediment TMDLs are being developed to provide the Office of Water, Regions and the States with assistance in determining TMDLs for sediment impaired water bodies. These protocols will supplement the protocols developed by the Office of W...

  7. Spacelab system analysis: The modified free access protocol: An access protocol for communication systems with periodic and Poisson traffic

    NASA Technical Reports Server (NTRS)

    Ingels, Frank; Owens, John; Daniel, Steven

    1989-01-01

    The protocol definition and terminal hardware for the modified free access protocol, a communications protocol similar to Ethernet, are developed. A MFA protocol simulator and a CSMA/CD math model are also developed. The protocol is tailored to communication systems where the total traffic may be divided into scheduled traffic and Poisson traffic. The scheduled traffic should occur on a periodic basis but may occur after a given event such as a request for data from a large number of stations. The Poisson traffic will include alarms and other random traffic. The purpose of the protocol is to guarantee that scheduled packets will be delivered without collision. This is required in many control and data collection systems. The protocol uses standard Ethernet hardware and software requiring minimum modifications to an existing system. The modification to the protocol only affects the Ethernet transmission privileges and does not effect the Ethernet receiver.

  8. Identification et prise en charge des femmes ayant des antécédents familiaux de cancer du sein

    PubMed Central

    Heisey, Ruth; Carroll, June C.

    2016-01-01

    Résumé Objectif Résumer les meilleures données portant sur les stratégies d’identification et de prise en charge des femmes qui présentent des antécédents familiaux de cancer du sein. Sources d’information Une recherche a été effectuée sur PubMed à l’aide des mots-clés anglais suivants : breast cancer, guidelines, risk, family history, management et magnetic resonance imaging screening, entre 2000 et 2016. La plupart des données sont de niveau II. Message principal Une bonne anamnèse familiale est essentielle lors de l’évaluation du risque de cancer du sein afin d’identifier les femmes qui sont candidates à une recommandation en counseling génétique pour un éventuel test génétique. On peut sauver des vies en offrant aux femmes porteuses d’une mutation au gène BRCA des interventions chirurgicales de réduction des risques (mastectomie bilatérale prophylactique, salpingo-ovariectomie bilatérale). Il faut encourager toutes les femmes qui présentent des antécédents familiaux de cancer du sein à demeurer actives et à limiter leur consommation d’alcool à moins de 1 verre par jour; certaines femmes sont admissibles à la chimioprévention. Il faut offrir aux femmes dont le risque à vie de cancer du sein est de 20 à 25 % ou plus un dépistage poussé par imagerie par résonance magnétique en plus d’une mammographie. Conclusion Une vie saine et la chimioprévention (chez les candidates) pourraient réduire l’incidence du cancer du sein; le dépistage poussé pourrait entraîner une détection plus précoce. Le fait d’aiguiller des femmes porteuses d’une mutation au BRCA vers la chirurgie de réduction des risques sauve des vies. PMID:27737991

  9. Profil épidémiologique des tumeurs malignes primitives des glandes salivaires : à propos de 154 cas

    PubMed Central

    Setti, Khadija; Mouanis, Mohamed; Moumni, Abdelmounim; Maher, Mostafa; Harmouch, Amal

    2014-01-01

    Introduction Les tumeurs des glandes salivaires sont des tumeurs rares représentant 3à 5% des tumeurs de la tête et du cou. La classification de l'OMS 2005 distingue les tumeurs épithéliales, les tumeurs mésenchymateuses, les tumeurs hématologiques et les tumeurs secondaires. Méthodes Notre travail consiste en une étude rétrospective réalisée sur une période de 10 ans allant de janvier 2002 à janvier 2012. Les critères d'inclusion étaient: l'âge, le sexe, le siège de la tumeur et le type histologique. Résultats L'incidence annuelle des tumeurs malignes primitives des glandes salivaires dans notre série était de 15 cas par an. Cent cinquante quatre cas de tumeurs malignes primitives des glandes salivaires ont été colligés sans prédominance de sexe (78 femmes (50,6%) et 76 hommes (49,4%)). La moyenne d'âge était de 60 ans avec des extrêmes de 4 et 83 ans et un pic de fréquence entre 51et 70 ans. Deux tiers des cas (65%) avaient une localisation au niveau des glandes principales avec 66 cas au niveau de la parotide (43%) et 34 cas au niveau de la glande sous maxillaire (22%). Cinquante quatre patients avaient une tumeur maligne des glandes salivaires accessoires (35%) dont 61% au niveau du palais. Aucun cas de tumeur maligne de la glande sublinguale n'a été recensé dans notre étude. Le type histologique prédominant dans notre série était le carcinome adénoïde kystique et retrouvé chez 43 patients (27,9%), suivi de l'adénocarcinome sans autre indication chez 37 patients (24%) puis du carcinome mucoépidermoïde chez 16 patients (10,4%) et de l'adénocarcinome polymorphe de bas grade également chez 16 patients (10. 4%). Conclusion Les tumeurs malignes des glandes salivaires représentent un ensemble hétérogène de maladies de caractérisation complexe et de fréquence variable. PMID:25120861

  10. Physical characteristics of stream subbasins in the Des Moines River, Upper Des Moines River, and East Fork Des Moines River basins, southern Minnesota and northern Iowa

    USGS Publications Warehouse

    Sanocki, Christopher A.

    2000-01-01

    Data that describe the physical characteristics of stream subbasins upstream from selected sites on streams in the Des Moines River, Upper Des Moines River, and East Fork Des Moines River Basins, located in southwestern Minnesota, and northwestern Iowa, are presented in this report. The physical characteristics are the drainage area of the subbasin, the percentage area of the subbasin covered only by lakes, the percentage area of the subbasin covered by both lakes and wetlands, the main-channel length, and the main-channel slope. Stream sites include outlets of subbasins of at least 5 square miles, and locations of U.S. Geological Survey high-flow, and continuous-record gaging stations.

  11. [Le leadership en santé et l'éthique de la gestion des attentes des soignants et des patients].

    PubMed

    Browne, Alister

    2016-03-01

    Les dispensateurs de soins et les patients sont souvent déçus du niveau de soins que les hôpitaux publics peuvent prodiguer. La solution consiste à réduire les attentes. Les dispensateurs devraient être amenés à considérer que leur obligation consiste à prodiguer les meilleurs soins en fonction des ressources. Le public devrait être bien informé des services que les hôpitaux de soins actifs peuvent ou non lui offrir et participer aux prises de décision. Les leaders en santé peuvent jouer des rôles novateurs à cet égard.

  12. Mecanique et mecanisme de la dechirure des materiaux textiles

    NASA Astrophysics Data System (ADS)

    Triki, Ennouri

    Cette thèse vise à apporter une contribution à l’étude et à la modélisation de la déchirure des textiles et des textiles enduits. Notons que la résistance à la déchirure est l’une des caractéristiques mesurées pour les équipements de protection contre les agresseurs mécaniques en milieu de travail. Jusqu'à présent, ce comportement en déchirure a été étudié en mesurant la force de déchirure et le travail de déchirure. De fait, aucun critère de rupture en déchirure n’existe actuellement. Par conséquent, en s’inspirant de la théorie du Griffith et de la mécanique de la rupture, une formulation d’un nouveau critère de rupture des structures textiles a été proposée. Cette approche offre la possibilité de déterminer d’une manière plus précise l’énergie nécessaire pour la création d’une nouvelle surface de rupture. Ce critère nous permet d’analyser l’effet des caractéristiques des tissus sur la variation de l’énergie de rupture. Cette étude montre que la résistance au glissement des fils dans la structure est le principal facteur qui contrôle la propagation de la fissure. En se basant sur la théorie de la mécanique de la rupture, un modèle de calcul de l’énergie de rupture par déchirure a été aussi élaboré. Ce modèle de déchirure relie l’énergie aux paramètres caractérisant les phénomènes affectant la déchirure des tissus, notamment la force de glissement et la force à la rupture des fils. Cette modélisation a tenu compte de certaines caractéristiques des tissus tels que l’épaisseur du matériau, la densité des fils, etc. Par l’étude de la variation de l’énergie de rupture par déchirure en fonction du rapport établi entre la force à la rupture et la force de glissement d’un fil ( FYB/FS), l’effet des mécanismes de la propagation de la fissure dans les tissus sur leur comportement en déchirure a été aussi observé. Les résultats obtenus

  13. Les sarcomes des tissus mous: à propos de 33 cas

    PubMed Central

    Abdou, Jiddou; Elkabous, Mustapha; M'rabti, Hind; Errihani, Hassan

    2015-01-01

    L'objectif de cette étude est de rapporter les particularités épidémiologiques, cliniques, histologiques, thérapeutiques et évolutives des sarcomes des tissus mous à l'Institut National d'Oncologie et de définir les facteurs influençant la survie des patients. C'est une étude rétrospective de 33 cas de sarcome des tissus mous, colligés entre janvier 2008 et décembre 2010. Les critères d’éligibilité étaient un âge supérieur à 16 ans, une épreuve histologique d'un sarcome des tissus mous à l'exclusion des tumeurs stromales gastro-intestinales (GIST). Les items recueillis étaient: épidémiologiques, cliniques, histologiques, Radiologiques, et thérapeutiques. Des analyses univariées puis multivariées ont été réalisées à la recherche de facteurs influençant la survie à 2 ans. Il s'agit de 33 cas, 17 Hommes et 16 Femmes, l’âge moyen était de 43,21 ans (Extrêmes= 18-76 ans). La tumeur était localisée aux extrémités dans 24 cas (72,72%). Le type histologique prédominant était le Liposarcome dans 9 cas (27,27%). Le stade tumoral était localisé dans 25 cas (75,8%), métastatique dans 8 cas (24,2%). Vingt-cinq tumeurs ont été traitées chirurgicalement dont 21 cas (84%) de chirurgie conservatrice et 4 cas (16%) de chirurgie radicale. La radiothérapie a été réalisée chez 10 patients (30,3%). La chimiothérapie a été faite chez 20 patients. En analyse univariée les facteurs pronostiques étaient l’âge (p=0,03) et le stade tumoral (p=0,09). L’âge et le stade tumoral sont des facteurs pronostiques influençant la survie des sarcomes des tissus mous. PMID:27022434

  14. BLUE-protocol and FALLS-protocol: two applications of lung ultrasound in the critically ill.

    PubMed

    Lichtenstein, Daniel A

    2015-06-01

    This review article describes two protocols adapted from lung ultrasound: the bedside lung ultrasound in emergency (BLUE)-protocol for the immediate diagnosis of acute respiratory failure and the fluid administration limited by lung sonography (FALLS)-protocol for the management of acute circulatory failure. These applications require the mastery of 10 signs indicating normal lung surface (bat sign, lung sliding, A-lines), pleural effusions (quad and sinusoid sign), lung consolidations (fractal and tissue-like sign), interstitial syndrome (lung rockets), and pneumothorax (stratosphere sign and the lung point). These signs have been assessed in adults, with diagnostic accuracies ranging from 90% to 100%, allowing consideration of ultrasound as a reasonable bedside gold standard. In the BLUE-protocol, profiles have been designed for the main diseases (pneumonia, congestive heart failure, COPD, asthma, pulmonary embolism, pneumothorax), with an accuracy > 90%. In the FALLS-protocol, the change from A-lines to lung rockets appears at a threshold of 18 mm Hg of pulmonary artery occlusion pressure, providing a direct biomarker of clinical volemia. The FALLS-protocol sequentially rules out obstructive, then cardiogenic, then hypovolemic shock for expediting the diagnosis of distributive (usually septic) shock. These applications can be done using simple grayscale machines and one microconvex probe suitable for the whole body. Lung ultrasound is a multifaceted tool also useful for decreasing radiation doses (of interest in neonates where the lung signatures are similar to those in adults), from ARDS to trauma management, and from ICUs to points of care. If done in suitable centers, training is the least of the limitations for making use of this kind of visual medicine. PMID:26033127

  15. Bell Inequalities, Experimental Protocols and Contextuality

    NASA Astrophysics Data System (ADS)

    Kupczynski, Marian

    2015-07-01

    In this paper we give additional arguments in favor of the point of view that the violation of Bell, CHSH and CH inequalities is not due to a mysterious non locality of nature. We concentrate on an intimate relation between a protocol of a random experiment and a probabilistic model which is used to describe it. We discuss in a simple way differences between attributive joint probability distributions and generalized joint probability distributions of outcomes from distant experiments which depend on how the pairing of these outcomes is defined. We analyze in detail experimental protocols implied by local realistic and stochastic hidden variable models and show that they are incompatible with the protocols used in spin polarization correlation experiments. We discuss also the meaning of "free will", differences between quantum and classical filters, contextuality of Kolmogorov models, contextuality of quantum theory (QT) and show how this contextuality has to be taken into account in probabilistic models trying to explain in an intuitive way the predictions of QT. The long range imperfect correlations between the clicks of distant detectors can be explained by partially preserved correlations between the signals created by a source. These correlations can only be preserved if the clicks are produced in a local and deterministic way depending on intrinsic parameters describing signals and measuring devices in the moment of the measurement. If an act of a measurement was irreducibly random they would be destroyed. It seems to indicate that QT may be in fact emerging from some underlying more detailed theory of physical phenomena. If this was a case then there is a chance to find in time series of experimental data some fine structures not predicted by QT. This would be a major discovery because it would not only prove that QT does not provide a complete description of individual physical systems but it would prove that it is not predictably complete.

  16. La planification préalable des soins pour les patients en pédiatrie

    PubMed Central

    2008-01-01

    RÉSUMÉ Les progrès médicaux et technologiques ont permis d’ac-croître les taux de survie et d’améliorer la qualité de vie des nourrissons, des enfants et des adolescents ayant des maladies chroniques mettant la vie en danger. La planifi-cation préalable des soins inclut le processus relié aux discussions sur les traitements essentiels au maintien de la survie et la détermination des objectifs des soins de longue durée. Les dispensateurs de soins pédiatriques ont l’obligation éthique d’assimiler cet aspect des soins médicaux. Le présent document de principes vise à aider les dispensateurs de soins à discuter de la planification préalable des soins des patients pédiatriques dans diverses situations. La planification préalable des soins exige des communications efficaces afin de clarifier les objectifs des soins et de s’entendre sur les traitements pertinents ou non pour réaliser ces objectifs, y compris les mesures de réanimation et les mesures palliatives.

  17. Towards a formalism for conversation protocols using joint intention theory

    SciTech Connect

    Kumar, Sanjeev; Huber, Marcus J.; Cohen, Philip R.; McGee, David R. )

    2001-12-01

    Conversation protocols are meant to achieve certain tasks or to bring about certain state of affairs in the world. Therefore, one may identify the landmarks or the state of affairs that must be brought about during the execution of a protocol in order to achieve its goal. Accordingly, the most important aspect of protocols is these landmarks rather than the communicative actions needed to achieve the landmarks. We show that families of conversation protocols can be expressed formally as partially ordered landmarks where each landmark is characterized by propositions that are true in the state represented by that landmark. Dialogue in natural languages is regarded as joint activity. Conversation protocols in multi-agent systems are treated as dialogue templates and are composed using speech acts from natural language dialogues. As such, we treat conversation protocols as joint action expressions and gainfully apply existing formal theories of dialogue, specifically the Joint Intention Theory, to protocols and their compositions. Conversation protocols may require agents to communicate with groups as well as individuals. However, most contemporary agent communication languages, notably FIPA and KQML, have either no provision or no well-defined semantics for group communication. Furthermore, the research on protocols so far does not correctly incorporate groups into the protocols. We give a formal semantics to group communicative acts and use it to handle group communication in a formal treatment of protocols.

  18. SPP: A data base processor data communications protocol

    NASA Technical Reports Server (NTRS)

    Fishwick, P. A.

    1983-01-01

    The design and implementation of a data communications protocol for the Intel Data Base Processor (DBP) is defined. The protocol is termed SPP (Service Port Protocol) since it enables data transfer between the host computer and the DBP service port. The protocol implementation is extensible in that it is explicitly layered and the protocol functionality is hierarchically organized. Extensive trace and performance capabilities have been supplied with the protocol software to permit optional efficient monitoring of the data transfer between the host and the Intel data base processor. Machine independence was considered to be an important attribute during the design and implementation of SPP. The protocol source is fully commented and is included in Appendix A of this report.

  19. Formal Analysis of Two Buyer-Seller Watermarking Protocols

    NASA Astrophysics Data System (ADS)

    Williams, David M.; Treharne, Helen; Ho, Anthony T. S.; Waller, Adrian

    In this paper we demonstrate how the formal model constructed in our previous work [1], can be modified in order to analyse additional Buyer-Seller Watermarking Protocols, identifying which specific sections of the CSP scripts remain identical and which require modification. First, we model the protocol proposed by Memon and Wong [2], an examplar of the Offline Watermarking Authority (OFWA) Model, defined in the framework by Poh and Martin [3]. Second, we model the Shao protocol [4] as an example of a protocol fitting the Online Watermarking Authority (ONWA) Model. Our analysis of the protocols reaffirms the unbinding attack described by Lei et al.[5] on the Memon and Wong protocol and we identify a new unbinding attack on the protocol proposed by Shao.

  20. Rosetta Ligand docking with flexible XML protocols.

    PubMed

    Lemmon, Gordon; Meiler, Jens

    2012-01-01

    RosettaLigand is premiere software for predicting how a protein and a small molecule interact. Benchmark studies demonstrate that 70% of the top scoring RosettaLigand predicted interfaces are within 2Å RMSD from the crystal structure [1]. The latest release of Rosetta ligand software includes many new features, such as (1) docking of multiple ligands simultaneously, (2) representing ligands as fragments for greater flexibility, (3) redesign of the interface during docking, and (4) an XML script based interface that gives the user full control of the ligand docking protocol. PMID:22183535

  1. 2014 Building America House Simulation Protocols

    SciTech Connect

    Wilson, E.; Engebrecht, C. Metzger; Horowitz, S.; Hendron, R.

    2014-03-01

    As Building America has grown to include a large and diverse cross-section of the home building and retrofit industries, it has become more important to develop accurate, consistent analysis techniques to measure progress towards the program's goals. The House Simulation Protocol (HSP) document provides guidance to program partners and managers so they can compare energy savings for new construction and retrofit projects. The HSP provides the program with analysis methods that are proven to be effective and reliable in investigating the energy use of advanced energy systems and of entire houses.

  2. 2014 Building America House Simulation Protocols

    SciTech Connect

    Wilson, E.; Engebrecht-Metzger, C.; Horowitz, S.; Hendron, R.

    2014-03-01

    As BA has grown to include a large and diverse cross-section of the home building and retrofit industries, it has become more important to develop accurate, consistent analysis techniques to measure progress towards the program's goals. The House Simulation Protocol (HSP) document provides guidance to program partners and managers so they can compare energy savings for new construction and retrofit projects. The HSP provides the program with analysis methods that are proven to be effective and reliable in investigating the energy use of advanced energy systems and of entire houses.

  3. Satellite-Friendly Protocols and Standards

    NASA Astrophysics Data System (ADS)

    Koudelka, O.; Schmidt, M.; Ebert, J.; Schlemmer, H.; Kastner, S.; Riedler, W.

    2002-01-01

    We are currently observing a development unprecedented with other services, the enormous growth of the Internet. Video, voice and data applications can be supported via this network in high quality. Multi-media applications require high bandwidth which may not be available in many areas. When making proper use of the broadcast feature of a communications satellite, the performance of the satellite-based system can compare favourably to terrestrial solutions. Internet applications are in many cases highly asymmetric, making them very well suited to applications using small and inexpensive terminals. Data from one source may be used simultaneously by a large number of users. The Internet protocol suite has become the de-facto standard. But this protocol family in its original form has not been designed to support guaranteed quality of service, a prerequisite for real-time, high quality traffic. The Internet Protocol has to be adapted for the satellite environment, because long roundtrip delays and the error behaviour of the channel could make it inefficient over a GEO satellite. Another requirement is to utilise the satellite bandwidth as efficiently as possible. This can be achieved by adapting the access system to the nature of IP frames, which are variable in length. In the framework of ESA's ARTES project a novel satellite multimedia system was developed which utilises Multi-Frequency TDMA in a meshed network topology. The system supports Quality of Service (QoS) by reserving capacity with different QoS requirements. The system is centrally controlled by a master station with the implementation of a demand assignment (DAMA) system. A lean internal signalling system has been adopted. Network management is based on the SNMP protocol and industry-standard network management platforms, making interfaces to standard accounting and billing systems easy. Modern communication systems will have to be compliant to different standards in a very flexible manner. The

  4. Quantum oblivious set-member decision protocol

    NASA Astrophysics Data System (ADS)

    Shi, Run-hua; Mu, Yi; Zhong, Hong; Zhang, Shun

    2015-08-01

    We present and define a privacy-preserving problem called the oblivious set-member decision problem, which allows a server to decide whether a private secret of a user is a member of his private set in an oblivious manner. Namely, if the secret belongs to his private set, he does not know which member it is. We propose a quantum solution to the oblivious set-member decision problem. Compared to classical solutions, the proposed quantum protocol achieves an exponential reduction in communication complexity, since it only needs O (1 ) communication cost.

  5. Impact of Communication Protocol on Performance

    SciTech Connect

    Worley, P.H.

    1999-02-01

    We use the PSTSWM compact application benchmark code to characterize the performance behavior of interprocessor communication on the SGI/Cray Research Origin 2000 and T3E-900. We measure 1. single processor performance, 2. point-to-point communication performance, 3. performance variation as a function of communication protocols and transport layer for collective communication routines, and 4. performance sensitivity of full application code to choice of parallel implementation. We also compare and contrast these results with similar results for the previous generation of parallel platforms, evaluating how the relative importance of communication performance has changed.

  6. De l'importance des orbites periodiques: Detection et applications

    NASA Astrophysics Data System (ADS)

    Doyon, Bernard

    L'ensemble des Orbites Periodiques Instables (OPIs) d'un systeme chaotique est intimement relie a ses proprietes dynamiques. A partir de l'ensemble (en principe infini) d'OPIs cachees dans l'espace des phases, on peut obtenir des quantites dynamiques importantes telles les exposants de Lyapunov, la mesure invariante, l'entropie topologique et la dimension fractale. En chaos quantique (i.e. l'etude de systemes quantiques qui ont un equivalent chaotique dans la limite classique), ces memes OPIs permettent de faire le pont entre le comportement classique et quantique de systemes non-integrables. La localisation de ces cycles fondamentaux est un probleme complexe. Cette these aborde dans un premier temps le probleme de la detection des OPIs dans les systemes chaotiques. Une etude comparative de deux algorithmes recents est presentee. Nous approfondissons ces deux methodes afin de les utiliser sur differents systemes dont des flots continus dissipatifs et conservatifs. Une analyse du taux de convergence des algorithmes est aussi realisee afin de degager les forces et les limites de ces schemes numeriques. Les methodes de detection que nous utilisons reposent sur une transformation particuliere de la dynamique initiale. Cette astuce nous a inspire une methode alternative pour cibler et stabiliser une orbite periodique quelconque dans un systeme chaotique. Le ciblage est en general combine aux methodes de controle pour stabiliser rapidement un cycle donne. En general, il faut connaitre la position et la stabilite du cycle en question. La nouvelle methode de ciblage que nous presentons ne demande pas de connaitre a priori la position et la stabilite des orbites periodiques. Elle pourrait etre un outil complementaire aux methodes de ciblage et de controle actuelles.

  7. Catalog Production for the DES Blind Cosmology Challenge

    NASA Astrophysics Data System (ADS)

    Busha, Michael T.; Wechsler, R. H.; Becker, M. R.; Erickson, B.; Evrard, A. E.

    2013-01-01

    The Blind Cosmology Challenge (BCC) is an effort by the Dark Energy Survey (DES) to test analysis tools for extracting cosmological information using a set of detailed synthetic galaxy catalogs. Here, we describe the creation of these synthetic sky catalogs based on requirements of the optical (DES) and the near-IR VISTA Hemisphere Survey, producing catalogs covering a quarter of the sky to z ˜ 2, with sources complete to r ˜ 25. Starting with a nested set of lightcone outputs of large, N-body simulation, galaxies are assigned to the dark matter distribution using an empirical algorithm that is tunable to match observed evolution of low-order galaxy population properties (counts and spatial clustering) in luminosity-color-density space. Galaxies are lensed by matter along the line of sight (including magnification, shape distortion, and multiple images), using a new algorithm that calculates shear with 3.22 arcsec resolution at galaxy positions in the full catalog. The catalog is well suited to support DES+VISTA joint studies of galaxy clustering, groups and clusters of galaxies, and gravitational lensing, and we highlight their application to the ongoing DES BBCC. Catalogs include ˜320 million galaxies and ˜150 million stars, with realistic colors, shapes and photometric errors. Using the expected DES photometric errors, three independent photometric redshift codes are run on the catalog, two of which produce full probability distributions. The synthetic observable catalog includes object position, magnitudes in the DES and VISTA bands, photometric errors, photometric redshifts, size, ellipticity, for each of ˜ 500 million objects. The galaxy distribution is additionally masked appropriately for the 5000 square degree DES footprint, including the impact of bright stars. In addition, we offer separate catalogs with magnitudes for additional existing and planned surveys, including SDSS, CFHTLS, HSC, LSST, and Euclid.

  8. Toward a Standard Protocol for Micelle Simulation.

    PubMed

    Johnston, Michael A; Swope, William C; Jordan, Kirk E; Warren, Patrick B; Noro, Massimo G; Bray, David J; Anderson, Richard L

    2016-07-01

    In this paper, we present protocols for simulating micelles using dissipative particle dynamics (and in principle molecular dynamics) that we expect to be appropriate for computing micelle properties for a wide range of surfactant molecules. The protocols address challenges in equilibrating and sampling, specifically when kinetics can be very different with changes in surfactant concentration, and with minor changes in molecular size and structure, even using the same force field parameters. We demonstrate that detection of equilibrium can be automated and is robust, for the molecules in this study and others we have considered. In order to quantify the degree of sampling obtained during simulations, metrics to assess the degree of molecular exchange among micellar material are presented, and the use of correlation times are prescribed to assess sampling and for statistical uncertainty estimates on the relevant simulation observables. We show that the computational challenges facing the measurement of the critical micelle concentration (CMC) are somewhat different for high and low CMC materials. While a specific choice is not recommended here, we demonstrate that various methods give values that are consistent in terms of trends, even if not numerically equivalent. PMID:27096611

  9. Chapter 18: Variable Frequency Drive Evaluation Protocol

    SciTech Connect

    Romberger, J.

    2014-11-01

    An adjustable-speed drive (ASD) includes all devices that vary the speed of a rotating load, including those that vary the motor speed and linkage devices that allow constant motor speed while varying the load speed. The Variable Frequency Drive Evaluation Protocol presented here addresses evaluation issues for variable-frequency drives (VFDs) installed on commercial and industrial motor-driven centrifugal fans and pumps for which torque varies with speed. Constant torque load applications, such as those for positive displacement pumps, are not covered by this protocol. Other ASD devices, such as magnetic drive, eddy current drives, variable belt sheave drives, or direct current motor variable voltage drives, are also not addressed. The VFD is by far the most common type of ASD hardware. With VFD speed control on a centrifugal fan or pump motor, energy use follows the affinity laws, which state that the motor electricity demand is a cubic relationship to speed under ideal conditions. Therefore, if the motor runs at 75% speed, the motor demand will ideally be reduced to 42% of full load power; however, with other losses it is about 49% of full load power.

  10. Advantages of a leveled commitment contracting protocol

    SciTech Connect

    Sandholm, T.W.; Lesser, V.R.

    1996-12-31

    In automated negotiation systems consisting of self-interested agents, contracts have traditionally been binding. Such contracts do not allow agents to efficiently accommodate future events. Game theory has proposed contingency contracts to solve this problem. Among computational agents, contingency contracts are often impractical due to large numbers of interdependent and unanticipated future events to be conditioned on, and because some events are not mutually observable. This paper proposes a leveled commitment contracting protocol that allows self-interested agents to efficiently accommodate future events by having the possibility of unilaterally decommitting from a contract based on local reasoning. A decommitment penalty is assigned to both agents in a contract: to be freed from the contract, an agent only pays this penalty to the other party. It is shown through formal analysis of several contracting settings that this leveled commitment feature in a contracting protocol increases Pareto efficiency of deals and can make contracts individually rational when no full commitment contract can. This advantage holds even if the agents decommit manipulatively.

  11. A high performance totally ordered multicast protocol

    NASA Technical Reports Server (NTRS)

    Montgomery, Todd; Whetten, Brian; Kaplan, Simon

    1995-01-01

    This paper presents the Reliable Multicast Protocol (RMP). RMP provides a totally ordered, reliable, atomic multicast service on top of an unreliable multicast datagram service such as IP Multicasting. RMP is fully and symmetrically distributed so that no site bears un undue portion of the communication load. RMP provides a wide range of guarantees, from unreliable delivery to totally ordered delivery, to K-resilient, majority resilient, and totally resilient atomic delivery. These QoS guarantees are selectable on a per packet basis. RMP provides many communication options, including virtual synchrony, a publisher/subscriber model of message delivery, an implicit naming service, mutually exclusive handlers for messages, and mutually exclusive locks. It has commonly been held that a large performance penalty must be paid in order to implement total ordering -- RMP discounts this. On SparcStation 10's on a 1250 KB/sec Ethernet, RMP provides totally ordered packet delivery to one destination at 842 KB/sec throughput and with 3.1 ms packet latency. The performance stays roughly constant independent of the number of destinations. For two or more destinations on a LAN, RMP provides higher throughput than any protocol that does not use multicast or broadcast.

  12. Toward a Standard Protocol for Micelle Simulation.

    PubMed

    Johnston, Michael A; Swope, William C; Jordan, Kirk E; Warren, Patrick B; Noro, Massimo G; Bray, David J; Anderson, Richard L

    2016-07-01

    In this paper, we present protocols for simulating micelles using dissipative particle dynamics (and in principle molecular dynamics) that we expect to be appropriate for computing micelle properties for a wide range of surfactant molecules. The protocols address challenges in equilibrating and sampling, specifically when kinetics can be very different with changes in surfactant concentration, and with minor changes in molecular size and structure, even using the same force field parameters. We demonstrate that detection of equilibrium can be automated and is robust, for the molecules in this study and others we have considered. In order to quantify the degree of sampling obtained during simulations, metrics to assess the degree of molecular exchange among micellar material are presented, and the use of correlation times are prescribed to assess sampling and for statistical uncertainty estimates on the relevant simulation observables. We show that the computational challenges facing the measurement of the critical micelle concentration (CMC) are somewhat different for high and low CMC materials. While a specific choice is not recommended here, we demonstrate that various methods give values that are consistent in terms of trends, even if not numerically equivalent.

  13. Resilient packet ring media access protocol

    NASA Astrophysics Data System (ADS)

    Thepot, Frederic

    2001-07-01

    The discussion will cover the new initiative to create a new MAC layer standard for resilient packet rings: IEEE 802.17 RPR. The key aspects of the presentation will include a preliminary address of the Metro Area Network today and the current networking technologies such as SONET/SDH which are not optimized to carry IP traffic over Metro MAN. The next segment will cover the options which could change the traditional and expensive layered networking model, and address the real benefits of marrying several technologies like Ethernet, SONET/SDH and IP into one technology. The next part of the discussion will detail the technical advantages a new MAC will bring to the services providers. Lastly a summary of the view and strategy about the acceptance and deployment of this new technology in the next 12 months, specifically, now one defines and develops standards for a Resilient Packet Ring Access Protocol for use in Local, Metropolitan, and Wide Area Networks for transfer of data packets at rates scalable to multiple gigabits per second; specifically address the data transmission requirements of carriers that have present and planned fiber optic physical infrastructure in a ring topology; and, defining and developing detailed specifications for using existing and/or new physical layers at appropriate data rates that will support transmission of this access protocol.

  14. Internet Protocol Enhanced over Satellite Networks

    NASA Technical Reports Server (NTRS)

    Ivancic, William D.

    1999-01-01

    Extensive research conducted by the Satellite Networks and Architectures Branch of the NASA Lewis Research Center led to an experimental change to the Internet's Transmission Control Protocol (TCP) that will increase performance over satellite channels. The change raises the size of the initial burst of data TCP can send from 1 packet to 4 packets or roughly 4 kilobytes (kB), whichever is less. TCP is used daily by everyone on the Internet for e-mail and World Wide Web access, as well as other services. TCP is one of the feature protocols used in computer communications for reliable data delivery and file transfer. Increasing TCP's initial data burst from the previously specified single segment to approximately 4 kB may improve data transfer rates by up to 27 percent for very small files. This is significant because most file transfers in wide-area networks today are small files, 4 kilobytes or less. In addition, because data transfers over geostationary satellites can take 5 to 20 times longer than over typical terrestrial connections, increasing the initial burst of data that can be sent is extremely important. This research along with research from other institutions has led to the release of two new Request for Comments from the Internet Engineering Task Force (IETF, the international body that sets Internet standards). In addition, two studies of the implications of this mechanism were also funded by NASA Lewis.

  15. 75 FR 25319 - Agency Information Collection (Survey of Satisfaction With the Disability Evaluation System (DES...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-05-07

    ... From the Federal Register Online via the Government Publishing Office DEPARTMENT OF VETERANS AFFAIRS Agency Information Collection (Survey of Satisfaction With the Disability Evaluation System (DES... Control No. 2900-New (DES).'' SUPPLEMENTARY INFORMATION: Title: Survey of Satisfaction with the...

  16. OIL SPILL DISPERSANT EFFECTIVENESS PROTOCOL. II: PERFORMANCE OF THE REVISED PROTOCOL

    EPA Science Inventory

    The current U.S. Environmental Protection Agency (EPA) protocol for testing the effectiveness of dispersants for use in treating oil spills on the open water, the swirling flask test (SFT), has been found to give widely varying results in the hands of different testing laborator...

  17. Unified Protocol for the Transdiagnostic Treatment of Emotional Disorders: Protocol Development and Initial Outcome Data

    ERIC Educational Resources Information Center

    Ellard, Kristen K.; Fairholme, Christopher P.; Boisseau, Christina L.; Farchione, Todd J.; Barlow, David H.

    2010-01-01

    The Unified Protocol (UP) is a transdiagnostic, emotion-focused cognitive-behavioral treatment developed to be applicable across the emotional disorders. The UP consists of 4 core modules: increasing emotional awareness, facilitating flexibility in appraisals, identifying and preventing behavioral and emotional avoidance, and situational and…

  18. Modelisation des emissions de particules microniques et nanometriques en usinage

    NASA Astrophysics Data System (ADS)

    Khettabi, Riad

    La mise en forme des pieces par usinage emet des particules, de tailles microscopiques et nanometriques, qui peuvent etre dangereuses pour la sante. Le but de ce travail est d'etudier les emissions de ces particules pour fins de prevention et reduction a la source. L'approche retenue est experimentale et theorique, aux deux echelles microscopique et macroscopique. Le travail commence par des essais permettant de determiner les influences du materiau, de l'outil et des parametres d'usinage sur les emissions de particules. E nsuite un nouveau parametre caracterisant les emissions, nomme Dust unit , est developpe et un modele predictif est propose. Ce modele est base sur une nouvelle theorie hybride qui integre les approches energetiques, tribologiques et deformation plastique, et inclut la geometrie de l'outil, les proprietes du materiau, les conditions de coupe et la segmentation des copeaux. Il ete valide au tournage sur quatre materiaux: A16061-T6, AISI1018, AISI4140 et fonte grise.

  19. A Survey on Underwater Acoustic Sensor Network Routing Protocols.

    PubMed

    Li, Ning; Martínez, José-Fernán; Meneses Chaus, Juan Manuel; Eckert, Martina

    2016-03-22

    Underwater acoustic sensor networks (UASNs) have become more and more important in ocean exploration applications, such as ocean monitoring, pollution detection, ocean resource management, underwater device maintenance, etc. In underwater acoustic sensor networks, since the routing protocol guarantees reliable and effective data transmission from the source node to the destination node, routing protocol design is an attractive topic for researchers. There are many routing algorithms have been proposed in recent years. To present the current state of development of UASN routing protocols, we review herein the UASN routing protocol designs reported in recent years. In this paper, all the routing protocols have been classified into different groups according to their characteristics and routing algorithms, such as the non-cross-layer design routing protocol, the traditional cross-layer design routing protocol, and the intelligent algorithm based routing protocol. This is also the first paper that introduces intelligent algorithm-based UASN routing protocols. In addition, in this paper, we investigate the development trends of UASN routing protocols, which can provide researchers with clear and direct insights for further research.

  20. The Quantum Steganography Protocol via Quantum Noisy Channels

    NASA Astrophysics Data System (ADS)

    Wei, Zhan-Hong; Chen, Xiu-Bo; Niu, Xin-Xin; Yang, Yi-Xian

    2015-08-01

    As a promising branch of quantum information hiding, Quantum steganography aims to transmit secret messages covertly in public quantum channels. But due to environment noise and decoherence, quantum states easily decay and change. Therefore, it is very meaningful to make a quantum information hiding protocol apply to quantum noisy channels. In this paper, we make the further research on a quantum steganography protocol for quantum noisy channels. The paper proved that the protocol can apply to transmit secret message covertly in quantum noisy channels, and explicity showed quantum steganography protocol. In the protocol, without publishing the cover data, legal receivers can extract the secret message with a certain probability, which make the protocol have a good secrecy. Moreover, our protocol owns the independent security, and can be used in general quantum communications. The communication, which happen in our protocol, do not need entangled states, so our protocol can be used without the limitation of entanglement resource. More importantly, the protocol apply to quantum noisy channels, and can be used widely in the future quantum communication.

  1. A Survey on Underwater Acoustic Sensor Network Routing Protocols

    PubMed Central

    Li, Ning; Martínez, José-Fernán; Meneses Chaus, Juan Manuel; Eckert, Martina

    2016-01-01

    Underwater acoustic sensor networks (UASNs) have become more and more important in ocean exploration applications, such as ocean monitoring, pollution detection, ocean resource management, underwater device maintenance, etc. In underwater acoustic sensor networks, since the routing protocol guarantees reliable and effective data transmission from the source node to the destination node, routing protocol design is an attractive topic for researchers. There are many routing algorithms have been proposed in recent years. To present the current state of development of UASN routing protocols, we review herein the UASN routing protocol designs reported in recent years. In this paper, all the routing protocols have been classified into different groups according to their characteristics and routing algorithms, such as the non-cross-layer design routing protocol, the traditional cross-layer design routing protocol, and the intelligent algorithm based routing protocol. This is also the first paper that introduces intelligent algorithm-based UASN routing protocols. In addition, in this paper, we investigate the development trends of UASN routing protocols, which can provide researchers with clear and direct insights for further research. PMID:27011193

  2. A Survey on Underwater Acoustic Sensor Network Routing Protocols.

    PubMed

    Li, Ning; Martínez, José-Fernán; Meneses Chaus, Juan Manuel; Eckert, Martina

    2016-01-01

    Underwater acoustic sensor networks (UASNs) have become more and more important in ocean exploration applications, such as ocean monitoring, pollution detection, ocean resource management, underwater device maintenance, etc. In underwater acoustic sensor networks, since the routing protocol guarantees reliable and effective data transmission from the source node to the destination node, routing protocol design is an attractive topic for researchers. There are many routing algorithms have been proposed in recent years. To present the current state of development of UASN routing protocols, we review herein the UASN routing protocol designs reported in recent years. In this paper, all the routing protocols have been classified into different groups according to their characteristics and routing algorithms, such as the non-cross-layer design routing protocol, the traditional cross-layer design routing protocol, and the intelligent algorithm based routing protocol. This is also the first paper that introduces intelligent algorithm-based UASN routing protocols. In addition, in this paper, we investigate the development trends of UASN routing protocols, which can provide researchers with clear and direct insights for further research. PMID:27011193

  3. Problemes en enseignement fonctionnel des langues (Problems in the Functional Teaching of Languages). Publication B-103.

    ERIC Educational Resources Information Center

    Alvarez, Gerardo, Ed.; Huot, Diane, Ed.

    Articles include: (1) "L'elaboration du materiel pedagogique pour des publics adultes" (The Elaboration of Teaching Materials for the Adult Public) by G. Painchaud-Leblanc, (2) "L'elaboration d'un programme d'etudes en francais langue seconde a partir des donnees recentes en didactique des langues" (The Elaboration of a Program of Study in French…

  4. [And Sarah Félix created "L 'Eau des Fées" and "La Parfumerie des Fées"].

    PubMed

    Raynal, Cécile

    2015-12-01

    century, the parisian perfumery of Sarah Felix was famous especially for her cosmetic "L'Eau des Fées" ("Water of the Fairies"), a dyeing supposed to give back to the old hair the color of their youth. Sarah Felix, sister of the famous actress Rachel, exercised several jobs before becoming perfumer. At first, she was actress, then she tried ... oyster culture in Normandy ! Abandoning these activities, Sarah Felix became really a businesswoman in Paris. She dedicated herself to perfumery, in particular to "L'Eau des Fées", from 1866. To launch its product, she was associated to competency characters (engineer, pharmacist, physician) and benefited from the protection of the imperial family. A lawsuit between the associates and the 1870 war hindered the company's early days, but "L'Eau des Fées" provided with quality pledges, imposed itself definitely. The "Parfumerie des Fées" completed the range of its cosmetics with creams, powders, etc. Sarah Félix paid attention to present "L'Eau des Fées" as a dye devoid of toxicity. Was it really the case and could il be sold nowadays? These two issues are discussed in the last part. PMID:26827551

  5. [And Sarah Félix created "L 'Eau des Fées" and "La Parfumerie des Fées"].

    PubMed

    Raynal, Cécile

    2015-12-01

    century, the parisian perfumery of Sarah Felix was famous especially for her cosmetic "L'Eau des Fées" ("Water of the Fairies"), a dyeing supposed to give back to the old hair the color of their youth. Sarah Felix, sister of the famous actress Rachel, exercised several jobs before becoming perfumer. At first, she was actress, then she tried ... oyster culture in Normandy ! Abandoning these activities, Sarah Felix became really a businesswoman in Paris. She dedicated herself to perfumery, in particular to "L'Eau des Fées", from 1866. To launch its product, she was associated to competency characters (engineer, pharmacist, physician) and benefited from the protection of the imperial family. A lawsuit between the associates and the 1870 war hindered the company's early days, but "L'Eau des Fées" provided with quality pledges, imposed itself definitely. The "Parfumerie des Fées" completed the range of its cosmetics with creams, powders, etc. Sarah Félix paid attention to present "L'Eau des Fées" as a dye devoid of toxicity. Was it really the case and could il be sold nowadays? These two issues are discussed in the last part.

  6. New Routing Metrics for ADHOC Network Routing Protocols

    NASA Astrophysics Data System (ADS)

    Reddy, P. C.

    2014-12-01

    The performance and reliability of Internet is measured using different quantities. When the quantities measured are essential and have wide range of acceptance then they are called metrics. Performance metrics enable comparison and selection among the alternatives. In computer networks, metrics are used to evaluate an application, protocol etc. Routing in adhoc networks is nontrivial. Routing protocols for adhoc networks are still evolving and there is need for continuous evaluation of them. In the literature existing, several routing protocols are evaluated using standard metrics under different conditions. This paper proposes new metrics for evaluation of routing protocols and uses them to evaluate the adhoc network routing protocols AODV, DSR, DSDV and TORA. Simulation environment is created using NS-2 simulator. Typical range of speeds, pause times and data rates are used. The results provide new insights in to the working of the routing protocols.

  7. A Secure RFID Authentication Protocol Adopting Error Correction Code

    PubMed Central

    Zheng, Xinying; Chen, Pei-Yu

    2014-01-01

    RFID technology has become popular in many applications; however, most of the RFID products lack security related functionality due to the hardware limitation of the low-cost RFID tags. In this paper, we propose a lightweight mutual authentication protocol adopting error correction code for RFID. Besides, we also propose an advanced version of our protocol to provide key updating. Based on the secrecy of shared keys, the reader and the tag can establish a mutual authenticity relationship. Further analysis of the protocol showed that it also satisfies integrity, forward secrecy, anonymity, and untraceability. Compared with other lightweight protocols, the proposed protocol provides stronger resistance to tracing attacks, compromising attacks and replay attacks. We also compare our protocol with previous works in terms of performance. PMID:24959619

  8. The Real Performance Drivers behind XML Lock Protocols

    NASA Astrophysics Data System (ADS)

    Bächle, Sebastian; Härder, Theo

    Fine-grained lock protocols should allow for highly concurrent transaction processing on XML document trees, which is addressed by the taDOM lock protocol family enabling specific lock modes and lock granules adjusted to the various XML processing models. We have already proved its operational flexibility and performance superiority when compared to competitor protocols. Here, we outline our experiences gained during the implementation and optimization of these protocols. We figure out their performance drivers to maximize throughput while keeping the response times at an acceptable level and perfectly exploiting the advantages of our tailor-made lock protocols for XML trees. Because we have implemented all options and alternatives in our prototype system XTC, benchmark runs for all “drivers” allow for comparisons in identical environments and illustrate the benefit of all implementation decisions. Finally, they reveal that careful lock protocol optimization pays off.

  9. Probabilistic protocols in quantum information science: Use and abuse

    NASA Astrophysics Data System (ADS)

    Caves, Carlton

    2014-03-01

    Protocols in quantum information science often succeed with less than unit probability, but nonetheless perform useful tasks because success occurs often enough to make tolerable the overhead from having to perform the protocol several times. Any probabilistic protocol must be analyzed from the perspective of the resources required to make the protocol succeed. I present results from analyses of two probabilistic protocols: (i) nondeterministic (or immaculate) linear amplification, in which an input coherent state is amplified some of the time to a larger-amplitude coherent state, and (ii) probabilistic quantum metrology, in which one attempts to improve estimation of a parameter (or parameters) by post-selecting on a particular outcome. The analysis indicates that there is little to be gained from probabilistic protocols in these two situations.

  10. Melanins and melanogenesis: methods, standards, protocols.

    PubMed

    d'Ischia, Marco; Wakamatsu, Kazumasa; Napolitano, Alessandra; Briganti, Stefania; Garcia-Borron, José-Carlos; Kovacs, Daniela; Meredith, Paul; Pezzella, Alessandro; Picardo, Mauro; Sarna, Tadeusz; Simon, John D; Ito, Shosuke

    2013-09-01

    Despite considerable advances in the past decade, melanin research still suffers from the lack of universally accepted and shared nomenclature, methodologies, and structural models. This paper stems from the joint efforts of chemists, biochemists, physicists, biologists, and physicians with recognized and consolidated expertise in the field of melanins and melanogenesis, who critically reviewed and experimentally revisited methods, standards, and protocols to provide for the first time a consensus set of recommended procedures to be adopted and shared by researchers involved in pigment cell research. The aim of the paper was to define an unprecedented frame of reference built on cutting-edge knowledge and state-of-the-art methodology, to enable reliable comparison of results among laboratories and new progress in the field based on standardized methods and shared information.

  11. Automatic quality assessment protocol for MRI equipment.

    PubMed

    Bourel, P; Gibon, D; Coste, E; Daanen, V; Rousseau, J

    1999-12-01

    The authors have developed a protocol and software for the quality assessment of MRI equipment with a commercial test object. Automatic image analysis consists of detecting surfaces and objects, defining regions of interest, acquiring reference point coordinates and establishing gray level profiles. Signal-to-noise ratio, image uniformity, geometrical distortion, slice thickness, slice profile, and spatial resolution are checked. The results are periodically analyzed to evaluate possible drifts with time. The measurements are performed weekly on three MRI scanners made by the Siemens Company (VISION 1.5T, EXPERT 1.0T, and OPEN 0.2T). The results obtained for the three scanners over approximately 3.5 years are presented, analyzed, and compared.

  12. Protocols for Handling Messages Between Simulation Computers

    NASA Technical Reports Server (NTRS)

    Balcerowski, John P.; Dunnam, Milton

    2006-01-01

    Practical Simulator Network (PSimNet) is a set of data-communication protocols designed especially for use in handling messages between computers that are engaging cooperatively in real-time or nearly-real-time training simulations. In a typical application, computers that provide individualized training at widely dispersed locations would communicate, by use of PSimNet, with a central host computer that would provide a common computational- simulation environment and common data. Originally intended for use in supporting interfaces between training computers and computers that simulate the responses of spacecraft scientific payloads, PSimNet could be especially well suited for a variety of other applications -- for example, group automobile-driver training in a classroom. Another potential application might lie in networking of automobile-diagnostic computers at repair facilities to a central computer that would compile the expertise of numerous technicians and engineers and act as an expert consulting technician.

  13. Optical protocols for advanced spacecraft networks

    NASA Technical Reports Server (NTRS)

    Bergman, Larry A.

    1991-01-01

    Most present day fiber optic networks are in fact extensions of copper wire networks. As a result, their speed is still limited by electronics even though optics is capable of running three orders of magnitude faster. Also, the fact that photons do not interact with one another (as electrons do) provides optical communication systems with some unique properties or new functionality that is not readily taken advantage of with conventional approaches. Some of the motivation for implementing network protocols in the optical domain, a few possible approaches including optical code-division multiple-access (CDMA), and how this class of networks can extend the technology life cycle of the Space Station Freedom (SSF) with increased performance and functionality are described.

  14. Intermittent kangaroo mother care: a NICU protocol.

    PubMed

    Davanzo, Riccardo; Brovedani, Pierpaolo; Travan, Laura; Kennedy, Jacqueline; Crocetta, Anna; Sanesi, Cecilia; Strajn, Tamara; De Cunto, Angela

    2013-08-01

    The practice of kangaroo mother care (KMC) is steadily increasing in high-tech settings due to its proven benefits for both infants and parents. In spite of that, clear guidelines about how to implement this method of care are lacking, and as a consequence, some restrictions are applied in many neonatal intensive care units (NICUs), preventing its practice. Based on recommendations from the Expert Group of the International Network on Kangaroo Mother Care, we developed a hospital protocol in the neonatal unit of the Institute for Maternal and Child Health in Trieste, Italy, a level 3 unit, aimed to facilitate and promote KMC implementation in high-tech settings. Our guideline is therefore proposed, based both on current scientific literature and on practical considerations and experience. Future adjustments and improvements would be considered based on increasing clinical KMC use and further knowledge.

  15. Extensible Authentication Protocol Overview and Its Applications

    NASA Astrophysics Data System (ADS)

    Youm, Heung Youl

    The Extensible Authentication Protocol (EAP) is an authentication framework that supports multiple authentication mechanisms [38] between a peer and an authentication server in a data communication network. EAP is used as a useful tool for enabling user authentication and distribution of session keys. There are numerous EAP methods that have been developed by global SDOs such as IETF, IEEE, ITU-T, and 3GPP. In this paper, we analyze the most widely deployed EAP methods ranging from the EAP-TLS [27] to the EAP-PSK [25]. In addition, we derive the security requirements of EAP methods meet, evaluate the typical EAP methods in terms of the security requirements, and discuss the features of the existing widely-deployed EAP methods. In addition, we identify two typical use cases for the EAP methods. Finally, recent global standardization activities in this area are reviewed.

  16. Hamstring Muscle Injuries, a Rehabilitation Protocol Purpose

    PubMed Central

    Valle, Xavier; L.Tol, Johannes; Hamilton, Bruce; Rodas, Gil; Malliaras, Peter; Malliaropoulos, Nikos; Rizo, Vicenc; Moreno, Marcel; Jardi, Jaume

    2015-01-01

    Context: Hamstring acute muscle injuries are prevalent in several sports including AFL football (Australian Football League), sprinting and soccer, and are often associated with prolonged time away from sport. Evidence Acquisition: In response to this, research into prevention and management of hamstring injury has increased, but epidemiological data shows no decline in injury and re-injury rates, suggesting that rehabilitation programs and return to play (RTP) criteria have to be improved. There continues to be a lack of consensus regarding how to assess performance, recovery and readiness to RTP, following hamstring strain injury. Results: The aim of this paper was to propose rehabilitation protocol for hamstring muscle injuries based on current basic science and research knowledge regarding injury demographics and management options. Conclusions: Criteria-based (subjective and objective) progression through the rehabilitation program will be outlined along with exercises for each phase, from initial injury to RTP. PMID:26715969

  17. Neonatal euthanasia: lessons from the Groningen Protocol.

    PubMed

    Eduard Verhagen, A A

    2014-10-01

    Decisions about neonatal end-of-life care have been studied intensely over the last 20 years in The Netherlands. Nationwide surveys were done to quantify these decisions, provide details and monitor the effect of guidelines, new regulations and other interventions. One of those interventions was the Groningen Protocol for newborn euthanasia in severely ill newborns, published in 2005. Before publication, an estimated 20 cases of euthanasia per year were performed. After publication, only two cases in five years were reported. Studies suggested that this might be partly caused by the lack of consensus about the dividing line between euthanasia and palliative care. New recommendations about paralytic medication use in dying newborns were issued to increase transparency and to improve reporting of euthanasia. New surveys will be needed to measure the effects of these interventions. This cycle of interventions and measurements seems useful for continuous improvement of end-of-life care in newborns.

  18. Fault recovery in the reliable multicast protocol

    NASA Technical Reports Server (NTRS)

    Callahan, John R.; Montgomery, Todd L.; Whetten, Brian

    1995-01-01

    The Reliable Multicast Protocol (RMP) provides a unique, group-based model for distributed programs that need to handle reconfiguration events at the application layer. This model, called membership views, provides an abstraction in which events such as site failures, network partitions, and normal join-leave events are viewed as group reformations. RMP provides access to this model through an application programming interface (API) that notifies an application when a group is reformed as the result of a some event. RMP provides applications with reliable delivery of messages using an underlying IP Multicast (12, 5) media to other group members in a distributed environment even in the case of reformations. A distributed application can use various Quality of Service (QoS) levels provided by RMP to tolerate group reformations. This paper explores the implementation details of the mechanisms in RMP that provide distributed applications with membership view information and fault recovery capabilities.

  19. Chest magnetic resonance imaging: a protocol suggestion*

    PubMed Central

    Hochhegger, Bruno; de Souza, Vinícius Valério Silveira; Marchiori, Edson; Irion, Klaus Loureiro; Souza Jr., Arthur Soares; Elias Junior, Jorge; Rodrigues, Rosana Souza; Barreto, Miriam Menna; Escuissato, Dante Luiz; Mançano, Alexandre Dias; Araujo Neto, César Augusto; Guimarães, Marcos Duarte; Nin, Carlos Schuler; Santos, Marcel Koenigkam; Silva, Jorge Luiz Pereira e

    2015-01-01

    In the recent years, with the development of ultrafast sequences, magnetic resonance imaging (MRI) has been established as a valuable diagnostic modality in body imaging. Because of improvements in speed and image quality, MRI is now ready for routine clinical use also in the study of pulmonary diseases. The main advantage of MRI of the lungs is its unique combination of morphological and functional assessment in a single imaging session. In this article, the authors review most technical aspects and suggest a protocol for performing chest MRI. The authors also describe the three major clinical indications for MRI of the lungs: staging of lung tumors; evaluation of pulmonary vascular diseases; and investigation of pulmonary abnormalities in patients who should not be exposed to radiation. PMID:26811555

  20. Designing an Exploration Atmosphere Prebreathe Protocol

    NASA Technical Reports Server (NTRS)

    Conkin, Johnny; Feiveson, A. H.; Gernhardt, M. L.; Norcross, J. R.; Wessel, J. H., III

    2015-01-01

    Extravehicular activities (EVAs) at remote locations must maximize limited resources such as oxygen (O2) and also minimize the risk of decompression sickness (DCS). A proposed remote denitrogenation (prebreathe) protocol requires astronauts to live in a mildly hypoxic atmosphere at 8.2 psia while periodically performing EVAs at 4.3 psia. Empirical data are required to confirm that the protocol meets the current accept requirements: less than or equal to 15% incidence of Type I DCS, less than or equal to 20% incidence of Grade IV venous gas emboli (VGE), both at 95% statistical confidence, with no Type II DCS symptom during the validation trial. METHODS: A repeated measures statistical design is proposed in which groups of 6 subjects with physical characteristics similar to active-duty astronauts would first become equilibrated to an 8.2 psia atmosphere in a hypobaric chamber containing 34% O2 and 66% N2, over 48 h, and then perform 4 simulated EVAs at 4.3 psia over the next 9 days. In the equilibration phase, subjects undergo a 3-h 100% O2 mask prebreathe prior to and during a 5-min ascent to 8.2 psia to prevent significant tissue N2 supersaturation on reaching 8.2 psia. Masks would be removed once 34% O2 is established at 8.2 psia, and subjects would then equilibrate to this atmosphere for 48 h. The hypoxia is equivalent to breathing air at 1,220 meters (4,000 ft) altitude, just as was experienced in the shuttle 10.2 psia - 26.5% O2 staged denitrogenation protocol and the current ISS campout denitrogenation protocol. For simulated EVAs, each subject dons a mask and breathes 85% O2 and 15% N2 during a 3-min depressurization to 6.0 psia, holds for 15 min, and then completes a 3-min depressurization to 4.3 psia. The simulated EVA period starts when 6.0 psia is reached and continues for a total of 240 min (222 min at 4.3 psia). During this time, subjects will follow a prescribed repetitive activity against loads in the upper and lower body with mean metabolic rate

  1. Assessment and classification of protocol deviations

    PubMed Central

    Ghooi, Ravindra Bhaskar; Bhosale, Neelambari; Wadhwani, Reena; Divate, Pathik; Divate, Uma

    2016-01-01

    Introduction: Deviations from the approved trial protocol are common during clinical trials. They have been conventionally classified as deviations or violations, depending on their impact on the trial. Methods: A new method has been proposed by which deviations are classified in five grades from 1 to 5. A deviation of Grade 1 has no impact on the subjects’ well-being or on the quality of data. At the maximum, a deviation Grade 5 leads to the death of the subject. This method of classification was applied to deviations noted in the center over the last 3 years. Results: It was observed that most deviations were of Grades 1 and 2, with fewer falling in Grades 3 and 4. There were no deviations that led to the death of the subject (Grade 5). Discussion: This method of classification would help trial managers decide on the action to be taken on the occurrence of deviations, which would be based on their impact. PMID:27453830

  2. Phenology monitoring protocol: Northeast Temperate Network

    USGS Publications Warehouse

    Tierney, Geri; Mitchell, Brian; Miller-Rushing, Abraham J.; Katz, Jonathan; Denny, Ellen; Brauer, Corinne; Donovan, Therese; Richardson, Andrew D.; Toomey, Michael; Kozlowski, Adam; Weltzin, Jake F.; Gerst, Kathy; Sharron, Ed; Sonnentag, Oliver; Dieffenbach, Fred

    2013-01-01

    historical parks and national historic sites in the northeastern US. This protocol was developed in collaboration with and relies upon the procedures and infrastructure of the USA National Phenology Network (USA-NPN), including Nature’s Notebook, USA-NPN’s online plant and animal phenology observation program (www.nn.usanpn.org). Organized in 2007, USA-NPN is a nation-wide partnership among federal agencies, schools and universities, citizen volunteers, and others to monitor and understand the influence of seasonal cycles on the nation’s biological resources. The overall goal of NETN’s phenology monitoring program is to determine trends in the phenology of key species in order to assist park managers with the detection and mitigation of the effects of climate change on park resources. An additional programmatic goal is to interest and educate park visitors and staff, as well as a cadre of volunteer monitors.

  3. Restauration adaptative des contours par une approche inspiree de la prediction des performances

    NASA Astrophysics Data System (ADS)

    Rousseau, Kami

    En teledetection, les cartes de contours peuvent servir, entre autres choses, a la restitution geometrique, a la recherche d'elements lineaires, ainsi qu'a la segmentation. La creation de ces cartes est faite relativement tot dans la chaine de traitements d'une image. Pour assurer la qualite des operations subsequentes, il faut veiller a obtenir une carte de contours precise. Notre problematique est de savoir s'il est possible de diminuer la perte de temps liee au choix d'algorithme et de parametre en corrigeant automatiquement la carte de contours. Nous concentrerons donc nos efforts sur le developpement d'une methode de detection/restauration de contours adaptative. Notre methode s'inspire d'une technique de prediction des performances d'algorithmes de bas niveau. Elle consiste a integrer un traitement par reseau de neurones a une methode " classique " de detection de contours. Plus precisement, nous proposons de combiner la carte de performances avec la carte de gradient pour permettre des decisions plus exactes. La presente etude a permis de developper un logiciel comprenant un reseau de neurones entraine pour predire la presence de contours. Ce reseau de neurones permet d'ameliorer les decisions de detecteurs de contours, en reduisant le nombre de pixels de fausses alarmes et de contours manques. La premiere etape de ce travail consiste en une methode d'evaluation de performance pour les cartes de contours. Une fois ce choix effectue, il devient possible de comparer les cartes entre elles. Il est donc plus aise de determiner, pour chaque image, la meilleure detection de contours. La revue de la litterature realisee simultanement a permis de faire un choix d'un groupe d'indicateurs prometteurs pour la restauration de contours. Ces derniers ont servi a la calibration et a l'entrainement d'un reseau de neurones pour modeliser les contours. Par la suite, l'information fournie par ce reseau a ete combinee par multiplication arithmetique avec les cartes d

  4. Outcome analysis of individualized vestibular rehabilitation protocols

    NASA Technical Reports Server (NTRS)

    Black, F. O.; Angel, C. R.; Pesznecker, S. C.; Gianna, C.

    2000-01-01

    OBJECTIVE: To determine the outcome of vestibular rehabilitation protocols in subjects with peripheral vestibular disorders compared with normal and abnormal control subjects. STUDY DESIGN: Prospective study using repeated measure, matched control design. Subjects were solicited consecutively according to these criteria: vestibular disorder subjects who had abnormal results of computerized dynamic posturography (CDP) sensory organization tests (SOTs) 5 and 6 and underwent rehabilitation; vestibular disorder subjects who had abnormal results of SOTs 5 and 6 and did not undergo rehabilitation; and normal subjects (normal SOTs). SETTING: Tertiary neurotology clinic. SUBJECTS: Men and women over age 18 with chronic vestibular disorders and chief complaints of unsteadiness, imbalance, and/or motion intolerance, and normal subjects. INTERVENTIONS: Pre- and post-rehabilitation assessment included CDP, vestibular disability, and activities of daily living questionnaires. Individualized rehabilitation plans were designed and implemented to address the subject's specific complaints and functional deficits. Supervised sessions were held at weekly intervals, and self-administered programs were devised for daily home use. MAIN OUTCOME MEASURES: CDP composite and SOT scores, number of falls on CDP, and self-assessment questionnaire results. RESULTS: Subjects who underwent rehabilitation (Group A) showed statistically significant improvements in SOTs, overall composite score, and reduction in falls compared with abnormal (Group B) control groups. Group A's performances after rehabilitation were not significantly different from those of normal subjects (Group C) in SOTs 3 through 6, and close to normal on SOTs 1 and 2. Subjects in Group A also reported statistically significant symptomatic improvement. CONCLUSIONS: Outcome measures of vestibular protocol physical therapy confirmed objective and subjective improvement in subjects with chronic peripheral vestibular disorders. These

  5. Interplanetary Overlay Network Bundle Protocol Implementation

    NASA Technical Reports Server (NTRS)

    Burleigh, Scott C.

    2011-01-01

    The Interplanetary Overlay Network (ION) system's BP package, an implementation of the Delay-Tolerant Networking (DTN) Bundle Protocol (BP) and supporting services, has been specifically designed to be suitable for use on deep-space robotic vehicles. Although the ION BP implementation is unique in its use of zero-copy objects for high performance, and in its use of resource-sensitive rate control, it is fully interoperable with other implementations of the BP specification (Internet RFC 5050). The ION BP implementation is built using the same software infrastructure that underlies the implementation of the CCSDS (Consultative Committee for Space Data Systems) File Delivery Protocol (CFDP) built into the flight software of Deep Impact. It is designed to minimize resource consumption, while maximizing operational robustness. For example, no dynamic allocation of system memory is required. Like all the other ION packages, ION's BP implementation is designed to port readily between Linux and Solaris (for easy development and for ground system operations) and VxWorks (for flight systems operations). The exact same source code is exercised in both environments. Initially included in the ION BP implementations are the following: libraries of functions used in constructing bundle forwarders and convergence-layer (CL) input and output adapters; a simple prototype bundle forwarder and associated CL adapters designed to run over an IPbased local area network; administrative tools for managing a simple DTN infrastructure built from these components; a background daemon process that silently destroys bundles whose time-to-live intervals have expired; a library of functions exposed to applications, enabling them to issue and receive data encapsulated in DTN bundles; and some simple applications that can be used for system checkout and benchmarking.

  6. Wireless Sensor Networks Energy-Efficient MAC Protocol

    NASA Astrophysics Data System (ADS)

    Lijuan, Du; Yuanpeng, Wang; WeiPeng, Jing

    This paper presents a new wireless sensor network energy-efficient MAC protocol, ES-MAC protocol, and shows the results of simulation experiments. During the transmission the nodes do not send ACK packages while use a small amount of new information packets, so they can reduce unnecessary energy loss and wasted time. The theoretical analysis and simulation results show that ES-MAC protocol reduces energy consumption while reducing network latency and improving network throughput.

  7. TRIGA: Telecommunications Protocol Processing Subsystem Using Reconfigurable Interoperable Gate Arrays

    NASA Technical Reports Server (NTRS)

    Pang, Jackson; Pingree, Paula J.; Torgerson, J. Leigh

    2006-01-01

    We present the Telecommunications protocol processing subsystem using Reconfigurable Interoperable Gate Arrays (TRIGA), a novel approach that unifies fault tolerance, error correction coding and interplanetary communication protocol off-loading to implement CCSDS File Delivery Protocol and Datalink layers. The new reconfigurable architecture offers more than one order of magnitude throughput increase while reducing footprint requirements in memory, command and data handling processor utilization, communication system interconnects and power consumption.

  8. Secure authentication protocol for Internet applications over CATV network

    NASA Astrophysics Data System (ADS)

    Chin, Le-Pond

    1998-02-01

    An authentication protocol is proposed in this paper to implement secure functions which include two way authentication and key management between end users and head-end. The protocol can protect transmission from frauds, attacks such as reply and wiretap. Location privacy is also achieved. A rest protocol is designed to restore the system once when systems fail. The security is verified by taking several security and privacy requirements into consideration.

  9. Heparin enhances the catalytic activity of des-ETW-thrombin.

    PubMed

    Goodwin, C A; Deadman, J J; Le Bonniec, B F; Elgendy, S; Kakkar, V V; Scully, M F

    1996-04-01

    The thrombin mutant, des-ETW-thrombin, lacking Glu(146), Thr(147), and Trp(148) within a unique insertion loop located at the extreme end of the primary specificity pocket, has been shown previously to exhibit reduced catalytic activity with respect to macromolecular and synthetic thrombin substrates and reduced or enhanced susceptibility to inhibition. Investigation of the hydrolysis of peptidyl p-nitroanilide substrates by des-ETW-thrombin showed increased activity in the presence of heparin and other sulphated glycosaminoglycans. No effect was observed upon the activity of wild-type thrombin. Heparin was found to decrease the K(m) for cleavage of four thrombin-specific substrates by des-ETW-thrombin by 3-4-fold. Similarly, pentosan polysulphate (PPS) decreased the K(m) with these substrates by 8-10-fold. Heparin also increased the rate of inhibition of des-ETW-thrombin by antithrombin III and D-phenylalanyl-prolyl-arginylchloromethane (PPACK). The inhibition of des-ETW-thrombin by a number of thrombin-specific peptide boronic acids also showed significant reduction in the final K(i) in the presence of heparin, due to reduction in the off-rate. A peptide analogue of a sequence of hirudin which binds thrombin tightly to exosite I (fibrinogen recognition site) potentiated the activity of des-ETW-thrombin against peptide p-nitroanilide substrates in a manner similar to heparin. The K(i) for the inhibition of des-ETW-thrombin by p-aminobenzamidine was decreased by these ligands from 9.7 mM to 7.5 mM, 5.1 mM, and 2.5 mM in the presence of heparin, hirudin peptide and PPS respectively, suggesting the increased catalytic activity is due to enhanced access to the primary specificity pocket. The positive influence of these ligands on des-ETW-thrombin was reversed in the presence of ATP or ADP; the latter has previously been shown to inhibit thrombin activity by blocking initial interaction with fibrinogen at exosite 1. Because the effect of heparin and PPS is similar to

  10. Protocols and services for distributed data-intensive science

    NASA Astrophysics Data System (ADS)

    Allcock, William; Foster, Ian; Tuecke, Steven; Chervenak, Ann; Kesselman, Carl

    2001-08-01

    We describe work being performed in the Globus project to develop enabling protocols and services for distributed data-intensive science. These services include: * High-performance, secure data transfer protocols based on FTP, plus a range of libraries and tools that use these protocols * Replica catalog services supporting the creation and location of file replicas in distributed systems These components leverage the substantial body of "Grid" services and protocols developed within the Globus project and by its collaborators, and are being used in a number of data-intensive application projects.

  11. Biometrics based authentication scheme for session initiation protocol.

    PubMed

    Xie, Qi; Tang, Zhixiong

    2016-01-01

    Many two-factor challenge-response based session initiation protocol (SIP) has been proposed, but most of them are vulnerable to smart card stolen attacks and password guessing attacks. In this paper, we propose a novel three-factor SIP authentication scheme using biometrics, password and smart card, and utilize the pi calculus-based formal verification tool ProVerif to prove that the proposed protocol achieves security and authentication. Furthermore, our protocol is highly efficient when compared to other related protocols.

  12. Variable bandwidth broadcasting protocol for video-on-demand

    NASA Astrophysics Data System (ADS)

    Paris, Jehan-Francois; Long, Darrell D. E.

    2003-01-01

    We present the first broadcasting protocol that can alter the number of channels allocated to a given video without inconveniencing the viewer and without causing any temporary bandwidth surge. Our variable bandwidth broadcasting (VBB) protocol assigns to each video a minimum number of channels whose bandwidths are all equal to the video consumption rate. Additional channels can be assigned to the video at any time to reduce the customer waiting time or retaken to free server bandwidth. The cost of this additional flexibility is quite reasonable as the bandwidth requirements of our VBB fall between those of the fast broadcasting protocol and the new pagoda broadcasting protocol.

  13. A Weak Value Based QKD Protocol Robust Against Detector Attacks

    NASA Astrophysics Data System (ADS)

    Troupe, James

    2015-03-01

    We propose a variation of the BB84 quantum key distribution protocol that utilizes the properties of weak values to insure the validity of the quantum bit error rate estimates used to detect an eavesdropper. The protocol is shown theoretically to be secure against recently demonstrated attacks utilizing detector blinding and control and should also be robust against all detector based hacking. Importantly, the new protocol promises to achieve this additional security without negatively impacting the secure key generation rate as compared to that originally promised by the standard BB84 scheme. Implementation of the weak measurements needed by the protocol should be very feasible using standard quantum optical techniques.

  14. Analysis of limiting information characteristics of quantum-cryptography protocols

    SciTech Connect

    Sych, D V; Grishanin, Boris A; Zadkov, Viktor N

    2005-01-31

    The problem of increasing the critical error rate of quantum-cryptography protocols by varying a set of letters in a quantum alphabet for space of a fixed dimensionality is studied. Quantum alphabets forming regular polyhedra on the Bloch sphere and the continual alphabet equally including all the quantum states are considered. It is shown that, in the absence of basis reconciliation, a protocol with the tetrahedral alphabet has the highest critical error rate among the protocols considered, while after the basis reconciliation, a protocol with the continual alphabet possesses the highest critical error rate. (quantum optics and quantum computation)

  15. A Flexible CSMA based MAC Protocol for Software Defined Radios

    NASA Astrophysics Data System (ADS)

    Puschmann, André; Kalil, Mohamed A.; Mitschele-Thiel, Andreas

    2012-09-01

    In this article, we propose a flexible CSMA based MAC protocol which facilitates research and experimentation using software define radios. The modular architecture allows to employ the protocol on platforms with heterogeneous hardware capabilities and provides the freedom to exchange or adapt the spectrum sensing mechanism without modifying the MAC protocol internals. We discuss the architecture of the protocol and provide structural details of its main components. Furthermore, we present throughput measurements that have been obtained on an example system using host-based spectrum sensing.

  16. The Protocol of Choice for Treatment of Snake Bite

    PubMed Central

    Mohammad Alizadeh, Afshin; Rahimi, Mitra; Erfantalab, Peyman; Ostadi, Ali

    2016-01-01

    The aim of the current study is to compare three different methods of treatment of snake bite to determine the most efficient one. To unify the protocol of snake bite treatment in our center, we retrospectively reviewed files of the snake-bitten patients who had been referred to us between 2010 and 2014. They were contacted for follow-up using phone calls. Demographic and on-arrival characteristics, protocol used for treatment (WHO/Haddad/GF), and outcome/complications were evaluated. Patients were entered into one of the protocol groups and compared. Of a total of 63 patients, 56 (89%) were males. Five, 19, and 28 patients were managed by Haddad, WHO, or GF protocols, respectively. Eleven patients had fallen into both GF and WHO protocols and were excluded. Serum sickness was significantly more common when WHO protocol was used while 100% of the compartment syndromes and 71% of deformities had been reported after GF protocol. The most important complications were considered to be deformity, compartment syndrome, and amputation and were more frequent after the use of WHO and GF protocols (23.1% versus 76.9%; none in Haddad; P = NS). Haddad protocol seems to be the best for treatment of snake-bitten patients in our region. However, this cannot be strictly concluded because of the limited sample size and nonsignificant P values. PMID:27738653

  17. Biometrics based authentication scheme for session initiation protocol.

    PubMed

    Xie, Qi; Tang, Zhixiong

    2016-01-01

    Many two-factor challenge-response based session initiation protocol (SIP) has been proposed, but most of them are vulnerable to smart card stolen attacks and password guessing attacks. In this paper, we propose a novel three-factor SIP authentication scheme using biometrics, password and smart card, and utilize the pi calculus-based formal verification tool ProVerif to prove that the proposed protocol achieves security and authentication. Furthermore, our protocol is highly efficient when compared to other related protocols. PMID:27462493

  18. Protocol for a Delay-Tolerant Data-Communication Network

    NASA Technical Reports Server (NTRS)

    Torgerson, Jordan; Hooke, Adrian; Burleigh, Scott; Fall, Kevin

    2004-01-01

    As its name partly indicates, the Delay-Tolerant Networking (DTN) Bundle Protocol is a protocol for delay-tolerant transmission of data via communication networks. This protocol was conceived as a result of studies of how to adapt Internet protocols so that Internet-like services could be provided across interplanetary distances in support of deep-space exploration. The protocol, and software to implement the protocol, is being developed in collaboration among experts at NASA's Jet Propulsion Laboratory and other institutions. No current Internet protocols can accommodate long transmission delay times or intermittent link connectivity. The DTN Bundle Protocol represents a departure from the standard Internet assumption that a continuous path is available from a host computer to a client computer: It provides for routing of data through networks that may be disjointed and may be characterized by long transmission delays. In addition to networks that include deepspace communication links, examples of such networks include terrestrial ones within which branches are temporarily disconnected. The protocol is based partly on the definition of a message-based overlay above the transport layers of the networks on which it is hosted.

  19. NEMVP: North American energy measurement and verification protocol

    SciTech Connect

    1996-03-01

    This measurement and verification protocol discusses procedures that,when implemented, allow buyers, sellers, and financiers of energy projects to quantify energy conservation measure performance and savings.

  20. The Xpress Transfer Protocol (XTP): A tutorial (short version)

    NASA Technical Reports Server (NTRS)

    Sanders, Robert M.; Weaver, Alfred C.

    1990-01-01

    The Xpress Transfer Protocol (XTP) is a reliable, light weight transfer layer protocol. Current transport layer protocols such as DoD's Transmission Control Protocol (TCP) and ISO's Transport Protocol (TP) were not designed for the next generation of high speed, interconnected reliable networks such as fiber distributed data interface (FDDI) and the gigabit/second wide area networks. Unlike all previous transport layer protocols, XTP is being designed to be implemented in hardware as a VLSI chip set. By streamlining the protocol, combining the transport and network layers, and utilizing the increased speed and parallelization possible with a VLSI implementation, XTP will be able to provide the end-to-end data transmission rates demanded in the high speed networks without compromising reliability and functionality. This tutorial briefly describes the operation of the XTP protocol and in particular, its error, flow and rate control; inter-networking addressing mechanisms; and multicast support features, as defined in the XTP Protocol Definition Revision 3.4.

  1. The Xpress Transfer Protocol (XTP): A tutorial (expanded version)

    NASA Technical Reports Server (NTRS)

    Sanders, Robert M.; Weaver, Alfred C.

    1990-01-01

    The Xpress Transfer Protocol (XTP) is a reliable, real-time, light weight transfer layer protocol. Current transport layer protocols such as DoD's Transmission Control Protocol (TCP) and ISO's Transport Protocol (TP) were not designed for the next generation of high speed, interconnected reliable networks such as fiber distributed data interface (FDDI) and the gigabit/second wide area networks. Unlike all previous transport layer protocols, XTP is being designed to be implemented in hardware as a VLSI chip set. By streamlining the protocol, combining the transport and network layers and utilizing the increased speed and parallelization possible with a VLSI implementation, XTP will be able to provide the end-to-end data transmission rates demanded in high speed networks without compromising reliability and functionality. This paper describes the operation of the XTP protocol and in particular, its error, flow and rate control; inter-networking addressing mechanisms; and multicast support features, as defined in the XTP Protocol Definition Revision 3.4.

  2. Comparison des donnees simulees des capteurs de SPOT et landsat-D: Application a une region agricole

    NASA Astrophysics Data System (ADS)

    Saint, Gilbert; Podaire, Alain

    La modélisation de la luminance spectrale des objets observés en télédétection permet d'effectuer des simulations de différents capteurs à partir de données obtenues au moyen d'un scanneur DAEDALUS aéroporté : les qualités radiométrique et géométrique ont pu être évaluées par une comparaison avec des données Landsat réelles. L'analyse sur une zone agricole met surtout en évidence le rôle important de l'accroissement de la résolution.

  3. Analyse des facteurs prédictifs de malignité des goitres nodulaires : à propos de 500 cas

    PubMed Central

    Bouaity, Brahim; Darouassi, Youssef; Chihani, Mehdi; Touati, Mohamed Mliha; Ammar, Haddou

    2016-01-01

    Les nodules thyroïdiens sont très fréquents et moins de 10% d'entre eux sont malin. Ils posent un véritable problème diagnostique et thérapeutique surtout par rapport à leur nature bénigne ou maligne. L’étude de certains facteurs cliniques et paracliniques de présomption de malignité permet de bien codifier la stratégie thérapeutique. Le but de ce travail est d’étudier les facteurs prédictifs de malignité des goitres nodulaires et comparer nos résultats à ceux de la littérature. Il s'agit d'une étude rétrospective à propos de 500 cas de goitres nodulaires opérés au service d'Oto-rhino-laryngologie (ORL) et Chirurgie cervico-faciale (CCF) de l'hôpital militaire Avicenne de Marrakech entre 2006 et 2012. Le pourcentage de cancers a été de 6,8%. L’âge moyen de nos patients était de 46 ans, avec une sex-ratio de 5 (F/H). A la palpation cervicale; le caractère dure du nodule a été constaté dans 94,4% des cas de cancer, avec des limites irrégulières dans 64,70% des cas de cancer. Trois nodules étaient fixes et ils étaient tous malins. Les adénopathies cervicales ont été constatées chez 8 malades dont 7 présentaient des cancers. A l’échographie, 61,8% des nodules malins présentaient un aspect hypoéchogène, avec des contours flous dans 88,24% des cas. La vascularisation intra nodulaire était présente dans 35,3% de ces cas des cancers avec des microcalcifications chez 55,9% d'entre eux. Le halo hypoéchogene périnodulaire était incomplet dans 73,5% des cas de cancer. Nos patients étaient en euthyroïdie dans 84,6% des cas. Les facteurs prédictifs de malignité d'un goitre nodulaire, étaient donc dans notre étude d'abord cliniques: l’âge supérieur à 60 ans, la consistance dure du nodule, sa fixité, son caractère irrégulier et mal limité à la palpation, ainsi que la présence d'adénopathie(s) cervicale(s) à l'examen; et échographiques: le caractère hypoéchogène, les limites floues, la présence de

  4. Classification of DES16C2nm as a SLSN at z=1.998

    NASA Astrophysics Data System (ADS)

    Galbany, L.; D'Andrea, C.; Prajs, S.; Smith, M.; Sullivan, M.; Ponder, K.; Gonzalez-Gaitan, S.; Forster, F.; Hamuy, M.; Prieto, Jose Luis; Schubnell, M.; Kessler, R.; Lasker, J.; Scolnic, D.; Brout, D. J.; Gladney, L.; March, M.; Sako, M.; Wolf, R. C.; Brown, P. J.; Krisciunas, K.; Suntzeff, N.; Macaulay, E.; Nichol, R.; Childress, M.; Maartens, R.; Kovacs, E.; Kuhlmann, S.; Spinka, H.; Ahn, E.; Finley, D. A.; Frieman, J.; Marriner, J.; Wester, W.; Aldering, G.; Gupta, R.; Kim, A. G.; Thomas, R. C.; Barbary, K.; Bloom, J. S.; Goldstein, D.; Nugent, P.; Perlmutter, S.; Foley, R. J.; Pan, Y.-C.; Casas, R.; Castander, F. J.; Papadopoulos, A.; Morganson, E.; Desai, S.; Paech, K.; Smith, R. C.

    2016-11-01

    We report the spectroscopic classification of DES16C2nm as a superluminous supernova (SLSN) discovered by the Dark Energy Survey (ATEL #4668). DES16C2nm was discovered in the first epoch of DES Y4, on 22 August 2016 at R.A. = 03:40:14.83, Decl = -29:05:53.5 with i = 23.2 mag. DES16C2nm has a non-detection in the final epoch of DES Y3 on 08 February 2016.

  5. Transport de paires EPR dans des structures mesoscopiques

    NASA Astrophysics Data System (ADS)

    Dupont, Emilie

    Dans cette these, nous nous sommes particulierement interesses a la propagation de paires EPR1 delocalisees et localisees, et a l'influence d'un supraconducteur sur le transport de ces paires. Apres une introduction de cette etude, ainsi que du cadre scientifique qu'est l'informatique quantique dans lequel elle s'inscrit, nous allons dans le chapitre 1 faire un rappel sur le systeme constitue de deux points quantiques normaux entoures de deux fils supraconducteurs. Cela nous permettra d'introduire une methode de calcul qui sera reutilisee par la suite, et de trouver egalement le courant Josephson produit par ce systeme transforme en SQUID-dc par l'ajout d'une jonction auxiliaire. Le SQUID permet de mesurer l'etat de spin (singulet ou triplet), et peut etre forme a partir d'autres systemes que nous etudierons ensuite. Dans le chapitre 2, nous rappellerons l'etude detaillee d'un intricateur d'Andreev faite par un groupe de Bale. La matrice T, permettant d'obtenir le courant dans les cas ou les electrons sont separes spatialement ou non, sera etudiee en detail afin d'en faire usage au chapitre suivant. Le chapitre 3 est consacre a l'etude de l'influence du bruit sur le fonctionnement de l'intricateur d'Andreev. Ce bruit modifie la forme du courant jusqu'a aboutir a d'autres conditions de fonctionnement de l'intricateur. En effet, le bruit present sur les points quantiques peut perturber le transport des paires EPR par l'intermediaire des degres de liberte. Nous montrerons que, du fait de l'"intrication" entre la charge de la paire et le bruit, la paire est detruite pour des temps longs. Cependant, le resultat le plus important sera que le bruit perturbe plus le transport des paires delocalisees, qui implique une resonance de Breit-Wigner a deux particules. Le transport parasite n'implique pour sa part qu'une resonance de Breit-Wigner a une particule. Dans le chapitre 4, nous reviendrons au systeme constitue de deux points quantiques entoures de deux fils

  6. Information searching protocol: a smart protocol for specific content search over the Internet

    NASA Astrophysics Data System (ADS)

    Bhattarakosol, Pattarasinee; Preechaveerakul, Ladda

    2006-10-01

    Currently, information is very important to Internet users. Unfortunately, searching for specific information from the Internet is not easy as wishes. The existing search engine mechanisms cannot be performed using a pathname of URL as a search key. Therefore, users who have a partial pathname of URL cannot use their knowledge to narrow down the search results. Thus, users have to spend a long time searching for the required web site from the result list. This paper proposes a search protocol named Information Searching Protocol (ISP) that supports the multiple search contents for users who know a partial pathname of URL and keywords. Moreover, the architecture of the Global Search Engine System (GSES) that cooperates with the ISP and is responsible for the search mechanism is also proposed. The GSES consists of two separated parts: an Internet Search Protocol agent at the client site, and GSES components at the server site. These components allow users to perform the search using a pathname of URL composing with keywords. The functions of GSES components indicate that the ISP enhances the search mechanism. So, users receive more specific URL and can, shortly, get access to the required site.

  7. Opération multimode transverse des OPOs: des structures classiques aux corrélations quantiques

    NASA Astrophysics Data System (ADS)

    Martinelli, M.; Ducci, S.; Gigan, S.; Treps, N.; Maître, A.; Fabre, C.

    2002-06-01

    Nous démontrons la formation de structures transverses sur les faisceaux émis par un oscillateur paramétrique optique (OPO) de type II en configuration confocale. D'un point de vue classique nous mettons en évidence le caractère multimode transverse de telles structures. A travers l'étude des corrélations spatiales des faisceaux générés nous montrons que ces structures sont également multimodes d'un point de vue quantique.

  8. Apport des moyens endoscopiques dans la dilatation des sténoses caustiques de l’œsophage

    PubMed Central

    Seydou, Togo; Abdoulaye, Ouattara Moussa; xing, Li; Zi, Sanogo Zimogo; sekou, Koumaré; Wen, Yang Shang; Ibrahim, Sankare; Sekou, Toure Cheik Ahmed; Boubacar, Maiga Ibrahim; Saye, Jacque; Jerome, Dakouo Dodino; Dantoumé, Toure Ousmane; Sadio, Yena

    2016-01-01

    Introduction Toutes les sténoses symptomatiques de l’œsophage peuvent être dilatées par voie endoscopique. Nous évaluons l'apport des moyens endoscopiques dans la prise en charge de la dilatation œsophagienne pour sténose caustique de l’œsophage (SCO) au Mali. Méthodes IL s'agissait d'une étude descriptive et prospective réalisée dans le service de chirurgie thoracique à l'hôpital du Mali. Au total 46 dossiers cliniques de patients on été enregistrés et subdivisés en 4 groupes en fonction de la topographie des lésions cicatricielles. Le nombre de cas d'assistance endoscopique réalisé a été déterminé afin de comprendre l'apport des moyens endoscopiques dans le succès de la dilatation des SCO. Pour les 2 différentes méthodes de dilatation utilisées, le résultat du traitement et le coût ont comparés. Résultats La FOGD a été utilisée dans 19 cas (41.30%) de dilatation avec la bougie de Savary Guillard et dans 47.82% des cas dans la dilatation de Lerut. La vidéo-laryngoscopie a été utilisé 58.69% des cas de dilatation à la bougie de Lerut. Le passage de guide métallique et / ou de fil-guide a été réalisée dans 39.13% avec la vidéo laryngoscopie et dans 58.68% avec la FOGD. Dans la comparaison des deux méthodes, il existe une différence significative dans la survenue des complications (p=0.04075), l'anesthésie générale (p=0.02287), l'accessibilité à la méthode (p=0.04805) et la mortalité (p=0.00402). Conclusion La SCO est une pathologie grave et sous évaluée au Mali. Les moyens endoscopiques contribuent considérablement au succès de la dilatation œsophagienne pour sténose caustique dans les différentes méthodes utilisées. PMID:27200129

  9. A Security Analysis of the 802.11s Wireless Mesh Network Routing Protocol and Its Secure Routing Protocols

    PubMed Central

    Tan, Whye Kit; Lee, Sang-Gon; Lam, Jun Huy; Yoo, Seong-Moo

    2013-01-01

    Wireless mesh networks (WMNs) can act as a scalable backbone by connecting separate sensor networks and even by connecting WMNs to a wired network. The Hybrid Wireless Mesh Protocol (HWMP) is the default routing protocol for the 802.11s WMN. The routing protocol is one of the most important parts of the network, and it requires protection, especially in the wireless environment. The existing security protocols, such as the Broadcast Integrity Protocol (BIP), Counter with cipher block chaining message authentication code protocol (CCMP), Secure Hybrid Wireless Mesh Protocol (SHWMP), Identity Based Cryptography HWMP (IBC-HWMP), Elliptic Curve Digital Signature Algorithm HWMP (ECDSA-HWMP), and Watchdog-HWMP aim to protect the HWMP frames. In this paper, we have analyzed the vulnerabilities of the HWMP and developed security requirements to protect these identified vulnerabilities. We applied the security requirements to analyze the existing secure schemes for HWMP. The results of our analysis indicate that none of these protocols is able to satisfy all of the security requirements. We also present a quantitative complexity comparison among the protocols and an example of a security scheme for HWMP to demonstrate how the result of our research can be utilized. Our research results thus provide a tool for designing secure schemes for the HWMP. PMID:24002231

  10. A security analysis of the 802.11s wireless mesh network routing protocol and its secure routing protocols.

    PubMed

    Tan, Whye Kit; Lee, Sang-Gon; Lam, Jun Huy; Yoo, Seong-Moo

    2013-09-02

    Wireless mesh networks (WMNs) can act as a scalable backbone by connecting separate sensor networks and even by connecting WMNs to a wired network. The Hybrid Wireless Mesh Protocol (HWMP) is the default routing protocol for the 802.11s WMN. The routing protocol is one of the most important parts of the network, and it requires protection, especially in the wireless environment. The existing security protocols, such as the Broadcast Integrity Protocol (BIP), Counter with cipher block chaining message authentication code protocol (CCMP), Secure Hybrid Wireless Mesh Protocol (SHWMP), Identity Based Cryptography HWMP (IBC-HWMP), Elliptic Curve Digital Signature Algorithm HWMP (ECDSA-HWMP), and Watchdog-HWMP aim to protect the HWMP frames. In this paper, we have analyzed the vulnerabilities of the HWMP and developed security requirements to protect these identified vulnerabilities. We applied the security requirements to analyze the existing secure schemes for HWMP. The results of our analysis indicate that none of these protocols is able to satisfy all of the security requirements. We also present a quantitative complexity comparison among the protocols and an example of a security scheme for HWMP to demonstrate how the result of our research can be utilized. Our research results thus provide a tool for designing secure schemes for the HWMP.

  11. Exploring Shared Memory Protocols in FLASH

    SciTech Connect

    Horowitz, Mark; Kunz, Robert; Hall, Mary; Lucas, Robert; Chame, Jacqueline

    2007-04-01

    ABSTRACT The goal of this project was to improve the performance of large scientific and engineering applications through collaborative hardware and software mechanisms to manage the memory hierarchy of non-uniform memory access time (NUMA) shared-memory machines, as well as their component individual processors. In spite of the programming advantages of shared-memory platforms, obtaining good performance for large scientific and engineering applications on such machines can be challenging. Because communication between processors is managed implicitly by the hardware, rather than expressed by the programmer, application performance may suffer from unintended communication – communication that the programmer did not consider when developing his/her application. In this project, we developed and evaluated a collection of hardware, compiler, languages and performance monitoring tools to obtain high performance on scientific and engineering applications on NUMA platforms by managing communication through alternative coherence mechanisms. Alternative coherence mechanisms have often been discussed as a means for reducing unintended communication, although architecture implementations of such mechanisms are quite rare. This report describes an actual implementation of a set of coherence protocols that support coherent, non-coherent and write-update accesses for a CC-NUMA shared-memory architecture, the Stanford FLASH machine. Such an approach has the advantages of using alternative coherence only where it is beneficial, and also provides an evolutionary migration path for improving application performance. We present data on two computations, RandomAccess from the HPC Challenge benchmarks and a forward solver derived from LS-DYNA, showing the performance advantages of the alternative coherence mechanisms. For RandomAccess, the non-coherent and write-update versions can outperform the coherent version by factors of 5 and 2.5, respectively. In LS-DYNA, we obtain

  12. Contribution aux Methodes Analytiques des Substances a L'aide de Faisceaux de Particules Chargees

    NASA Astrophysics Data System (ADS)

    Saidi, Abdelmajid

    Nous avons vu les possibilites d'analyse par particules chargees des aerosols recueillis sur des filtres de type MILLIPORE. La meme technique a ete utilisee pour des filtres ayant servi a la filtration de l'eau du fleuve Saint-laurent. Deux techniques ont ete utilisees: (1) FAST (Forward Alpha Scattering Technique): pour analyser l'hydrogene, le carbone, l'oxygene et puis l'azote. Des alpha de 12 MeV ont ete utilises. (2) PIXE (Particle Induced X-ray Emission): pour analyser les elements moyens et lourds, dans ce cas des protons de 3 MeV ainsi que des ions d'argon de 1 et 1.6 MeV ont ete utilises. Les etudes ont montre que sous vide, la majorite des problemes proviennent des dommages causes par l'echauffement du a l'impact du faisceau sur le filtre. L'analyse quantitative par l'intermediaire du faisceau extrait peut presenter des difficultes en ce qui concerne les elements legers pour lesquels l'absorption des rayonnements caracteristiques dans l'atmosphere externe est importante. Les ions lourds se pretent mal aux analyses des aerosols du fait de leur limite de sensibilite. L'analyse directe de liquides par des protons est particulierement interessante puisqu'elle ne necessite aucune preparation prealable des echantillons. A cet effet, un programme de calcul de concentration des elements dans la solution a analyser a ete mis au point. Nous avons determine la limite de sensibilite de la methode PIXE pour les cibles minces (filtre) et pour le cas ou la matrice est de l'eau. Enfin, la technique FAST peut etre un complement de la technique PIXE.

  13. Simulations of the OzDES AGN reverberation mapping project

    SciTech Connect

    King, Anthea L.; Martini, Paul; Davis, Tamara M.; Denney, K. D.; Kochanek, C. S.; Peterson, Bradley M.; Skielboe, Andreas; Vestergaard, Marianne; Huff, Eric; Watson, Darach; Banerji, Manda; McMahon, Richard; Sharp, Rob; Lidman, C.

    2015-08-26

    As part of the Australian spectroscopic dark energy survey (OzDES) we are carrying out a large-scale reverberation mapping study of ~500 quasars over five years in the 30 deg2 area of the Dark Energy Survey (DES) supernova fields. These quasars have redshifts ranging up to 4 and have apparent AB magnitudes between 16.8 mag < r < 22.5 mag. The aim of the survey is to measure time lags between fluctuations in the quasar continuum and broad emission-line fluxes of individual objects in order to measure black hole masses for a broad range of active galactic nuclei (AGN) and constrain the radius–luminosity (R–L) relationship. Here we investigate the expected efficiency of the OzDES reverberation mapping campaign and its possible extensions. We expect to recover lags for ~35–45 % of the quasars. AGN with shorter lags and greater variability are more likely to yield a lag measurement, and objects with lags ≲6 months or ~1 yr are expected to be recovered the most accurately. The baseline OzDES reverberation mapping campaign is predicted to produce an unbiased measurement of the R–L relationship parameters for Hβ, MgIIλ2798, and C IVλ1549. As a result, extending the baseline survey by either increasing the spectroscopic cadence, extending the survey season, or improving the emission-line flux measurement accuracy will significantly improve the R–L parameter constraints for all broad emission lines.

  14. Recognition of Langue des Signes Quebecoise in Eastern Canada

    ERIC Educational Resources Information Center

    Parisot, Anne-Marie; Rinfret, Julie

    2012-01-01

    This article presents a portrait of two community-level and legal efforts in Canada to obtain official recognition of ASL and LSQ (Langue des signes quebecoise), both of which are recognized as official languages by the Canadian Association of the Deaf (CAD). In order to situate this issue in the Canadian linguistic context, the authors first…

  15. Mechanistic Enzymology of the Radical SAM Enzyme DesII

    PubMed Central

    2016-01-01

    DesII is a member of the radical SAM family of enzymes that catalyzes radical-mediated transformations of TDP-4-amino-4,6-didexoy-D-glucose as well as other sugar nucleotide diphosphates. Like nearly all radical SAM enzymes, the reactions begin with the reductive homolysis of SAM to produce a 5′-deoxyadenosyl radical which is followed by regiospecific hydrogen atom abstraction from the substrate. What happens next, however, depends on the nature of the substrate radical so produced. In the case of the biosynthetically relevant substrate, a radical-mediated deamination ensues; however, when this amino group is replaced with a hydroxyl, one instead observes dehydrogenation. The factors that govern the fate of the initially generated substrate radical as well as the mechanistic details underlying these transformations have been a key focus of research into the chemistry of DesII. This review will discuss recent discoveries pertaining to the enzymology of DesII, how it may relate to understanding other radical-mediated lyases and dehydrogenases and the working hypotheses currently being investigated regarding the mechanism of DesII catalysis.

  16. Judges' Agreement and Disagreement Patterns When Encoding Verbal Protocols.

    ERIC Educational Resources Information Center

    Schael, Jocelyne; Dionne, Jean-Paul

    The basis of agreement or disagreement among judges/evaluators when applying a coding scheme to concurrent verbal protocols was studied. The sample included 20 university graduates, from varied backgrounds; 10 subjects had and 10 subjects did not have experience in protocol analysis. The total sample was divided into four balanced groups according…

  17. The Geneva Protocol of 1925: Past and Present.

    ERIC Educational Resources Information Center

    Harbison, John L.

    1982-01-01

    Presents a position paper for use in high school social studies class debates on the Geneva Protocol of 1925. The Protocol was an international agreement to restrict chemical and biological warfare (CBW). The author traces the history of U.S. policies dealing with CBW since 1925. (AM)

  18. Clinicians as Communication Partners: Developing a Mediated Discourse Elicitation Protocol

    ERIC Educational Resources Information Center

    Hengst, Julie A.; Duff, Melissa C.

    2007-01-01

    This article presents the development and piloting of a mediated discourse elicitation protocol. Grounded in situated theories of communication and informed by mediated discourse analysis, this protocol selectively samples familiar discourse types in a manner designed to preserve interactional aspects of communication. Critically, the mediated…

  19. PACIFIC NORTHWEST SIDE-BY-SIDE PROTOCOL COMPARISON TEST

    EPA Science Inventory

    Eleven state, tribal, and federal agencies participated during summer 2005 in a side-by-side comparison of protocols used to measure common in-stream physical attributes to help determine which protocols are best for determining status and trend of stream/watershed condition. Th...

  20. Concurrent Think-Aloud Protocol as a Socially Situated Construct

    ERIC Educational Resources Information Center

    Sasaki, Tomomi

    2008-01-01

    Verbal report protocols have been considered as direct representations of individual cognitive processes. The present study examined the social nature of verbal reports, particularly focusing on whether and in what ways concurrent think-aloud (TA) protocol data are recipient-designed. The results of this study suggest that verbal reports elicited…

  1. Discrete rotational symmetry and quantum-key-distribution protocols

    SciTech Connect

    Shirokoff, David; Fung, Chi-Hang Fred; Lo, Hoi-Kwong

    2007-03-15

    We study the role of discrete rotational symmetry in the quantum key distribution by generalizing the well-known Bennett-Brassard 1984 and Scarani-Acin-Ribordy-Gisin 2004 protocols. We observe that discrete rotational symmetry results in the protocol's invariance to continuous rotations, thus leading to a simplified relation between bit and phase error rates and consequently a straightforward security proof.

  2. 40 CFR 766.14 - Contents of protocols.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 40 Protection of Environment 32 2013-07-01 2013-07-01 false Contents of protocols. 766.14 Section 766.14 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY (CONTINUED) TOXIC SUBSTANCES CONTROL ACT DIBENZO-PARA-DIOXINS/DIBENZOFURANS General Provisions § 766.14 Contents of protocols....

  3. 40 CFR 766.14 - Contents of protocols.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 40 Protection of Environment 30 2010-07-01 2010-07-01 false Contents of protocols. 766.14 Section 766.14 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY (CONTINUED) TOXIC SUBSTANCES CONTROL ACT DIBENZO-PARA-DIOXINS/DIBENZOFURANS General Provisions § 766.14 Contents of protocols....

  4. 40 CFR 766.14 - Contents of protocols.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... 40 Protection of Environment 31 2014-07-01 2014-07-01 false Contents of protocols. 766.14 Section 766.14 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY (CONTINUED) TOXIC SUBSTANCES CONTROL ACT DIBENZO-PARA-DIOXINS/DIBENZOFURANS General Provisions § 766.14 Contents of protocols....

  5. 40 CFR 766.14 - Contents of protocols.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... 40 Protection of Environment 32 2012-07-01 2012-07-01 false Contents of protocols. 766.14 Section 766.14 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY (CONTINUED) TOXIC SUBSTANCES CONTROL ACT DIBENZO-PARA-DIOXINS/DIBENZOFURANS General Provisions § 766.14 Contents of protocols....

  6. SDLIP + STARTS = SDARTS: A Protocol and Toolkit for Metasearching.

    ERIC Educational Resources Information Center

    Green, Noah; Ipeirotis, Panagiotis G.; Gravano, Luis

    This paper describes how SDLIP and STARTS, two complementary protocols for searching over distributed document collections, were combined. The resulting protocol, called SDARTS, is simple yet expressible enough to enable building sophisticated metasearch engines. SDARTS can be viewed as an instantiation of SDLIP with metasearch-specific elements…

  7. Experimental eavesdropping attack against Ekert's protocol based on Wigner's inequality

    SciTech Connect

    Bovino, F. A.; Colla, A. M.; Castagnoli, G.; Castelletto, S.; Degiovanni, I. P.; Rastello, M. L.

    2003-09-01

    We experimentally implemented an eavesdropping attack against the Ekert protocol for quantum key distribution based on the Wigner inequality. We demonstrate a serious lack of security of this protocol when the eavesdropper gains total control of the source. In addition we tested a modified Wigner inequality which should guarantee a secure quantum key distribution.

  8. Power Tools for Talking: Custom Protocols Enrich Coaching Conversations

    ERIC Educational Resources Information Center

    Pomerantz, Francesca; Ippolito, Jacy

    2015-01-01

    Discussion-based protocols--an "agreed upon set of discussion or observation rules that guide coach/teacher/student work, discussion, and interactions" (Ippolito & Lieberman, 2012, p. 79)--can help focus and structure productive professional learning discussions. However, while protocols are slowly growing into essential elements of…

  9. A Network Client Using the Gopher Information Discovery Protocol

    1993-10-05

    WSGOPHER uses the protocol known as Gopher, which is described in Internet RFC 1436. Specifically Gopher is a client/server protocol. Gopher servers provide information across the network to Gopher clients. WSGOPHER is an implementation of a Gopher client for Microsoft Windows 3.1 and Windows Sockets version 1.1.

  10. The Strong-Inference Protocol: Not Just for Grant Proposals

    ERIC Educational Resources Information Center

    Hiebert, Sara M.

    2007-01-01

    The strong-inference protocol puts into action the important concepts in Platt's often-assigned, classic paper on the strong-inference method (10). Yet, perhaps because students are frequently performing experiments with known outcomes, the protocols they write as undergraduates are usually little more than step-by-step instructions for performing…

  11. 21 CFR 312.320 - Treatment IND or treatment protocol.

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ... 21 Food and Drugs 5 2014-04-01 2014-04-01 false Treatment IND or treatment protocol. 312.320... for Treatment Use § 312.320 Treatment IND or treatment protocol. Under this section, FDA may permit an investigational drug to be used for widespread treatment use. (a) Criteria. The criteria in § 312.305(a) must...

  12. 21 CFR 312.320 - Treatment IND or treatment protocol.

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ... 21 Food and Drugs 5 2012-04-01 2012-04-01 false Treatment IND or treatment protocol. 312.320... for Treatment Use § 312.320 Treatment IND or treatment protocol. Under this section, FDA may permit an investigational drug to be used for widespread treatment use. (a) Criteria. The criteria in § 312.305(a) must...

  13. 21 CFR 312.320 - Treatment IND or treatment protocol.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... 21 Food and Drugs 5 2011-04-01 2011-04-01 false Treatment IND or treatment protocol. 312.320... for Treatment Use § 312.320 Treatment IND or treatment protocol. Under this section, FDA may permit an investigational drug to be used for widespread treatment use. (a) Criteria. The criteria in § 312.305(a) must...

  14. 21 CFR 312.320 - Treatment IND or treatment protocol.

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ... 21 Food and Drugs 5 2013-04-01 2013-04-01 false Treatment IND or treatment protocol. 312.320... for Treatment Use § 312.320 Treatment IND or treatment protocol. Under this section, FDA may permit an investigational drug to be used for widespread treatment use. (a) Criteria. The criteria in § 312.305(a) must...

  15. Enhancing Self-Regulated Learning by Writing Learning Protocols

    ERIC Educational Resources Information Center

    Nuckles, Matthias; Hubner, Sandra; Renkl, Alexander

    2009-01-01

    Learning protocols are a self-guided way of writing that allows for elaboration and reflection on learning content. In an experimental study (N = 103), we supported protocol writing with prompts to elicit important strategies as postulated by a cyclical model of self-regulated learning. Students received either (a) no prompts, (b) cognitive…

  16. ENVIRONMENTAL TECHNOLOGY VERIFICATION TEST PROTOCOL, GENERAL VENTILATION FILTERS

    EPA Science Inventory

    The Environmental Technology Verification Test Protocol, General Ventilation Filters provides guidance for verification tests.

    Reference is made in the protocol to the ASHRAE 52.2P "Method of Testing General Ventilation Air-cleaning Devices for Removal Efficiency by P...

  17. The Design of a Reliable Multipeer Protocol for DVEs.

    ERIC Educational Resources Information Center

    Stuer, Gunther; Broeckhove, Jan; Arickx, Frans

    2003-01-01

    Presents the design and implementation of a reliable multipeer protocol (RMPP), which is written in Java and is suitable for applications in the area of distributed virtual environments (DVEs). Discusses motivation, protocol classification, design goals and the error recovery algorithm and lists implementation issues. Presents two possible…

  18. L'Infection Nosocomiale en Reanimation des Brules

    PubMed Central

    Siah, S.; Belefqih, R.; Elouennass, M.; Fouadi, F.E.; Ihrai, I.

    2009-01-01

    Summary L'infection nosocomiale bactérienne étant l'une des principales causes de morbidité et de mortalité chez le brûlé, nous avons réalisé une étude rétrospective portant sur 84 patients hospitalisés au sein du service de réanimation des brûlés de l'Hôpital Militaire d'Instruction Mohammed V de Rabat, sur une période de 3 ans, du premier janvier 2001 au 31 décembre 2003. Les critères d'infection nosocomiale étaient ceux du Center for Disease Control d'Atlanta de 1988. Les taux d'incidence ont été calculés. La population infectée a été comparée à celle non infectée. L'écologie bactérienne du service a été décrite comme aussi l'antibiotype. Il ressort de cette étude la survenue de 87 infections nosocomiales chez 27 patients. L'incidence cumulative était de 103 infections pour 1000 jours de traitement. Pour ce qui est des caractéristiques des infections bactériennes, les sites infectés étaient la peau (77%), le sang (13,8%), les voies urinaires (8%) et les poumons (1,1%). Les principaux germes étaient: Staphylococcus sp. (33,3%), Pseudomonas aeruginosa (23%), Enterococcus faecalis et Acinetobacter (8%). Les staphylocoques étaient méticillo-résistants dans 22,2% des cas. Le Pseudomonas et l'Acinetobacter étaient multirésistants (60%). Dans notre étude les facteurs prédictifs de survenue des infections nosocomiales que nous avons retenus après l'étude comparative des populations infectées et non infectées ont été l'âge, le body mass index, l'abbreviated burn severity index et le remplissage initial. En isolant ces paramètres, nous avons pu établir une équation à valeur prédictive de survenue d'infection nosocomiale chez le patient brûlé. PMID:21991158

  19. Exercise countermeasure protocol management expert system

    NASA Technical Reports Server (NTRS)

    Webster, L.; Chen, J. G.; Flores, L.; Tan, S.

    1993-01-01

    Exercise will be used primarily to countermeasure against deconditioning on extended space flight. In this paper we describe the development and evaluation of an expert system for exercise countermeasure protocol management. Currently, the system includes two major subsystems: baseline prescription and prescription adjustment. The baseline prescription subsystem is designed to provide initial exercise prescriptions while prescription adjustment subsystem is designed to modify the initial prescription based on the exercised progress. The system runs under three different environments: PC, SUN workstation, and Symbolic machine. The inference engine, baseline prescription module, prescription adjustment module and explanation module are developed under the Symbolic environment by using the ART (Automated Reasoning Tool) software. The Sun environment handles database management features and interfaces with PC environment to obtain physical and physiological data from exercise units on-board during the flight. Eight subjects' data have been used to evaluate the system performance by comparing the prescription of nine experienced exercise physiologists and the one prescribed by the expert system. The results of the validation test indicated that the performance of the expert system was acceptable.

  20. Data Provenance in Photogrammetry Through Documentation Protocols

    NASA Astrophysics Data System (ADS)

    Carboni, N.; Bruseker, G.; Guillem, A.; Bellido Castañeda, D.; Coughenour, C.; Domajnko, M.; de Kramer, M.; Ramos Calles, M. M.; Stathopoulou, E. K.; Suma, R.

    2016-06-01

    Documenting the relevant aspects in digitisation processes such as photogrammetry in order to provide a robust provenance for their products continues to present a challenge. The creation of a product that can be re-used scientifically requires a framework for consistent, standardised documentation of the entire digitisation pipeline. This article provides an analysis of the problems inherent to such goals and presents a series of protocols to document the various steps of a photogrammetric workflow. We propose this pipeline, with descriptors to track all phases of digital product creation in order to assure data provenance and enable the validation of the operations from an analytic and production perspective. The approach aims to support adopters of the workflow to define procedures with a long term perspective. The conceptual schema we present is founded on an analysis of information and actor exchanges in the digitisation process. The metadata were defined through the synthesis of previous proposals in this area and were tested on a case study. We performed the digitisation of a set of cultural heritage artefacts from an Iron Age burial in Ilmendorf, Germany. The objects were captured and processed using different techniques, including a comparison of different imaging tools and algorithms. This augmented the complexity of the process allowing us to test the flexibility of the schema for documenting complex scenarios. Although we have only presented a photogrammetry digitisation scenario, we claim that our schema is easily applicable to a multitude of 3D documentation processes.

  1. [The research protocol IV: study variables].

    PubMed

    Villasís-Keever, Miguel Ángel; Miranda-Novales, María Guadalupe

    2016-01-01

    The variables in a research study are all that is measured, the information collected, or the data that is collected in order to answer the research questions, which are specified in the objectives. Their selection is essential to the research protocol. This article aims to point out the elements to be considered in the section of the variables. To avoid ambiguity, it is necessary to select only those that will help achieve the study objectives. It should subsequently be defined how they will be measured to ensure that the findings can be replicated; it is therefore desirable to include conceptual and operational definitions. From the methodological point of view, the classification of variables helps us understand how the relationship between them is conceptualized. Depending on the study design, the independent, dependent, universal, and confounding variables should be noted. Another indispensable element for planning statistical analyses is the scale of variable measurement. Therefore, one must specify whether the variables correspond to one of the following four: qualitative nominal, qualitative ordinal, quantitative range, or quantitative ratio. Finally, we should detail the measurement units of each variable. PMID:27560918

  2. Protocol for sampling environmental sites for legionellae

    SciTech Connect

    Barbaree, J.M.; Gorman, G.W.; Martin, W.T.; Fields, B.S.; Morrill, W.E.

    1987-07-01

    A protocol for sampling environmental sites was developed and used to identify possible sources of Legionella species in support of epidemiologic investigations at two hospitals. In hospital A, legionellae were isolated from 43 of 106 (40%) different sites. Three separate Legionella pneumophila serotypes and a previously unrecognized species were present in different combinations in the positive samples. Two of five cooling towers contained the same L. pneumophila serogroup 1 monoclonal type (1,2,4,5) as was isolated from patients. The same monoclonal type was also isolated from make-up water for the two cooling towers, a hot water tank, water separators in four main air compressor systems for respiratory therapy, and cold and hot water faucets. In hospital B, 13 of 37 (38%) sample sites contained legionellae, all of which were L. pneumophila serogroup 1. The monoclonal type matching isolates from patients (1,2,4,5) was found at the highest concentration in a hot water tank, but it was also present at four other sample sites. Since legionellae not related to disease may be found in many of the sites sampled, an epidemiologic association with the probable source should be established before intervention methods, such as disinfection, are undertaken.

  3. [The research protocol III. Study population].

    PubMed

    Arias-Gómez, Jesús; Villasís-Keever, Miguel Ángel; Miranda-Novales, María Guadalupe

    2016-01-01

    The study population is defined as a set of cases, determined, limited, and accessible, that will constitute the subjects for the selection of the sample, and must fulfill several characteristics and distinct criteria. The objectives of this manuscript are focused on specifying each one of the elements required to make the selection of the participants of a research project, during the elaboration of the protocol, including the concepts of study population, sample, selection criteria and sampling methods. After delineating the study population, the researcher must specify the criteria that each participant has to comply. The criteria that include the specific characteristics are denominated selection or eligibility criteria. These criteria are inclusion, exclusion and elimination, and will delineate the eligible population. The sampling methods are divided in two large groups: 1) probabilistic or random sampling and 2) non-probabilistic sampling. The difference lies in the employment of statistical methods to select the subjects. In every research, it is necessary to establish at the beginning the specific number of participants to be included to achieve the objectives of the study. This number is the sample size, and can be calculated or estimated with mathematical formulas and statistic software. PMID:27174763

  4. Potential anesthesia protocols for space exploration missions.

    PubMed

    Komorowski, Matthieu; Watkins, Sharmila D; Lebuffe, Gilles; Clark, Jonathan B

    2013-03-01

    In spaceflight beyond low Earth's orbit, medical conditions requiring surgery are of a high level of concern because of their potential impact on crew health and mission success. Whereas surgical techniques have been thoroughly studied in spaceflight analogues, the research focusing on anesthesia is limited. To provide safe anesthesia during an exploration mission will be a highly challenging task. The research objective is thus to describe specific anesthesia procedures enabling treatment of pre-identified surgical conditions. Among the medical conditions considered by the NASA Human Research Program Exploration Medical Capability element, those potentially necessitating anesthesia techniques have been identified. The most appropriate procedure for each condition is thoroughly discussed. The substantial cost of training time necessary to implement regional anesthesia is pointed out. Within general anesthetics, ketamine combines the unique advantages of preservation of cardiovascular stability, the protective airway reflexes, and spontaneous ventilation. Ketamine side effects have for decades tempered enthusiasm for its use, but recent developments in mitigation means broadened its indications. The extensive experience gathered in remote environments, with minimal equipment and occasionally by insufficiently trained care providers, confirms its high degree of safety. Two ketamine-based anesthesia protocols are described with their corresponding indications. They have been designed taking into account the physiological changes occurring in microgravity and the specific constraints of exploration missions. This investigation could not only improve surgical care during long-duration spaceflights, but may find a number of terrestrial applications in isolated or austere environments.

  5. Fault discovery protocol for passive optical networks

    NASA Astrophysics Data System (ADS)

    Hajduczenia, Marek; Fonseca, Daniel; da Silva, Henrique J. A.; Monteiro, Paulo P.

    2007-06-01

    All existing flavors of passive optical networks (PONs) provide an attractive alternative to legacy copper-based access lines deployed between a central office (CO) of the service provider (SP) and a customer site. One of the most challenging tasks for PON network planners is the reduction of the overall cost of employing protection schemes for the optical fiber plant while maintaining a reasonable level of survivability and reducing the downtime, thus ensuring acceptable levels of quality of service (QoS) for end subscribers. The recently growing volume of Ethernet PONs deployment [Kramer, IEEE 802.3, CFI (2006)], connected with low-cost electronic and optical components used in the optical network unit (ONU) modules, results in the situation where remote detection of faulty/active subscriber modules becomes indispensable for proper operation of an EPON system. The problem of the remote detection of faulty ONUs in the system is addressed where the upstream channel is flooded with the cw transmission from one or more damaged ONUs and standard communication is severed, providing a solution that is applicable in any type of PON network, regardless of the operating protocol, physical structure, and data rate.

  6. [The research protocol IV: study variables].

    PubMed

    Villasís-Keever, Miguel Ángel; Miranda-Novales, María Guadalupe

    2016-01-01

    The variables in a research study are all that is measured, the information collected, or the data that is collected in order to answer the research questions, which are specified in the objectives. Their selection is essential to the research protocol. This article aims to point out the elements to be considered in the section of the variables. To avoid ambiguity, it is necessary to select only those that will help achieve the study objectives. It should subsequently be defined how they will be measured to ensure that the findings can be replicated; it is therefore desirable to include conceptual and operational definitions. From the methodological point of view, the classification of variables helps us understand how the relationship between them is conceptualized. Depending on the study design, the independent, dependent, universal, and confounding variables should be noted. Another indispensable element for planning statistical analyses is the scale of variable measurement. Therefore, one must specify whether the variables correspond to one of the following four: qualitative nominal, qualitative ordinal, quantitative range, or quantitative ratio. Finally, we should detail the measurement units of each variable.

  7. [The research protocol III. Study population].

    PubMed

    Arias-Gómez, Jesús; Villasís-Keever, Miguel Ángel; Miranda-Novales, María Guadalupe

    2016-01-01

    The study population is defined as a set of cases, determined, limited, and accessible, that will constitute the subjects for the selection of the sample, and must fulfill several characteristics and distinct criteria. The objectives of this manuscript are focused on specifying each one of the elements required to make the selection of the participants of a research project, during the elaboration of the protocol, including the concepts of study population, sample, selection criteria and sampling methods. After delineating the study population, the researcher must specify the criteria that each participant has to comply. The criteria that include the specific characteristics are denominated selection or eligibility criteria. These criteria are inclusion, exclusion and elimination, and will delineate the eligible population. The sampling methods are divided in two large groups: 1) probabilistic or random sampling and 2) non-probabilistic sampling. The difference lies in the employment of statistical methods to select the subjects. In every research, it is necessary to establish at the beginning the specific number of participants to be included to achieve the objectives of the study. This number is the sample size, and can be calculated or estimated with mathematical formulas and statistic software.

  8. Enhanced parent selection algorithms in mintroute protocol

    NASA Astrophysics Data System (ADS)

    Kim, Ki-Il

    2012-11-01

    A low-rate, short-range wireless radio communication on a small device often hampers high reliability in wireless sensor networks. However, more applications are increasingly demanding high reliability. To meet this requirement, various approaches have been proposed in each viewpoint of layers. Among those, MintRoute is a well-known network layer approach to develop a new metric based on link quality for path selection towards the sink. By choosing the link with the highest measured value, it has a higher possibility to transmit a packet over the link without error. However, there are still several issues to be mentioned during operations. In this paper, we propose how to improve the MintRoute protocol through revised algorithms. They include a parent selection considering distance and level from the sink node, and a fast recovery method against failures. Simulations and analysis are performed by in order to validate the suitability of reduced end-to-end delay and fast recovery for failures, thus to enhance the reliability of communication.

  9. RADCAL Operations Manual Radiation Calibration Laboratory Protocol

    SciTech Connect

    Bogard, J.S.

    1998-12-01

    The Life Sciences Division (LSD) of Oak Ridge National Laboratory (ORNL) has a long record of radiation dosimetry research, primarily using the Health Physics Research Reactor (HPRR) and the Radiation Calibration Laboratory (RADCAL) in its Dosimetry Applications Research (DOSAR) Program. These facilities have been used by a broad segment of the research community to perform a variety of experiments in areas including, but not limited to, radiobiology, radiation dosimeter and instrumentation development and calibration, and the testing of materials in a variety of radiation environments. Operations of the HPRR were terminated in 1987 and the reactor was moved to storage at the Oak Ridge Y-12 Plant; however, RADCAL will continue to be operated in accordance with the guidelines of the National Institute of Standards and Technology (NIST) Secondary Calibration Laboratory program and will meet all requirements for testing dosimeters under the National Voluntary Laboratory Accreditation Program (NVLAP). This manual is to serve as the primary instruction and operation manual for the Oak Ridge National Laboratory's RADCAL facility. Its purpose is to (1) provide operating protocols for the RADCAL facility, (2) outline the organizational structure, (3) define the Quality Assurance Action Plan, and (4) describe all the procedures, operations, and responsibilities for the safe and proper operation of all routine aspects of the calibration facility.

  10. Parabiosis in Mice: A Detailed Protocol

    PubMed Central

    Kamran, Paniz; Sereti, Konstantina-Ioanna; Zhao, Peng; Ali, Shah R.; Weissman, Irving L.; Ardehali, Reza

    2013-01-01

    Parabiosis is a surgical union of two organisms allowing sharing of the blood circulation. Attaching the skin of two animals promotes formation of microvasculature at the site of inflammation. Parabiotic partners share their circulating antigens and thus are free of adverse immune reaction. First described by Paul Bert in 18641, the parabiosis surgery was refined by Bunster and Meyer in 1933 to improve animal survival2. In the current protocol, two mice are surgically joined following a modification of the Bunster and Meyer technique. Animals are connected through the elbow and knee joints followed by attachment of the skin allowing firm support that prevents strain on the sutured skin. Herein, we describe in detail the parabiotic joining of a ubiquitous GFP expressing mouse to a wild type (WT) mouse. Two weeks after the procedure, the pair is separated and GFP positive cells can be detected by flow cytometric analysis in the blood circulation of the WT mouse. The blood chimerism allows one to examine the contribution of the circulating cells from one animal in the other. PMID:24145664

  11. Spherical-code key-distribution protocols for qubits

    SciTech Connect

    Renes, Joseph M.

    2004-11-01

    Recently spherical codes were introduced as potentially more capable ensembles for quantum key distribution. Here we develop specific key-creation protocols for the two qubit-based spherical codes, the trine and tetrahedron, and analyze them in the context of a suitably tailored intercept/resend attack, both in standard form, and in a 'gentler' version whose back action on the quantum state is weaker. When compared to the standard unbiased basis protocols, Bennett-Brassard 1984 (BB84) and six-state, two distinct advantages are found. First, they offer improved tolerance of eavesdropping, the trine besting its counterpart BB84 and the tetrahedron the six-state protocol. Second, the key error rate may be computed from the sift rate of the protocol itself, removing the need to sacrifice key bits for this purpose. This simplifies the protocol and improves the overall key rate.0.

  12. Auto-configuration protocols in mobile ad hoc networks.

    PubMed

    Villalba, Luis Javier García; Matesanz, Julián García; Orozco, Ana Lucila Sandoval; Díaz, José Duván Márquez

    2011-01-01

    The TCP/IP protocol allows the different nodes in a network to communicate by associating a different IP address to each node. In wired or wireless networks with infrastructure, we have a server or node acting as such which correctly assigns IP addresses, but in mobile ad hoc networks there is no such centralized entity capable of carrying out this function. Therefore, a protocol is needed to perform the network configuration automatically and in a dynamic way, which will use all nodes in the network (or part thereof) as if they were servers that manage IP addresses. This article reviews the major proposed auto-configuration protocols for mobile ad hoc networks, with particular emphasis on one of the most recent: D2HCP. This work also includes a comparison of auto-configuration protocols for mobile ad hoc networks by specifying the most relevant metrics, such as a guarantee of uniqueness, overhead, latency, dependency on the routing protocol and uniformity.

  13. The importance of the Montreal Protocol in protecting climate

    PubMed Central

    Velders, Guus J. M.; Andersen, Stephen O.; Daniel, John S.; Fahey, David W.; McFarland, Mack

    2007-01-01

    The 1987 Montreal Protocol on Substances that Deplete the Ozone Layer is a landmark agreement that has successfully reduced the global production, consumption, and emissions of ozone-depleting substances (ODSs). ODSs are also greenhouse gases that contribute to the radiative forcing of climate change. Using historical ODSs emissions and scenarios of potential emissions, we show that the ODS contribution to radiative forcing most likely would have been much larger if the ODS link to stratospheric ozone depletion had not been recognized in 1974 and followed by a series of regulations. The climate protection already achieved by the Montreal Protocol alone is far larger than the reduction target of the first commitment period of the Kyoto Protocol. Additional climate benefits that are significant compared with the Kyoto Protocol reduction target could be achieved by actions under the Montreal Protocol, by managing the emissions of substitute fluorocarbon gases and/or implementing alternative gases with lower global warming potentials. PMID:17360370

  14. Packet-Based Protocol Efficiency for Aeronautical and Satellite Communications

    NASA Technical Reports Server (NTRS)

    Carek, David A.

    2005-01-01

    This paper examines the relation between bit error ratios and the effective link efficiency when transporting data with a packet-based protocol. Relations are developed to quantify the impact of a protocol s packet size and header size relative to the bit error ratio of the underlying link. These relations are examined in the context of radio transmissions that exhibit variable error conditions, such as those used in satellite, aeronautical, and other wireless networks. A comparison of two packet sizing methodologies is presented. From these relations, the true ability of a link to deliver user data, or information, is determined. Relations are developed to calculate the optimal protocol packet size forgiven link error characteristics. These relations could be useful in future research for developing an adaptive protocol layer. They can also be used for sizing protocols in the design of static links, where bit error ratios have small variability.

  15. Near-optimal protocols in complex nonequilibrium transformations.

    PubMed

    Gingrich, Todd R; Rotskoff, Grant M; Crooks, Gavin E; Geissler, Phillip L

    2016-09-13

    The development of sophisticated experimental means to control nanoscale systems has motivated efforts to design driving protocols that minimize the energy dissipated to the environment. Computational models are a crucial tool in this practical challenge. We describe a general method for sampling an ensemble of finite-time, nonequilibrium protocols biased toward a low average dissipation. We show that this scheme can be carried out very efficiently in several limiting cases. As an application, we sample the ensemble of low-dissipation protocols that invert the magnetization of a 2D Ising model and explore how the diversity of the protocols varies in response to constraints on the average dissipation. In this example, we find that there is a large set of protocols with average dissipation close to the optimal value, which we argue is a general phenomenon. PMID:27573816

  16. [Immunosuppressive protocols in kidney transplantation: with or without induction?].

    PubMed

    Nehme Chelala, Dania; Mourani, Chebl; Moukarzel, Maroun; Azar, Hiba

    2015-01-01

    Kidney transplantation is the treatment of choice of end stage kidney disease. Over the years, kidney transplantation progressed tremendously, mainly by the improvement of immunosuppressive drugs used in the prevention of acute rejection. Since the introduction of cyclosporine in the 80s, many immunosuppressive protocols have been established. These protocols are characterized by two strategies: with or without induction. The agents used in induction therapies can be polyclonal or monoclonal antibodies. The decision of using induction therapy relies mainly on the evaluation of the immunological risk in the recipient. Even if protocols with induction have improved early results concerning acute rejection, the protocoles without induction seem justified in some candidates. The optimal immunosuppressive protocol is not yet established, and individualization of immunosuppressive treatment is necessary. PMID:26591195

  17. Proof of fault coverage for a formal protocol test procedure

    NASA Astrophysics Data System (ADS)

    Randall, Michael A.

    1992-12-01

    Due to the speed and complexity of communication networks being designed today, it is imperative to ensure that they operate correctly. Todays fiber optic networks, which can transmit billions of bits per second over thousands of miles, are heavily dependent on sophisticated software and protocols which are becoming increasingly difficult to test. Conformance testing is a method that is used for this purpose: to test the design of a protocol against an implementation of the design. This thesis provides some insight into the conformance testing problem by first providing background on some current protocol test methods and then focusing on a newer method, which is based on a formal protocol specification. A proof is given that demonstrates the method's error detection capabilities. Two well known local area network protocols, Token Bus and Fiber Distributed Data Interface (FDDI), are used as examples to illustrate how the test method is applied to a specification.

  18. Security of the arbitrated quantum signature protocols revisited

    NASA Astrophysics Data System (ADS)

    Kejia, Zhang; Dan, Li; Qi, Su

    2014-01-01

    Recently, much attention has been paid to the study of arbitrated quantum signature (AQS). Among these studies, the cryptanalysis of some AQS protocols and a series of improved ideas have been proposed. Compared with the previous analysis, we present a security criterion, which can judge whether an AQS protocol is able to prevent the receiver (i.e. one participant in the signature protocol) from forging a legal signature. According to our results, it can be seen that most AQS protocols which are based on the Zeng and Keitel (ZK) model are susceptible to a forgery attack. Furthermore, we present an improved idea of the ZK protocol. Finally, some supplement discussions and several interesting topics are provided.

  19. A Secured Authentication Protocol for SIP Using Elliptic Curves Cryptography

    NASA Astrophysics Data System (ADS)

    Chen, Tien-Ho; Yeh, Hsiu-Lien; Liu, Pin-Chuan; Hsiang, Han-Chen; Shih, Wei-Kuan

    Session initiation protocol (SIP) is a technology regularly performed in Internet Telephony, and Hyper Text Transport Protocol (HTTP) as digest authentication is one of the major methods for SIP authentication mechanism. In 2005, Yang et al. pointed out that HTTP could not resist server spoofing attack and off-line guessing attack and proposed a secret authentication with Diffie-Hellman concept. In 2009, Tsai proposed a nonce based authentication protocol for SIP. In this paper, we demonstrate that their protocol could not resist the password guessing attack and insider attack. Furthermore, we propose an ECC-based authentication mechanism to solve their issues and present security analysis of our protocol to show that ours is suitable for applications with higher security requirement.

  20. The importance of the Montreal Protocol in protecting climate.

    PubMed

    Velders, Guus J M; Andersen, Stephen O; Daniel, John S; Fahey, David W; McFarland, Mack

    2007-03-20

    The 1987 Montreal Protocol on Substances that Deplete the Ozone Layer is a landmark agreement that has successfully reduced the global production, consumption, and emissions of ozone-depleting substances (ODSs). ODSs are also greenhouse gases that contribute to the radiative forcing of climate change. Using historical ODSs emissions and scenarios of potential emissions, we show that the ODS contribution to radiative forcing most likely would have been much larger if the ODS link to stratospheric ozone depletion had not been recognized in 1974 and followed by a series of regulations. The climate protection already achieved by the Montreal Protocol alone is far larger than the reduction target of the first commitment period of the Kyoto Protocol. Additional climate benefits that are significant compared with the Kyoto Protocol reduction target could be achieved by actions under the Montreal Protocol, by managing the emissions of substitute fluorocarbon gases and/or implementing alternative gases with lower global warming potentials.

  1. Reducing the write traffic for a hybrid cache protocol

    SciTech Connect

    Dahlgren, F.; Stenstroem, P.

    1994-12-31

    Coherence misses limit the performance of write-invalidate cache protocols in large-scale shared-memory multiprocessors. By contrast, hybrid protocols mix updates with invalidations and can reduce the coherence miss rate. The gains of the fewer coherence misses, however, can sometimes be outweighed by contention due to the extra traffic making techniques to cut the write traffic important. We study in this paper how write traffic for hybrid protocols can be reduced by incorporating a write cache in each node. Detailed architectural simulations reveal that write caches are effective in exploiting locality in write accesses under relaxed memory consistency models. Hybrid protocols augmented with write caches with only a few entries are shown to outperform a write-invalidate protocol for all five benchmark applications under study.

  2. Lignes directrices canadiennes sur l’utilisation sécuritaire et efficace des opioïdes pour la douleur chronique non cancéreuse

    PubMed Central

    Kahan, Meldon; Wilson, Lynn; Mailis-Gagnon, Angela; Srivastava, Anita

    2011-01-01

    Résumé Objectif Présenter aux médecins de famille un résumé clinique pratique sur la prescription d’opioïdes à des populations particulières en se fondant sur les recommandations faites dans les lignes directrices canadiennes sur l’utilisation sécuritaire et efficace des opioïdes pour la douleur chronique non cancéreuse. Qualité des données Pour produire les lignes directrices, les chercheurs ont effectué une synthèse critique de la littérature médicale en insistant plus précisément sur les études de l’efficacité et de la sécurité des opioïdes dans des populations particulières. Message principal Les médecins de famille peuvent atténuer les risques de surdose, de sédation, d’usage abusif et de dépendance grâce à des stratégies adaptées à l’âge et à l’état de santé des patients. Dans le cas de patients à risque de dépendance, on devrait réserver les opioïdes aux douleurs nociceptives ou neuropathiques bien définies qui n’ont pas répondu aux traitements de première intention. Il faut procéder lentement au titrage des opioïdes, avec des dispensations fréquentes et une étroite surveillance pour dépister tout signe d’usage abusif. Une dépendance aux opioïdes suspectée est prise en charge au moyen d’une thérapie structurée aux opioïdes, d’un traitement à la méthadone ou à la buprénorphine ou encore d’un traitement fondé sur l’abstinence. Les patients souffrant de troubles de l’humeur ou d’anxiété ont tendance à avoir une réponse analgésique atténuée aux opioïdes, sont à risque plus élevé d’usage abusif et prennent souvent des sédatifs qui interagissent défavorablement avec les opioïdes. Il faut prendre des précautions semblables à celles utilisées avec d’autres patients à risque élevé. Il faut faire un sevrage progressif si la douleur du patient demeure sévère même avec un essai adéquat de thérapie aux opioïdes. Chez les personnes âgées, la s

  3. Les reseaux de politique publique comme facteur d'influence du choix des instruments de politique energetique canadienne a des fins environnementales de 1993 a nos jours

    NASA Astrophysics Data System (ADS)

    Fathy El Dessouky, Naglaa

    Au cours de la derniere decennie, les modes de la gouvernance ont pris place dans un contexte totalement different de celui qu'ils avaient auparavant. Les gouvernements modernes se rendent compte qu'ils perdent de plus en plus leur capacite a elaborer et a gerer les changements d'une maniere autonome. Ainsi, les fonctions et les activites traditionnellement accomplies exclusivement par le gouvernement engagent de nos jours une gamme d'acteurs etatiques et non etatiques. A l'encontre du concept traditionnel de l'Etat controleur, la gouvernance contemporaine est ainsi devenue moins une question d'offre de service et davantage une gestion indirecte des reseaux de politique publique. Dans cette entreprise, les gouvernements contemporains, cherchant plus d'information, de soutien et de legitimite en matiere de formulation des decisions, ont besoin d'etablir des relations avec les divers groupes d'interet qui, a leur tour, voulaient plus de promotion et de protection en faveur de leurs interets a travers leur implication au processus de l'elaboration et de la mise en oeuvre des politiques publiques. Ainsi, l'approche des reseaux de politique publique represente aujourd'hui un courant considerable au sein du champ d'analyse des politiques publiques. Toutefois, les preoccupations des chercheurs pour cette approche, dans le domaine des politiques energetiques a des fins environnementales, semblent recentes, et les etudes realisees sont encore trop peu nombreuses. Au Canada, au debut des annees 1990, le gouvernement ainsi que plusieurs groupes d'interets, des differents secteurs energetique, industriel et environnemental, ont commence a intensifier leurs efforts pour s'attaquer au probleme du changement climatique d'origine energetique, genere surtout par le secteur de l'industrie. Au cours de la derniere decennie, la question touchant plutot le sujet du developpement energetique durable represente le plus important domaine des politiques publiques ayant surgi recemment dans

  4. La biogenèse des mélanosomes

    PubMed Central

    Delevoye, Cédric; Giordano, Francesca; van Niel, Guillaume; Raposo, Graça

    2012-01-01

    Les mélanocytes situés à la base de l’épiderme produisent des mélanosomes qui sont transférés aux kératinocytes pour assurer la pigmentation de l’épiderme et sa photoprotection contre les rayons ultraviolets. Les mélanosomes, organites apparentés aux lysosomes, sont le lieu de synthèse et de stockage d’un pigment, la mélanine. Leur formation dépend de protéines mélanosomales qui transitent par les voies de biosynthèse et d’endocytose et exploitent les mécanismes moléculaires du trafic intracellulaire. Les acteurs moléculaires impliqués dans le transport des protéines mélanosomales et la biogenèse des mélanosomes sont la cible de mutations dans des maladies génétiques accompagnées d’hypopigmentation comme l’albinisme et les maladies lysosomales. Les études menées sur les mélanocytes issus de souris modèles de ces maladies permettent de comprendre certaines des étapes-clés de la mélanogenèse ainsi que les dysfonctionnements associés à ces pathologies. De plus, décrypter la mélanogenèse facilite également la compréhension d’autres processus physiologiques, comme l’illustrent les similitudes inattendues avec l’amyloïdogenèse dans les maladies neurodégénératives. PMID:21382323

  5. A Self-Stabilizing Synchronization Protocol for Arbitrary Digraphs

    NASA Technical Reports Server (NTRS)

    Malekpour, Mahyar R.

    2011-01-01

    This paper presents a self-stabilizing distributed clock synchronization protocol in the absence of faults in the system. It is focused on the distributed clock synchronization of an arbitrary, non-partitioned digraph ranging from fully connected to 1-connected networks of nodes while allowing for differences in the network elements. This protocol does not rely on assumptions about the initial state of the system, other than the presence of at least one node, and no central clock or a centrally generated signal, pulse, or message is used. Nodes are anonymous, i.e., they do not have unique identities. There is no theoretical limit on the maximum number of participating nodes. The only constraint on the behavior of the node is that the interactions with other nodes are restricted to defined links and interfaces. This protocol deterministically converges within a time bound that is a linear function of the self-stabilization period. We present an outline of a deductive proof of the correctness of the protocol. A bounded model of the protocol was mechanically verified for a variety of topologies. Results of the mechanical proof of the correctness of the protocol are provided. The model checking results have verified the correctness of the protocol as they apply to the networks with unidirectional and bidirectional links. In addition, the results confirm the claims of determinism and linear convergence. As a result, we conjecture that the protocol solves the general case of this problem. We also present several variations of the protocol and discuss that this synchronization protocol is indeed an emergent system.

  6. Relation entre les caractéristiques des table-bancs et les mesures anthropométriques des écoliers au Benin

    PubMed Central

    Falola, Stève Marjelin; Gouthon, Polycarpe; Falola, Jean-Marie; Fiogbe, Michel Armand; Nigan, Issiako Bio

    2014-01-01

    Introduction Le mobilier scolaire et la posture assise en classe sont souvent impliqués dans l'apparition des douleurs rachidiennes, influant de fait sur la qualité des tâches réalisées par les apprenants. Aucune étude n'a encore vérifié le degré d'adéquation entre les caractéristiques du mobilier et celles des écoliers au Bénin. L'objectif de cette étude transversale est donc de déterminer la relation entre les dimensions des table-bancs utilisées en classe et les mesures anthropométriques des écoliers au Bénin. Methods Elle a été réalisée avec un échantillon probabiliste de 678 écoliers, âgés de 4 à 17 ans. Les mesures anthropométriques des écoliers et les mensurations relatives aux longueurs, largeurs et hauteurs des table-bancs ont été mesurées, puis intégrées aux équations proposées dans la littérature. Les pourcentages des valeurs situées hors des limitesacceptables, dérivées de l'application des équations ont été calculés. Results La largeur et la hauteur des table-bancs utilisées par les écoliers étaient plus élevées (p < 0,05) que les valeurs de référence recommandées par les structures officielles de contrôle et de production des mobiliers scolaires au Bénin. Quel que soit le sexe, il y avait une inadéquation entre la largeur du banc et la longueur fesse-poplité, puis entre la hauteur de la table et la distance coude-bancdes écoliers. Conclusion Les résultats suggèrent de prendre en compte l’évolution des mesures anthropométriques des écoliers dans la confection des table-bancs, afin de promouvoir de bonnes postures assises en classe et de réduire le risque de troubles du rachis. PMID:25317232

  7. Optimisation des proprietes fonctionnelles des alliages a memoire de forme suite a l'application de traitements thermomecaniques

    NASA Astrophysics Data System (ADS)

    Demers, Vincent

    L'objectif de ce projet est de determiner les conditions de laminage et la temperature de traitement thermique maximisant les proprietes fonctionnelles de l'alliage a memoire de forme Ti-Ni. Les specimens sont caracterises par des mesures de calorimetrie, de microscopie optique, de gene ration de contrainte, de deformation recuperable et des essais mecaniques. Pour un cycle unique, l'utilisation d'un taux d'ecrouissage e=1.5 obtenu avec l'application d'une force de tension FT = 0.1sigma y et d'une huile minerale resulte en un echantillon droit, sans microfissure et qui apres un recuit a 400°C, produit un materiau nanostructure manifestant des proprietes fonctionnelles deux fois plus grandes que le meme materiau ayant une structure polygonisee. Pour des cycles repetes, les memes conditions de laminage sont valables mais le niveau de deformation optimal est situe entre e=0.75-2, et depend particulierement du mode de sollicitation, du niveau de stabilisation et du nombre de cycles a la rupture requis par l'application.

  8. Ocean Optics Protocols for Satellite Ocean Color Sensor Validation. Volume 6; Special Topics in Ocean Optics Protocols and Appendices; Revised

    NASA Technical Reports Server (NTRS)

    Mueller, J. L. (Editor); Fargion, Giulietta S. (Editor); McClain, Charles R. (Editor)

    2003-01-01

    This document stipulates protocols for measuring bio-optical and radiometric data for the Sensor Intercomparison and Merger for Biological and Interdisciplinary Oceanic Studies (SIMBIOS) Project activities and algorithm development. The document is organized into 6 separate volumes as Ocean Optics Protocols for Satellite Ocean Color Sensor Validation, Revision 4. Volume I: Introduction, Background and Conventions; Volume II: Instrument Specifications, Characterization and Calibration; Volume III: Radiometric Measurements and Data Analysis Methods; Volume IV: Inherent Optical Properties: Instruments, Characterization, Field Measurements and Data Analysis Protocols; Volume V: Biogeochemical and Bio-Optical Measurements and Data Analysis Methods; Volume VI: Special Topics in Ocean Optics Protocols and Appendices. The earlier version of Ocean Optics Protocols for Satellite Ocean Color Sensor Validation, Revision 3 (Mueller and Fargion 2002, Volumes 1 and 2) is entirely superseded by the six volumes of Revision 4 listed above.

  9. Mars Sample Handling Protocol Workshop Series: Workshop 4

    NASA Technical Reports Server (NTRS)

    Race Margaret S. (Editor); DeVincenzi, Donald L. (Editor); Rummel, John D. (Editor); Acevedo, Sara E. (Editor)

    2001-01-01

    In preparation for missions to Mars that will involve the return of samples to Earth, it will be necessary to prepare for the receiving, handling, testing, distributing, and archiving of martian materials here on Earth. Previous groups and committees have studied selected aspects of sample return activities, but specific detailed protocols for the handling and testing of returned samples must still be developed. To further refine the requirements for sample hazard testing and to develop the criteria for subsequent release of sample materials from quarantine, the NASA Planetary Protection Officer convened a series of workshops in 2000-2001. The overall objective of the Workshop Series was to produce a Draft Protocol by which returned martian sample materials can be assessed for biological hazards and examined for evidence of life (extant or extinct) while safeguarding the purity of the samples from possible terrestrial contamination. This report also provides a record of the proceedings of Workshop 4, the final Workshop of the Series, which was held in Arlington, Virginia, June 5-7, 2001. During Workshop 4, the sub-groups were provided with a draft of the protocol compiled in May 2001 from the work done at prior Workshops in the Series. Then eight sub-groups were formed to discuss the following assigned topics: Review and Assess the Draft Protocol for Physical/Chemical Testing Review and Assess the Draft Protocol for Life Detection Testing Review and Assess the Draft Protocol for Biohazard Testing Environmental and Health/Monitoring and Safety Issues Requirements of the Draft Protocol for Facilities and Equipment Contingency Planning for Different Outcomes of the Draft Protocol Personnel Management Considerations in Implementation of the Draft Protocol Draft Protocol Implementation Process and Update Concepts This report provides the first complete presentation of the Draft Protocol for Mars Sample Handling to meet planetary protection needs. This Draft Protocol

  10. Microscopie interférentielle X-UV : un outil pour l'étude des endommagements des surfaces optiques

    NASA Astrophysics Data System (ADS)

    Jamelot, G.; Ros, D.; Cassou, K.; Kazamias, S.; Klisnick, A.; Kozlová, M.; Mocek, T.; Homer, P.; Polan, J.; Stupka, M.

    2006-12-01

    Nous présentons des résultats récents concernant des premières investigations de microscopie interférentielle par laser X-UV d'endommagement optique. Le laser X-UV utilisé est un laser collisionnel en régime quasi-stationnaire émettant à 21.2 nm, développé au Prague Asterix Laser System (PALS, Prague, République Tchèque). Des échantillons de silice fondue de haute qualité, avec ou sans rayure, étaient irradiées en face avant par un laser bleu, correspondant au 3selectfontfontsize{7{9}{textrm{ème}}} harmonique du laser à iode du PALS (1.315 μ m), servant également à réaliser le laser X-UV à 21.2 nm. Celui-ci était utilisé, 5 ns après l'irradiation pour réaliser une imagerie microscopique et interférentielle de la face arrière de l'échantillon. Les résultats font apparaître des déformations locales transitoires. Des premières analyses mettent en évidence une probable variation de la rugosité de la surface. Cette démonstration expérimentale encourageante ouvre la voie à de futures investigations, notamment sur notre prochaine installation laser : LASERIX.

  11. Methodes iteratives paralleles: Applications en neutronique et en mecanique des fluides

    NASA Astrophysics Data System (ADS)

    Qaddouri, Abdessamad

    Dans cette these, le calcul parallele est applique successivement a la neutronique et a la mecanique des fluides. Dans chacune de ces deux applications, des methodes iteratives sont utilisees pour resoudre le systeme d'equations algebriques resultant de la discretisation des equations du probleme physique. Dans le probleme de neutronique, le calcul des matrices des probabilites de collision (PC) ainsi qu'un schema iteratif multigroupe utilisant une methode inverse de puissance sont parallelises. Dans le probleme de mecanique des fluides, un code d'elements finis utilisant un algorithme iteratif du type GMRES preconditionne est parallelise. Cette these est presentee sous forme de six articles suivis d'une conclusion. Les cinq premiers articles traitent des applications en neutronique, articles qui representent l'evolution de notre travail dans ce domaine. Cette evolution passe par un calcul parallele des matrices des PC et un algorithme multigroupe parallele teste sur un probleme unidimensionnel (article 1), puis par deux algorithmes paralleles l'un mutiregion l'autre multigroupe, testes sur des problemes bidimensionnels (articles 2--3). Ces deux premieres etapes sont suivies par l'application de deux techniques d'acceleration, le rebalancement neutronique et la minimisation du residu aux deux algorithmes paralleles (article 4). Finalement, on a mis en oeuvre l'algorithme multigroupe et le calcul parallele des matrices des PC sur un code de production DRAGON ou les tests sont plus realistes et peuvent etre tridimensionnels (article 5). Le sixieme article (article 6), consacre a l'application a la mecanique des fluides, traite la parallelisation d'un code d'elements finis FES ou le partitionneur de graphe METIS et la librairie PSPARSLIB sont utilises.

  12. Mesure des stades de developpement du sapin baumier (Abies balsamea [L.] Mill.) par teledetection des maxima locaux sur images a tres haute resolution

    NASA Astrophysics Data System (ADS)

    Demers, Alain

    L'objectif principal de cette these est d'identifier les parametres cles pour lier le developpement morphologique de la cime du sapin baumier (Abies balsamea [L.] Mill.) aux patrons de reflectance qu'elle genere sur une image aerienne a haute resolution. La quantite et la distribution spatiale des aiguilles dans le sapin dependent de la structure des branches. Un mecanisme de ramification particulier (la reiteration) ressort comme le parametre cle pour lier l'augmentation de la biomasse foliaire et la forme de la branche. Les reiterats forment des agglomerats de feuillage qui engendrent des inegalites dans les patrons de reflectance de la cime. La reflectance est plus elevee ou il y a une forte concentration de reiterats (maximum local). On demontre que le developpement du sapin baumier se mesure au moyen de l'analyse des maxima locaux de la cime sur une image. La biomasse de l'arbre se mesure par la teledetection et l'analyse des patrons de reflectance de la cime, c'est-a-dire la mesure du niveau de reiteration par le decompte des maxima locaux de la cime. Cette etude demontre qu'il est possible de proceder a l'inventaire du volume de bois d'un peuplement par la teledetection de l'architecture des arbres.

  13. Fault-tolerant quantum blind signature protocols against collective noise

    NASA Astrophysics Data System (ADS)

    Zhang, Ming-Hui; Li, Hui-Fang

    2016-07-01

    This work proposes two fault-tolerant quantum blind signature protocols based on the entanglement swapping of logical Bell states, which are robust against two kinds of collective noises: the collective-dephasing noise and the collective-rotation noise, respectively. Both of the quantum blind signature protocols are constructed from four-qubit decoherence-free (DF) states, i.e., logical Bell qubits. The initial message is encoded on the logical Bell qubits with logical unitary operations, which will not destroy the anti-noise trait of the logical Bell qubits. Based on the fundamental property of quantum entanglement swapping, the receiver simply performs two Bell-state measurements (rather than four-qubit joint measurements) on the logical Bell qubits to verify the signature, which makes the protocols more convenient in a practical application. Different from the existing quantum signature protocols, our protocols can offer the high fidelity of quantum communication with the employment of logical qubits. Moreover, we hereinafter prove the security of the protocols against some individual eavesdropping attacks, and we show that our protocols have the characteristics of unforgeability, undeniability and blindness.

  14. Compositional mining of multiple object API protocols through state abstraction.

    PubMed

    Dai, Ziying; Mao, Xiaoguang; Lei, Yan; Qi, Yuhua; Wang, Rui; Gu, Bin

    2013-01-01

    API protocols specify correct sequences of method invocations. Despite their usefulness, API protocols are often unavailable in practice because writing them is cumbersome and error prone. Multiple object API protocols are more expressive than single object API protocols. However, the huge number of objects of typical object-oriented programs poses a major challenge to the automatic mining of multiple object API protocols: besides maintaining scalability, it is important to capture various object interactions. Current approaches utilize various heuristics to focus on small sets of methods. In this paper, we present a general, scalable, multiple object API protocols mining approach that can capture all object interactions. Our approach uses abstract field values to label object states during the mining process. We first mine single object typestates as finite state automata whose transitions are annotated with states of interacting objects before and after the execution of the corresponding method and then construct multiple object API protocols by composing these annotated single object typestates. We implement our approach for Java and evaluate it through a series of experiments. PMID:23844378

  15. How to Implement a Protocol for Babel RMI

    SciTech Connect

    Kumfert, G; Leek, J

    2006-03-30

    RMI support in Babel has two main goals: transparency & flexibility. Transparency meaning that the new RMI features are entirely transparent to existing Babelized code; flexibility meaning the RMI capability should also be flexible enough to support a variety of RMI transport implementations. Babel RMI is a big success in both areas. Babel RMI is completely transparent to already Babelized implementation code, allowing painless upgrade, and only very minor setup changes are required in client code to take advantage of RMI. The Babel RMI transport mechanism is also extremely flexible. Any protocol that implements Babel's minimal, but complete, interface may be used as a Babel RMI protocol. The Babel RMI API allows users to select the best protocol and connection model for their application, whether that means a WebServices-like client-server model for use over a WAP, or a faster binary peer-to-peer protocol for use on different nodes in a leadership-class supercomputer. Users can even change protocols without recompiling their code. The goal of this paper is to give network researchers and protocol implementors the information they need to develop new protocols for Babel RMI. This paper will cover both the high-level interfaces in the Babel RMI API, and the low level details about how Babel RMI handles RMI objects.

  16. Development of a novel protocol for generating flavivirus reporter particles.

    PubMed

    Fernández, Igor Velado; Okamoto, Natsumi; Ito, Aki; Fukuda, Miki; Someya, Azusa; Nishino, Yosii; Sasaki, Nobuya; Maeda, Akihiko

    2014-11-01

    Infection with West Nile virus (WNV), a mosquito-borne flavivirus, is a growing public and animal health concern worldwide. Prevention, diagnosis and treatment strategies for the infection are urgently required. Recently, viral reverse genetic systems have been developed and applied to clinical WNV virology. We developed a protocol for generating reporter virus particles (RVPs) of WNV with the aim of overcoming two major problems associated with conventional protocols, the difficulty in generating RVPs due to the specific skills required for handling RNAs, and the potential for environmental contamination by antibiotic-resistant genes encoded within the genome RNA of the RVPs. By using the proposed protocol, cells were established in which the RVP genome RNA is replicated constitutively and does not encode any antibiotic-resistant genes, and used as the cell supply for RVP genome RNA. Generation of the WNV RVPs requires only the simple transfection of the expression vectors for the viral structural proteins into the cells. Therefore, no RNA handling is required in this protocol. The WNV RVP yield obtained using this protocol was similar that obtained using the conventional protocol. According to these results, the newly developed protocol appears to be a good alternative for the generation of WNV RVPs, particularly for clinical applications.

  17. Fault-tolerant quantum blind signature protocols against collective noise

    NASA Astrophysics Data System (ADS)

    Zhang, Ming-Hui; Li, Hui-Fang

    2016-10-01

    This work proposes two fault-tolerant quantum blind signature protocols based on the entanglement swapping of logical Bell states, which are robust against two kinds of collective noises: the collective-dephasing noise and the collective-rotation noise, respectively. Both of the quantum blind signature protocols are constructed from four-qubit decoherence-free (DF) states, i.e., logical Bell qubits. The initial message is encoded on the logical Bell qubits with logical unitary operations, which will not destroy the anti-noise trait of the logical Bell qubits. Based on the fundamental property of quantum entanglement swapping, the receiver simply performs two Bell-state measurements (rather than four-qubit joint measurements) on the logical Bell qubits to verify the signature, which makes the protocols more convenient in a practical application. Different from the existing quantum signature protocols, our protocols can offer the high fidelity of quantum communication with the employment of logical qubits. Moreover, we hereinafter prove the security of the protocols against some individual eavesdropping attacks, and we show that our protocols have the characteristics of unforgeability, undeniability and blindness.

  18. Protocols, practices, and the reproduction of technique in molecular biology.

    PubMed

    Lynch, Michael

    2002-06-01

    Protocols are one of the main organizational resources in molecular biology. They are written instructions that specify ingredients, equipment, and sequences of steps for making technical preparations. Some protocols are published in widely used manuals, while others are hand-written variants used by particular laboratories and individual technicians. It is widely understood, both in molecular biology and in social studies of science, that protocols do not describe exactly what practitioners do in the laboratory workplace. In social studies of science, the difference between protocols and the actual practices of doing them often is used to set up ironic contrasts between 'messy' laboratory practices and the appearance of technical order. Alternatively, in ethnomethodological studies of work, the difference is examined as a constitutive feature, both of the lived-work of doing technical projects, and of the administrative work of regulating and evaluating such projects. The present article takes its point of departure from ethnomethodology, and begins with a discussion of local problems with performing molecular biology protocols on specific occasions. The discussion then moves to particular cases in criminal law in which defense attorneys cross-examine forensic technicians and lab administrators. In these interrogations, the distinction between protocols and actual practices animates the dialogue and becomes consequential for judgments in the case at hand. The article concludes with a discussion of administrative science: the work of treating protocols and paper trails as proxies for actual 'scientific' practices.

  19. A study of treadmill exercise protocols for Chinese males.

    PubMed

    Ho, B L

    1982-02-01

    Treadmill stress testing currently is used in screening for coronary artery disease. Maximal oxygen consumption is the best index of work capacity and maximal cardiovascular function. Clinically, there are many exercise protocols being utilized, including Bruce, Kattus, Balke, Naughton, and Chinese Air Force (CAF). The purpose of this study is to compare five of them and evaluate their reproducibility. Each of 24 volunteers performed one exercise test per week for 3 periods totalling 15 weeks. During each period, the five different protocols were performed in individually randomized order. Maximal and submaximal oxygen consumption and heart rate were determined. Statistical analysis revealed no difference in maximal oxygen consumption among the various protocols; however significant differences did exist in maximal treadmill time. Maximal exertional duration was not affected by the test periods. All of the five protocols were equally reproducible. The Chinese Air Force has adopted a treadmill protocol with a constant speed of 3.5 mph and a 5% increase in elevation every 3 min. The physiological parameters measured by this protocol include a maximal heart rate of 181 beats/min; maximal oxygen consumption of 48 ml/kg/min; and maximal exercise duration of 17 min. Bruce and Balke protocols were 13 and 24 min, respectively, in our study. The regression equation of oxygen consumption and duration was: Y (ml/kg/min) = 1.26X (min) + 26.3. The CAF protocol is a safe, reproducible, easily performed method with moderate exercise duration. We confirm its advantages and prefer to select this protocol to serve as a routine screening or clinical method for use in testing Chinese people.

  20. Quantum secure communication using a multi-photon tolerant protocol

    NASA Astrophysics Data System (ADS)

    El Rifai, Mayssaa; Verma, Pramode K.

    2015-03-01

    This paper proposes a quantum secure communication protocol using multiple photons to represent each bit of a message to be shared. The multi-photon tolerant approach to quantum cryptography provides a quantum level security while using more than a single photon per transmission. The protocol proposed is a multi-stage protocol; an explanation of its operation and implementation are provided. The multi-stage protocol is based on the use of unitary transformations known only to Alice and Bob. This paper studies the security aspects of the multi-stage protocol by assessing its vulnerability to different attacks. It is well known that as the number of photons increases, the level of vulnerability of the multi-stage protocol increases. This paper sets a limit on the number of photons that can be used while keeping the multi-stage protocol a multi-photon tolerant quantum secure method for communication. The analysis of the number of photons to be used is based on the probability of success of a Helstrom discrimination done by an eavesdropper on the channel. Limiting the number of photons up to certain threshold per stage makes it impossible for an eavesdropper to decipher the message sent over the channel. The proposed protocol obviates the disadvantages associated with single photon implementations, such as limited data rates and distances along with the need to have no more than a single photon per time slot. The multi-stage protocol is a step toward direct quantum communication rather than quantum key distribution associated with single photon approaches.

  1. Modeling Techniques for High Dependability Protocols and Architecture

    NASA Technical Reports Server (NTRS)

    LaValley, Brian; Ellis, Peter; Walter, Chris J.

    2012-01-01

    This report documents an investigation into modeling high dependability protocols and some specific challenges that were identified as a result of the experiments. The need for an approach was established and foundational concepts proposed for modeling different layers of a complex protocol and capturing the compositional properties that provide high dependability services for a system architecture. The approach centers around the definition of an architecture layer, its interfaces for composability with other layers and its bindings to a platform specific architecture model that implements the protocols required for the layer.

  2. A Quantum Watermarking Protocol Based on Bell Dual Basis

    NASA Astrophysics Data System (ADS)

    Mo, Jia; Ma, Zhaofeng; Yang, Yixian; Niu, Xinxin

    2013-11-01

    This paper presents a Bell-dual-basis-based quantum watermarking protocol composed of three major algorithms: watermark embedding and extracting and the intercepting test. The first two are completed by using the entanglement swapping property of Bell dual basis and the test is accomplished through IBF protocol to guarantee its bottom security. The watermarking protocol is mainly designed for the protection of digital copyright in the existence of classical information. This design finds that the quality of digital contents is not damaged with its zero-watermark attributes when embedding watermarks.

  3. An XML-based protocol for distributed event services

    SciTech Connect

    Gunter, Dan K.; Smith, Warren; Quesnel, Darcy

    2001-06-25

    A recent trend in distributed computing is the construction of high-performance distributed systems called computational grids. One difficulty we have encountered is that there is no standard format for the representation of performance information and no standard protocol for transmitting this information. This limits the types of performance analysis that can be undertaken in complex distributed systems. To address this problem, we present an XML-based protocol for transmitting performance events in distributed systems and evaluate the performance of this protocol.

  4. An XML-Based Protocol for Distributed Event Services

    NASA Technical Reports Server (NTRS)

    Smith, Warren; Gunter, Dan; Quesnel, Darcy; Biegel, Bryan (Technical Monitor)

    2001-01-01

    A recent trend in distributed computing is the construction of high-performance distributed systems called computational grids. One difficulty we have encountered is that there is no standard format for the representation of performance information and no standard protocol for transmitting this information. This limits the types of performance analysis that can be undertaken in complex distributed systems. To address this problem, we present an XML-based protocol for transmitting performance events in distributed systems and evaluate the performance of this protocol.

  5. A Robust Conditional Privacy-Preserving Authentication Protocol in VANET

    NASA Astrophysics Data System (ADS)

    Jung, Chae Duk; Sur, Chul; Park, Youngho; Rhee, Kyung-Hyune

    Recently, Lu et al. proposed an efficient conditional privacy preservation protocol, named ECPP, based on group signature scheme for secure vehicular communications. However, ECPP dose not provide unlinkability and traceability when multiple RSUs are compromised. In this paper, we make up for the limitations and propose a robust conditional privacy-preserving authentication protocol without loss of efficiency as compared with ECPP. Furthermore, in our protocol, RSUs can issue multiple anonymous certificates to an OBU to alleviate system overheads for validity check of RSUs. In order to achieve these goals, we consider a universal re-encryption scheme as our building block.

  6. A Scalable and Practical Authentication Protocol in Mobile IP

    NASA Astrophysics Data System (ADS)

    Lee, Yong; Lee, Goo-Yeon; Kim, Hwa-Long

    Due to the proliferation of mobile devices connected to the Internet, implementing a secure and practical Mobile IP has become an important goal. A mobile IP can not work properly without authentication between the mobile node (MN), the home agent (HA) and the foreign agent (FA). In this paper, we propose a practical Mobile IP authentication protocol that uses public key cryptography only during the initial authentication. The proposed scheme is compatible with the conventional Mobile IP protocol and provides scalability against the number of MN's. We also show that the proposed protocol offers secure operation.

  7. Membrane Protein Production in Escherichia coli: Protocols and Rules.

    PubMed

    Angius, Federica; Ilioaia, Oana; Uzan, Marc; Miroux, Bruno

    2016-01-01

    Functional and structural studies on membrane proteins are limited by the difficulty to produce them in large amount and in a functional state. In this review, we provide protocols to achieve high-level expression of membrane proteins in Escherichia coli. The T7 RNA polymerase-based expression system is presented in detail and protocols to assess and improve its efficiency are discussed. Protocols to isolate either membrane or inclusion bodies and to perform an initial qualitative test to assess the solubility of the recombinant protein are also included. PMID:27485328

  8. MASSIVE TRANSFUSION PROTOCOL: STANDARDIZING CARE TO IMPROVE PATIENT OUTCOMES.

    PubMed

    Porteous, Joan

    2015-06-01

    Providing rapid response is a primary goal when caring for surgical patients with injuries involving massive blood loss. Massive transfusion protocols have been developed in some tertiary care health care facilities to ensure a rapid and efficient response in the provision of care to patients with a massive and uncontrolled hemorrhage. The purpose of this article is to discuss a massive transfusion protocol and to describe the process used to implement a massive transfusion protocol at Winnipeg's Health Sciences Centre (the site) as well as to describe its impact in the operating room department. PMID:26310036

  9. Performance enhancement of OSPF protocol in the private network

    NASA Astrophysics Data System (ADS)

    Yang, Yang; Lu, Yang; Lin, Xiaokang

    2005-11-01

    The private network serves as an information exchange platform to support the integrated services via microwave channels and accordingly selects the open shortest path first (OSPF) as the IP routing protocol. But the existing OSPF can't fit the private network very well for its special characteristics. This paper presents our modifications to the standard protocol in such aspects as the single-area scheme, link state advertisement (LSA) types and formats, OSPF packet formats, important state machines, setting of protocol parameters and link flap damping. Finally simulations are performed in various scenarios and the results indicate that our modifications can enhance the OSPF performance in the private network effectively.

  10. Study & Analysis of various Protocols in popular Web Browsers

    NASA Astrophysics Data System (ADS)

    Mishra, Bharat; Baghel, Harish Singh; Patil, Manoj; Singh, Pramod

    2012-08-01

    The web browsers are the application software that are used to access information from the World Wide Web. With the increasing popularity of the web browsers, the modern web browsers are designed to contain more features as compared to the existing web browsers. For the transferring of information through these browsers, various protocols have been implemented on these modern web browsers to make these browsers more efficient. Different protocols used in different layers have different functions and by increasing the efficiency of these protocols we can make the working of browsers more efficient.

  11. RFID authentication protocol to enhance patient medication safety.

    PubMed

    Kaul, Sonam Devgan; Awasthi, Amit K

    2013-12-01

    Medication errors can cause substantial harm to patients. Automated patient medication system with RFID technology is purposely used to reduce the medication error, to improve the patient safety, to provide personalized patient medication and identification and also to provide counterfeit protection to the patients. In order to enhance medication safety for patients we propose a new dynamic ID based lightweight RFID authentication protocol. Due to low storage capacity and limited computational and communicational capacity of tags, only pseudo random number generator function, one way hash function and bitwise Xor operation are used in our authentication protocol. The proposed protocol is practical, secure and efficient for health care domain.

  12. Membrane Protein Production in Escherichia coli: Protocols and Rules.

    PubMed

    Angius, Federica; Ilioaia, Oana; Uzan, Marc; Miroux, Bruno

    2016-01-01

    Functional and structural studies on membrane proteins are limited by the difficulty to produce them in large amount and in a functional state. In this review, we provide protocols to achieve high-level expression of membrane proteins in Escherichia coli. The T7 RNA polymerase-based expression system is presented in detail and protocols to assess and improve its efficiency are discussed. Protocols to isolate either membrane or inclusion bodies and to perform an initial qualitative test to assess the solubility of the recombinant protein are also included.

  13. High-Performance CCSDS AOS Protocol Implementation in FPGA

    NASA Technical Reports Server (NTRS)

    Clare, Loren P.; Torgerson, Jordan L.; Pang, Jackson

    2010-01-01

    The Consultative Committee for Space Data Systems (CCSDS) Advanced Orbiting Systems (AOS) space data link protocol provides a framing layer between channel coding such as LDPC (low-density parity-check) and higher-layer link multiplexing protocols such as CCSDS Encapsulation Service, which is described in the following article. Recent advancement in RF modem technology has allowed multi-megabit transmission over space links. With this increase in data rate, the CCSDS AOS protocol implementation needs to be optimized to both reduce energy consumption and operate at a high rate.

  14. Design and Implementation of a Secure Modbus Protocol

    NASA Astrophysics Data System (ADS)

    Fovino, Igor Nai; Carcano, Andrea; Masera, Marcelo; Trombetta, Alberto

    The interconnectivity of modern and legacy supervisory control and data acquisition (SCADA) systems with corporate networks and the Internet has significantly increased the threats to critical infrastructure assets. Meanwhile, traditional IT security solutions such as firewalls, intrusion detection systems and antivirus software are relatively ineffective against attacks that specifically target vulnerabilities in SCADA protocols. This paper describes a secure version of the Modbus SCADA protocol that incorporates integrity, authentication, non-repudiation and anti-replay mechanisms. Experimental results using a power plant testbed indicate that the augmented protocol provides good security functionality without significant overhead.

  15. Comment on "Quantum oblivious set-member decision protocol"

    NASA Astrophysics Data System (ADS)

    Liu, Bin; Xiao, Di; Huang, Wei; Song, Ting-Ting

    2016-03-01

    In a recent paper [Phys. Rev. A 92, 022309 (2015), 10.1103/PhysRevA.92.022309], the authors proposed a quantum oblivious set-member decision protocol, which is designed to allow a server to check whether a private secret of a user is a member of his private set in an oblivious manner. Such protocols should protect the privacies of both the server and the user. However, we find that the user in their protocol can steal l -1 bits of information about the server's private set by sending the false decoy states.

  16. A Secure Authenticated Key Exchange Protocol for Credential Services

    NASA Astrophysics Data System (ADS)

    Shin, Seonghan; Kobara, Kazukuni; Imai, Hideki

    In this paper, we propose a leakage-resilient and proactive authenticated key exchange (called LRP-AKE) protocol for credential services which provides not only a higher level of security against leakage of stored secrets but also secrecy of private key with respect to the involving server. And we show that the LRP-AKE protocol is provably secure in the random oracle model with the reduction to the computational Difie-Hellman problem. In addition, we discuss about some possible applications of the LRP-AKE protocol.

  17. MASSIVE TRANSFUSION PROTOCOL: STANDARDIZING CARE TO IMPROVE PATIENT OUTCOMES.

    PubMed

    Porteous, Joan

    2015-06-01

    Providing rapid response is a primary goal when caring for surgical patients with injuries involving massive blood loss. Massive transfusion protocols have been developed in some tertiary care health care facilities to ensure a rapid and efficient response in the provision of care to patients with a massive and uncontrolled hemorrhage. The purpose of this article is to discuss a massive transfusion protocol and to describe the process used to implement a massive transfusion protocol at Winnipeg's Health Sciences Centre (the site) as well as to describe its impact in the operating room department.

  18. A comparative study of protocols for secure quantum communication under noisy environment: single-qubit-based protocols versus entangled-state-based protocols

    NASA Astrophysics Data System (ADS)

    Sharma, Vishal; Thapliyal, Kishore; Pathak, Anirban; Banerjee, Subhashish

    2016-07-01

    The effect of noise on various protocols of secure quantum communication has been studied. Specifically, we have investigated the effect of amplitude damping, phase damping, squeezed generalized amplitude damping, Pauli type as well as various collective noise models on the protocols of quantum key distribution, quantum key agreement, quantum secure direct quantum communication and quantum dialogue. From each type of protocol of secure quantum communication, we have chosen two protocols for our comparative study: one based on single-qubit states and the other one on entangled states. The comparative study reported here has revealed that single-qubit-based schemes are generally found to perform better in the presence of amplitude damping, phase damping, squeezed generalized amplitude damping noises, while entanglement-based protocols turn out to be preferable in the presence of collective noises. It is also observed that the effect of noise depends upon the number of rounds of quantum communication involved in a scheme of quantum communication. Further, it is observed that squeezing, a completely quantum mechanical resource present in the squeezed generalized amplitude channel, can be used in a beneficial way as it may yield higher fidelity compared to the corresponding zero squeezing case.

  19. A blueprint for a sepsis protocol.

    PubMed

    Shapiro, Nathan I; Howell, Michael; Talmor, Daniel

    2005-04-01

    viewed. Although complex and challenging, these therapies must be brought to the patient's bedside. We propose and describe the Multiple Urgent Sepsis Therapies (MUST) protocol as a practical way to implement a comprehensive treatment plan using available evidence-based therapies.

  20. Exploration des mécanismes de repliement des protéines par dynamique moléculaire

    NASA Astrophysics Data System (ADS)

    Gilquin, B.

    2005-11-01

    Comment se replient les protéines? Cette question est ancienne. En introduction nous rappellerons ce qu'est le paradoxe de Levinthal et comment on est passé de la notion de chemin de repliement à la notion de paysage énergétique. Les simulations de dynamique moléculaire ont permis d'aborder la compréhension du processus de repliement au niveau atomique. Cependant l'échelle de temps des processus de repliement (de l'ordre de la milliseconde) n'est pas accessible aux simulations numériques (de l'ordre de la nanoseconde). Plusieurs auteurs ont donc proposé de simuler le dépliement des protéines par dynamique moléculaire. En admettant le principe de micro-réversibilité l'étude du processus de dépliement renseigne sur celui de repliement. Cependant, il est nécessaire d'accélérer le dépliement en introduisant un biais afin que les états dépliées soient accessibles aux échelles de temps des simulations. Nous présenterons un exemple de ce qui a été réalise dans le cas de l'étude de protéines de petite taille suivant un repliement simple, globalement à deux états. Nous présenterons ensuite ce que nous avons réalisé dans le cas d'une protéine de taille plus importante et pour laquelle le processus de repliement est plus complexe car il existe un intermédiaire transitoire de repliement. C'est le cas du lysozyme pour lequel les simulations de dépliement permettent d'accéder au mécanisme atomique de repliement et de comprendre pourquoi des mutants de cette protéine se replient plus lentement et forment des fibres amyloïdiques. Ainsi les intermédiaires de repliement seraient à l'origine de formes pathogènes des protéines observées dans les maladies neuro-dégéneratives. Enfin nous montrerons comment à partir de plusieurs simulations longues de dynamique moléculaire, le paysage énergétique pour de petites protéines peut être calculé.

  1. An Accurate Link Correlation Estimator for Improving Wireless Protocol Performance

    PubMed Central

    Zhao, Zhiwei; Xu, Xianghua; Dong, Wei; Bu, Jiajun

    2015-01-01

    Wireless link correlation has shown significant impact on the performance of various sensor network protocols. Many works have been devoted to exploiting link correlation for protocol improvements. However, the effectiveness of these designs heavily relies on the accuracy of link correlation measurement. In this paper, we investigate state-of-the-art link correlation measurement and analyze the limitations of existing works. We then propose a novel lightweight and accurate link correlation estimation (LACE) approach based on the reasoning of link correlation formation. LACE combines both long-term and short-term link behaviors for link correlation estimation. We implement LACE as a stand-alone interface in TinyOS and incorporate it into both routing and flooding protocols. Simulation and testbed results show that LACE: (1) achieves more accurate and lightweight link correlation measurements than the state-of-the-art work; and (2) greatly improves the performance of protocols exploiting link correlation. PMID:25686314

  2. An accurate link correlation estimator for improving wireless protocol performance.

    PubMed

    Zhao, Zhiwei; Xu, Xianghua; Dong, Wei; Bu, Jiajun

    2015-02-12

    Wireless link correlation has shown significant impact on the performance of various sensor network protocols. Many works have been devoted to exploiting link correlation for protocol improvements. However, the effectiveness of these designs heavily relies on the accuracy of link correlation measurement. In this paper, we investigate state-of-the-art link correlation measurement and analyze the limitations of existing works. We then propose a novel lightweight and accurate link correlation estimation (LACE) approach based on the reasoning of link correlation formation. LACE combines both long-term and short-term link behaviors for link correlation estimation. We implement LACE as a stand-alone interface in TinyOS and incorporate it into both routing and flooding protocols. Simulation and testbed results show that LACE: (1) achieves more accurate and lightweight link correlation measurements than the state-of-the-art work; and (2) greatly improves the performance of protocols exploiting link correlation.

  3. 21 CFR 660.6 - Samples; protocols; official release.

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ... Hepatitis B Surface Antigen § 660.6 Samples; protocols; official release. (a) Samples. (1) For the purposes... continued evaluation is necessary to ensure the potency, quality, and reliability of the product....

  4. 21 CFR 660.6 - Samples; protocols; official release.

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ... Hepatitis B Surface Antigen § 660.6 Samples; protocols; official release. (a) Samples. (1) For the purposes... continued evaluation is necessary to ensure the potency, quality, and reliability of the product....

  5. 21 CFR 660.6 - Samples; protocols; official release.

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ... Hepatitis B Surface Antigen § 660.6 Samples; protocols; official release. (a) Samples. (1) For the purposes... continued evaluation is necessary to ensure the potency, quality, and reliability of the product....

  6. Factors influencing adherence to an emergency department national protocol.

    PubMed

    Ebben, Remco H A; Vloet, Lilian C M; de Groot, Joke Mintjes; van Achterberg, Theo

    2012-02-01

    The objective of this study was to identify factors that influence emergency nurses' adherence to an emergency department national protocol (EDNP). A survey of emergency nurses (n=200) and physicians with medical end responsibility on an emergency department (n=103) was carried out. Emergency nurses' self-reported adherence to the EDNP was 38%, 55% of the nurses and 44% of the physicians were aware of the protocol. Interference with professional autonomy, insufficient organizational support and the EDNP's applicability were indicated as barriers for adherence. The main influencing factor seems awareness. Other factors related to the individual, the organization and to protocol characteristics. Solely disseminating the EDNP is not enough to get the protocol used in clinical practice. PMID:21552130

  7. 21 CFR 660.6 - Samples; protocols; official release.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... Hepatitis B Surface Antigen § 660.6 Samples; protocols; official release. (a) Samples. (1) For the purposes... continued evaluation is necessary to ensure the potency, quality, and reliability of the product....

  8. Joint Architecture Standard (JAS) Reliable Data Delivery Protocol (RDDP) specification.

    SciTech Connect

    Enderle, Justin Wayne; Daniels, James W.; Gardner, Michael T.; Eldridge, John M.; Hunt, Richard D.; Gallegos, Daniel E.

    2011-05-01

    The Joint Architecture Standard (JAS) program at Sandia National Laboratories requires the use of a reliable data delivery protocol over SpaceWire. The National Aeronautics and Space Administration at the Goddard Spaceflight Center in Greenbelt, Maryland, developed and specified a reliable protocol for its Geostationary Operational Environment Satellite known as GOES-R Reliable Data Delivery Protocol (GRDDP). The JAS program implemented and tested GRDDP and then suggested a number of modifications to the original specification to meet its program specific requirements. This document details the full RDDP specification as modified for JAS. The JAS Reliable Data Delivery Protocol uses the lower-level SpaceWire data link layer to provide reliable packet delivery services to one or more higher-level host application processes. This document specifies the functional requirements for JRDDP but does not specify the interfaces to the lower- or higher-level processes, which may be implementation-dependent.

  9. Improvement on "Quantum Key Agreement Protocol with Maximally Entangled States"

    NASA Astrophysics Data System (ADS)

    Chong, Song-Kong; Tsai, Chia-Wei; Hwang, Tzonelih

    2011-06-01

    Recently, Hsueh and Chen [in Proceedings of the 14th Information Security Conference, National Taiwan University of Science and Technology, Taipei, pp. 236-242, 2004] proposed a quantum key agreement (QKA) protocol with maximally entangled states. Their protocol allows two users to negotiate a secret key in such a way that no one can predetermine the shared key alone. This study points out two security flaws in their protocol: (1) a legitimate but malicious user can fully control the shared key alone; (2) an eavesdropper can obtain the shared key without being detected. A possible solution is presented to avoid these attacks and also Tsai et al.'s CNOT attack [in Proceedings of the 20th Cryptology and Information Security Conference, National Chiao Tung University, Hsinchu, pp. 210-213, 2010] on Hsueh and Chen protocol to obtain the shared key without being detected.

  10. Electronic Voting Protocol Using Identity-Based Cryptography

    PubMed Central

    Gallegos-Garcia, Gina; Tapia-Recillas, Horacio

    2015-01-01

    Electronic voting protocols proposed to date meet their properties based on Public Key Cryptography (PKC), which offers high flexibility through key agreement protocols and authentication mechanisms. However, when PKC is used, it is necessary to implement Certification Authority (CA) to provide certificates which bind public keys to entities and enable verification of such public key bindings. Consequently, the components of the protocol increase notably. An alternative is to use Identity-Based Encryption (IBE). With this kind of cryptography, it is possible to have all the benefits offered by PKC, without neither the need of certificates nor all the core components of a Public Key Infrastructure (PKI). Considering the aforementioned, in this paper we propose an electronic voting protocol, which meets the privacy and robustness properties by using bilinear maps. PMID:26090515

  11. Distributed reservation control protocols for random access broadcasting channels

    NASA Technical Reports Server (NTRS)

    Greene, E. P.; Ephremides, A.

    1981-01-01

    Attention is given to a communication network consisting of an arbitrary number of nodes which can communicate with each other via a time-division multiple access (TDMA) broadcast channel. The reported investigation is concerned with the development of efficient distributed multiple access protocols for traffic consisting primarily of single packet messages in a datagram mode of operation. The motivation for the design of the protocols came from the consideration of efficient multiple access utilization of moderate to high bandwidth (4-40 Mbit/s capacity) communication satellite channels used for the transmission of short (1000-10,000 bits) fixed length packets. Under these circumstances, the ratio of roundtrip propagation time to packet transmission time is between 100 to 10,000. It is shown how a TDMA channel can be adaptively shared by datagram traffic and constant bandwidth users such as in digital voice applications. The distributed reservation control protocols described are a hybrid between contention and reservation protocols.

  12. Current Status of EPA Protocol Gas Verification Program

    EPA Science Inventory

    Accurate compressed gas reference standards are needed to calibrate and audit continuous emission monitors (CEMs) and ambient air quality monitors that are being used for regulatory purposes. US Environmental Protection Agency (EPA) established its traceability protocol to ensur...

  13. Minimal computational-space implementation of multiround quantum protocols

    SciTech Connect

    Bisio, Alessandro; D'Ariano, Giacomo Mauro; Perinotti, Paolo; Chiribella, Giulio

    2011-02-15

    A single-party strategy in a multiround quantum protocol can be implemented by sequential networks of quantum operations connected by internal memories. Here, we provide an efficient realization in terms of computational-space resources.

  14. Meta-Envy-Free Cake-Cutting Protocols

    NASA Astrophysics Data System (ADS)

    Manabe, Yoshifumi; Okamoto, Tatsuaki

    This paper discusses cake-cutting protocols when the cake is a heterogeneous good that is represented by an interval in the real line. We propose a new desirable property, the meta-envy-freeness of cake-cutting, which has not been formally considered before. Though envy-freeness was considered to be one of the most important desirable properties, envy-freeness does not prevent envy about role assignment in the protocols. We define meta-envy-freeness that formalizes this kind of envy. We show that current envy-free cake-cutting protocols do not satisfy meta-envy-freeness. Formerly proposed properties such as strong envy-free, exact, and equitable do not directly consider this type of envy and these properties are very difficult to realize. This paper then shows meta-envy-free cake-cutting protocols for two and three party cases.

  15. Photographic protocol for image acquisition in craniofacial microsomia

    PubMed Central

    2011-01-01

    Craniofacial microsomia (CFM) is a congenital condition associated with orbital, mandibular, ear, nerve, and soft tissue anomalies. We present a standardized, two-dimensional, digital photographic protocol designed to capture the common craniofacial features associated with CFM. PMID:22208766

  16. Electronic Voting Protocol Using Identity-Based Cryptography.

    PubMed

    Gallegos-Garcia, Gina; Tapia-Recillas, Horacio

    2015-01-01

    Electronic voting protocols proposed to date meet their properties based on Public Key Cryptography (PKC), which offers high flexibility through key agreement protocols and authentication mechanisms. However, when PKC is used, it is necessary to implement Certification Authority (CA) to provide certificates which bind public keys to entities and enable verification of such public key bindings. Consequently, the components of the protocol increase notably. An alternative is to use Identity-Based Encryption (IBE). With this kind of cryptography, it is possible to have all the benefits offered by PKC, without neither the need of certificates nor all the core components of a Public Key Infrastructure (PKI). Considering the aforementioned, in this paper we propose an electronic voting protocol, which meets the privacy and robustness properties by using bilinear maps.

  17. Current Status of EPA Verification Program for EPA Protocol Gases

    EPA Science Inventory

    Accurate compressed gas calibration standards are needed to calibrate continuous emission monitors (CEMs) and ambient air quality monitors that are being used for regulatory purposes. US Environmental Protection Agency (EPA) established its traceability protocol to ensure that c...

  18. 40 CFR 766.28 - Expert review of protocols.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... Expert review of protocols. EPA will gather a panel of experts in analysis of chemical matrices for HDDs... and/or of other U.S. Government agencies who have had experience in analysis of chemical matrices...

  19. Developing a notebook protocol for the high school chemistry classroom

    NASA Astrophysics Data System (ADS)

    Rensing, Roselyn I.

    The focus of this project is to increase science literacy in high school students using a protocol that emphasizes writing. A protocol or lesson sequence comprises a code of behavior to encourage learning through reflection, writing, and self-assessment. A basic protocol may have a sequence of writing elements or tasks which checks for prior knowledge, looks at lesson standards, studies content, and summarizes learning. Using the protocol, students will demonstrate evidence of their learning through writing. The project will identify a progression of tasks which enable students to master content and express mastery through writing. The student's interactive notebook will record evidence of their learning. Several styles of writing and reporting tasks will be explored using the notebook. Students will help implement and identify tasks that demonstrate their knowledge and understanding of science content.

  20. A Voting Protocol Based on the Controlled Quantum Operation Teleportation

    NASA Astrophysics Data System (ADS)

    Tian, Juan-Hong; Zhang, Jian-Zhong; Li, Yan-Ping

    2016-05-01

    Based on the controlled quantum operation teleportation, a secure voting protocol is proposed in this paper. Genuine four-qubit entangled state functions as the quantum channel. The eligible voter's quantum operation which represents his vote information can be transmitted to the tallyman Bob with the help of the scrutineer Charlie. Voter's quantum identity authentication provides the anonymity of voters'ID, which is ensured by a zero-knowledge proof of the notary organization CA. Charlie's supervision in the whole voting process can make the protocol satisfy verifiability and non-reusability so as to avoid Bob's dishonest behaviour. The security analysis shows that the voting protocol satisfies unforgeability, and has great advantages over some relevant researches. Additionally, the quantum operation can be transmitted successfully with the probability 1, which can make the protocol reliable and practical.