MR efficiency using automated MRI-desktop eProtocol
NASA Astrophysics Data System (ADS)
Gao, Fei; Xu, Yanzhe; Panda, Anshuman; Zhang, Min; Hanson, James; Su, Congzhe; Wu, Teresa; Pavlicek, William; James, Judy R.
2017-03-01
MRI protocols are instruction sheets that radiology technologists use in routine clinical practice for guidance (e.g., slice position, acquisition parameters etc.). In Mayo Clinic Arizona (MCA), there are over 900 MR protocols (ranging across neuro, body, cardiac, breast etc.) which makes maintaining and updating the protocol instructions a labor intensive effort. The task is even more challenging given different vendors (Siemens, GE etc.). This is a universal problem faced by all the hospitals and/or medical research institutions. To increase the efficiency of the MR practice, we designed and implemented a web-based platform (eProtocol) to automate the management of MRI protocols. It is built upon a database that automatically extracts protocol information from DICOM compliant images and provides a user-friendly interface to the technologists to create, edit and update the protocols. Advanced operations such as protocol migrations from scanner to scanner and capability to upload Multimedia content were also implemented. To the best of our knowledge, eProtocol is the first MR protocol automated management tool used clinically. It is expected that this platform will significantly improve the radiology operations efficiency including better image quality and exam consistency, fewer repeat examinations and less acquisition errors. These protocols instructions will be readily available to the technologists during scans. In addition, this web-based platform can be extended to other imaging modalities such as CT, Mammography, and Interventional Radiology and different vendors for imaging protocol management.
Automating individualized coaching and authentic role-play practice for brief intervention training.
Hayes-Roth, B; Saker, R; Amano, K
2010-01-01
Brief intervention helps to reduce alcohol abuse, but there is a need for accessible, cost-effective training of clinicians. This study evaluated STAR Workshop , a web-based training system that automates efficacious techniques for individualized coaching and authentic role-play practice. We compared STAR Workshop to a web-based, self-guided e-book and a no-treatment control, for training the Engage for Change (E4C) brief intervention protocol. Subjects were medical and nursing students. Brief written skill probes tested subjects' performance of individual protocol steps, in different clinical scenarios, at three test times: pre-training, post-training, and post-delay (two weeks). Subjects also did live phone interviews with a standardized patient, post-delay. STAR subjects performed significantly better than both other groups. They showed significantly greater improvement from pre-training probes to post-training and post-delay probes. They scored significantly higher on post-delay phone interviews. STAR Workshop appears to be an accessible, cost-effective approach for training students to use the E4C protocol for brief intervention in alcohol abuse. It may also be useful for training other clinical interviewing protocols.
NASA Astrophysics Data System (ADS)
Wei, Chun-Yan; Gao, Fei; Wen, Qiao-Yan; Wang, Tian-Yin
2014-12-01
Until now, the only kind of practical quantum private query (QPQ), quantum-key-distribution (QKD)-based QPQ, focuses on the retrieval of a single bit. In fact, meaningful message is generally composed of multiple adjacent bits (i.e., a multi-bit block). To obtain a message from database, the user Alice has to query l times to get each ai. In this condition, the server Bob could gain Alice's privacy once he obtains the address she queried in any of the l queries, since each ai contributes to the message Alice retrieves. Apparently, the longer the retrieved message is, the worse the user privacy becomes. To solve this problem, via an unbalanced-state technique and based on a variant of multi-level BB84 protocol, we present a protocol for QPQ of blocks, which allows the user to retrieve a multi-bit block from database in one query. Our protocol is somewhat like the high-dimension version of the first QKD-based QPQ protocol proposed by Jacobi et al., but some nontrivial modifications are necessary.
Wei, Chun-Yan; Gao, Fei; Wen, Qiao-Yan; Wang, Tian-Yin
2014-01-01
Until now, the only kind of practical quantum private query (QPQ), quantum-key-distribution (QKD)-based QPQ, focuses on the retrieval of a single bit. In fact, meaningful message is generally composed of multiple adjacent bits (i.e., a multi-bit block). To obtain a message from database, the user Alice has to query l times to get each ai. In this condition, the server Bob could gain Alice's privacy once he obtains the address she queried in any of the l queries, since each ai contributes to the message Alice retrieves. Apparently, the longer the retrieved message is, the worse the user privacy becomes. To solve this problem, via an unbalanced-state technique and based on a variant of multi-level BB84 protocol, we present a protocol for QPQ of blocks, which allows the user to retrieve a multi-bit block from database in one query. Our protocol is somewhat like the high-dimension version of the first QKD-based QPQ protocol proposed by Jacobi et al., but some nontrivial modifications are necessary. PMID:25518810
RSA-Based Password-Authenticated Key Exchange, Revisited
NASA Astrophysics Data System (ADS)
Shin, Seonghan; Kobara, Kazukuni; Imai, Hideki
The RSA-based Password-Authenticated Key Exchange (PAKE) protocols have been proposed to realize both mutual authentication and generation of secure session keys where a client is sharing his/her password only with a server and the latter should generate its RSA public/private key pair (e, n), (d, n) every time due to the lack of PKI (Public-Key Infrastructures). One of the ways to avoid a special kind of off-line (so called e-residue) attacks in the RSA-based PAKE protocols is to deploy a challenge/response method by which a client verifies the relative primality of e and φ(n) interactively with a server. However, this kind of RSA-based PAKE protocols did not give any proof of the underlying challenge/response method and therefore could not specify the exact complexity of their protocols since there exists another security parameter, needed in the challenge/response method. In this paper, we first present an RSA-based PAKE (RSA-PAKE) protocol that can deploy two different challenge/response methods (denoted by Challenge/Response Method1 and Challenge/Response Method2). The main contributions of this work include: (1) Based on the number theory, we prove that the Challenge/Response Method1 and the Challenge/Response Method2 are secure against e-residue attacks for any odd prime e (2) With the security parameter for the on-line attacks, we show that the RSA-PAKE protocol is provably secure in the random oracle model where all of the off-line attacks are not more efficient than on-line dictionary attacks; and (3) By considering the Hamming weight of e and its complexity in the. RSA-PAKE protocol, we search for primes to be recommended for a practical use. We also compare the RSA-PAKE protocol with the previous ones mainly in terms of computation and communication complexities.
ERIC Educational Resources Information Center
Stahmer, Aubyn C.; Suhrheinrich, Jessica; Schetter, Patricia L.; Hassrick, Elizabeth McGee
2018-01-01
This study examines how system-wide (i.e., region, district, and school) mechanisms such as leadership support, training requirements, structure, collaboration, and education affect the use of evidence-based practices (EBPs) in schools and how this affects the outcomes for students with autism spectrum disorder (ASD). Despite growing evidence for…
Wei, Chun-Yan; Gao, Fei; Wen, Qiao-Yan; Wang, Tian-Yin
2014-12-18
Until now, the only kind of practical quantum private query (QPQ), quantum-key-distribution (QKD)-based QPQ, focuses on the retrieval of a single bit. In fact, meaningful message is generally composed of multiple adjacent bits (i.e., a multi-bit block). To obtain a message a1a2···al from database, the user Alice has to query l times to get each ai. In this condition, the server Bob could gain Alice's privacy once he obtains the address she queried in any of the l queries, since each a(i) contributes to the message Alice retrieves. Apparently, the longer the retrieved message is, the worse the user privacy becomes. To solve this problem, via an unbalanced-state technique and based on a variant of multi-level BB84 protocol, we present a protocol for QPQ of blocks, which allows the user to retrieve a multi-bit block from database in one query. Our protocol is somewhat like the high-dimension version of the first QKD-based QPQ protocol proposed by Jacobi et al., but some nontrivial modifications are necessary.
Developing an evidence-based practice protocol: implications for midwifery practice.
Carr, K C
2000-01-01
Evidence-based practice is defined and its importance to midwifery practice is presented. Guidelines are provided for the development of an evidence-based practice protocol. These include: identifying the clinical question, obtaining the evidence, evaluating the validity and importance of the evidence, synthesizing the evidence and applying it to the development of a protocol or clinical algorithm, and, finally, developing an evaluation plan or measurement strategy to see if the new protocol is effective.
Practical quantum digital signature
NASA Astrophysics Data System (ADS)
Yin, Hua-Lei; Fu, Yao; Chen, Zeng-Bing
2016-03-01
Guaranteeing nonrepudiation, unforgeability as well as transferability of a signature is one of the most vital safeguards in today's e-commerce era. Based on fundamental laws of quantum physics, quantum digital signature (QDS) aims to provide information-theoretic security for this cryptographic task. However, up to date, the previously proposed QDS protocols are impractical due to various challenging problems and most importantly, the requirement of authenticated (secure) quantum channels between participants. Here, we present the first quantum digital signature protocol that removes the assumption of authenticated quantum channels while remaining secure against the collective attacks. Besides, our QDS protocol can be practically implemented over more than 100 km under current mature technology as used in quantum key distribution.
González-González, Ana Isabel; Orrego, Carola; Perestelo-Perez, Lilisbeth; Bermejo-Caja, Carlos Jesús; Mora, Nuria; Koatz, Débora; Ballester, Marta; Del Pino, Tasmania; Pérez-Ramos, Jeannet; Toledo-Chavarri, Ana; Robles, Noemí; Pérez-Rivas, Francisco Javier; Ramírez-Puerta, Ana Belén; Canellas-Criado, Yolanda; Del Rey-Granado, Yolanda; Muñoz-Balsa, Marcos José; Becerril-Rojas, Beatriz; Rodríguez-Morales, David; Sánchez-Perruca, Luis; Vázquez, José Ramón; Aguirre, Armando
2017-10-30
Communities of practice are based on the idea that learning involves a group of people exchanging experiences and knowledge. The e-MPODERA project aims to assess the effectiveness of a virtual community of practice aimed at improving primary healthcare professional attitudes to the empowerment of patients with chronic diseases. This paper describes the protocol for a cluster randomized controlled trial. We will randomly assign 18 primary-care practices per participating region of Spain (Catalonia, Madrid and Canary Islands) to a virtual community of practice or to usual training. The primary-care practice will be the randomization unit and the primary healthcare professional will be the unit of analysis. We will need a sample of 270 primary healthcare professionals (general practitioners and nurses) and 1382 patients. We will perform randomization after professionals and patients are selected. We will ask the intervention group to participate for 12 months in a virtual community of practice based on a web 2.0 platform. We will measure the primary outcome using the Patient-Provider Orientation Scale questionnaire administered at baseline and after 12 months. Secondary outcomes will be the sociodemographic characteristics of health professionals, sociodemographic and clinical characteristics of patients, the Patient Activation Measure questionnaire for patient activation and outcomes regarding use of the virtual community of practice. We will calculate a linear mixed-effects regression to estimate the effect of participating in the virtual community of practice. This cluster randomized controlled trial will show whether a virtual intervention for primary healthcare professionals improves attitudes to the empowerment of patients with chronic diseases. ClicalTrials.gov, NCT02757781 . Registered on 25 April 2016. Protocol Version. PI15.01 22 January 2016.
ALIZADEH, Mahdi; KHADEM, Ebrahim; ALIASL, Jale
2017-01-01
Background: In Iranian traditional medicine (ITM) stomach is the important organ in the body. Its disorders can affect other organs such as liver, heart and also can cause depression. Stomach distemperaments can cause some disorders. The purpose of this study was to provide a diagnostic method of stomach distemperament for clinical practice. Methods: In this study authoritative ITM books such as Canon of Avicenna, Zakhirah-E-Kharazm Shahi by Hakim Esmail Jorjani, Kamel al-Sina’ah al-Tibbiyah by Ali ibn al-‘Abbas al-Majusi were assessed and symptoms and signs of stomach distemperament were collected. Results: Stomach has some normal temperament. The imbalance in temperament and humor can cause distemperments. There are 12 types of stomach distemperament and based on symptoms and signs a primary protocol is designed for diagnosis of stomach distemperament. Conclusion: There is no available guideline for gastric distemperamet diagnosis protocol. As a result, the presented protocol should be considered for use in clinical practice. PMID:28845397
Use of Intervention Mapping to Enhance Health Care Professional Practice: A Systematic Review.
Durks, Desire; Fernandez-Llimos, Fernando; Hossain, Lutfun N; Franco-Trigo, Lucia; Benrimoj, Shalom I; Sabater-Hernández, Daniel
2017-08-01
Intervention Mapping is a planning protocol for developing behavior change interventions, the first three steps of which are intended to establish the foundations and rationales of such interventions. This systematic review aimed to identify programs that used Intervention Mapping to plan changes in health care professional practice. Specifically, it provides an analysis of the information provided by the programs in the first three steps of the protocol to determine their foundations and rationales of change. A literature search was undertaken in PubMed, Scopus, SciELO, and DOAJ using "Intervention Mapping" as keyword. Key information was gathered, including theories used, determinants of practice, research methodologies, theory-based methods, and practical applications. Seventeen programs aimed at changing a range of health care practices were included. The social cognitive theory and the theory of planned behavior were the most frequently used frameworks in driving change within health care practices. Programs used a large variety of research methodologies to identify determinants of practice. Specific theory-based methods (e.g., modelling and active learning) and practical applications (e.g., health care professional training and facilitation) were reported to inform the development of practice change interventions and programs. In practice, Intervention Mapping delineates a three-step systematic, theory- and evidence-driven process for establishing the theoretical foundations and rationales underpinning change in health care professional practice. The use of Intervention Mapping can provide health care planners with useful guidelines for the theoretical development of practice change interventions and programs.
NASA Astrophysics Data System (ADS)
Wilcox, Jesse Lee
This year-long study explored how ten teachers--five first year, five second year--acclimated to their new school environment after leaving a master's level university science teacher preparation program known for being highly effective. Furthermore, this study sought to explore if a relationship existed between teachers' understanding and implementation of research-based science teaching practices, the barriers to enacting these practices--known as institutional constraints, and the constructive-developmental theory which explores meaning-making systems known as orders of consciousness. As a naturalistic inquiry mixed methods study, data were collected using both qualitative (e.g., semi-structured interviews, field notes) as well as quantitative methods (e.g., observation protocols, subject/object protocol). These data sources were used to construct participant summaries and a cross-case analysis. The findings from provide evidence that teachers' orders of consciousness might help to explain why understanding research-based science teaching practices are maintained by some new teachers and not others. Additionally, this study found the orders of consciousness of teachers relates to the perceptions of institutional constraints as well as how a teacher chooses to navigate those constraints. Finally, the extent to which teachers implement research-based science teaching practices is related to orders of consciousness. While many studies have focused on what meaning teachers make, this study highlights the importance of considering how teachers make meaning.
Practical quantum private query with better performance in resisting joint-measurement attack
NASA Astrophysics Data System (ADS)
Wei, Chun-Yan; Wang, Tian-Yin; Gao, Fei
2016-04-01
As a kind of practical protocol, quantum-key-distribution (QKD)-based quantum private queries (QPQs) have drawn lots of attention. However, joint-measurement (JM) attack poses a noticeable threat to the database security in such protocols. That is, by JM attack a malicious user can illegally elicit many more items from the database than the average amount an honest one can obtain. Taking Jacobi et al.'s protocol as an example, by JM attack a malicious user can obtain as many as 500 bits, instead of the expected 2.44 bits, from a 104-bit database in one query. It is a noticeable security flaw in theory, and would also arise in application with the development of quantum memories. To solve this problem, we propose a QPQ protocol based on a two-way QKD scheme, which behaves much better in resisting JM attack. Concretely, the user Alice cannot get more database items by conducting JM attack on the qubits because she has to send them back to Bob (the database holder) before knowing which of them should be jointly measured. Furthermore, JM attack by both Alice and Bob would be detected with certain probability, which is quite different from previous protocols. Moreover, our protocol retains the good characters of QKD-based QPQs, e.g., it is loss tolerant and robust against quantum memory attack.
James, Dorsha N; Voskresensky, Igor V; Jack, Meg; Cotton, Bryan A
2009-06-01
Pre-hospital airway management represents the intervention most likely to impact outcomes in critically injured patients. As such, airway management issues dominate quality improvement (QI) reviews of aero-medical programs. The purpose of this study was to evaluate current practice patterns of airway management in trauma among U.S. aero-medical service (AMS) programs. The Association of Air Medical Services (AAMS) Resource Guide from 2005 to 2006 was utilized to identify the e-mail addresses of all directors of U.S. aero-medical transport programs. Program directors from 182 U.S. aero-medical programs were asked to participate in an anonymous, web-based survey of emergency airway management protocols and practices. Non-responders to the initial request were contacted a second time by e-mail. 89 programs responded. 98.9% have rapid sequence intubation (RSI) protocols. 90% use succinylcholine, 70% use long-acting neuromuscular blockers (NMB) within their RSI protocol. 77% have protocols for mandatory in-flight sedation but only 13% have similar protocols for maintenance paralytics. 60% administer long-acting NMB immediately after RSI, 13% after confirmation of neurological activity. Given clinical scenarios, however, 97% administer long-acting NMB to patients with scene and in-flight Glasgow Coma Scale (GCS) of 3, even for brief transport times. The majority of AMS programs have well defined RSI and in-flight sedation protocols, while protocols for in-flight NMB are uncommon. Despite this, nearly all programs administer long-acting NMB following RSI, irrespective of GCS or flight time. Given the impact of in-flight NMB on initial assessment, early intervention, and injury severity scoring, a critical appraisal of current AMS airway management practices appears warranted.
Implementing clinical protocols in oncology: quality gaps and the learning curve phenomenon.
Kedikoglou, Simos; Syrigos, Konstantinos; Skalkidis, Yannis; Ploiarchopoulou, Fani; Dessypris, Nick; Petridou, Eleni
2005-08-01
The quality improvement effort in clinical practice has focused mostly on 'performance quality', i.e. on the development of comprehensive, evidence-based guidelines. This study aimed to assess the 'conformance quality', i.e. the extent to which guidelines once developed are correctly and consistently applied. It also aimed to assess the existence of quality gaps in the treatment of certain patient segments as defined by age or gender and to investigate methods to improve overall conformance quality. A retrospective audit of clinical practice in a well-defined oncology setting was undertaken and the results compared to those obtained from prospectively applying an internally developed clinical protocol in the same setting and using specific tools to increase conformance quality. All indicators showed improvement after the implementation of the protocol that in many cases reached statistical significance, while in the entire cohort advanced age was associated (although not significantly) with sub-optimal delivery of care. A 'learning curve' phenomenon in the implementation of quality initiatives was detected, with all indicators improving substantially in the second part of the prospective study. Clinicians should pay separate attention to the implementation of chosen protocols and employ specific tools to increase conformance quality in patient care.
Bour, Robert K.; Pozniak, Myron; Ranallo, Frank N.
2015-01-01
The purpose of this paper is to describe our experience with the AAPM Medical Physics Practice Guideline 1.a: “CT Protocol Management and Review Practice Guideline”. Specifically, we will share how our institution's quality management system addresses the suggestions within the AAPM practice report. We feel this paper is needed as it was beyond the scope of the AAPM practice guideline to provide specific details on fulfilling individual guidelines. Our hope is that other institutions will be able to emulate some of our practices and that this article would encourage other types of centers (e.g., community hospitals) to share their methodology for approaching CT protocol optimization and quality control. Our institution had a functioning CT protocol optimization process, albeit informal, since we began using CT. Recently, we made our protocol development and validation process compliant with a number of the ISO 9001:2008 clauses and this required us to formalize the roles of the members of our CT protocol optimization team. We rely heavily on PACS‐based IT solutions for acquiring radiologist feedback on the performance of our CT protocols and the performance of our CT scanners in terms of dose (scanner output) and the function of the automatic tube current modulation. Specific details on our quality management system covering both quality control and ongoing optimization have been provided. The roles of each CT protocol team member have been defined, and the critical role that IT solutions provides for the management of files and the monitoring of CT protocols has been reviewed. In addition, the invaluable role management provides by being a champion for the project has been explained; lack of a project champion will mitigate the efforts of a CT protocol optimization team. Meeting the guidelines set forth in the AAPM practice guideline was not inherently difficult, but did, in our case, require the cooperation of radiologists, technologists, physicists, IT, administrative staff, and hospital management. Some of the IT solutions presented in this paper are novel and currently unique to our institution. PACS number: 87.57.Q PMID:26103176
DOE Office of Scientific and Technical Information (OSTI.GOV)
Chan, A.; Tsiounis, Y.; Frankel, Y.
Recently, there has been an interest in making electronic cash protocols more practical for electronic commerce by developing e-cash which is divisible (e.g., a coin which can be spent incrementally but total purchases are limited to the monetary value of the coin). In Crypto`95, T. Okamoto presented the first practical divisible, untraceable, off-line e-cash scheme, which requires only O(log N) computations for each of the withdrawal, payment and deposit procedures, where N = (total coin value)/(smallest divisible unit). However, Okamoto`s set-up procedure is quite inefficient (on the order of 4,000 multi-exponentiations and depending on the size of the RSA modulus).more » The authors formalize the notion of range-bounded commitment, originally used in Okamoto`s account establishment protocol, and present a very efficient instantiation which allows one to construct the first truly efficient divisible e-cash system. The scheme only requires the equivalent of one (1) exponentiation for set-up, less than 2 exponentiations for withdrawal and around 20 for payment, while the size of the coin remains about 300 Bytes. Hence, the withdrawal protocol is 3 orders of magnitude faster than Okamoto`s, while the rest of the system remains equally efficient, allowing for implementation in smart-cards. Similar to Okamoto`s, the scheme is based on proofs whose cryptographic security assumptions are theoretically clarified.« less
Fault-tolerant quantum blind signature protocols against collective noise
NASA Astrophysics Data System (ADS)
Zhang, Ming-Hui; Li, Hui-Fang
2016-10-01
This work proposes two fault-tolerant quantum blind signature protocols based on the entanglement swapping of logical Bell states, which are robust against two kinds of collective noises: the collective-dephasing noise and the collective-rotation noise, respectively. Both of the quantum blind signature protocols are constructed from four-qubit decoherence-free (DF) states, i.e., logical Bell qubits. The initial message is encoded on the logical Bell qubits with logical unitary operations, which will not destroy the anti-noise trait of the logical Bell qubits. Based on the fundamental property of quantum entanglement swapping, the receiver simply performs two Bell-state measurements (rather than four-qubit joint measurements) on the logical Bell qubits to verify the signature, which makes the protocols more convenient in a practical application. Different from the existing quantum signature protocols, our protocols can offer the high fidelity of quantum communication with the employment of logical qubits. Moreover, we hereinafter prove the security of the protocols against some individual eavesdropping attacks, and we show that our protocols have the characteristics of unforgeability, undeniability and blindness.
Scales, Kezia; Zimmerman, Sheryl; Miller, Stephanie J
2018-01-18
To draw from systematic and other literature reviews to identify, describe, and critique nonpharmacological practices to address behavioral and psychological symptoms of dementia (BPSDs) and provide evidence-based recommendations for dementia care especially useful for potential adopters. A search of systematic and other literature reviews published from January 2010 through January 2017. Nonpharmacological practices were summarized to describe the overall conceptual basis related to effectiveness, the practice itself, and the size and main conclusions of the evidence base. Each practice was also critically reviewed to determine acceptability, harmful effects, elements of effectiveness, and level of investment required, based on time needed for training/implementation, specialized care provider requirements, and equipment/capital requirements. Nonpharmacological practices to address BPSDs include sensory practices (aromatherapy, massage, multi-sensory stimulation, bright light therapy), psychosocial practices (validation therapy, reminiscence therapy, music therapy, pet therapy, meaningful activities), and structured care protocols (bathing, mouth care). Most practices are acceptable, have no harmful effects, and require minimal to moderate investment. Nonpharmacological practices are person-centered, and their selection can be informed by considering the cause and meaning of the individual's behavioral and psychological symptoms. Family caregivers and paid care providers can implement evidence-based practices in home or residential care settings, although some practices require the development of more specific protocols if they are to become widely used in an efficacious manner. © The Author(s) 2018. Published by Oxford University Press on behalf of The Gerontological Society of America. All rights reserved. For permissions, please e-mail: journals.permissions@oup.com.
Pothier, Kristell; Soriano, G; Lussier, M; Naudin, A; Costa, N; Guyonnet, S; Piau, A; Ousset, P J; Nourhashemi, F; Vellas, B; de Souto Barreto, P
2018-01-24
Multidomain interventions composed of nutritional counseling, exercise and cognitive trainings have shown encouraging results as effective preventive strategies delaying age-related declines. However, these interventions are time- and resource-consuming. The use of Information and Communication Technologies (ICT) might facilitate the translation from research into real-world practice and reach a massive number of people. This article describes the protocol of the eMIND study, a randomized controlled trial (RCT) using a web-based multidomain intervention for older adults. One hundred and twenty older adults (≥ 65 years), with a spontaneous memory complaint, will be randomly assigned to a six-month web-based multidomain (nutritional counseling, physical and cognitive trainings) intervention group with a connected accelerometer (number of steps, energy expenditure), or to a control group with access to general information on healthy aging plus the accelerometer, but no access to the multidomain intervention. The main outcome is the feasibility/acceptability of the web-based intervention. Secondary clinical outcomes include: cognitive functions, physical performance, nutritional status and cost-effectiveness. We expect a high amount of adherers (ie, > 75% compliance to the protocol) to reflect the feasibility. Acceptability, assessed through interviews, should allow us to understand motivators and barriers to this ICT intervention. We also expect to provide data on its effects on various clinical outcomes and efficiency. The eMIND study will provide crucial information to help developing a future and larger web-based multidomain lifestyle RCT, which should facilitate the translation of this ICT intervention from the research world into real-life clinical practice for the healthcare of older adults.
Hutting, Nathan; Detaille, Sarah I; Engels, Josephine A; Heerkens, Yvonne F; Staal, J Bart; Nijhuis-van der Sanden, Maria Wg
2015-01-01
To develop a self-management program with an additional eHealth module, using the six steps of the intervention mapping (IM) protocol, to help employees with complaints of the arm, neck, and/or shoulder (CANS) cope with their problems. In Step 1 of the IM protocol, a needs assessment was performed consisting of a review of the Dutch multidisciplinary guidelines on CANS, and of focus group sessions with employees with CANS (n=15) and with relevant experts (n=17). After the needs assessment, the objectives of the intervention and the determinants of self-management at work were formulated (Step 2). Furthermore, theory-based intervention methods and practical strategies were selected (Step 3), and an intervention program (including the eHealth module) was developed (Step 4). Finally, plans for implementation and evaluation of the program were developed (Steps 5 and 6). Step 1 of the IM protocol revealed that employees with CANS should be stimulated to search for information about the cause of their complaints, about how to deal with their complaints, and in which manner they can influence their complaints themselves. In Step 2, the overall goal of the intervention was defined as "self-management behavior at work" with the aim to alleviate the perceived disability of the participants. Step 3 described how the intervention methods were translated into practical strategies, and goal setting was introduced as an important method for increasing self-efficacy. The product of Step 4 was the final program plan, consisting of 6-weekly group sessions of 2.5 hours each and an eHealth module. In Step 5, a recruitment plan and course materials were developed, a steering committee was set up, trainers were recruited, and the final program was tested. In Step 6, an evaluation plan was developed, which consists of a randomized controlled trial with a 12-month follow-up period and a qualitative evaluation (interviews) with some of the participants. This study resulted in a theory- and practice-based self-management program, based on behavioral change theories, guideline-related evidence, and practice-based knowledge that fits the needs of employees with CANS.
Study of consensus-based time synchronization in wireless sensor networks.
He, Jianping; Li, Hao; Chen, Jiming; Cheng, Peng
2014-03-01
Recently, various consensus-based protocols have been developed for time synchronization in wireless sensor networks. However, due to the uncertainties lying in both the hardware fabrication and network communication processes, it is not clear how most of the protocols will perform in real implementations. In order to reduce such gap, this paper investigates whether and how the typical consensus-based time synchronization protocols can tolerate the uncertainties in practical sensor networks through extensive testbed experiments. For two typical protocols, i.e., Average Time Synchronization (ATS) and Maximum Time Synchronization (MTS), we first analyze how the time synchronization accuracy will be affected by various uncertainties in the system. Then, we implement both protocols on our sensor network testbed consisted of Micaz nodes, and investigate the time synchronization performance and robustness under various network settings. Noticing that the synchronized clocks under MTS may be slightly faster than the desirable clock, by adopting both maximum consensus and minimum consensus, we propose a modified protocol, MMTS, which is able to drive the synchronized clocks closer to the desirable clock while maintaining the convergence rate and synchronization accuracy of MTS. © 2013 ISA. Published by ISA. All rights reserved.
Green, Esther; Ballantyne, Barbara; Tarasuk, Joy; Skrutkowski, Myriam; Carley, Meg; Chapman, Kim; Kuziemsky, Craig; Kolari, Erin; Sabo, Brenda; Saucier, Andréanne; Shaw, Tara; Tardif, Lucie; Truant, Tracy; Cummings, Greta G.; Howell, Doris
2016-01-01
ABSTRACT Background The pan‐Canadian Oncology Symptom Triage and Remote Support (COSTaRS) team developed 13 evidence‐informed protocols for symptom management. Aim To build an effective and sustainable approach for implementing the COSTaRS protocols for nurses providing telephone‐based symptom support to cancer patients. Methods A comparative case study was guided by the Knowledge to Action Framework. Three cases were created for three Canadian oncology programs that have nurses providing telephone support. Teams of researchers and knowledge users: (a) assessed barriers and facilitators influencing protocol use, (b) adapted protocols for local use, (c) intervened to address barriers, (d) monitored use, and (e) assessed barriers and facilitators influencing sustained use. Analysis was within and across cases. Results At baseline, >85% nurses rated protocols positively but barriers were identified (64‐80% needed training). Patients and families identified similar barriers and thought protocols would enhance consistency among nurses teaching self‐management. Twenty‐two COSTaRS workshops reached 85% to 97% of targeted nurses (N = 119). Nurses felt more confident with symptom management and using the COSTaRS protocols (p < .01). Protocol adaptations addressed barriers (e.g., health records approval, creating pocket versions, distributing with telephone messages). Chart audits revealed that protocols used were documented for 11% to 47% of patient calls. Sustained use requires organizational alignment and ongoing leadership support. Linking Evidence to Action Protocol uptake was similar to trials that have evaluated tailored interventions to improve professional practice by overcoming identified barriers. Collaborating with knowledge users facilitated interpretation of findings, aided protocol adaptation, and supported implementation. Protocol implementation in nursing requires a tailored approach. A multifaceted intervention approach increased nurses’ use of evidence‐informed protocols during telephone calls with patients about symptoms. Training and other interventions improved nurses’ confidence with using COSTaRS protocols and their uptake was evident in some documented telephone calls. Protocols could be adapted for use by patients and nurses globally. PMID:27243574
Wong, Anthony F; Pielmeier, Ulrike; Haug, Peter J; Andreassen, Steen
2016-01-01
Objective Develop an efficient non-clinical method for identifying promising computer-based protocols for clinical study. An in silico comparison can provide information that informs the decision to proceed to a clinical trial. The authors compared two existing computer-based insulin infusion protocols: eProtocol-insulin from Utah, USA, and Glucosafe from Denmark. Materials and Methods The authors used eProtocol-insulin to manage intensive care unit (ICU) hyperglycemia with intravenous (IV) insulin from 2004 to 2010. Recommendations accepted by the bedside clinicians directly link the subsequent blood glucose values to eProtocol-insulin recommendations and provide a unique clinical database. The authors retrospectively compared in silico 18 984 eProtocol-insulin continuous IV insulin infusion rate recommendations from 408 ICU patients with those of Glucosafe, the candidate computer-based protocol. The subsequent blood glucose measurement value (low, on target, high) was used to identify if the insulin recommendation was too high, on target, or too low. Results Glucosafe consistently provided more favorable continuous IV insulin infusion rate recommendations than eProtocol-insulin for on target (64% of comparisons), low (80% of comparisons), or high (70% of comparisons) blood glucose. Aggregated eProtocol-insulin and Glucosafe continuous IV insulin infusion rates were clinically similar though statistically significantly different (Wilcoxon signed rank test P = .01). In contrast, when stratified by low, on target, or high subsequent blood glucose measurement, insulin infusion rates from eProtocol-insulin and Glucosafe were statistically significantly different (Wilcoxon signed rank test, P < .001), and clinically different. Discussion This in silico comparison appears to be an efficient nonclinical method for identifying promising computer-based protocols. Conclusion Preclinical in silico comparison analytical framework allows rapid and inexpensive identification of computer-based protocol care strategies that justify expensive and burdensome clinical trials. PMID:26228765
Quantum private query based on single-photon interference
NASA Astrophysics Data System (ADS)
Xu, Sheng-Wei; Sun, Ying; Lin, Song
2016-08-01
Quantum private query (QPQ) has become a research hotspot recently. Specially, the quantum key distribution (QKD)-based QPQ attracts lots of attention because of its practicality. Various such kind of QPQ protocols have been proposed based on different technologies of quantum communications. Single-photon interference is one of such technologies, on which the famous QKD protocol GV95 is just based. In this paper, we propose two QPQ protocols based on single-photon interference. The first one is simpler and easier to realize, and the second one is loss tolerant and flexible, and more practical than the first one. Furthermore, we analyze both the user privacy and the database privacy in the proposed protocols.
Berger, Cezar; Freitas, Renato; Malafaia, Osvaldo; Pinto, José Simão de Paula; Mocellin, Marcos; Macedo, Evaldo; Fagundes, Marina Serrato Coelho
2012-01-01
Summary Introduction: In the health field, computerization has become increasingly necessary in professional practice, since it facilitates data recovery and assists in the development of research with greater scientific rigor. Objective: the present work aimed to develop, apply, and validate specific electronic protocols for patients referred for rhinoplasty. Methods: The prospective research had 3 stages: (1) preparation of theoretical data bases; (2) creation of a master protocol using Integrated System of Electronic Protocol (SINPE©); and (3) elaboration, application, and validation of a specific protocol for the nose and sinuses regarding rhinoplasty. Results: After the preparation of the master protocol, which dealt with the entire field of otorhinolaryngology, we idealized a specific protocol containing all matters related to the patient. In particular, the aesthetic and functional nasal complaints referred for surgical treatment (i.e., rhinoplasty) were organized into 6 main hierarchical categories: anamnesis, physical examination, complementary exams, diagnosis, treatment, and outcome. This protocol utilized these categories and their sub-items: finality; access; surgical maneuvers on the nasal dorsum, tip, and base; clinical evolution after 3, 6, and 12 months; revisional surgery; and quantitative and qualitative evaluations. Conclusion: The developed electronic-specific protocol is feasible and important for information registration from patients referred to rhinoplasty. PMID:25991979
Hutting, Nathan; Detaille, Sarah I; Engels, Josephine A; Heerkens, Yvonne F; Staal, J Bart; Nijhuis-van der Sanden, Maria WG
2015-01-01
Purpose To develop a self-management program with an additional eHealth module, using the six steps of the intervention mapping (IM) protocol, to help employees with complaints of the arm, neck, and/or shoulder (CANS) cope with their problems. Methods In Step 1 of the IM protocol, a needs assessment was performed consisting of a review of the Dutch multidisciplinary guidelines on CANS, and of focus group sessions with employees with CANS (n=15) and with relevant experts (n=17). After the needs assessment, the objectives of the intervention and the determinants of self-management at work were formulated (Step 2). Furthermore, theory-based intervention methods and practical strategies were selected (Step 3), and an intervention program (including the eHealth module) was developed (Step 4). Finally, plans for implementation and evaluation of the program were developed (Steps 5 and 6). Results Step 1 of the IM protocol revealed that employees with CANS should be stimulated to search for information about the cause of their complaints, about how to deal with their complaints, and in which manner they can influence their complaints themselves. In Step 2, the overall goal of the intervention was defined as “self-management behavior at work” with the aim to alleviate the perceived disability of the participants. Step 3 described how the intervention methods were translated into practical strategies, and goal setting was introduced as an important method for increasing self-efficacy. The product of Step 4 was the final program plan, consisting of 6-weekly group sessions of 2.5 hours each and an eHealth module. In Step 5, a recruitment plan and course materials were developed, a steering committee was set up, trainers were recruited, and the final program was tested. In Step 6, an evaluation plan was developed, which consists of a randomized controlled trial with a 12-month follow-up period and a qualitative evaluation (interviews) with some of the participants. Conclusion This study resulted in a theory- and practice-based self-management program, based on behavioral change theories, guideline-related evidence, and practice-based knowledge that fits the needs of employees with CANS. PMID:26170689
Rakovshik, Sarah G; McManus, Freda
2010-07-01
Cognitive behavior therapy's (CBT) demonstrated efficacy has prompted calls for its increased dissemination to routine clinical practice settings. For the widespread dissemination of CBT to be successful in achieving effects similar to the original efficacy trials, there must also be effective dissemination of CBT training practices. However, as yet, CBT training is not evidence-based. This review examines what can be learned from existing research into the efficacy and effectiveness of CBT training. Due to the paucity of research specifically investigating CBT training, CBT effectiveness and dissemination studies are also examined to glean information about potentially effective training practices. In order to draw conclusions about effective training practices, comparisons are drawn between studies according to the clinical outcomes that they achieved. Training approaches are compared according to dose and active training elements, and theoretical models of learning are applied to interpret the findings. The limitations of the existing literature are discussed, as well as recommendations for improving training research to meet the standards evident in treatment trials (e.g., random allocation, control conditions, self-report and blind assessment, and adherence monitoring). Finally, the process of developing efficacious CBT treatment protocols is offered as a template for developing evidence-based CBT training protocols. 2010 Elsevier Ltd. All rights reserved.
The use of participant-observation protocol in an industrial engineering research.
Silveira e Silva, Renato da; Sznelwar, Laerte Idal; D'Afonseca e Silva, Victor
2012-01-01
Based on literature, this article aims to present the "participant-observation' research protocol, and its practical application in the industrial engineering field, more specifically within the area of design development, and in the case shown by this article, of interiors' design. The main target is to identify the concept of the method, i.e., from its characteristics to structure a general sense about the subject, so that the protocol can be used in different areas of knowledge, especially those ones which are committed with the scientific research involving the expertise from researchers, and subjective feelings and opinions of the users of an engineering product, and how this knowledge can be benefic for product design, contributing since the earliest stage of design.
Swindle, Taren; Johnson, Susan L; Whiteside-Mansell, Leanne; Curran, Geoffrey M
2017-07-18
Despite the potential to reach at-risk children in childcare, there is a significant gap between current practices and evidence-based obesity prevention in this setting. There are few investigations of the impact of implementation strategies on the uptake of evidence-based practices (EBPs) for obesity prevention and nutrition promotion. This study protocol describes a three-phase approach to developing and testing implementation strategies to support uptake of EBPs for obesity prevention practices in childcare (i.e., key components of the WISE intervention). Informed by the i-PARIHS framework, we will use a stakeholder-driven evidence-based quality improvement (EBQI) process to apply information gathered in qualitative interviews on barriers and facilitators to practice to inform the design of implementation strategies. Then, a Hybrid Type III cluster randomized trial will compare a basic implementation strategy (i.e., intervention as usual) with an enhanced implementation strategy informed by stakeholders. All Head Start centers (N = 12) within one agency in an urban area in a southern state in the USA will be randomized to receive the basic or enhanced implementation with approximately 20 classrooms per group (40 educators, 400 children per group). The educators involved in the study, the data collectors, and the biostastician will be blinded to the study condition. The basic and enhanced implementation strategies will be compared on outcomes specified by the RE-AIM model (e.g., Reach to families, Effectiveness of impact on child diet and health indicators, Adoption commitment of agency, Implementation fidelity and acceptability, and Maintenance after 6 months). Principles of formative evaluation will be used throughout the hybrid trial. This study will test a stakeholder-driven approach to improve implementation, fidelity, and maintenance of EBPs for obesity prevention in childcare. Further, this study provides an example of a systematic process to develop and test a tailored, enhanced implementation strategy. ClinicalTrials.gov, NCT03075085.
Preservice Teachers' Teacher Efficacy Beliefs and Constructivist-Based Teaching Practice
ERIC Educational Resources Information Center
Temiz, Tugba; Topcu, Mustafa Sami
2013-01-01
The purpose of this paper is to explore the relationship between preservice teachers' (PTs) teacher efficacy beliefs and their constructivist-based teaching practices. Data were gathered through the questionnaire (Teachers' Sense of Efficacy Scale) and the observation protocol (Reformed Teaching Observation Protocol) administered to the…
Bisseling, Else M; Schellekens, Melanie PJ; Jansen, Ellen TM; van der Lee, Marije L; Speckens, Anne EM
2017-01-01
Background The number of patients living with cancer is growing, and a substantial number of patients suffer from psychological distress. Mindfulness-based interventions (MBIs) seem effective in alleviating psychological distress. Unfortunately, several cancer patients find it difficult, if not impossible, to attend a group-based course. Internet-based MBIs (eMBIs) such as Internet-based mindfulness-based cognitive therapy (eMBCT) may offer solutions. However, it is yet to be studied what facilitators and barriers cancer patients experience during eMBCT. Objective This study aimed to explore facilitators and barriers of individual asynchronous therapist-assisted eMBCT as experienced by both patients and therapists. Methods Patients with heterogeneous cancer diagnoses suffering from psychological distress were offered eMBCT. This 9-week intervention mirrored the group-based MBCT protocol and included weekly asynchronous written therapist feedback. Patients were granted access to a website that contained the eMBCT protocol and a secured inbox, and they were asked to practice and fill out diaries on which the therapist provided feedback. In total, 31 patients participated in an individual posttreatment interview on experienced facilitators and barriers during eMBCT. Moreover, eight therapists were interviewed. The data were analyzed with qualitative content analysis to identify barriers and facilitators in eMBCT. Results Both patients and therapists mentioned four overarching themes as facilitators and barriers: treatment setting (the individual and Internet-based nature of the treatment), treatment format (how the treatment and its guidance were organized and delivered), role of the therapist, and individual patient characteristics. Conclusions The eMBCT provided flexibility in when, where, and how patients and therapists engage in MBCT. Future studies should assess how different eMBCT designs could further improve barriers that were found. PMID:29254912
Overcoming Challenges in School-Wide Survey Administration.
Rasberry, Catherine N; Rose, India; Kroupa, Elizabeth; Hebert, Andrew; Geller, Amanda; Morris, Elana; Lesesne, Catherine A
2018-01-01
School-based surveys provide a useful method for gathering data from youth. Existing literature offers many examples of data collection through school-based surveys, and a small subset of literature describes methodological approaches or general recommendations for health promotion professionals seeking to conduct school-based data collection. Much less is available on real-life logistical challenges (e.g., minimizing disruption in the school day) and corresponding solutions. In this article, we fill that literature gap by offering practical considerations for the administration of school-based surveys. The protocol and practical considerations outlined in the article are based on a survey conducted with 11,681 students from seven large, urban public high schools in the southeast United States. We outline our protocol for implementing a school-based survey that was conducted with all students school-wide, and we describe six types of key challenges faced in conducting the survey: consent procedures, scheduling, locating students within the schools, teacher failure to administer the survey, improper administration of the survey, and minimizing disruption. For each challenge, we offer our key lessons learned and associated recommendations for successfully implementing school-based surveys, and we provide relevant tools for practitioners planning to conduct their own surveys in schools.
Takenouchi, Toshiki; Iwata, Osuke; Nabetani, Makoto; Tamura, Masanori
2012-02-01
Neonatal encephalopathy (NE) secondary to intrapartum asphyxia remains a major cause of post-natal death and permanent neurological deficits worldwide. Supportive therapy has been the mainstay of the treatment until recent series of large clinical trials demonstrating benefit of therapeutic hypothermia (TH) in this high risk population. Now the International Liaison Committee on Resuscitation (ILCOR) recommends TH as a standard of care with the protocols used in the large clinical trials as tentative standard protocols. Our goal is to develop a nationwide consensus practice guideline not only consistent with the international standard protocols but also practical and compatible with the current medical system in Japan. In summary, TH should be offered to newborn infants born ≥36 weeks gestational age and birth weight ≥1800 g exhibiting clinical signs of moderate to severe NE as well as evidence of hypoxia-ischemia, i.e. 10 min Apgar score ≤5, a need for resuscitation at 10 min, blood pH<7.00, or base deficit ≥16 mmol/L. TH should be conducted in the NICUs capable of multidisciplinary care and under the standard protocols, i.e. utilization of cooling device, target (rectal or esophageal) temperatures at 33.5±0.5 and 34.5±0.5°C for whole body and selective head cooling respectively, duration of TH for 72 h, gradual rewarming not exceeding the rate of 0.5°C/h. Long term follow-up with multidisciplinary approach including standardized psychological assessment is warranted. Copyright © 2011 The Japanese Society of Child Neurology. Published by Elsevier B.V. All rights reserved.
Rosenkrantz, Andrew B; Johnson, Evan; Sanger, Joseph J
2015-10-01
This article presents our local experience in the implementation of a real-time web-based system for reporting and tracking quality issues relating to abdominal imaging examinations. This system allows radiologists to electronically submit examination quality issues during clinical readouts. The submitted information is e-mailed to a designate for the given modality for further follow-up; the designate may subsequently enter text describing their response or action taken, which is e-mailed back to the radiologist. Review of 558 entries over a 6-year period demonstrated documentation of a broad range of examination quality issues, including specific issues relating to protocol deviation, post-processing errors, positioning errors, artifacts, and IT concerns. The most common issues varied among US, CT, MRI, radiography, and fluoroscopy. In addition, the most common issues resulting in a patient recall for repeat imaging (generally related to protocol deviation in MRI and US) were identified. In addition to submitting quality problems, radiologists also commonly used the tool to provide recognition of a well-performed examination. An electronic log of actions taken in response to radiologists' submissions indicated that both positive and negative feedback were commonly communicated to the performing technologist. Information generated using the tool can be used to guide subsequent quality improvement initiatives within a practice, including continued protocol standardization as well as education of technologists in the optimization of abdominal imaging examinations.
A survey of system architecture requirements for health care-based wireless sensor networks.
Egbogah, Emeka E; Fapojuwo, Abraham O
2011-01-01
Wireless Sensor Networks (WSNs) have emerged as a viable technology for a vast number of applications, including health care applications. To best support these health care applications, WSN technology can be adopted for the design of practical Health Care WSNs (HCWSNs) that support the key system architecture requirements of reliable communication, node mobility support, multicast technology, energy efficiency, and the timely delivery of data. Work in the literature mostly focuses on the physical design of the HCWSNs (e.g., wearable sensors, in vivo embedded sensors, et cetera). However, work towards enhancing the communication layers (i.e., routing, medium access control, et cetera) to improve HCWSN performance is largely lacking. In this paper, the information gleaned from an extensive literature survey is shared in an effort to fortify the knowledge base for the communication aspect of HCWSNs. We highlight the major currently existing prototype HCWSNs and also provide the details of their routing protocol characteristics. We also explore the current state of the art in medium access control (MAC) protocols for WSNs, for the purpose of seeking an energy efficient solution that is robust to mobility and delivers data in a timely fashion. Furthermore, we review a number of reliable transport layer protocols, including a network coding based protocol from the literature, that are potentially suitable for delivering end-to-end reliability of data transmitted in HCWSNs. We identify the advantages and disadvantages of the reviewed MAC, routing, and transport layer protocols as they pertain to the design and implementation of a HCWSN. The findings from this literature survey will serve as a useful foundation for designing a reliable HCWSN and also contribute to the development and evaluation of protocols for improving the performance of future HCWSNs. Open issues that required further investigations are highlighted.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Penninkhof, Joan, E-mail: j.penninkhof@erasmusmc.nl; Quint, Sandra; Baaijens, Margreet
Purpose: To describe the practical use of the extended No Action Level (eNAL) setup correction protocol for breast cancer patients with surgical clips and evaluate its impact on the setup accuracy of both tumor bed and whole breast during simultaneously integrated boost treatments. Methods and Materials: For 80 patients, two orthogonal planar kilovoltage images and one megavoltage image (for the mediolateral beam) were acquired per fraction throughout the radiotherapy course. For setup correction, the eNAL protocol was applied, based on registration of surgical clips in the lumpectomy cavity. Differences with respect to application of a No Action Level (NAL) protocolmore » or no protocol were quantified for tumor bed and whole breast. The correlation between clip migration during the fractionated treatment and either the method of surgery or the time elapsed from last surgery was investigated. Results: The distance of the clips to their center of mass (COM), averaged over all clips and patients, was reduced by 0.9 {+-} 1.2 mm (mean {+-} 1 SD). Clip migration was similar between the group of patients starting treatment within 100 days after surgery (median, 53 days) and the group starting afterward (median, 163 days) (p = 0.20). Clip migration after conventional breast surgery (closing the breast superficially) or after lumpectomy with partial breast reconstructive techniques (sutured cavity). was not significantly different either (p = 0.22). Application of eNAL on clips resulted in residual systematic errors for the clips' COM of less than 1 mm in each direction, whereas the setup of the breast was within about 2 mm of accuracy. Conclusions: Surgical clips can be safely used for high-accuracy position verification and correction. Given compensation for time trends in the clips' COM throughout the treatment course, eNAL resulted in better setup accuracies for both tumor bed and whole breast than NAL.« less
Development of wide area environment accelerator operation and diagnostics method
NASA Astrophysics Data System (ADS)
Uchiyama, Akito; Furukawa, Kazuro
2015-08-01
Remote operation and diagnostic systems for particle accelerators have been developed for beam operation and maintenance in various situations. Even though fully remote experiments are not necessary, the remote diagnosis and maintenance of the accelerator is required. Considering remote-operation operator interfaces (OPIs), the use of standard protocols such as the hypertext transfer protocol (HTTP) is advantageous, because system-dependent protocols are unnecessary between the remote client and the on-site server. Here, we have developed a client system based on WebSocket, which is a new protocol provided by the Internet Engineering Task Force for Web-based systems, as a next-generation Web-based OPI using the Experimental Physics and Industrial Control System Channel Access protocol. As a result of this implementation, WebSocket-based client systems have become available for remote operation. Also, as regards practical application, the remote operation of an accelerator via a wide area network (WAN) faces a number of challenges, e.g., the accelerator has both experimental device and radiation generator characteristics. Any error in remote control system operation could result in an immediate breakdown. Therefore, we propose the implementation of an operator intervention system for remote accelerator diagnostics and support that can obviate any differences between the local control room and remote locations. Here, remote-operation Web-based OPIs, which resolve security issues, are developed.
NASA Astrophysics Data System (ADS)
Jeng, Albert; Chang, Li-Chung; Chen, Sheng-Hui
There are many protocols proposed for protecting Radio Frequency Identification (RFID) system privacy and security. A number of these protocols are designed for protecting long-term security of RFID system using symmetric key or public key cryptosystem. Others are designed for protecting user anonymity and privacy. In practice, the use of RFID technology often has a short lifespan, such as commodity check out, supply chain management and so on. Furthermore, we know that designing a long-term security architecture to protect the security and privacy of RFID tags information requires a thorough consideration from many different aspects. However, any security enhancement on RFID technology will jack up its cost which may be detrimental to its widespread deployment. Due to the severe constraints of RFID tag resources (e. g., power source, computing power, communication bandwidth) and open air communication nature of RFID usage, it is a great challenge to secure a typical RFID system. For example, computational heavy public key and symmetric key cryptography algorithms (e. g., RSA and AES) may not be suitable or over-killed to protect RFID security or privacy. These factors motivate us to research an efficient and cost effective solution for RFID security and privacy protection. In this paper, we propose a new effective generic binary tree based key agreement protocol (called BKAP) and its variations, and show how it can be applied to secure the low cost and resource constraint RFID system. This BKAP is not a general purpose key agreement protocol rather it is a special purpose protocol to protect privacy, un-traceability and anonymity in a single RFID closed system domain.
Oakley, Paul A.; Harrison, Donald D.; Harrison, Deed E.; Haas, Jason W.
2005-01-01
BACKGROUND Although practice protocols exist for SMT and functional rehabilitation, no practice protocols exist for structural rehabilitation. Traditional chiropractic practice guidelines have been limited to acute and chronic pain treatment, with limited inclusion of functional and exclusion of structural rehabilitation procedures. OBJECTIVE (1) To derive an evidence-based practice protocol for structural rehabilitation from publications on Clinical Biomechanics of Posture (CBP®) methods, and (2) to compare the evidence for Diversified, SMT, and CBP®. METHODS Clinical control trials utilizing CBP® methods and spinal manipulative therapy (SMT) were obtained from searches in Mantis, CINAHL, and Index Medicus. Using data from SMT review articles, evidence for Diversified Technique (as taught in chiropractic colleges), SMT, and CBP® were rated and compared. RESULTS From the evidence from Clinical Control Trials on SMT and CBP®, there is very little evidence support for Diversified (our rating = 18), as taught in chiropractic colleges, for the treatment of pain subjects, while CBP® (our rating = 46) and SMT for neck pain (rating = 58) and low back pain (our rating = 202) have evidence-based support. CONCLUSIONS While CBP® Technique has approximately as much evidence-based support as SMT for neck pain, CBP® has more evidence to support its methods than the Diversified technique taught in chiropractic colleges, but not as much as SMT for low back pain. The evolution of chiropractic specialization has occurred, and doctors providing structural-based chiropractic care require protocol guidelines for patient quality assurance and standardization. A structural rehabilitation protocol was developed based on evidence from CBP® publications. PMID:17549209
Ho, Kendall; Marsden, Julian; Jarvis-Selinger, Sandra; Novak Lauscher, Helen; Kamal, Noreen; Stenstrom, Rob; Sweet, David; Goldman, Ran D; Innes, Grant
2012-07-12
Emergency medicine departments within several organizations are now advocating the adoption of early intervention guidelines for patients with the signs and symptoms of sepsis. This proposed research will lead to a comprehensive understanding of how diverse emergency department (ED) sites across British Columbia (BC), Canada, engage in a quality improvement collaborative to lead to improvements in time-based process measures and clinical outcomes for septic patients in EDs. To address the challenge of sepsis management, in 2007, the BC Ministry of Health began working with emergency health professionals, including health administrators, to establish a provincial ED collaborative: Evidence to Excellence (E2E). The E2E initiative employs the Institute for Healthcare Improvement (IHI) model and is supported by a Web-based community of practice (CoP) in emergency medicine. It aims to (1) support clinicians in accessing and applying evidence to clinical practice in emergency medicine, (2) support system change and clinical process improvement, and (3) develop resources and strategies to facilitate knowledge translation and process improvement. Improving sepsis management is one of the central foci of the E2E initiative. The primary purpose of our research is to investigate whether the application of sepsis management protocols leads to improved time-based process measures and clinical outcomes for patients presenting to EDs with sepsis. Also, we seek to investigate the implementation of sepsis protocols among different EDs. For example: (1) How can sepsis protocols be harmonized among different EDs? (2) What are health professionals' perspectives on interprofessional collaboration with various EDs? and (3) What are the factors affecting the level of success among EDs? Lastly, working in collaboration with the BC Ministry of Health as our policy-maker partner, the research will investigate how the demonstrated efficacy of this research can be applied on a provincial and national level to establish a template for policy makers from other jurisdictions to translate knowledge into action for EDs. This research study will employ the IHI model for improvement, incorporate the principles of participatory action research, and use the E2E online CoP to engage ED practitioners (eg, physicians, nurses, and administrators, exchanging ideas, engaging in discussions, sharing resources, and amalgamating knowledge) from across BC to (1) share the evidence of early intervention in sepsis, (2) adapt the evidence to their patterns of practice, (3) develop a common set of orders for implementing the sepsis pathway, and (4) agree on common indicators to measure clinical outcomes. Our hypothesis is that combining the social networking ability of an electronic CoP and its inherent knowledge translation capacity with the structured project management of the IHI model will result in widespread and sustained improvement in the emergency and overall care of patients with severe sepsis presenting to EDs throughout BC.
Henderson, Joanna L; Chaim, Gloria; Brownlie, E B
2017-08-01
Many youth with significant mental health (MH) and/or substance use (SU) difficulties do not receive specialized services. Collaboration between service providers, researchers, and other stakeholders is essential to improve youth service system capacity to provide evidence-based services to meet the complex array of needs of youth. Facilitators and barriers of implementing evidence-based practice have been identified, but few studies provide examples of the processes of collaboration and implementation for youth MH services. This study explicates the design features and implementation processes of a project to improve screening activities in youth services. These processes supported the building of 16 collaborative networks of service providers from diverse youth-serving sectors (e.g., MH, youth justice, child welfare) in urban, rural, suburban, and remote Canadian communities. These cross-sectoral networks implemented an evidence-based practice (screening youth aged 12-24 years for MH and SU problems using the Global Assessment of Individual Needs-Short Screener [GAIN-SS]) across their services. Materials and resources were provided by a centralized research team. Core project components were standardized and adherence to these components was monitored. Over 800 service providers participated in cross-sectoral networks, capacity-building events, joint data analysis, or interpretation and recommendation sessions. Across the 89 participating agencies, service providers for 84% of participating youth implemented the evidence-based practice accurately in accordance with project protocols, with 98% of positive screens reviewed and addressed according to organizational protocols. Service provider feedback is reported. Facilitators, barriers, and implications of promoting implementation of evidence-based practices across sites and sectors are discussed. (PsycINFO Database Record (c) 2017 APA, all rights reserved).
Relativistic quantum private database queries
NASA Astrophysics Data System (ADS)
Sun, Si-Jia; Yang, Yu-Guang; Zhang, Ming-Ou
2015-04-01
Recently, Jakobi et al. (Phys Rev A 83, 022301, 2011) suggested the first practical private database query protocol (J-protocol) based on the Scarani et al. (Phys Rev Lett 92, 057901, 2004) quantum key distribution protocol. Unfortunately, the J-protocol is just a cheat-sensitive private database query protocol. In this paper, we present an idealized relativistic quantum private database query protocol based on Minkowski causality and the properties of quantum information. Also, we prove that the protocol is secure in terms of the user security and the database security.
Ellis, Isabelle; Howard, Peter; Larson, Ann; Robertson, Jeanette
2005-01-01
This article examines the process of translating evidence into practice using a facilitation model developed by the Western Australian Centre for Evidence Based Nursing and Midwifery. Using the conceptual framework Promoting Action on Research Implementation in Health Services (PARIHS), the aims of the study were (1) to explore the relative and combined importance of context and facilitation in the successful implementation of a new evidence-based clinical practice protocol and (2) to examine the establishment of more lasting change to individuals and organizations that resulted in greater incorporation of the principles of evidence-based practice (EBP). A pre-workshop, semi-structured telephone survey with 16 nurse managers in six rural hospitals; a summative evaluation immediately post-workshop with 54 participants; and follow-up, semi-structured interviews with 23 workshop participants. The contexts in each of the participating hospitals were very different; of the six hospitals, only one had not implemented the new protocol. Five had reviewed their practices and brought them in line with the protocol developed at the workshop. The rate of adoption varied considerably from 2 weeks to months. The participants reported being better informed about EBP in general and were positive about their ability to improve their practice and search more efficiently for best practice information. Underlying motivations for protocol development should be included in the PARIHS framework. IMPLICATIONS FOR EDUCATION: Good facilitation appears to be more influential than context in overcoming the barriers to the uptake of EBP.
Brown, Kerry A; de Wit, Liesbeth; Timotijevic, Lada; Sonne, Anne-Mette; Lähteenmäki, Liisa; Brito Garcia, Noé; Jeruszka-Bielak, Marta; Sicińska, Ewa; Moore, Alana N; Lawrence, Mark; Raats, Monique M
2015-06-01
Transparent evidence-based decision making has been promoted worldwide to engender trust in science and policy making. Yet, little attention has been given to transparency implementation. The degree of transparency (focused on how uncertain evidence was handled) during the development of folate and vitamin D Dietary Reference Values was explored in three a priori defined areas: (i) value request; (ii) evidence evaluation; and (iii) final values. Qualitative case studies (semi-structured interviews and desk research). A common protocol was used for data collection, interview thematic analysis and reporting. Results were coordinated via cross-case synthesis. Australia and New Zealand, Netherlands, Nordic countries, Poland, Spain and UK. Twenty-one interviews were conducted in six case studies. Transparency of process was not universally observed across countries or areas of the recommendation setting process. Transparency practices were most commonly seen surrounding the request to develop reference values (e.g. access to risk manager/assessor problem formulation discussions) and evidence evaluation (e.g. disclosure of risk assessor data sourcing/evaluation protocols). Fewer transparency practices were observed to assist with handling uncertainty in the evidence base during the development of quantitative reference values. Implementation of transparency policies may be limited by a lack of dedicated resources and best practice procedures, particularly to assist with the latter stages of reference value development. Challenges remain regarding the best practice for transparently communicating the influence of uncertain evidence on the final reference values. Resolving this issue may assist the evolution of nutrition risk assessment and better inform the recommendation setting process.
NASA Astrophysics Data System (ADS)
Hashim, S.; Karim, M. K. A.; Bakar, K. A.; Sabarudin, A.; Chin, A. W.; Saripan, M. I.; Bradley, D. A.
2016-09-01
The magnitude of radiation dose in computed tomography (CT) depends on the scan acquisition parameters, investigated herein using an anthropomorphic phantom (RANDO®) and thermoluminescence dosimeters (TLD). Specific interest was in the organ doses resulting from CT thorax examination, the specific k coefficient for effective dose estimation for particular protocols also being determined. For measurement of doses representing five main organs (thyroid, lung, liver, esophagus and skin), TLD-100 (LiF:Mg, Ti) were inserted into selected holes in a phantom slab. Five CT thorax protocols were investigated, one routine (R1) and four that were modified protocols (R2 to R5). Organ doses were ranked from greatest to least, found to lie in the order: thyroid>skin>lung>liver>breast. The greatest dose, for thyroid at 25 mGy, was that in use of R1 while the lowest, at 8.8 mGy, was in breast tissue using R3. Effective dose (E) was estimated using three standard methods: the International Commission on Radiological Protection (ICRP)-103 recommendation (E103), the computational phantom CT-EXPO (E(CTEXPO)) method, and the dose-length product (DLP) based approach. E103 k factors were constant for all protocols, 8% less than that of the universal k factor. Due to inconsistency in tube potential and pitch factor the k factors from CTEXPO were found to vary between 0.015 and 0.010 for protocols R3 and R5. With considerable variation between scan acquisition parameters and organ doses, optimization of practice is necessary in order to reduce patient organ dose.
TH-E-209-00: Radiation Dose Monitoring and Protocol Management
DOE Office of Scientific and Technical Information (OSTI.GOV)
NONE
Radiation dose monitoring solutions have opened up new opportunities for medical physicists to be more involved in modern clinical radiology practices. In particular, with the help of comprehensive radiation dose data, data-driven protocol management and informed case follow up are now feasible. Significant challenges remain however and the problems faced by medical physicists are highly heterogeneous. Imaging systems from multiple vendors and a wide range of vintages co-exist in the same department and employ data communication protocols that are not fully standardized or implemented making harmonization complex. Many different solutions for radiation dose monitoring have been implemented by imaging facilitiesmore » over the past few years. Such systems are based on commercial software, home-grown IT solutions, manual PACS data dumping, etc., and diverse pathways can be used to bring the data to impact clinical practice. The speakers will share their experiences with creating or tailoring radiation dose monitoring/management systems and procedures over the past few years, which vary significantly in design and scope. Topics to cover: (1) fluoroscopic dose monitoring and high radiation event handling from a large academic hospital; (2) dose monitoring and protocol optimization in pediatric radiology; and (3) development of a home-grown IT solution and dose data analysis framework. Learning Objectives: Describe the scope and range of radiation dose monitoring and protocol management in a modern radiology practice Review examples of data available from a variety of systems and how it managed and conveyed. Reflect on the role of the physicist in radiation dose awareness.« less
TH-E-209-02: Dose Monitoring and Protocol Optimization: The Pediatric Perspective
DOE Office of Scientific and Technical Information (OSTI.GOV)
MacDougall, R.
Radiation dose monitoring solutions have opened up new opportunities for medical physicists to be more involved in modern clinical radiology practices. In particular, with the help of comprehensive radiation dose data, data-driven protocol management and informed case follow up are now feasible. Significant challenges remain however and the problems faced by medical physicists are highly heterogeneous. Imaging systems from multiple vendors and a wide range of vintages co-exist in the same department and employ data communication protocols that are not fully standardized or implemented making harmonization complex. Many different solutions for radiation dose monitoring have been implemented by imaging facilitiesmore » over the past few years. Such systems are based on commercial software, home-grown IT solutions, manual PACS data dumping, etc., and diverse pathways can be used to bring the data to impact clinical practice. The speakers will share their experiences with creating or tailoring radiation dose monitoring/management systems and procedures over the past few years, which vary significantly in design and scope. Topics to cover: (1) fluoroscopic dose monitoring and high radiation event handling from a large academic hospital; (2) dose monitoring and protocol optimization in pediatric radiology; and (3) development of a home-grown IT solution and dose data analysis framework. Learning Objectives: Describe the scope and range of radiation dose monitoring and protocol management in a modern radiology practice Review examples of data available from a variety of systems and how it managed and conveyed. Reflect on the role of the physicist in radiation dose awareness.« less
Applying Adult Ventilator-associated Pneumonia Bundle Evidence to the Ventilated Neonate.
Weber, Carla D
2016-06-01
Ventilator-associated pneumonia (VAP) in neonates can be reduced by implementing preventive care practices. Implementation of a group, or bundle, of evidence-based practices that improve processes of care has been shown to be cost-effective and to have better outcomes than implementation of individual single practices. The purpose of this article is to describe a safe, effective, and efficient neonatal VAP prevention protocol developed for caregivers in the neonatal intensive care unit (NICU). Improved understanding of VAP causes, effects of care practices, and rationale for interventions can help reduce VAP risk to neonatal patients. In order to improve care practices to affect VAP rates, initial and annual education occurred on improved protocol components after surveying staff practices and auditing documentation compliance. In 2009, a tertiary care level III NICU in the Midwestern United States had 14 VAP cases. Lacking evidence-based VAP prevention practices for neonates, effective adult strategies were modified to meet the complex needs of the ventilated neonate. A protocol was developed over time and resulted in an annual decrease in VAP until rates were zero for 20 consecutive months from October 2012 to May 2014. This article describes a VAP prevention protocol developed to address care practices surrounding hand hygiene, intubation, feeding, suctioning, positioning, oral care, and respiratory equipment in the NICU. Implementation of this VAP prevention protocol in other facilities with appropriate monitoring and tracking would provide broader support for standardization of care. Individual components of this VAP protocol could be studied to strengthen the inclusion of each; however, bundled interventions are often considered stronger when implemented as a whole.
Li, Jian; Yang, Yu-Guang; Chen, Xiu-Bo; Zhou, Yi-Hua; Shi, Wei-Min
2016-08-19
A novel quantum private database query protocol is proposed, based on passive round-robin differential phase-shift quantum key distribution. Compared with previous quantum private database query protocols, the present protocol has the following unique merits: (i) the user Alice can obtain one and only one key bit so that both the efficiency and security of the present protocol can be ensured, and (ii) it does not require to change the length difference of the two arms in a Mach-Zehnder interferometer and just chooses two pulses passively to interfere with so that it is much simpler and more practical. The present protocol is also proved to be secure in terms of the user security and database security.
A Third-Party E-Payment Protocol Based on Quantum Group Blind Signature
NASA Astrophysics Data System (ADS)
Zhang, Jian-Zhong; Yang, Yuan-Yuan; Xie, Shu-Cui
2017-09-01
A third-party E-payment protocol based on quantum group blind signature is proposed in this paper. Our E-payment protocol could protect user's anonymity as the traditional E-payment systems do, and also have unconditional security which the classical E-payment systems can not provide. To achieve that, quantum key distribution, one-time pad and quantum group blind signature are adopted in our scheme. Furthermore, if there were a dispute, the manager Trent can identify who tells a lie.
Olswang, Lesley B.; Greenslade, Kathryn; Pinder, Gay Lloyd; Dowden, Patricia; Madden, Jodi
2017-01-01
Purpose This research investigated a first step in implementing the dynamic assessment (DA) component of Triadic Gaze Intervention (Olswang, Feuerstein, Pinder, & Dowden, 2013; Olswang et al., 2014), an evidence-based protocol for teaching early signals of communication to young children with physical disabilities. Clinician attitudes about adopting external evidence into practice and implementation fidelity in DA protocol delivery were examined following training. Method Seven early intervention clinicians from multiple disciplines were trained to deliver the four essential elements of the DA protocol: (a) provide communication opportunity, (b) recognize child's potentially communicative signal, (c) shape child's signal toward triadic gaze, and (d) reinforce with play. Clinician attitude regarding adopting evidence into practice was measured at baseline and follow-up, with the Evidence-Based Practice Attitude Scale (Aarons, 2004). Implementation fidelity in delivering the protocol was measured for adherence (accuracy) and competence (quality) during trial implementation. Results Clinicians' attitudes about trying new evidence that at first was perceived as incongruent with their practice improved over the course of the research. Clinicians demonstrated strong adherence to the DA protocol; however, competence varied across clinicians and appeared related to child performance. Conclusions The results provided insight into moving Triadic Gaze Intervention into practice and yielded valuable information regarding the implementation process, with implications for future research. PMID:28525577
Orientation and mobility training for adults with low vision: a new standardized approach
Ballemans, Judith; Kempen, Gertrudis IJM
2013-01-01
Background: Orientation and mobility training aims to facilitate independent functioning and participation in the community of people with low vision. Objective: (1) To gain insight into current practice regarding orientation and mobility training, and (2) to develop a theory-driven standardized version of this training to teach people with low vision how to orientate and be safe in terms of mobility. Study of current practice: Insight into current practice and its strengths and weaknesses was obtained via reviewing the literature, observing orientation and mobility training sessions (n = 5) and interviewing Dutch mobility trainers (n = 18). Current practice was mainly characterized by an individual, face-to-face orientation and mobility training session concerning three components: crystallizing client’s needs, providing information and training skills. A weakness was the lack of a (structured) protocol based on evidence or theory. New theory-driven training: A new training protocol comprising two face-to-face sessions and one telephone follow-up was developed. Its content is partly based on the components of current practice, yet techniques from theoretical frameworks (e.g. social-cognitive theory and self-management) are incorporated. Discussion: A standardized, tailor-made orientation and mobility training for using the identification cane is available. The new theory-driven standardized training is generally applicable for teaching the use of every low-vision device. Its acceptability and effectiveness are currently being evaluated in a randomized controlled trial. PMID:22734105
DOE Office of Scientific and Technical Information (OSTI.GOV)
Zhang, D.
Radiation dose monitoring solutions have opened up new opportunities for medical physicists to be more involved in modern clinical radiology practices. In particular, with the help of comprehensive radiation dose data, data-driven protocol management and informed case follow up are now feasible. Significant challenges remain however and the problems faced by medical physicists are highly heterogeneous. Imaging systems from multiple vendors and a wide range of vintages co-exist in the same department and employ data communication protocols that are not fully standardized or implemented making harmonization complex. Many different solutions for radiation dose monitoring have been implemented by imaging facilitiesmore » over the past few years. Such systems are based on commercial software, home-grown IT solutions, manual PACS data dumping, etc., and diverse pathways can be used to bring the data to impact clinical practice. The speakers will share their experiences with creating or tailoring radiation dose monitoring/management systems and procedures over the past few years, which vary significantly in design and scope. Topics to cover: (1) fluoroscopic dose monitoring and high radiation event handling from a large academic hospital; (2) dose monitoring and protocol optimization in pediatric radiology; and (3) development of a home-grown IT solution and dose data analysis framework. Learning Objectives: Describe the scope and range of radiation dose monitoring and protocol management in a modern radiology practice Review examples of data available from a variety of systems and how it managed and conveyed. Reflect on the role of the physicist in radiation dose awareness.« less
ERIC Educational Resources Information Center
Love, Tyler S.; Wells, John G.; Parkes, Kelly A.
2017-01-01
A modified Reformed Teaching Observation Protocol (RTOP) (Piburn & Sawada, 2000) instrument was used to separately examine eight technology and engineering (T&E) educators' teaching of science, and T&E content and practices, as called for by the "Standards for Technological Literacy: Content for the Study of Technology"…
Quantum key distribution protocol based on contextuality monogamy
NASA Astrophysics Data System (ADS)
Singh, Jaskaran; Bharti, Kishor; Arvind
2017-06-01
The security of quantum key distribution (QKD) protocols hinges upon features of physical systems that are uniquely quantum in nature. We explore the role of quantumness, as qualified by quantum contextuality, in a QKD scheme. A QKD protocol based on the Klyachko-Can-Binicioğlu-Shumovsky (KCBS) contextuality scenario using a three-level quantum system is presented. We explicitly show the unconditional security of the protocol by a generalized contextuality monogamy relationship based on the no-disturbance principle. This protocol provides a new framework for QKD which has conceptual and practical advantages over other protocols.
Li, Jian; Yang, Yu-Guang; Chen, Xiu-Bo; Zhou, Yi-Hua; Shi, Wei-Min
2016-01-01
A novel quantum private database query protocol is proposed, based on passive round-robin differential phase-shift quantum key distribution. Compared with previous quantum private database query protocols, the present protocol has the following unique merits: (i) the user Alice can obtain one and only one key bit so that both the efficiency and security of the present protocol can be ensured, and (ii) it does not require to change the length difference of the two arms in a Mach-Zehnder interferometer and just chooses two pulses passively to interfere with so that it is much simpler and more practical. The present protocol is also proved to be secure in terms of the user security and database security. PMID:27539654
Jung, Christian; Tepohl, Lena; Tholen, Reina; Beitzel, Knut; Buchmann, Stefan; Gottfried, Thomas; Grim, Casper; Mauch, Bettina; Krischak, Gert; Ortmann, Hans; Schoch, Christian; Mauch, Frieder
2018-01-01
Tears and lesions of the rotator cuff are a frequent cause of shoulder pain and disability. Surgical repair of the rotator cuff is a valuable procedure to improve shoulder function and decrease pain. However, there is no consensus concerning the rehabilitation protocol following surgery. To review and evaluate current rehabilitation contents and protocols after rotator cuff repair by reviewing the existing scientific literature and providing an overview of the clinical practice of selected German Society of Shoulder and Elbow Surgery e. V. (DVSE) shoulder experts. A literature search for the years 2004-2014 was conducted in relevant databases and bibliographies including the Guidelines International Network, National Guidelines, PubMed, Cochrane CentralRegister of Controlled Trials, Cochrane Database of Systematic Reviews, and the Physiotherapy Evidence Database. In addition, 63 DVSE experts were contacted via online questionnaire. A total of 17 studies, four reviews and one guideline fulfilled the inclusion criteria. Based on these results and the obtained expert opinions, a four-phase rehabilitation protocol could be developed.
Using an intervention mapping approach to develop a discharge protocol for intensive care patients.
van Mol, Margo; Nijkamp, Marjan; Markham, Christine; Ista, Erwin
2017-12-19
Admission into an intensive care unit (ICU) may result in long-term physical, cognitive, and emotional consequences for patients and their relatives. The care of the critically ill patient does not end upon ICU discharge; therefore, integrated and ongoing care during and after transition to the follow-up ward is pivotal. This study described the development of an intervention that responds to this need. Intervention Mapping (IM), a six-step theory- and evidence-based approach, was used to guide intervention development. The first step, a problem analysis, comprised a literature review, six semi-structured telephone interviews with former ICU-patients and their relatives, and seven qualitative roundtable meetings for all eligible nurses (i.e., 135 specialized and 105 general ward nurses). Performance and change objectives were formulated in step two. In step three, theory-based methods and practical applications were selected and directed at the desired behaviors and the identified barriers. Step four designed a revised discharge protocol taking into account existing interventions. Adoption, implementation and evaluation of the new discharge protocol (IM steps five and six) are in progress and were not included in this study. Four former ICU patients and two relatives underlined the importance of the need for effective discharge information and supportive written material. They also reported a lack of knowledge regarding the consequences of ICU admission. 42 ICU and 19 general ward nurses identified benefits and barriers regarding discharge procedures using three vignettes framed by literature. Some discrepancies were found. For example, ICU nurses were skeptical about the impact of writing a lay summary despite extensive evidence of the known benefits for the patients. ICU nurses anticipated having insufficient skills, not knowing the patient well enough, and fearing legal consequences of their writings. The intervention was designed to target the knowledge, attitudes, self-efficacy, and perceived social influence. Building upon IM steps one to three, a concept discharge protocol was developed that is relevant and feasible within current daily practice. Intervention mapping provided a comprehensive framework to improve ICU discharge by guiding the development process of a theory- and empirically-based discharge protocol that is robust and useful in practice.
Cryptanalysis of an inter-bank E-payment protocol based on quantum proxy blind signature
NASA Astrophysics Data System (ADS)
Cai, Xiao-Qiu; Wei, Chun-Yan
2013-04-01
We analyze the security of an inter-bank E-payment protocol based on quantum proxy blind signature, and find that there is a security leak in the quantum channels of this protocol, which gives a chance for an outside opponent to launch a special denial-of-service attack. Furthermore, we show that the dishonest merchant can succeed to change the purchase information of the customer in this protocol.
Protocol-based care: the standardisation of decision-making?
Rycroft-Malone, Jo; Fontenla, Marina; Seers, Kate; Bick, Debra
2009-05-01
To explore how protocol-based care affects clinical decision-making. In the context of evidence-based practice, protocol-based care is a mechanism for facilitating the standardisation of care and streamlining decision-making through rationalising the information with which to make judgements and ultimately decisions. However, whether protocol-based care does, in the reality of practice, standardise decision-making is unknown. This paper reports on a study that explored the impact of protocol-based care on nurses' decision-making. Theoretically informed by realistic evaluation and the promoting action on research implementation in health services framework, a case study design using ethnographic methods was used. Two sites were purposively sampled; a diabetic and endocrine unit and a cardiac medical unit. Within each site, data collection included observation, postobservation semi-structured interviews with staff and patients, field notes, feedback sessions and document review. Data were inductively and thematically analysed. Decisions made by nurses in both sites were varied according to many different and interacting factors. While several standardised care approaches were available for use, in reality, a variety of information sources informed decision-making. The primary approach to knowledge exchange and acquisition was person-to-person; decision-making was a social activity. Rarely were standardised care approaches obviously referred to; nurses described following a mental flowchart, not necessarily linked to a particular guideline or protocol. When standardised care approaches were used, it was reported that they were used flexibly and particularised. While the logic of protocol-based care is algorithmic, in the reality of clinical practice, other sources of information supported nurses' decision-making process. This has significant implications for the political goal of standardisation. The successful implementation and judicious use of tools such as protocols and guidelines will likely be dependant on approaches that facilitate the development of nurses' decision-making processes in parallel to paying attention to the influence of context.
Research on a Banknote Printing Wastewater Monitoring System based on Wireless Sensor Network
NASA Astrophysics Data System (ADS)
Li, B. B.; Yuan, Z. F.
2006-10-01
In this paper, a banknote printing wastewater monitoring system based on WSN is presented in line with the system demands and actual condition of the worksite for a banknote printing factory. In Physical Layer, the network node is a nRF9e5-centric embedded instrument, which can realize the multi-function such as data collecting, status monitoring, wireless data transmission and so on. Limited by the computing capability, memory capability, communicating energy and others factors, it is impossible for the node to get every detail information of the network, so the communication protocol on WSN couldn't be very complicated. The competitive-based MACA (Multiple Access with Collision Avoidance) Protocol is introduced in MAC, which can decide the communication process and working mode of the nodes, avoid the collision of data transmission, hidden and exposed station problem of nodes. On networks layer, the routing protocol in charge of the transmitting path of the data, the networks topology structure is arranged based on address assignation. Accompanied with some redundant nodes, the network performances stabile and expandable. The wastewater monitoring system is a tentative practice of WSN theory in engineering. Now, the system has passed test and proved efficiently.
The Length of Child Anxiety Treatment in a Regional Health System.
Whiteside, Stephen P H; Ale, Chelsea M; Young, Brennan; Olsen, Mark W; Biggs, Bridget K; Gregg, Melissa S; Geske, Jennifer R; Homan, Kendra
2016-12-01
Anxiety disorders are often undertreated due to unsuccessful dissemination of evidence-based treatments (EBTs). Lack of empirical data regarding the typical length of treatment in clinical settings may hamper the development of clinically relevant protocols. The current study examined billing records for 335 children ages 7-17 years to quantify the treatment received for newly diagnosed anxiety disorders within a regional health system. The vast majority of patients did not receive a sufficient number of appointments to complete the typical cognitive behavioral therapy protocol or reach the sessions introducing exposure. Although half of the sample received pharmacotherapy, the vast majority received fewer follow-up appointments than participants in pharmacotherapy research studies. Further, the type of treatment (i.e., number of sessions and medication) differed depending on utilization of specialty care. These results underscore the need to develop brief and flexible EBT protocols that can be standardized and implemented in community practice.
Wang, Liangmin
2018-01-01
Today IoT integrate thousands of inter networks and sensing devices e.g., vehicular networks, which are considered to be challenging due to its high speed and network dynamics. The goal of future vehicular networks is to improve road safety, promote commercial or infotainment products and to reduce the traffic accidents. All these applications are based on the information exchange among nodes, so not only reliable data delivery but also the authenticity and credibility of the data itself are prerequisite. To cope with the aforementioned problem, trust management come up as promising candidate to conduct node’s transaction and interaction management, which requires distributed mobile nodes cooperation for achieving design goals. In this paper, we propose a trust-based routing protocol i.e., 3VSR (Three Valued Secure Routing), which extends the widely used AODV (Ad hoc On-demand Distance Vector) routing protocol and employs the idea of Sensing Logic-based trust model to enhance the security solution of VANET (Vehicular Ad-Hoc Network). The existing routing protocol are mostly based on key or signature-based schemes, which off course increases computation overhead. In our proposed 3VSR, trust among entities is updated frequently by means of opinion derived from sensing logic due to vehicles random topologies. In 3VSR the theoretical capabilities are based on Dirichlet distribution by considering prior and posterior uncertainty of the said event. Also by using trust recommendation message exchange, nodes are able to reduce computation and routing overhead. The simulated results shows that the proposed scheme is secure and practical. PMID:29538314
Sohail, Muhammad; Wang, Liangmin
2018-03-14
Today IoT integrate thousands of inter networks and sensing devices e.g., vehicular networks, which are considered to be challenging due to its high speed and network dynamics. The goal of future vehicular networks is to improve road safety, promote commercial or infotainment products and to reduce the traffic accidents. All these applications are based on the information exchange among nodes, so not only reliable data delivery but also the authenticity and credibility of the data itself are prerequisite. To cope with the aforementioned problem, trust management come up as promising candidate to conduct node's transaction and interaction management, which requires distributed mobile nodes cooperation for achieving design goals. In this paper, we propose a trust-based routing protocol i.e., 3VSR (Three Valued Secure Routing), which extends the widely used AODV (Ad hoc On-demand Distance Vector) routing protocol and employs the idea of Sensing Logic-based trust model to enhance the security solution of VANET (Vehicular Ad-Hoc Network). The existing routing protocol are mostly based on key or signature-based schemes, which off course increases computation overhead. In our proposed 3VSR, trust among entities is updated frequently by means of opinion derived from sensing logic due to vehicles random topologies. In 3VSR the theoretical capabilities are based on Dirichlet distribution by considering prior and posterior uncertainty of the said event. Also by using trust recommendation message exchange, nodes are able to reduce computation and routing overhead. The simulated results shows that the proposed scheme is secure and practical.
ERIC Educational Resources Information Center
Buchanan, Larry
1998-01-01
Addresses the use of e-mail for communication and collaborative projects in schools. Discusses the effectiveness of an e-mail system based on a UNIX host; problems with POP (post office protocol) client programs; and the new Internet Mail Access Protocol (IMAP) which addresses most of the shortcomings of the POP protocol while keeping advantages…
Wolfe, Marlene K; Gallandat, Karin; Daniels, Kyle; Desmarais, Anne Marie; Scheinman, Pamela; Lantagne, Daniele
2017-01-01
To prevent Ebola transmission, frequent handwashing is recommended in Ebola Treatment Units and communities. However, little is known about which handwashing protocol is most efficacious. We evaluated six handwashing protocols (soap and water, alcohol-based hand sanitizer (ABHS), and 0.05% sodium dichloroisocyanurate, high-test hypochlorite, and stabilized and non-stabilized sodium hypochlorite solutions) for 1) efficacy of handwashing on the removal and inactivation of non-pathogenic model organisms and, 2) persistence of organisms in rinse water. Model organisms E. coli and bacteriophage Phi6 were used to evaluate handwashing with and without organic load added to simulate bodily fluids. Hands were inoculated with test organisms, washed, and rinsed using a glove juice method to retrieve remaining organisms. Impact was estimated by comparing the log reduction in organisms after handwashing to the log reduction without handwashing. Rinse water was collected to test for persistence of organisms. Handwashing resulted in a 1.94-3.01 log reduction in E. coli concentration without, and 2.18-3.34 with, soil load; and a 2.44-3.06 log reduction in Phi6 without, and 2.71-3.69 with, soil load. HTH performed most consistently well, with significantly greater log reductions than other handwashing protocols in three models. However, the magnitude of handwashing efficacy differences was small, suggesting protocols are similarly efficacious. Rinse water demonstrated a 0.28-4.77 log reduction in remaining E. coli without, and 0.21-4.49 with, soil load and a 1.26-2.02 log reduction in Phi6 without, and 1.30-2.20 with, soil load. Chlorine resulted in significantly less persistence of E. coli in both conditions and Phi6 without soil load in rinse water (p<0.001). Thus, chlorine-based methods may offer a benefit of reducing persistence in rinse water. We recommend responders use the most practical handwashing method to ensure hand hygiene in Ebola contexts, considering the potential benefit of chlorine-based methods in rinse water persistence.
Linder, Lauri A; Gerdy, Cheryl; Abouzelof, Rouett; Wilson, Andrew
Children with cancer are a subset of patients with central lines with distinct risk factors for infection including periods of prolonged neutropenia and compromised mucous membrane integrity. This article relates the implementation of principles of practice-based evidence to identify interventions in addition to best practice maintenance care bundles to reduce central line-associated bloodstream infections involving viridans group streptococci and coagulase-negative staphylococci on an inpatient pediatric oncology unit. Review of individual events combined with review of current clinical practice guided the development of structured protocols emphasizing routine oral care and general supportive cares. Key principles of the protocols emphasized a 1-2-3 mnemonic and included daily bathing, twice daily oral care, and out-of-bed activity 3 times daily. Poisson regression identified a significant main effect for time period for central line-associated bloodstream infection rates involving both viridans group streptococci and coagulase-negative staphylococci. Significant differences were present between the preintervention baseline and implementation of the supportive care protocols. Project outcomes demonstrate the added value of using principles of practice-based evidence to guide the development of interventions to improve clinical care when evidence-based sources are limited.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Liu, B.
2016-06-15
Radiation dose monitoring solutions have opened up new opportunities for medical physicists to be more involved in modern clinical radiology practices. In particular, with the help of comprehensive radiation dose data, data-driven protocol management and informed case follow up are now feasible. Significant challenges remain however and the problems faced by medical physicists are highly heterogeneous. Imaging systems from multiple vendors and a wide range of vintages co-exist in the same department and employ data communication protocols that are not fully standardized or implemented making harmonization complex. Many different solutions for radiation dose monitoring have been implemented by imaging facilitiesmore » over the past few years. Such systems are based on commercial software, home-grown IT solutions, manual PACS data dumping, etc., and diverse pathways can be used to bring the data to impact clinical practice. The speakers will share their experiences with creating or tailoring radiation dose monitoring/management systems and procedures over the past few years, which vary significantly in design and scope. Topics to cover: (1) fluoroscopic dose monitoring and high radiation event handling from a large academic hospital; (2) dose monitoring and protocol optimization in pediatric radiology; and (3) development of a home-grown IT solution and dose data analysis framework. Learning Objectives: Describe the scope and range of radiation dose monitoring and protocol management in a modern radiology practice Review examples of data available from a variety of systems and how it managed and conveyed. Reflect on the role of the physicist in radiation dose awareness.« less
A realistic evaluation: the case of protocol-based care
2010-01-01
Background 'Protocol based care' was envisioned by policy makers as a mechanism for delivering on the service improvement agenda in England. Realistic evaluation is an increasingly popular approach, but few published examples exist, particularly in implementation research. To fill this gap, within this paper we describe the application of a realistic evaluation approach to the study of protocol-based care, whilst sharing findings of relevance about standardising care through the use of protocols, guidelines, and pathways. Methods Situated between positivism and relativism, realistic evaluation is concerned with the identification of underlying causal mechanisms, how they work, and under what conditions. Fundamentally it focuses attention on finding out what works, for whom, how, and in what circumstances. Results In this research, we were interested in understanding the relationships between the type and nature of particular approaches to protocol-based care (mechanisms), within different clinical settings (context), and what impacts this resulted in (outcomes). An evidence review using the principles of realist synthesis resulted in a number of propositions, i.e., context, mechanism, and outcome threads (CMOs). These propositions were then 'tested' through multiple case studies, using multiple methods including non-participant observation, interviews, and document analysis through an iterative analysis process. The initial propositions (conjectured CMOs) only partially corresponded to the findings that emerged during analysis. From the iterative analysis process of scrutinising mechanisms, context, and outcomes we were able to draw out some theoretically generalisable features about what works, for whom, how, and what circumstances in relation to the use of standardised care approaches (refined CMOs). Conclusions As one of the first studies to apply realistic evaluation in implementation research, it was a good fit, particularly given the growing emphasis on understanding how context influences evidence-based practice. The strengths and limitations of the approach are considered, including how to operationalise it and some of the challenges. This approach provided a useful interpretive framework with which to make sense of the multiple factors that were simultaneously at play and being observed through various data sources, and for developing explanatory theory about using standardised care approaches in practice. PMID:20504293
Instruments for Assessment of Instructional Practices in Standards-Based Teaching
NASA Astrophysics Data System (ADS)
Wainwright, Camille L.
2006-12-01
This paper describes the development of two forms of an instrument used as a classroom observation protocol, designed to document the impact of reform-based professional development with undergraduate mathematics and science faculty and its impact on the resultant preparation of teachers (PreK 12). A rationale for the development and utilization of this instrument (known as the OTOP, or the Oregon Teacher Observation Protocol) is provided. Constructed upon review of the research on teaching and standards documents in mathematics and science, the protocol formed the basis for data collection in a three-year longitudinal study of teaching practice among early career teachers as well as undergraduate college faculty. In addition, this paper suggests further applications of the observation protocol beyond the original research study purpose. One prominent use for the protocol is in supervisor observations of mathematics and science student teachers.
Suppression of work fluctuations by optimal control: An approach based on Jarzynski's equality
NASA Astrophysics Data System (ADS)
Xiao, Gaoyang; Gong, Jiangbin
2014-11-01
Understanding and manipulating work fluctuations in microscale and nanoscale systems are of both fundamental and practical interest. For example, aspects of work fluctuations will be an important factor in designing nanoscale heat engines. In this work, an optimal control approach directly exploiting Jarzynski's equality is proposed to effectively suppress the fluctuations in the work statistics, for systems (initially at thermal equilibrium) subject to a work protocol but isolated from a bath during the protocol. The control strategy is to minimize the deviations of individual values of e-β W from their ensemble average given by e-β Δ F, where W is the work, β is the inverse temperature, and Δ F is the free energy difference between two equilibrium states. It is further shown that even when the system Hamiltonian is not fully known, it is still possible to suppress work fluctuations through a feedback loop, by refining the control target function on the fly through Jarzynski's equality itself. Numerical experiments are based on linear and nonlinear parametric oscillators. Optimal control results for linear parametric oscillators are also benchmarked with early results based on shortcuts to adiabaticity.
The Aeronautical Data Link: Taxonomy, Architectural Analysis, and Optimization
NASA Technical Reports Server (NTRS)
Morris, A. Terry; Goode, Plesent W.
2002-01-01
The future Communication, Navigation, and Surveillance/Air Traffic Management (CNS/ATM) System will rely on global satellite navigation, and ground-based and satellite based communications via Multi-Protocol Networks (e.g. combined Aeronautical Telecommunications Network (ATN)/Internet Protocol (IP)) to bring about needed improvements in efficiency and safety of operations to meet increasing levels of air traffic. This paper will discuss the development of an approach that completely describes optimal data link architecture configuration and behavior to meet the multiple conflicting objectives of concurrent and different operations functions. The practical application of the approach enables the design and assessment of configurations relative to airspace operations phases. The approach includes a formal taxonomic classification, an architectural analysis methodology, and optimization techniques. The formal taxonomic classification provides a multidimensional correlation of data link performance with data link service, information protocol, spectrum, and technology mode; and to flight operations phase and environment. The architectural analysis methodology assesses the impact of a specific architecture configuration and behavior on the local ATM system performance. Deterministic and stochastic optimization techniques maximize architectural design effectiveness while addressing operational, technology, and policy constraints.
Two-dimensional distributed-phase-reference protocol for quantum key distribution
NASA Astrophysics Data System (ADS)
Bacco, Davide; Christensen, Jesper Bjerge; Castaneda, Mario A. Usuga; Ding, Yunhong; Forchhammer, Søren; Rottwitt, Karsten; Oxenløwe, Leif Katsuo
2016-12-01
Quantum key distribution (QKD) and quantum communication enable the secure exchange of information between remote parties. Currently, the distributed-phase-reference (DPR) protocols, which are based on weak coherent pulses, are among the most practical solutions for long-range QKD. During the last 10 years, long-distance fiber-based DPR systems have been successfully demonstrated, although fundamental obstacles such as intrinsic channel losses limit their performance. Here, we introduce the first two-dimensional DPR-QKD protocol in which information is encoded in the time and phase of weak coherent pulses. The ability of extracting two bits of information per detection event, enables a higher secret key rate in specific realistic network scenarios. Moreover, despite the use of more dimensions, the proposed protocol remains simple, practical, and fully integrable.
Two-dimensional distributed-phase-reference protocol for quantum key distribution.
Bacco, Davide; Christensen, Jesper Bjerge; Castaneda, Mario A Usuga; Ding, Yunhong; Forchhammer, Søren; Rottwitt, Karsten; Oxenløwe, Leif Katsuo
2016-12-22
Quantum key distribution (QKD) and quantum communication enable the secure exchange of information between remote parties. Currently, the distributed-phase-reference (DPR) protocols, which are based on weak coherent pulses, are among the most practical solutions for long-range QKD. During the last 10 years, long-distance fiber-based DPR systems have been successfully demonstrated, although fundamental obstacles such as intrinsic channel losses limit their performance. Here, we introduce the first two-dimensional DPR-QKD protocol in which information is encoded in the time and phase of weak coherent pulses. The ability of extracting two bits of information per detection event, enables a higher secret key rate in specific realistic network scenarios. Moreover, despite the use of more dimensions, the proposed protocol remains simple, practical, and fully integrable.
Two-dimensional distributed-phase-reference protocol for quantum key distribution
Bacco, Davide; Christensen, Jesper Bjerge; Castaneda, Mario A. Usuga; Ding, Yunhong; Forchhammer, Søren; Rottwitt, Karsten; Oxenløwe, Leif Katsuo
2016-01-01
Quantum key distribution (QKD) and quantum communication enable the secure exchange of information between remote parties. Currently, the distributed-phase-reference (DPR) protocols, which are based on weak coherent pulses, are among the most practical solutions for long-range QKD. During the last 10 years, long-distance fiber-based DPR systems have been successfully demonstrated, although fundamental obstacles such as intrinsic channel losses limit their performance. Here, we introduce the first two-dimensional DPR-QKD protocol in which information is encoded in the time and phase of weak coherent pulses. The ability of extracting two bits of information per detection event, enables a higher secret key rate in specific realistic network scenarios. Moreover, despite the use of more dimensions, the proposed protocol remains simple, practical, and fully integrable. PMID:28004821
A Generalized Model of E-trading for GSR Fair Exchange Protocol
NASA Astrophysics Data System (ADS)
Konar, Debajyoti; Mazumdar, Chandan
In this paper we propose a generalized model of E-trading for the development of GSR Fair Exchange Protocols. Based on the model, a method is narrated to implement E-trading protocols that ensure fairness in true sense without using an additional trusted third party for which either party has to pay. The model provides the scope to include the correctness of the product, money atomicity and customer's anonymity properties within E-trading protocol. We conclude this paper by indicating the area of applicability for our model.
Pharmaceutical care for patients with COPD in Belgium and views on protocol implementation.
Tommelein, Eline; Tollenaere, Kathleen; Mehuys, Els; Boussery, Koen
2014-08-01
A protocol-based pharmaceutical care program (the PHARMACOP-protocol) focusing on patient counselling during prescription filling has shown to be effective in patients with chronic obstructive pulmonary disease (COPD). However, implementation of this protocol in daily practice has not yet been studied. To describe current implementation level of the items included in the PHARMACOP-protocol in Belgian community pharmacies and to evaluate pharmacists' perspectives on the implementation of this protocol in daily practice. A cross-sectional study was conducted from April to June 2012, in randomly selected community pharmacies in Flanders. Pharmacists were questionned using structured interviews. 125 pharmacies were contacted and 80 managing pharmacists (64 %) participated. In >70 % of pharmacies, 4/7 protocol items for first prescriptions and 3/5 protocol items for follow-up prescriptions were already routinely implemented. For first and follow-up prescriptions, respectively 39 (49 %) and 34 pharmacists (43 %) stated they would need to spend at least 5 min extra to offer optimal patient counselling. Most mentioned barriers preventing protocol implementation included lack of time (80 %), no integration in pharmacy software (61 %) and too much administrative burden (58 %). Approximately 50 % of the PHARMACOP-protocol items are currently routinely provided in Belgian community pharmacies. Nearly all interviewed pharmacists are willing to implement the protocol fully or partially in daily practice.
Protocols for pressure ulcer prevention: are they evidence-based?
Chaves, Lidice M; Grypdonck, Mieke H F; Defloor, Tom
2010-03-01
This study is a report of a study to determine the quality of protocols for pressure ulcer prevention in home care in the Netherlands. If pressure ulcer prevention protocols are evidence-based and practitioners use them correctly in practice, this will result a reduction in pressure ulcers. Very little is known about the evidence-based content and quality of the pressure ulcer prevention protocols. In 2008, current pressure ulcer prevention protocols from 24 home-care agencies in the Netherlands were evaluated. A checklist developed and validated by two pressure ulcer prevention experts was used to assess the quality of the protocols, and weighted and unweighted quality scores were computed and analysed using descriptive statistics. The 24 pressure ulcer prevention protocols had a mean weighted quality score of 63.38 points out of a maximum of 100 (sd 5). The importance of observing the skin at the pressure points at least once a day was emphasized in 75% of the protocols. Only 42% correctly warned against the use of materials that were 'less effective or that could potentially cause harm'. Pressure ulcer prevention commands a reasonable amount of attention in home care, but the incidence of pressure ulcers and lack of a consistent, standardized document for use in actual practice indicate a need for systematic implementation of national pressure ulcer prevention standards in the Netherlands to ensure adherence to the established protocols.
Carleton, R Nicholas; Teale Sapach, Michelle J N; Oriet, Chris; LeBouthillier, Daniel M
2017-01-01
Social anxiety disorder (SAD) models posit vigilance for external social threat cues and exacerbated self-focused attention as key in disorder development and maintenance. Evidence indicates a modified dot-probe protocol may reduce symptoms of SAD; however, the efficacy when compared to a standard protocol and long-term maintenance of treatment gains remains unclear. Furthermore, the efficacy of such protocols on SAD-related constructs remains relatively unknown. The current investigation clarified these associations using a randomized control trial replicating and extending previous research. Participants with SAD (n = 113; 71% women) were randomized to complete a standard (i.e. control) or modified (i.e. active) dot-probe protocol consisting of 15-min sessions twice weekly for four weeks. Self-reported symptoms were measured at baseline, post-treatment, and 4-month and 8-month follow-ups. Hierarchical linear modeling indicated significant self-reported reductions in symptoms of social anxiety, fear of negative evaluation, trait anxiety, and depression, but no such reductions in fear of positive evaluation. Symptom changes did not differ based on condition and were maintained at 8-month follow-up. Attentional biases during the dot-probe task were not related to symptom change. Overall, our results replicate support for the efficacy of both protocols in reducing symptoms of SAD and specific related constructs, and suggest a role of exposure, expectancy, or practice effects, rather than attention modification, in effecting such reductions. The current results also support distinct relationships between fears of negative and positive evaluation and social anxiety. Further research focused on identifying the mechanisms of change in attention modification protocols appears warranted.
Bowers, Gillian; Bowers, John
2018-01-01
Digital services are often regarded as a solution to the growing demands on primary care services. Provision of a tool offering advice to support self-management as well as the ability to digitally consult with a General Practitioner (GP) has the potential to alleviate some of the pressure on primary care. This paper reports on a Phase II, 6-month evaluation of eConsult, a web-based triage and consultation system that was piloted across 11 GP practices across Scotland. Through a multi-method approach the evaluation explored eConsult use across practices, exposing both barriers and facilitators to its adoption. Findings suggest that expectations that eConsult would offer an additional and alternative method of accessing GP services were largely met. However, there is less certainty that it has fulfilled expectations of promoting self-help. In addition, low uptake meant that evaluation of current effectiveness was difficult for practices to quantify. The presence of an eConsult champion(s) within the practice was seen to be a significant factor in ensuring successful integration of the tool. A lack of patient and staff engagement, insufficient support and lack of protocols around processes were seen as barriers to its success. PMID:29724040
Lu, Zhengwu
2010-01-01
To identify key challenges and propose technical considerations in designing electronic case report form (eCRF) for post-marketing studies, the author undertakes a comprehensive literature review of peer reviewed and grey literature to assess the key aspects, processes, standards, recommendations, and best practices in designing eCRFs based on industry experience in designing and supporting electronic data capture (EDC) studies. Literature search using strings on MEDLINE and PUBMED returned few papers directly related to CRF design. Health informatics and general practice journals were searched and results reviewed. Many conference, government commission, health professional and special interests group websites provide relevant information from practical experience - summarization of this information is presented. Further, we presented a list of concrete technical considerations in dealing with EDC technology/system limitations based on literature assessment and industry implementation experience. It is recognized that cross-functional teams be involved in eCRF design process and decision making. To summarize the keys in designing eCRFs to address post-market study safety and pharmacovigilance needs, the first is to identify required data elements from the study protocol supporting data analyses and reporting requirements. Secondly, accepted best practices, CDASH & CDISC guidelines, and company internal or therapeutic unit standard should be considered and applied. Coding (MedDRA & WHODD) mapping should be managed and implemented as well when possible. Finally, we need to be on top of the EDC technologies, challenge the technologies, drive EDC improvement via working with vendors, and utilize the technologies to drive clinical effectiveness. Copyright (c) 2009 Elsevier Inc. All rights reserved.
Shastri, Shefali M; Barbieri, Elizabeth; Kligman, Isaac; Schoyer, Katherine D; Davis, Owen K; Rosenwaks, Zev
2011-02-01
To evaluate in vitro fertilization (IVF) cycle outcomes in young poor responders treated with a luteal estradiol/gonadotropin-releasing hormone antagonist (E(2)/ANT) protocol versus an oral contraceptive pill microdose leuprolide protocol (OCP-MDL). Retrospective cohort. Academic practice. Poor responders: 186 women, aged <35 years undergoing IVF with either E(2)/ANT or OCP-MDL protocols. None. Clinical pregnancies, oocytes retrieved, cancellation rate. Patients in the E(2)/ANT group had a greater gonadotropin requirement (71.9 ± 22.2 vs. 57.6 ± 25.7) and lower E(2) level (1,178.6 ± 668 vs. 1,627 ± 889), yet achieved similar numbers of oocytes retrieved and fertilized, and a greater number of embryos transferred (2.3 ± 0.9 vs. 2.0 ± 1.1) with a better mean grade (2.14 ± .06 vs. 2.7 ± 1.8) compared with the OCP/MDL group. The E2/ANT group exhibited a trend toward improved implantation rates (30.5% vs. 21.1%) and ongoing pregnancy rates per started cycle: 44 out of 117 (37%) versus 17 out of 69 (25%). Poor responders aged <35 years may be treated with the aggressive E(2)/ANT protocol to improve cycle outcomes. Both protocols remain viable options for this group. Adequately powered, randomized clinical comparison appears justified. Copyright © 2011 American Society for Reproductive Medicine. Published by Elsevier Inc. All rights reserved.
NASA Technical Reports Server (NTRS)
Hou, Tan-Hung
2014-01-01
For the fabrication of resin matrix fiber reinforced composite laminates, a workable cure cycle (i.e., temperature and pressure profiles as a function of processing time) is needed and is critical for achieving void-free laminate consolidation. Design of such a cure cycle is not trivial, especially when dealing with reactive matrix resins. An empirical "trial and error" approach has been used as common practice in the composite industry. Such an approach is not only costly, but also ineffective at establishing the optimal processing conditions for a specific resin/fiber composite system. In this report, a rational "processing science" based approach is established, and a universal cure cycle design protocol is proposed. Following this protocol, a workable and optimal cure cycle can be readily and rationally designed for most reactive resin systems in a cost effective way. This design protocol has been validated through experimental studies of several reactive polyimide composites for a wide spectrum of usage that has been documented in the previous publications.
Upgrading physical activity counselling in primary care in the Netherlands.
Verwey, Renée; van der Weegen, Sanne; Spreeuwenberg, Marieke; Tange, Huibert; van der Weijden, Trudy; de Witte, Luc
2016-06-01
The systematic development of a counselling protocol in primary care combined with a monitoring and feedback tool to support chronically ill patients to achieve a more active lifestyle. An iterative user-centred design method was used to develop a counselling protocol: the Self-management Support Programme (SSP). The needs and preferences of future users of this protocol were identified by analysing the literature, through qualitative research, and by consulting an expert panel. The counselling protocol is based on the Five A's model. Practice nurses apply motivational interviewing, risk communication and goal setting to support self-management of patients in planning how to achieve a more active lifestyle. The protocol consists of a limited number of behaviour change consultations intertwined with interaction with and responses from the It's LiFe! monitoring and feedback tool. This tool provides feedback on patients' physical activity levels via an app on their smartphone. A summary of these levels is automatically sent to the general practice so that practice nurses can respond to this information. A SSP to stimulate physical activity was defined based on user requirements of care providers and patients, followed by a review by a panel of experts. By following this user-centred approach, the organization of care was carefully taken into account, which has led to a practical and affordable protocol for physical activity counselling combined with mobile technology. © The Author 2014. Published by Oxford University Press. All rights reserved. For Permissions, please email: journals.permissions@oup.com.
An eCK-Secure Authenticated Key Exchange Protocol without Random Oracles
NASA Astrophysics Data System (ADS)
Moriyama, Daisuke; Okamoto, Tatsuaki
This paper presents a (PKI-based) two-pass authenticated key exchange (AKE) protocol that is secure in the extended Canetti-Krawczyk (eCK) security model. The security of the proposed protocol is proven without random oracles (under three assumptions), and relies on no implementation techniques such as a trick by LaMacchia, Lauter and Mityagin (so-called the NAXOS trick). Since an AKE protocol that is eCK-secure under a NAXOS-like implementation trick will be no more eCK-secure if some realistic information leakage occurs through side-channel attacks, it has been an important open problem how to realize an eCK-secure AKE protocol without using the NAXOS tricks (and without random oracles).
The quest to standardize hemodialysis care.
Hegbrant, Jörgen; Gentile, Giorgio; Strippoli, Giovanni F M
2011-01-01
A large global dialysis provider's core activities include providing dialysis care with excellent quality, ensuring a low variability across the clinic network and ensuring strong focus on patient safety. In this article, we summarize the pertinent components of the quality assurance and safety program of the Diaverum Renal Services Group. Concerning medical performance, the key components of a successful quality program are setting treatment targets; implementing evidence-based guidelines and clinical protocols; consistently, regularly, prospectively and accurately collecting data from all clinics in the network; processing collected data to provide feedback to clinics in a timely manner, incorporating information on interclinic and intercountry variations; and revising targets, guidelines and clinical protocols based on sound scientific data. The key activities for ensuring patient safety include a standardized approach to education, i.e. a uniform education program including control of theoretical knowledge and clinical competencies; implementation of clinical policies and procedures in the organization in order to reduce variability and potential defects in clinic practice; and auditing of clinical practice on a regular basis. By applying a standardized and systematic continuous quality improvement approach throughout the entire organization, it has been possible for Diaverum to progressively improve medical performance and ensure patient safety. Copyright © 2011 S. Karger AG, Basel.
Federal Register 2010, 2011, 2012, 2013, 2014
2012-05-14
... practice recommendations on emergency alerting systems such as promoting E9-1-1 reliability and alerting platforms--Emergency Alert System and Common Alerting Protocol. DATES: June 6, 2012. ADDRESSES: Federal... Advisory Committee that will provide recommendations to the FCC regarding best practices and actions the...
SU-E-I-68: Practical Considerations On Implementation of the Image Gently Pediatric CT Protocols
DOE Office of Scientific and Technical Information (OSTI.GOV)
Zhang, J; Adams, C; Lumby, C
Purpose: One limitation associated with the Image Gently pediatric CT protocols is practical implementation of the recommended manual techniques. Inconsistency as a result of different practice is a possibility among technologist. An additional concern is the added risk of data error that would result in over or underexposure. The Automatic Exposure Control (AEC) features automatically reduce radiation for children. However, they do not work efficiently for the patients of very small size and relative large size. This study aims to implement the Image Gently pediatric CT protocols in the practical setting while maintaining the use of AEC features for pediatricmore » patients of varying size. Methods: Anthropomorphological abdomen phantoms were scanned in a CT scanner using the Image Gently pediatric protocols, the AEC technique with a fixed adult baseline, and automatic protocols with various baselines. The baselines were adjusted corresponding to patient age, weight and posterioranterior thickness to match the Image Gently pediatric CT manual techniques. CTDIvol was recorded for each examination. Image noise was measured and recorded for image quality comparison. Clinical images were evaluated by pediatric radiologists. Results: By adjusting vendor default baselines used in the automatic techniques, radiation dose and image quality can match those of the Image Gently manual techniques. In practice, this can be achieved by dividing pediatric patients into three major groups for technologist reference: infant, small child, and large child. Further division can be done but will increase the number of CT protocols. For each group, AEC can efficiently adjust acquisition techniques for children. This implementation significantly overcomes the limitation of the Image Gently manual techniques. Conclusion: Considering the effectiveness in clinical practice, Image Gently Pediatric CT protocols can be implemented in accordance with AEC techniques, with adjusted baselines, to achieve the goal of providing the most appropriate radiation dose for pediatric patients of varying sizes.« less
Movement towards transdiagnostic psychotherapeutic practices for the affective disorders.
Gros, Daniel F; Allan, Nicholas P; Szafranski, Derek D
2016-08-01
Evidence-based cognitive behavioural therapy (CBT) practices were first developed in the 1960s. Over the decades, refinements and alternative symptom foci resulted in the development of several CBT protocols/manuals for each of the many disorders, especially in the affective disorders. Although shown to be effective in highly trained providers, the proliferation of CBT protocols also has shown to demonstrate challenges in dissemination and implementation efforts due to the sheer number of CBT protocols and their related training requirements (eg, 6 months per protocol) and their related cost (eg, over US$2000 each; lost days/hours at work). To address these concerns, newer transdiagnostic CBT protocols have been developed to reduce the number of disorder-specific CBT protocols needed to treat patients with affective disorders. Transdiagnostic treatments are based on the notion that various disorder-specific CBT protocols contain important but overlapping treatment components that can be distilled into a single treatment and therefore address the symptoms and comorbidities across all of the disorders at once. 3 examples of transdiagnostic treatments include group CBT of anxiety, unified protocol for transdiagnostic treatment for emotional disorders and transdiagnostic behaviour therapy. Each transdiagnostic protocol is designed for a different set of disorders, contains a varied amount of CBT treatment components and is tested in different types of samples. However, together, these 3 transdiagnostic psychotherapies represent the future of CBT practice. Published by the BMJ Publishing Group Limited. For permission to use (where not already granted under a licence) please go to http://www.bmj.com/company/products-services/rights-and-licensing/
ERIC Educational Resources Information Center
McMullen, Mary Benson; Elicker, James; Goetze, Giselle; Huang, Hsin-Hui; Lee, Sun-Mi; Mathers, Carrie; Wen, Xiaoli; Yang, Heayoung
2006-01-01
A team of researchers used a collaborative assessment protocol to compare the self-reported teaching beliefs of a convenience sample of preschool teachers (N = 57) to their documentable practices (i.e., practices that could be observed, recorded, and categorized using a deductive strategy). Data were examined from survey instruments, detailed…
Aiello, Lloyd Paul; Beck, Roy W; Bressler, Neil M.; Browning, David J.; Chalam, KV; Davis, Matthew; Ferris, Frederick L; Glassman, Adam; Maturi, Raj; Stockdale, Cynthia R.; Topping, Trexler
2011-01-01
Objective Describe the underlying principles used to develop a web-based algorithm that incorporated intravitreal anti-vascular endothelial growth factor (anti-VEGF) treatment for diabetic macular edema (DME) in a Diabetic Retinopathy Clinical Research Network (DRCR.net) randomized clinical trial. Design Discussion of treatment protocol for DME. Participants Subjects with vision loss from DME involving the center of the macula. Methods The DRCR.net created an algorithm incorporating anti-VEGF injections in a comparative effectiveness randomized clinical trial evaluating intravitreal ranibizumab with prompt or deferred (≥24 weeks) focal/grid laser in eyes with vision loss from center-involved DME. Results confirmed that intravitreal ranibizumab with prompt or deferred laser provides superior visual acuity outcomes, compared with prompt laser alone through at least 2 years. Duplication of this algorithm may not be practical for clinical practice. In order to share their opinion on how ophthalmologists might emulate the study protocol, participating DRCR.net investigators developed guidelines based on the algorithm's underlying rationale. Main Outcome Measures Clinical guidelines based on a DRCR.net protocol. Results The treatment protocol required real time feedback from a web-based data entry system for intravitreal injections, focal/grid laser, and follow-up intervals. Guidance from this system indicated whether treatment was required or given at investigator discretion and when follow-up should be scheduled. Clinical treatment guidelines, based on the underlying clinical rationale of the DRCR.net protocol, include repeating treatment monthly as long as there is improvement in edema compared with the previous month, or until the retina is no longer thickened. If thickening recurs or worsens after discontinuing treatment, treatment is resumed. Conclusions Duplication of the approach used in the DRCR.net randomized clinical trial to treat DME involving the center of the macula with intravitreal ranibizumab may not be practical in clinical practice, but likely can be emulated based on an understanding of the underlying rationale for the study protocol. Inherent differences between a web-based treatment algorithm and a clinical approach may lead to differences in outcomes that are impossible to predict. The closer the clinical approach is to the algorithm used in the study, the more likely the outcomes will be similar to those published. PMID:22136692
Aiello, Lloyd Paul; Beck, Roy W; Bressler, Neil M; Browning, David J; Chalam, K V; Davis, Matthew; Ferris, Frederick L; Glassman, Adam R; Maturi, Raj K; Stockdale, Cynthia R; Topping, Trexler M
2011-12-01
To describe the underlying principles used to develop a web-based algorithm that incorporated intravitreal anti-vascular endothelial growth factor (anti-VEGF) treatment for diabetic macular edema (DME) in a Diabetic Retinopathy Clinical Research Network (DRCR.net) randomized clinical trial. Discussion of treatment protocol for DME. Subjects with vision loss resulting from DME involving the center of the macula. The DRCR.net created an algorithm incorporating anti-VEGF injections in a comparative effectiveness randomized clinical trial evaluating intravitreal ranibizumab with prompt or deferred (≥24 weeks) focal/grid laser treatment in eyes with vision loss resulting from center-involved DME. Results confirmed that intravitreal ranibizumab with prompt or deferred laser provides superior visual acuity outcomes compared with prompt laser alone through at least 2 years. Duplication of this algorithm may not be practical for clinical practice. To share their opinion on how ophthalmologists might emulate the study protocol, participating DRCR.net investigators developed guidelines based on the algorithm's underlying rationale. Clinical guidelines based on a DRCR.net protocol. The treatment protocol required real-time feedback from a web-based data entry system for intravitreal injections, focal/grid laser treatment, and follow-up intervals. Guidance from this system indicated whether treatment was required or given at investigator discretion and when follow-up should be scheduled. Clinical treatment guidelines, based on the underlying clinical rationale of the DRCR.net protocol, include repeating treatment monthly as long as there is improvement in edema compared with the previous month or until the retina is no longer thickened. If thickening recurs or worsens after discontinuing treatment, treatment is resumed. Duplication of the approach used in the DRCR.net randomized clinical trial to treat DME involving the center of the macula with intravitreal ranibizumab may not be practical in clinical practice, but likely can be emulated based on an understanding of the underlying rationale for the study protocol. Inherent differences between a web-based treatment algorithm and a clinical approach may lead to differences in outcomes that are impossible to predict. The closer the clinical approach is to the algorithm used in the study, the more likely the outcomes will be similar to those published. Proprietary or commercial disclosure may be found after the references. Copyright © 2011 American Academy of Ophthalmology. Published by Elsevier Inc. All rights reserved.
Butler, Ashleigh; Hall, Helen; Copnell, Beverley
2016-06-01
The qualitative systematic review is a rapidly developing area of nursing research. In order to present trustworthy, high-quality recommendations, such reviews should be based on a review protocol to minimize bias and enhance transparency and reproducibility. Although there are a number of resources available to guide researchers in developing a quantitative review protocol, very few resources exist for qualitative reviews. To guide researchers through the process of developing a qualitative systematic review protocol, using an example review question. The key elements required in a systematic review protocol are discussed, with a focus on application to qualitative reviews: Development of a research question; formulation of key search terms and strategies; designing a multistage review process; critical appraisal of qualitative literature; development of data extraction techniques; and data synthesis. The paper highlights important considerations during the protocol development process, and uses a previously developed review question as a working example. This paper will assist novice researchers in developing a qualitative systematic review protocol. By providing a worked example of a protocol, the paper encourages the development of review protocols, enhancing the trustworthiness and value of the completed qualitative systematic review findings. Qualitative systematic reviews should be based on well planned, peer reviewed protocols to enhance the trustworthiness of results and thus their usefulness in clinical practice. Protocols should outline, in detail, the processes which will be used to undertake the review, including key search terms, inclusion and exclusion criteria, and the methods used for critical appraisal, data extraction and data analysis to facilitate transparency of the review process. Additionally, journals should encourage and support the publication of review protocols, and should require reference to a protocol prior to publication of the review results. © 2016 Sigma Theta Tau International.
Schnackers, Marlous; Beckers, Laura; Janssen-Potten, Yvonne; Aarts, Pauline; Rameckers, Eugène; van der Burg, Jan; de Groot, Imelda; Smeets, Rob; Geurts, Sander; Steenbergen, Bert
2018-04-18
Home-based training is considered an important intervention in rehabilitation of children with unilateral cerebral palsy. Despite consensus on the value of home-based upper limb training, no evidence-based best practice exists. Promoting compliance of children to adhere to an intensive program while keeping parental stress levels low is an important challenge when designing home-based training programs. Incorporating implicit motor learning principles emerges to be a promising method to resolve this challenge. Here we describe two protocols for home-based bimanual training programs, one based on implicit motor learning principles and one based on explicit motor learning principles, for children with unilateral spastic cerebral palsy aged 2 through 7 years. Children receive goal-oriented, task-specific bimanual training in their home environment from their parents for 3.5 h/week for 12 weeks according to an individualized program. Parents will be intensively coached by a multidisciplinary team, consisting of a pediatric therapist and remedial educationalist. Both programs consist of a preparation phase (goal setting, introductory meetings with coaching professionals, design of individualized program, instruction of parents, home visit) and home-based training phase (training, video-recordings, registrations, and telecoaching and home visits by the coaching team). The programs contrast with respect to the teaching strategy, i.e. how the parents support their child during training. In both programs parents provide their child with instructions and feedback that focus on the activity (i.e. task-oriented) or the result of the activity (i.e. result-oriented). However, in the explicit program parents are in addition instructed to give exact instructions and feedback on the motor performance of the bimanual activities, whereas in the implicit program the use of both hands and the appropriate motor performance of the activity are elicited via manipulation of the organization of the activities. With the protocols described here, we aim to take a next step in the development of much needed evidence-based home-based training programs for children with unilateral cerebral palsy.
Furlong, Lisa M; Morris, Meg E; Erickson, Shane; Serry, Tanya A
2016-11-29
Although mobile apps are readily available for speech sound disorders (SSD), their validity has not been systematically evaluated. This evidence-based appraisal will critically review and synthesize current evidence on available therapy apps for use by children with SSD. The main aims are to (1) identify the types of apps currently available for Android and iOS mobile phones and tablets, and (2) to critique their design features and content using a structured quality appraisal tool. This protocol paper presents and justifies the methods used for a systematic review of mobile apps that provide intervention for use by children with SSD. The primary outcomes of interest are (1) engagement, (2) functionality, (3) aesthetics, (4) information quality, (5) subjective quality, and (6) perceived impact. Quality will be assessed by 2 certified practicing speech-language pathologists using a structured quality appraisal tool. Two app stores will be searched from the 2 largest operating platforms, Android and iOS. Systematic methods of knowledge synthesis shall include searching the app stores using a defined procedure, data extraction, and quality analysis. This search strategy shall enable us to determine how many SSD apps are available for Android and for iOS compatible mobile phones and tablets. It shall also identify the regions of the world responsible for the apps' development, the content and the quality of offerings. Recommendations will be made for speech-language pathologists seeking to use mobile apps in their clinical practice. This protocol provides a structured process for locating apps and appraising the quality, as the basis for evaluating their use in speech pathology for children in English-speaking nations. ©Lisa M Furlong, Meg E Morris, Shane Erickson, Tanya A Serry. Originally published in JMIR Research Protocols (http://www.researchprotocols.org), 29.11.2016.
Clinical decision support systems in child and adolescent psychiatry: a systematic review.
Koposov, Roman; Fossum, Sturla; Frodl, Thomas; Nytrø, Øystein; Leventhal, Bennett; Sourander, Andre; Quaglini, Silvana; Molteni, Massimo; de la Iglesia Vayá, María; Prokosch, Hans-Ulrich; Barbarini, Nicola; Milham, Michael Peter; Castellanos, Francisco Xavier; Skokauskas, Norbert
2017-11-01
Psychiatric disorders are amongst the most prevalent and impairing conditions in childhood and adolescence. Unfortunately, it is well known that general practitioners (GPs) and other frontline health providers (i.e., child protection workers, public health nurses, and pediatricians) are not adequately trained to address these ubiquitous problems (Braddick et al. Child and Adolescent mental health in Europe: infrastructures, policy and programmes, European Communities, 2009; Levav et al. Eur Child Adolesc Psychiatry 13:395-401, 2004). Advances in technology may offer a solution to this problem with clinical decision support systems (CDSS) that are designed to help professionals make sound clinical decisions in real time. This paper offers a systematic review of currently available CDSS for child and adolescent mental health disorders prepared according to the PRISMA-Protocols (Preferred Reporting Items for Systematic Reviews and Meta-Analyses Protocols). Applying strict eligibility criteria, the identified studies (n = 5048) were screened. Ten studies, describing eight original clinical decision support systems for child and adolescent psychiatric disorders, fulfilled inclusion criteria. Based on this systematic review, there appears to be a need for a new, readily available CDSS for child neuropsychiatric disorder which promotes evidence-based, best practices, while enabling consideration of national variation in practices by leveraging data-reuse to generate predictions regarding treatment outcome, addressing a broader cluster of clinical disorders, and targeting frontline practice environments.
A Trusted Third-Party E-Payment Protocol Based on Quantum Blind Signature Without Entanglement
NASA Astrophysics Data System (ADS)
Guo, Xi; Zhang, Jian-Zhong; Xie, Shu-Cui
2018-06-01
In this paper, we present a trusted third-party e-payment protocol which is designed based on quantum blind signature without entanglement. The security and verifiability of our scheme are guaranteed by using single-particle unitary operation, quantum key distribution (QKD) protocol and one-time pad. Furthermore, once there is a dispute among the participants, it can be solved with the assistance of the third-party platform which is reliant.
A Third-Party E-payment Protocol Based on Quantum Multi-proxy Blind Signature
NASA Astrophysics Data System (ADS)
Niu, Xu-Feng; Zhang, Jian-Zhong; Xie, Shu-Cui; Chen, Bu-Qing
2018-05-01
A third-party E-payment protocol is presented in this paper. It is based on quantum multi-proxy blind signature. Adopting the techniques of quantum key distribution, one-time pad and quantum multi-proxy blind signature, our third-party E-payment system could protect user's anonymity as the traditional E-payment systems do, and also have unconditional security which the classical E-payment systems can not provide. Furthermore, compared with the existing quantum E-payment systems, the proposed system could support the E-payment which using the third-party platforms.
ERIC Educational Resources Information Center
Sawada, Daiyo; Piburn, Michael D.; Judson, Eugene; Turley, Jeff; Falconer, Kathleen; Benford, Russell; Bloom, Irene
2002-01-01
Describes the Reformed Teaching Observation Protocol (RTOP), a 25-item classroom observation protocol that is standards-based, inquiry-oriented, and student-centered. Provides the definition for reform and the basis for evaluation of the Arizona Collaborative for Excellence in the Preparation of Teachers (ACEPT). Concludes that reform, as defined…
Schacht Hansen, M; Dørup, J
2001-01-01
The Wireless Application Protocol technology implemented in newer mobile phones has built-in facilities for handling much of the information processing needed in clinical work. To test a practical approach we ported a relational database of the Danish pharmaceutical catalogue to Wireless Application Protocol using open source freeware at all steps. We used Apache 1.3 web software on a Linux server. Data containing the Danish pharmaceutical catalogue were imported from an ASCII file into a MySQL 3.22.32 database using a Practical Extraction and Report Language script for easy update of the database. Data were distributed in 35 interrelated tables. Each pharmaceutical brand name was given its own card with links to general information about the drug, active substances, contraindications etc. Access was available through 1) browsing therapeutic groups and 2) searching for a brand name. The database interface was programmed in the server-side scripting language PHP3. A free, open source Wireless Application Protocol gateway to a pharmaceutical catalogue was established to allow dial-in access independent of commercial Wireless Application Protocol service providers. The application was tested on the Nokia 7110 and Ericsson R320s cellular phones. We have demonstrated that Wireless Application Protocol-based access to a dynamic clinical database can be established using open source freeware. The project opens perspectives for a further integration of Wireless Application Protocol phone functions in clinical information processing: Global System for Mobile communication telephony for bilateral communication, asynchronous unilateral communication via e-mail and Short Message Service, built-in calculator, calendar, personal organizer, phone number catalogue and Dictaphone function via answering machine technology. An independent Wireless Application Protocol gateway may be placed within hospital firewalls, which may be an advantage with respect to security. However, if Wireless Application Protocol phones are to become effective tools for physicians, special attention must be paid to the limitations of the devices. Input tools of Wireless Application Protocol phones should be improved, for instance by increased use of speech control.
Hansen, Michael Schacht
2001-01-01
Background The Wireless Application Protocol technology implemented in newer mobile phones has built-in facilities for handling much of the information processing needed in clinical work. Objectives To test a practical approach we ported a relational database of the Danish pharmaceutical catalogue to Wireless Application Protocol using open source freeware at all steps. Methods We used Apache 1.3 web software on a Linux server. Data containing the Danish pharmaceutical catalogue were imported from an ASCII file into a MySQL 3.22.32 database using a Practical Extraction and Report Language script for easy update of the database. Data were distributed in 35 interrelated tables. Each pharmaceutical brand name was given its own card with links to general information about the drug, active substances, contraindications etc. Access was available through 1) browsing therapeutic groups and 2) searching for a brand name. The database interface was programmed in the server-side scripting language PHP3. Results A free, open source Wireless Application Protocol gateway to a pharmaceutical catalogue was established to allow dial-in access independent of commercial Wireless Application Protocol service providers. The application was tested on the Nokia 7110 and Ericsson R320s cellular phones. Conclusions We have demonstrated that Wireless Application Protocol-based access to a dynamic clinical database can be established using open source freeware. The project opens perspectives for a further integration of Wireless Application Protocol phone functions in clinical information processing: Global System for Mobile communication telephony for bilateral communication, asynchronous unilateral communication via e-mail and Short Message Service, built-in calculator, calendar, personal organizer, phone number catalogue and Dictaphone function via answering machine technology. An independent Wireless Application Protocol gateway may be placed within hospital firewalls, which may be an advantage with respect to security. However, if Wireless Application Protocol phones are to become effective tools for physicians, special attention must be paid to the limitations of the devices. Input tools of Wireless Application Protocol phones should be improved, for instance by increased use of speech control. PMID:11720946
Where Words Fail, Music Speaks: A Mixed Method Study of an Evidence-Based Music Protocol.
Daniels, Ruby A; Torres, David; Reeser, Cathy
2016-01-01
Despite numerous studies documenting the benefits of music, hospice social workers are often unfamiliar with evidence-based music practices that may improve end of life care. This mixed method study tested an intervention to teach hospice social workers and chaplains (N = 10) an evidence-based music protocol. Participants used the evidence-based practice (EBP) for 30 days, recording 226 journal entries that described observations of 84 patients and their families. There was a significant increase in EBP knowledge (35%). Prompting behavioral and emotional responses, music was described frequently as a catalyst that facilitated deeper dialogue between patients, families, social workers, and chaplains.
Learning from the best: Overcoming barriers to reforms-based elementary science teaching
NASA Astrophysics Data System (ADS)
Banchi, Heather May
This study explored the characteristics of elementary science teachers who employ reforms-based practices. Particular attention was paid to the consistency of teachers' practices and their beliefs, the impact of professional development experiences on practices, and how teachers mitigated barriers to reforms-based instruction. Understanding how successful elementary science teachers develop fills a gap in the science reforms literature. Participants included 7 upper elementary science teachers from six different schools. All schools were located within two suburban school districts in the south-Atlantic United States and data was collected during the spring of 2008. Data collection included use of the Reformed Teaching Observation Protocol (RTOP) to evaluate the level of reforms-based instruction, as well as 35 hours of classroom observation field notes and 21 hours of audio-taped teacher interviews. The variety of data sources allowed for triangulation of evidence. The RTOP was analyzed using descriptive statistics and classroom observations and interview data were analyzed using Erickson's (1986) guidelines for analytic induction. Findings indicated (a) reforms-based elementary science teaching was attainable, (b) beliefs and practices were consistent and both reflected reforms-based philosophies and practices, (c) formal professional development experiences were limited and did not foster reforms-based practices, (d) informal professional development pursued by teachers had a positive impact on practices, (e) barriers to reforms-based instruction were present but mitigated by strong beliefs and practical strategies like curriculum integration. These findings suggest that there are common, salient characteristics of reforms-based teachers' beliefs, practices, and professional development experiences. These commonalities contribute to an understanding of how reforms-based teachers develop, and inform efforts to move all elementary teachers in the direction of reforms-based science teaching.
E-novo: an automated workflow for efficient structure-based lead optimization.
Pearce, Bradley C; Langley, David R; Kang, Jia; Huang, Hongwei; Kulkarni, Amit
2009-07-01
An automated E-Novo protocol designed as a structure-based lead optimization tool was prepared through Pipeline Pilot with existing CHARMm components in Discovery Studio. A scaffold core having 3D binding coordinates of interest is generated from a ligand-bound protein structural model. Ligands of interest are generated from the scaffold using an R-group fragmentation/enumeration tool within E-Novo, with their cores aligned. The ligand side chains are conformationally sampled and are subjected to core-constrained protein docking, using a modified CHARMm-based CDOCKER method to generate top poses along with CDOCKER energies. In the final stage of E-Novo, a physics-based binding energy scoring function ranks the top ligand CDOCKER poses using a more accurate Molecular Mechanics-Generalized Born with Surface Area method. Correlation of the calculated ligand binding energies with experimental binding affinities were used to validate protocol performance. Inhibitors of Src tyrosine kinase, CDK2 kinase, beta-secretase, factor Xa, HIV protease, and thrombin were used to test the protocol using published ligand crystal structure data within reasonably defined binding sites. In-house Respiratory Syncytial Virus inhibitor data were used as a more challenging test set using a hand-built binding model. Least squares fits for all data sets suggested reasonable validation of the protocol within the context of observed ligand binding poses. The E-Novo protocol provides a convenient all-in-one structure-based design process for rapid assessment and scoring of lead optimization libraries.
Gallandat, Karin; Daniels, Kyle; Desmarais, Anne Marie; Scheinman, Pamela; Lantagne, Daniele
2017-01-01
To prevent Ebola transmission, frequent handwashing is recommended in Ebola Treatment Units and communities. However, little is known about which handwashing protocol is most efficacious. We evaluated six handwashing protocols (soap and water, alcohol-based hand sanitizer (ABHS), and 0.05% sodium dichloroisocyanurate, high-test hypochlorite, and stabilized and non-stabilized sodium hypochlorite solutions) for 1) efficacy of handwashing on the removal and inactivation of non-pathogenic model organisms and, 2) persistence of organisms in rinse water. Model organisms E. coli and bacteriophage Phi6 were used to evaluate handwashing with and without organic load added to simulate bodily fluids. Hands were inoculated with test organisms, washed, and rinsed using a glove juice method to retrieve remaining organisms. Impact was estimated by comparing the log reduction in organisms after handwashing to the log reduction without handwashing. Rinse water was collected to test for persistence of organisms. Handwashing resulted in a 1.94–3.01 log reduction in E. coli concentration without, and 2.18–3.34 with, soil load; and a 2.44–3.06 log reduction in Phi6 without, and 2.71–3.69 with, soil load. HTH performed most consistently well, with significantly greater log reductions than other handwashing protocols in three models. However, the magnitude of handwashing efficacy differences was small, suggesting protocols are similarly efficacious. Rinse water demonstrated a 0.28–4.77 log reduction in remaining E. coli without, and 0.21–4.49 with, soil load and a 1.26–2.02 log reduction in Phi6 without, and 1.30–2.20 with, soil load. Chlorine resulted in significantly less persistence of E. coli in both conditions and Phi6 without soil load in rinse water (p<0.001). Thus, chlorine-based methods may offer a benefit of reducing persistence in rinse water. We recommend responders use the most practical handwashing method to ensure hand hygiene in Ebola contexts, considering the potential benefit of chlorine-based methods in rinse water persistence. PMID:28231311
A proportional integral estimator-based clock synchronization protocol for wireless sensor networks.
Yang, Wenlun; Fu, Minyue
2017-11-01
Clock synchronization is an issue of vital importance in applications of WSNs. This paper proposes a proportional integral estimator-based protocol (EBP) to achieve clock synchronization for wireless sensor networks. As each local clock skew gradually drifts, synchronization accuracy will decline over time. Compared with existing consensus-based approaches, the proposed synchronization protocol improves synchronization accuracy under time-varying clock skews. Moreover, by restricting synchronization error of clock skew into a relative small quantity, it could reduce periodic re-synchronization frequencies. At last, a pseudo-synchronous implementation for skew compensation is introduced as synchronous protocol is unrealistic in practice. Numerical simulations are shown to illustrate the performance of the proposed protocol. Copyright © 2017 ISA. Published by Elsevier Ltd. All rights reserved.
Virues-Ortega, Javier; Montaño-Fidalgo, Montserrat; Froján-Parga, María Xesús; Calero-Elvira, Ana
2011-12-01
This study analyzes the interobserver agreement and hypothesis-based known-group validity of the Therapist's Verbal Behavior Category System (SISC-INTER). The SISC-INTER is a behavioral observation protocol comprised of a set of verbal categories representing putative behavioral functions of the in-session verbal behavior of a therapist (e.g., discriminative, reinforcing, punishing, and motivational operations). The complete therapeutic process of a clinical case of an individual with marital problems was recorded (10 sessions, 8 hours), and data were arranged in a temporal sequence using 10-min periods. Hypotheses based on the expected performance of the putative behavioral functions portrayed by the SISC-INTER codes across prevalent clinical activities (i.e., assessing, explaining, Socratic method, providing clinical guidance) were tested using autoregressive integrated moving average (ARIMA) models. Known-group validity analyses provided support to all hypotheses. The SISC-INTER may be a useful tool to describe therapist-client interaction in operant terms. The utility of reliable and valid protocols for the descriptive analysis of clinical practice in terms of verbal behavior is discussed. Copyright © 2011. Published by Elsevier Ltd.
Modeling the Sensitivity of Field Surveys for Detection of Environmental DNA (eDNA)
Schultz, Martin T.; Lance, Richard F.
2015-01-01
The environmental DNA (eDNA) method is the practice of collecting environmental samples and analyzing them for the presence of a genetic marker specific to a target species. Little is known about the sensitivity of the eDNA method. Sensitivity is the probability that the target marker will be detected if it is present in the water body. Methods and tools are needed to assess the sensitivity of sampling protocols, design eDNA surveys, and interpret survey results. In this study, the sensitivity of the eDNA method is modeled as a function of ambient target marker concentration. The model accounts for five steps of sample collection and analysis, including: 1) collection of a filtered water sample from the source; 2) extraction of DNA from the filter and isolation in a purified elution; 3) removal of aliquots from the elution for use in the polymerase chain reaction (PCR) assay; 4) PCR; and 5) genetic sequencing. The model is applicable to any target species. For demonstration purposes, the model is parameterized for bighead carp (Hypophthalmichthys nobilis) and silver carp (H. molitrix) assuming sampling protocols used in the Chicago Area Waterway System (CAWS). Simulation results show that eDNA surveys have a high false negative rate at low concentrations of the genetic marker. This is attributed to processing of water samples and division of the extraction elution in preparation for the PCR assay. Increases in field survey sensitivity can be achieved by increasing sample volume, sample number, and PCR replicates. Increasing sample volume yields the greatest increase in sensitivity. It is recommended that investigators estimate and communicate the sensitivity of eDNA surveys to help facilitate interpretation of eDNA survey results. In the absence of such information, it is difficult to evaluate the results of surveys in which no water samples test positive for the target marker. It is also recommended that invasive species managers articulate concentration-based sensitivity objectives for eDNA surveys. In the absence of such information, it is difficult to design appropriate sampling protocols. The model provides insights into how sampling protocols can be designed or modified to achieve these sensitivity objectives. PMID:26509674
Modeling the Sensitivity of Field Surveys for Detection of Environmental DNA (eDNA).
Schultz, Martin T; Lance, Richard F
2015-01-01
The environmental DNA (eDNA) method is the practice of collecting environmental samples and analyzing them for the presence of a genetic marker specific to a target species. Little is known about the sensitivity of the eDNA method. Sensitivity is the probability that the target marker will be detected if it is present in the water body. Methods and tools are needed to assess the sensitivity of sampling protocols, design eDNA surveys, and interpret survey results. In this study, the sensitivity of the eDNA method is modeled as a function of ambient target marker concentration. The model accounts for five steps of sample collection and analysis, including: 1) collection of a filtered water sample from the source; 2) extraction of DNA from the filter and isolation in a purified elution; 3) removal of aliquots from the elution for use in the polymerase chain reaction (PCR) assay; 4) PCR; and 5) genetic sequencing. The model is applicable to any target species. For demonstration purposes, the model is parameterized for bighead carp (Hypophthalmichthys nobilis) and silver carp (H. molitrix) assuming sampling protocols used in the Chicago Area Waterway System (CAWS). Simulation results show that eDNA surveys have a high false negative rate at low concentrations of the genetic marker. This is attributed to processing of water samples and division of the extraction elution in preparation for the PCR assay. Increases in field survey sensitivity can be achieved by increasing sample volume, sample number, and PCR replicates. Increasing sample volume yields the greatest increase in sensitivity. It is recommended that investigators estimate and communicate the sensitivity of eDNA surveys to help facilitate interpretation of eDNA survey results. In the absence of such information, it is difficult to evaluate the results of surveys in which no water samples test positive for the target marker. It is also recommended that invasive species managers articulate concentration-based sensitivity objectives for eDNA surveys. In the absence of such information, it is difficult to design appropriate sampling protocols. The model provides insights into how sampling protocols can be designed or modified to achieve these sensitivity objectives.
Wound-healing outcomes using standardized assessment and care in clinical practice.
Bolton, Laura; McNees, Patrick; van Rijswijk, Lia; de Leon, Jean; Lyder, Courtney; Kobza, Laura; Edman, Kelly; Scheurich, Anne; Shannon, Ron; Toth, Michelle
2004-01-01
Wound-healing outcomes applying standardized protocols have typically been measured within controlled clinical trials, not natural settings. Standardized protocols of wound care have been validated for clinical use, creating an opportunity to measure the resulting outcomes. Wound-healing outcomes were explored during clinical use of standardized validated protocols of care based on patient and wound assessments. This was a prospective multicenter study of wound-healing outcomes management in real-world clinical practice. Healing outcomes from March 26 to October 31, 2001, were recorded on patients in 3 long-term care facilities, 1 long-term acute care hospital, and 12 home care agencies for wounds selected by staff to receive care based on computer-generated validated wound care algorithms. After diagnosis, wound dimensions and status were assessed using a tool adapted from the Pressure Sore Status Toolfor use on all wounds. Wound, ostomy, and continence nursing professionals accessed consistent protocols of care, via telemedicine in home care or paper forms in long-term care. A physician entered assessments into a desktop computer in the wound clinic. Based on evidence that healing proceeds faster with fewer infections in environments without gauze, the protocols generally avoided gauze dressings. Most of the 767 wounds selected to receive the standardized-protocols of care were stage III-IV pressure ulcers (n = 373; mean healing time 62 days) or full-thickness venous ulcers (n = 124; mean healing time 57 days). Partial-thickness wounds healed faster than same-etiology full-thickness wounds. These results provide benchmarks for natural-setting healing outcomes and help to define and address wound care challenges. Outcomes primarily using nongauze protocols of care matched or surpassed best previously published results on similar wounds using gauze-based protocols of care, including protocols applying gauze impregnated with growth factors or other agents.
Witkiewitz, Katie; Bowen, Sarah; Harrop, Erin N; Douglas, Haley; Enkema, Matthew; Sedgwick, Carly
2014-04-01
Mindfulness-based treatments are growing in popularity among addiction treatment providers, and several studies suggest the efficacy of incorporating mindfulness practices into the treatment of addiction, including the treatment of substance use disorders and behavioral addictions (i.e., gambling). The current paper provides a review of theoretical models of mindfulness in the treatment of addiction and several hypothesized mechanisms of change. We provide an overview of mindfulness-based relapse prevention (MBRP), including session content, treatment targets, and client feedback from participants who have received MBRP in the context of empirical studies. Future research directions regarding operationalization and measurement, identifying factors that moderate treatment effects, and protocol adaptations for specific populations are discussed.
Ilott, Irene; Booth, Andrew; Rick, Jo; Patterson, Malcolm
2010-06-01
To explore how nurses, midwives and health visitors contribute to the development, implementation and audit of protocol-based care. Protocol-based care refers to the use of documents that set standards for clinical care processes with the intent of reducing unacceptable variations in practice. Documents such as protocols, clinical guidelines and care pathways underpin evidence-based practice throughout the world. An interpretative review using the five-stage systematic literature review process. The data sources were the British Nursing Index, CINAHL, EMBASE, MEDLINE and Web of Science from onset to 2005. The Journal of Integrated Care Pathways was hand searched (1997-June 2006). Thirty three studies about protocol-based care in the United Kingdom were appraised using the Qualitative Assessment and Review Instrument (QARI version 2). The literature was synthesized inductively and deductively, using an official 12-step guide for development as a framework for the deductive synthesis. Most papers were descriptive, offering practitioner knowledge and positive findings about a locally developed and owned protocol-based care. The majority were instigated in response to clinical need or service re-design. Development of protocol-based care was a non-linear, idiosyncratic process, with steps omitted, repeated or completed in a different order. The context and the multiple purposes of protocol-based care influenced the development process. Implementation and sustainability were rarely mentioned, or theorised as a change. The roles and activities of nurses were so understated as to be almost invisible. There were notable gaps in the literature about the resource use costs, the engagement of patients in the decision-making process, leadership and the impact of formalisation and new roles on inter-professional relations. Documents that standardise clinical care are part of the history of nursing as well as contemporary evidence-based care and expanded roles. Considering the proliferation and contested nature of protocol-based care, the dearth of literature about the contribution, experience and outcomes for nurses, midwives and health visitors is noteworthy and requires further investigation. (c) 2010 Elsevier Ltd. All rights reserved.
Hiding the Source Based on Limited Flooding for Sensor Networks.
Chen, Juan; Lin, Zhengkui; Hu, Ying; Wang, Bailing
2015-11-17
Wireless sensor networks are widely used to monitor valuable objects such as rare animals or armies. Once an object is detected, the source, i.e., the sensor nearest to the object, generates and periodically sends a packet about the object to the base station. Since attackers can capture the object by localizing the source, many protocols have been proposed to protect source location. Instead of transmitting the packet to the base station directly, typical source location protection protocols first transmit packets randomly for a few hops to a phantom location, and then forward the packets to the base station. The problem with these protocols is that the generated phantom locations are usually not only near the true source but also close to each other. As a result, attackers can easily trace a route back to the source from the phantom locations. To address the above problem, we propose a new protocol for source location protection based on limited flooding, named SLP. Compared with existing protocols, SLP can generate phantom locations that are not only far away from the source, but also widely distributed. It improves source location security significantly with low communication cost. We further propose a protocol, namely SLP-E, to protect source location against more powerful attackers with wider fields of vision. The performance of our SLP and SLP-E are validated by both theoretical analysis and simulation results.
Varga, Z.; Mayer, K.; Bonamici, C. E.; ...
2015-05-11
The results of a joint effort by expert nuclear forensic laboratories in the area of age dating of uranium, i.e. the elapsed time since the last chemical purification of the material are presented and discussed. Completely separated uranium materials of known production date were distributed among the laboratories, and the samples were dated according to routine laboratory procedures by the measurement of the ²²⁰Th/²³⁴U ratio. The measurement results were in good agreement with the known production date showing that the concept for preparing uranium age dating reference material based on complete separation is valid. Detailed knowledge of the laboratory proceduresmore » used for uranium age dating allows the identification of possible improvements in the current protocols and the development of improved practice in the future. The availability of age dating reference materials as well as the evolvement of the age dating best-practice protocol will increase the relevance and applicability of age dating as part of the tool-kit available for nuclear forensic investigations.« less
DOE Office of Scientific and Technical Information (OSTI.GOV)
Varga, Z.; Mayer, K.; Bonamici, C. E.
The results of a joint effort by expert nuclear forensic laboratories in the area of age dating of uranium, i.e. the elapsed time since the last chemical purification of the material are presented and discussed. Completely separated uranium materials of known production date were distributed among the laboratories, and the samples were dated according to routine laboratory procedures by the measurement of the ²²⁰Th/²³⁴U ratio. The measurement results were in good agreement with the known production date showing that the concept for preparing uranium age dating reference material based on complete separation is valid. Detailed knowledge of the laboratory proceduresmore » used for uranium age dating allows the identification of possible improvements in the current protocols and the development of improved practice in the future. The availability of age dating reference materials as well as the evolvement of the age dating best-practice protocol will increase the relevance and applicability of age dating as part of the tool-kit available for nuclear forensic investigations.« less
Lund, Travis J.; Pilarz, Matthew; Velasco, Jonathan B.; Chakraverty, Devasmita; Rosploch, Kaitlyn; Undersander, Molly; Stains, Marilyne
2015-01-01
Researchers, university administrators, and faculty members are increasingly interested in measuring and describing instructional practices provided in science, technology, engineering, and mathematics (STEM) courses at the college level. Specifically, there is keen interest in comparing instructional practices between courses, monitoring changes over time, and mapping observed practices to research-based teaching. While increasingly common observation protocols (Reformed Teaching Observation Protocol [RTOP] and Classroom Observation Protocol in Undergraduate STEM [COPUS]) at the postsecondary level help achieve some of these goals, they also suffer from weaknesses that limit their applicability. In this study, we leverage the strengths of these protocols to provide an easy method that enables the reliable and valid characterization of instructional practices. This method was developed empirically via a cluster analysis using observations of 269 individual class periods, corresponding to 73 different faculty members, 28 different research-intensive institutions, and various STEM disciplines. Ten clusters, called COPUS profiles, emerged from this analysis; they represent the most common types of instructional practices enacted in the classrooms observed for this study. RTOP scores were used to validate the alignment of the 10 COPUS profiles with reformed teaching. Herein, we present a detailed description of the cluster analysis method, the COPUS profiles, and the distribution of the COPUS profiles across various STEM courses at research-intensive universities. PMID:25976654
Practice guidelines for music interventions with hospitalized pediatric patients.
Stouffer, Janice W; Shirk, Beverly J; Polomano, Rosemary C
2007-12-01
Music therapy is an effective complementary approach that can achieve specific therapeutic outcomes in the clinical management of pediatric patients. Growing research on music interventions has generated scientific knowledge about how this modality benefits patients and has formed the basis for effective protocols that can be used in practice. Although it can be challenging to translate research-based protocols into routine clinical care at the bedside, it is essential that music therapy interventions be aligned with evidence-based information and that accepted standards be established by the music therapy discipline to achieve the greatest benefit. The importance of partnerships between nurses and music therapists is emphasized to enhance the success of music-based treatments. This discussion synthesizes research findings that can be used to design pediatric practice guidelines in the application of music therapy.
Whitworth, David E
2016-07-08
Laboratory-based practical classes are a common feature of life science teaching, during which students learn how to perform experiments and generate/interpret data. Practical classes are typically instructional, concentrating on providing topic- and technique-specific skills, however to produce research-capable graduates it is also important to develop generic practical skills. To provide an opportunity for students to develop the skills needed to create bespoke protocols for experimental benchwork, a traditional practical was repurposed. Students were given a list of available resources and an experimental goal, and directed to create a bench protocol to achieve the aim (measuring the iron in hemoglobin). In a series of teaching events students received feedback from staff, and peers prototyped the protocols, before protocols were finally implemented. Graduates highlighted this exercise as one of the most important of their degrees, primarily because of the clear relevance of the skills acquired to professional practice. The exercise exemplifies a range of pedagogic principles, but arguably its most important innovation is that it repurposed a pre-existing practical. This had the benefits of automatically providing scaffolding to direct the students' thought processes, while retaining the advantages of a "discovery learning" exercise, and allowing facile adoption of the approach across the sector. © 2016 by The International Union of Biochemistry and Molecular Biology, 44(4):377-380, 2016. © 2016 The International Union of Biochemistry and Molecular Biology.
Eminaga, O; Semjonow, A; Oezguer, E; Herden, J; Akbarov, I; Tok, A; Engelmann, U; Wille, S
2014-01-01
The integrity of collection protocols in biobanking is essential for a high-quality sample preparation process. However, there is not currently a well-defined universal method for integrating collection protocols in the biobanking information system (BIMS). Therefore, an electronic schema of the collection protocol that is based on Extensible Markup Language (XML) is required to maintain the integrity and enable the exchange of collection protocols. The development and implementation of an electronic specimen collection protocol schema (eSCPS) was performed at two institutions (Muenster and Cologne) in three stages. First, we analyzed the infrastructure that was already established at both the biorepository and the hospital information systems of these institutions and determined the requirements for the sufficient preparation of specimens and documentation. Second, we designed an eSCPS according to these requirements. Finally, a prospective study was conducted to implement and evaluate the novel schema in the current BIMS. We designed an eSCPS that provides all of the relevant information about collection protocols. Ten electronic collection protocols were generated using the supplementary Protocol Editor tool, and these protocols were successfully implemented in the existing BIMS. Moreover, an electronic list of collection protocols for the current studies being performed at each institution was included, new collection protocols were added, and the existing protocols were redesigned to be modifiable. The documentation time was significantly reduced after implementing the eSCPS (5 ± 2 min vs. 7 ± 3 min; p = 0.0002). The eSCPS improves the integrity and facilitates the exchange of specimen collection protocols in the existing open-source BIMS.
Study on Cloud Security Based on Trust Spanning Tree Protocol
NASA Astrophysics Data System (ADS)
Lai, Yingxu; Liu, Zenghui; Pan, Qiuyue; Liu, Jing
2015-09-01
Attacks executed on Spanning Tree Protocol (STP) expose the weakness of link layer protocols and put the higher layers in jeopardy. Although the problems have been studied for many years and various solutions have been proposed, many security issues remain. To enhance the security and credibility of layer-2 network, we propose a trust-based spanning tree protocol aiming at achieving a higher credibility of LAN switch with a simple and lightweight authentication mechanism. If correctly implemented in each trusted switch, the authentication of trust-based STP can guarantee the credibility of topology information that is announced to other switch in the LAN. To verify the enforcement of the trusted protocol, we present a new trust evaluation method of the STP using a specification-based state model. We implement a prototype of trust-based STP to investigate its practicality. Experiment shows that the trusted protocol can achieve security goals and effectively avoid STP attacks with a lower computation overhead and good convergence performance.
Practical single-photon-assisted remote state preparation with non-maximally entanglement
NASA Astrophysics Data System (ADS)
Wang, Dong; Huang, Ai-Jun; Sun, Wen-Yang; Shi, Jia-Dong; Ye, Liu
2016-08-01
Remote state preparation (RSP) and joint remote state preparation (JRSP) protocols for single-photon states are investigated via linear optical elements with partially entangled states. In our scheme, by choosing two-mode instances from a polarizing beam splitter, only the sender in the communication protocol needs to prepare an ancillary single-photon and operate the entanglement preparation process in order to retrieve an arbitrary single-photon state from a photon pair in partially entangled state. In the case of JRSP, i.e., a canonical model of RSP with multi-party, we consider that the information of the desired state is split into many subsets and in prior maintained by spatially separate parties. Specifically, with the assistance of a single-photon state and a three-photon entangled state, it turns out that an arbitrary single-photon state can be jointly and remotely prepared with certain probability, which is characterized by the coefficients of both the employed entangled state and the target state. Remarkably, our protocol is readily to extend to the case for RSP and JRSP of mixed states with the all optical means. Therefore, our protocol is promising for communicating among optics-based multi-node quantum networks.
Watson, Dennis P; Young, Jeani; Ahonen, Emily; Xu, Huiping; Henderson, Macey; Shuman, Valery; Tolliver, Randi
2014-10-17
There is currently a lack of scientifically designed and tested implementation strategies. Such strategies are particularly important for highly complex interventions that require coordination between multiple parts to be successful. This paper presents a protocol for the development and testing of an implementation strategy for a complex intervention known as the Housing First model (HFM). Housing First is an evidence-based practice for chronically homeless individuals demonstrated to significantly improve a number of outcomes. Drawing on practices demonstrated to be useful in implementation and e-learning theory, our team is currently adapting a face-to-face implementation strategy so that it can be delivered over a distance. Research activities will be divided between Chicago and Central Indiana, two areas with significantly different barriers to HFM implementation. Ten housing providers (five from Chicago and five from Indiana) will be recruited to conduct an alpha test of each of four e-learning modules as they are developed. Providers will be requested to keep a detailed log of their experience completing the modules and participate in one of two focus groups. After refining the modules based on alpha test results, we will test the strategy among a sample of four housing organizations (two from Chicago and two from Indiana). We will collect and analyze both qualitative and quantitative data from administration and staff. Measures of interest include causal factors affecting implementation, training outcomes, and implementation outcomes. This project is an important first step in the development of an evidence-based implementation strategy to increase scalability and impact of the HFM. The project also has strong potential to increase limited scientific knowledge regarding implementation strategies in general.
Loss-tolerant measurement-device-independent quantum private queries
NASA Astrophysics Data System (ADS)
Zhao, Liang-Yuan; Yin, Zhen-Qiang; Chen, Wei; Qian, Yong-Jun; Zhang, Chun-Mei; Guo, Guang-Can; Han, Zheng-Fu
2017-01-01
Quantum private queries (QPQ) is an important cryptography protocol aiming to protect both the user’s and database’s privacy when the database is queried privately. Recently, a variety of practical QPQ protocols based on quantum key distribution (QKD) have been proposed. However, for QKD-based QPQ the user’s imperfect detectors can be subjected to some detector- side-channel attacks launched by the dishonest owner of the database. Here, we present a simple example that shows how the detector-blinding attack can damage the security of QKD-based QPQ completely. To remove all the known and unknown detector side channels, we propose a solution of measurement-device-independent QPQ (MDI-QPQ) with single- photon sources. The security of the proposed protocol has been analyzed under some typical attacks. Moreover, we prove that its security is completely loss independent. The results show that practical QPQ will remain the same degree of privacy as before even with seriously uncharacterized detectors.
Loss-tolerant measurement-device-independent quantum private queries.
Zhao, Liang-Yuan; Yin, Zhen-Qiang; Chen, Wei; Qian, Yong-Jun; Zhang, Chun-Mei; Guo, Guang-Can; Han, Zheng-Fu
2017-01-04
Quantum private queries (QPQ) is an important cryptography protocol aiming to protect both the user's and database's privacy when the database is queried privately. Recently, a variety of practical QPQ protocols based on quantum key distribution (QKD) have been proposed. However, for QKD-based QPQ the user's imperfect detectors can be subjected to some detector- side-channel attacks launched by the dishonest owner of the database. Here, we present a simple example that shows how the detector-blinding attack can damage the security of QKD-based QPQ completely. To remove all the known and unknown detector side channels, we propose a solution of measurement-device-independent QPQ (MDI-QPQ) with single- photon sources. The security of the proposed protocol has been analyzed under some typical attacks. Moreover, we prove that its security is completely loss independent. The results show that practical QPQ will remain the same degree of privacy as before even with seriously uncharacterized detectors.
Conte, Kathleen P; Groen, Sisse; Loblay, Victoria; Green, Amanda; Milat, Andrew; Persson, Lina; Innes-Hughes, Christine; Mitchell, Jo; Thackway, Sarah; Williams, Mandy; Hawe, Penelope
2017-12-06
The effectiveness of many interventions to promote health and prevent disease has been well established. The imperative has therefore shifted from amassing evidence about efficacy to scale-up to maximise population-level health gains. Electronic implementation monitoring, or 'e-monitoring', systems have been designed to assist and track the delivery of preventive policies and programs. However, there is little evidence on whether e-monitoring systems improve the dissemination, adoption, and ongoing delivery of evidence-based preventive programs. Also, given considerable difficulties with e-monitoring systems in the clinical sector, scholars have called for a more sophisticated re-examination of e-monitoring's role in enhancing implementation. In the state of New South Wales (NSW), Australia, the Population Health Information Management System (PHIMS) was created to support the dissemination of obesity prevention programs to 6000 childcare centres and elementary schools across all 15 local health districts. We have established a three-way university-policymaker-practice research partnership to investigate the impact of PHIMS on practice, how PHIMS is used, and how achievement of key performance indicators of program adoption may be associated with local contextual factors. Our methods encompass ethnographic observation, key informant interviews and participatory workshops for data interpretation at a state and local level. We use an on-line social network analysis of the collaborative relationships across local health district health promotion teams to explore the relationship between PHIMS use and the organisational structure of practice. Insights will be sensitised by institutional theory, practice theory and complex adaptive system thinking, among other theories which make sense of socio-technical action. Our working hypothesis is that the science of getting evidence-based programs into practice rests on an in-depth understanding of the role they play in the on-going system of local relationships and multiple accountabilities. Data will be synthesised to produce a typology to characterise local context, PHIMS use and key performance indicator achievement (of program implementation) across the 15 local health districts. Results could be used to continuously align e-monitoring technologies within quality improvement processes to ensure that such technologies enhance practice and innovation. A partnership approach to knowledge production increases the likelihood that findings will be put into practice.
2013-01-01
Background There is growing acceptance that optimal service provision for individuals with severe and recurrent mental illness requires a complementary focus on medical recovery (i.e., symptom management and general functioning) and personal recovery (i.e., having a ‘life worth living’). Despite significant research attention and policy-level support, the translation of this vision of healthcare into changed workplace practice continues to elude. Over the past decade, evidence-based training interventions that seek to enhance the knowledge, attitudes, and skills of staff working in the mental health field have been implemented as a primary redress strategy. However, a large body of multi-disciplinary research indicates disappointing rates of training transfer. There is an absence of empirical research that investigates the importance of worker-motivation in the uptake of desired workplace change initiatives. ‘Autonomy’ is acknowledged as important to human effectiveness and as a correlate of workplace variables like productivity, and wellbeing. To our knowledge, there have been no studies that investigate purposeful and structured use of values-based interventions to facilitate increased autonomy as a means of promoting enhanced implementation of workplace change. Methods This study involves 200 mental health workers across 22 worksites within five community-managed organisations in three Australian states. It involves cluster-randomisation of participants within organisation, by work site, to the experimental (values) condition, or the control (implementation). Both conditions receive two days of training focusing on an evidence-based framework of mental health service delivery. The experimental group receives a third day of values-focused intervention and 12 months of values-focused coaching. Well-validated self-report measures are used to explore variables related to values concordance, autonomy, and self-reported implementation success. Audits of work files and staff work samples are reviewed for each condition to determine the impact of implementation. Self-determination theory and theories of organisational change are used to interpret the data. Discussion The research adds to the current knowledge base related to worker motivation and uptake of workplace practice. It describes a structured protocol that aims to enhance worker autonomy for imposed workplace practices. The research will inform how best to measure and conceptualise transfer. These findings will apply particularly to contexts where individuals are not ‘volunteers’ in requisite change processes. Trial registration ACTRN: ACTRN12613000353796. PMID:23819816
Kuttner, Samuel; Bujila, Robert; Kortesniemi, Mika; Andersson, Henrik; Kull, Love; Østerås, Bjørn Helge; Thygesen, Jesper; Tarp, Ivanka Sojat
2013-03-01
Quality assurance (QA) of computed tomography (CT) systems is one of the routine tasks for medical physicists in the Nordic countries. However, standardized QA protocols do not yet exist and the QA methods, as well as the applied tolerance levels, vary in scope and extent at different hospitals. To propose a standardized protocol for acceptance and constancy testing of CT scanners in the Nordic Region. Following a Nordic Association for Clinical Physics (NACP) initiative, a group of medical physicists, with representatives from four Nordic countries, was formed. Based on international literature and practical experience within the group, a comprehensive standardized test protocol was developed. The proposed protocol includes tests related to the mechanical functionality, X-ray tube, detector, and image quality for CT scanners. For each test, recommendations regarding the purpose, equipment needed, an outline of the test method, the measured parameter, tolerance levels, and the testing frequency are stated. In addition, a number of optional tests are briefly discussed that may provide further information about the CT system. Based on international references and medical physicists' practical experiences, a comprehensive QA protocol for CT systems is proposed, including both acceptance and constancy tests. The protocol may serve as a reference for medical physicists in the Nordic countries.
The feasibility of universal DLP-to-risk conversion coefficients for body CT protocols
NASA Astrophysics Data System (ADS)
Li, Xiang; Samei, Ehsan; Segars, W. Paul; Paulson, Erik K.; Frush, Donald P.
2011-03-01
The effective dose associated with computed tomography (CT) examinations is often estimated from dose-length product (DLP) using scanner-independent conversion coefficients. Such conversion coefficients are available for a small number of examinations, each covering an entire region of the body (e.g., head, neck, chest, abdomen and/or pelvis). Similar conversion coefficients, however, do not exist for examinations that cover a single organ or a sub-region of the body, as in the case of a multi-phase liver examination. In this study, we extended the DLP-to-effective dose conversion coefficient (k factor) to a wide range of body CT protocols and derived the corresponding DLP-to-cancer risk conversion coefficient (q factor). An extended cardiactorso (XCAT) computational model was used, which represented a reference adult male patient. A range of body CT protocols used in clinical practice were categorized based on anatomical regions examined into 10 protocol classes. A validated Monte Carlo program was used to estimate the organ dose associated with each protocol class. Assuming the reference model to be 20 years old, effective dose and risk index (an index of the total risk for cancer incidence) were then calculated and normalized by DLP to obtain the k and q factors. The k and q factors varied across protocol classes; the coefficients of variation were 28% and 9%, respectively. The small variation exhibited by the q factor suggested the feasibility of universal q factors for a wide range of body CT protocols.
Peters, Remco P H; Verweij, Stephan P; Nijsten, Noëmi; Ouburg, Sander; Mutsaers, Johan; Jansen, Casper L; van Leeuwen, A Petra; Morré, Servaas A
2011-07-26
Sexually transmitted infection (STI) screening programmes are implemented in many countries to decrease burden of STI and to improve sexual health. Screening for Chlamydia trachomatis and Neisseria gonorrhoeae has a prominent role in these protocols. Most of the screening programmes concerning men having sex with men (MSM) are based on opportunistic urethral testing. In The Netherlands, a history-based approach is used. The aim of this study is to evaluate the protocol of screening anatomic sites for C. trachomatis and N. gonorrhoeae infection based on sexual history in MSM in routine practice in The Netherlands. All MSM visiting the clinic for STI in The Hague are routinely asked about their sexual practice during consulting. As per protocol, tests for urogenital, oropharyngeal and anorectal infection are obtained based on reported site(s) of sexual contact. All consultations are entered into a database as part of the national STI monitoring system. Data of an 18 months period were retrieved from this database and analysed. A total of 1455 consultations in MSM were registered during the study period. The prevalence of C. trachomatis and N. gonorrhoeae per anatomic site was: urethral infection 4.0% respectively and 2.8%, oropharynx 1.5% and 4.2%, and anorectum 8.2% and 6.0%. The majority of chlamydia cases (72%) involved a single anatomic site, which was especially manifest for anorectal infections (79%), while 42% of gonorrhoea cases were single site. Twenty-six percent of MSM with anorectal chlamydia and 17% with anorectal gonorrhoea reported symptoms of proctitis; none of the oropharyngeal infections were symptomatic. Most cases of anorectal infection (83%) and oropharyngeal infection (100%) would have remained undiagnosed with a symptom-based protocol. The current strategy of sexual-history based screening of multiple anatomic sites for chlamydia and gonorrhoea in MSM is a useful and valid guideline which is to be preferred over a symptom-based screening protocol.
Mostafa, Gehan M A; Shazly, Mona M; Sherief, Wafaa I
2009-01-01
Good healthcare waste management in a hospital depends on a dedicated waste management team, good administration, careful planning, sound organization, underpinning legislation, adequate financing, and full participation by trained staff. Hence, waste management protocols must be convenient and sensible. To assess the knowledge and practice related to waste management among doctors, nurses, and housekeepers in the surgical departments at Al-Mansoura University Hospital, and to design and validate a waste management protocol for the health team in these settings. This cross-sectional study was carried out in the eight surgical departments at Al-Mansoura University Hospital. All health care personnel and their assistants were included: 38 doctors, 106 nurses, and 56 housekeepers. Two groups of jury were included for experts' opinions validation of the developed protocol, one from academia (30 members) and the other from service providers (30 members). Data were collected using a self-administered knowledge questionnaire for nurses and doctors, and an interview questionnaire for housekeepers. Observation checklists were used for assessment of performance. The researchers developed the first draft of the waste management protocol according to the results of the analysis of the data collected in the assessment phase. Then, the protocol was presented to the jury group for validation, and then was implemented. Only 27.4% of the nurses, 32.1% of the housekeepers, and 36.8% of the doctors had satisfactory knowledge. Concerning practice, 18.9% of the nurses, 7.1% of the housekeepers, and none of the doctors had adequate practice. Nurses' knowledge score had a statistically significant weak positive correlation with the attendance of training courses (r=0.23, p<0.05). Validation of the developed protocol was done, and the percent of agreement ranged between 60.0% and 96.7% for the service group, and 60.0% and 90.0% for the academia group. The majority of the doctors, nurses, and housekeepers have unsatisfactory knowledge and inadequate practice related to health care waste management. The knowledge among nurses is positively affected by attendance of training programs. Based on the findings, a protocol for healthcare waste management was developed and validated. It is recommended to implement the developed waste management protocol for the surgical departments in the designed hospital, with establishment of waste management audits.
Rural Indonesian health care workers' constructs of infection prevention and control knowledge.
Marjadi, Brahmaputra; McLaws, Mary-Louise
2010-06-01
Understanding the constructs of knowledge behind clinical practices in low-resource rural health care settings with limited laboratory facilities and surveillance programs may help in designing resource-appropriate infection prevention and control education. Multiple qualitative methods of direct observations, individual and group focus discussions, and document analysis were used to examine health care workers' knowledge of infection prevention and control practices in intravenous therapy, antibiotic therapy, instrument reprocessing, and hand hygiene in 10 rural Indonesian health care facilities. Awareness of health care-associated infections was low. Protocols were in the main based on verbal instructions handed down through the ranks of health care workers. The evidence-based knowledge gained across professional training was overridden by empiricism, nonscientific modifications, and organizational and societal cultures when resources were restricted or patients demanded inappropriate therapies. This phenomenon remained undetected by accreditation systems and clinical educators. Rural Indonesian health care workers would benefit from a formal introduction to evidence-based practice that would deconstruct individual protocols that include nonscientific knowledge. To achieve levels of acceptable patient safety, protocols would have to be both evidence-based and resource-appropriate. Copyright 2010 Association for Professionals in Infection Control and Epidemiology, Inc. All rights reserved.
Practical quantum appointment scheduling
NASA Astrophysics Data System (ADS)
Touchette, Dave; Lovitz, Benjamin; Lütkenhaus, Norbert
2018-04-01
We propose a protocol based on coherent states and linear optics operations for solving the appointment-scheduling problem. Our main protocol leaks strictly less information about each party's input than the optimal classical protocol, even when considering experimental errors. Along with the ability to generate constant-amplitude coherent states over two modes, this protocol requires the ability to transfer these modes back-and-forth between the two parties multiple times with very low losses. The implementation requirements are thus still challenging. Along the way, we develop tools to study quantum information cost of interactive protocols in the finite regime.
ERIC Educational Resources Information Center
Birch & Davis Associates, Inc., Silver Spring, MD.
A substantial knowledge base exists on reduction of tobacco use by youth. Effective prevention in this area can have major health and economic benefits. Information from research and prevention practice, organized by means of the Prevention Enhancement Protocols System (PEPS), is provided in the form of guidelines and recommendations for planning…
Description and effects of sequential behavior practice in teacher education.
Sharpe, T; Lounsbery, M; Bahls, V
1997-09-01
This study examined the effects of a sequential behavior feedback protocol on the practice-teaching experiences of undergraduate teacher trainees. The performance competencies of teacher trainees were analyzed using an alternative opportunities for appropriate action measure. Data support the added utility of sequential (Sharpe, 1997a, 1997b) behavior analysis information in systematic observation approaches to teacher education. One field-based undergraduate practicum using sequential behavior (i.e., field systems analysis) principles was monitored. Summarized are the key elements of the (a) classroom instruction provided as a precursor to the practice teaching experience, (b) practice teaching experience, and (c) field systems observation tool used for evaluation and feedback, including multiple-baseline data (N = 4) to support this approach to teacher education. Results point to (a) the strong relationship between sequential behavior feedback and the positive change in four preservice teachers' day-to-day teaching practices in challenging situational contexts, and (b) the relationship between changes in teacher practices and positive changes in the behavioral practices of gymnasium pupils. Sequential behavior feedback was also socially validated by the undergraduate participants and Professional Development School teacher supervisors in the study.
Castro, Luis A; Favela, Jesus; Garcia-Peña, Carmen
2014-11-01
The transition from paper to electronic-based records in the healthcare industry has posed several challenges to conventional medical practices. The introduction of technology in day-to-day medical and nursing practices deserves careful consideration. In this work, we report the results of a controlled experiment to compare nurses' consultation in emergency calls in six different conditions. We studied the effect that the type of communication media (face-to-face, telephone, videoconference) and type of nursing protocol media (paper-based, electronic-based) can have on consultation time, mistakes made, pauses during consultation, eye contact, and efficacy of the consultation. We found that the type of communication media has an effect on consultation time; on average, fewer mistakes were made during telephone-based consultations; for eye contact, there were significantly fewer eye contacts during face-to-face than during videoconference consultations; finally, the type of communication media or protocol media did not have any effect in the efficacy of the consultation.
Practical quantum retrieval games
NASA Astrophysics Data System (ADS)
Arrazola, Juan Miguel; Karasamanis, Markos; Lütkenhaus, Norbert
2016-06-01
Complex cryptographic protocols are often constructed from simpler building blocks. In order to advance quantum cryptography, it is important to study practical building blocks that can be used to develop new protocols. An example is quantum retrieval games (QRGs), which have broad applicability and have already been used to construct quantum money schemes. In this work, we introduce a general construction of quantum retrieval games based on the hidden matching problem and show how they can be implemented in practice using available technology. More precisely, we provide a general method to construct (1-out-of-k ) QRGs, proving that their cheating probabilities decrease exponentially in k . In particular, we define QRGs based on coherent states of light, which can be implemented even in the presence of experimental imperfections. Our results constitute a tool in the arsenal of the practical quantum cryptographer.
Kelly, Kassandra C; Jordan, Erin M; Joyner, A Barry; Burdette, G Trey; Buckley, Thomas A
2014-01-01
A cornerstone of the recent consensus statements on concussion is a multifaceted concussion-assessment program at baseline and postinjury and when tracking recovery. Earlier studies of athletic trainers' (ATs') practice patterns found limited use of multifaceted protocols; however, these authors typically grouped diverse athletic training settings together. To (1) describe the concussion-management practice patterns of National Collegiate Athletic Association (NCAA) Division I ATs, (2) compare these practice patterns to earlier studies, and (3) objectively characterize the clinical examination. Cross-sectional study. Online survey. A total of 610 ATs from NCAA Division I institutions, for a response rate of 34.4%. The survey had 3 subsections: demographic questions related to the participant's experiences, concussion-assessment practice patterns, and concussion-recovery and return-to-participation practice patterns. Specific practice-pattern questions addressed balance, cognitive and mental status, neuropsychological testing, and self-reported symptoms. Finally, specific components of the clinical examination were examined. We identified high rates of multifaceted assessments (i.e., assessments using at least 3 techniques) during testing at baseline (71.2%), acute concussion assessment (79.2%), and return to participation (66.9%). The specific techniques used are provided along with their adherence with evidence-based practice findings. Respondents endorsed a diverse array of clinical examination techniques that often overlapped objective concussion-assessment protocols or were likely used to rule out associated potential conditions. Respondents were cognizant of the Third International Consensus Statement, the National Athletic Trainers' Association position statement, and the revised NCAA Sports Medicine Handbook recommendations. Athletic trainers in NCAA Division I demonstrated widespread use of multifaceted concussion-assessment techniques and appeared compliant with recent consensus statements and the NCAA Sports Medicine Handbook.
De Decker, Ellen; De Craemer, Marieke; De Bourdeaudhuij, Ilse; Verbestel, Vera; Duvinage, Kristin; Iotova, Violeta; Grammatikaki, Evangelia; Wildgruber, Andreas; Mouratidou, Theodora; Manios, Yannis; Cardon, Greet
2014-02-19
High levels of sedentary behavior are often measured in preschoolers, but only a few interventions have been developed to counteract this. Furthermore, detailed descriptions of interventions in preschoolers targeting different forms of sedentary behavior could not be located in the literature. The aim of the present paper was to describe the different steps of the Intervention Mapping Protocol used towards the development of an intervention component of the ToyBox-study focusing on decreasing preschoolers' sedentary behavior. The ToyBox-study focuses on the prevention of overweight in 4- to 6-year-old children by implementing a multi-component kindergarten-based intervention with family involvement in six different European countries. Applying the Intervention Mapping Protocol, six different steps were systematically completed for the structured planning and development of the intervention. A literature search and results from focus groups with parents/caregivers and kindergarten teachers were used as a guide during the development of the intervention and the intervention materials. The application of the different steps in the Intervention Mapping Protocol resulted in the creation of matrices of change objectives, followed by the selection of practical applications for five different intervention tools that could be used at the individual level of the preschool child, at the interpersonal level (i.e., parents/caregivers) and at the organizational level (i.e., kindergarten teachers). No cultural differences regarding preschoolers' sedentary behavior were identified between the participating countries during the focus groups, so cultural and local adaptations of the intervention materials were not necessary to improve the adoption and implementation of the intervention. A systematic and evidence-based approach was used for the development of this kindergarten-based family-involved intervention targeting preschoolers, with the inclusion of parental involvement. The application of the Intervention Mapping Protocol may lead to the development of more effective interventions. The detailed intervention matrices that were developed as part of the ToyBox-study can be used by other researchers as an aid in order to avoid repetitive work for the design of similar interventions.
2014-01-01
Background High levels of sedentary behavior are often measured in preschoolers, but only a few interventions have been developed to counteract this. Furthermore, detailed descriptions of interventions in preschoolers targeting different forms of sedentary behavior could not be located in the literature. The aim of the present paper was to describe the different steps of the Intervention Mapping Protocol used towards the development of an intervention component of the ToyBox-study focusing on decreasing preschoolers’ sedentary behavior. The ToyBox-study focuses on the prevention of overweight in 4- to 6-year-old children by implementing a multi-component kindergarten-based intervention with family involvement in six different European countries. Methods Applying the Intervention Mapping Protocol, six different steps were systematically completed for the structured planning and development of the intervention. A literature search and results from focus groups with parents/caregivers and kindergarten teachers were used as a guide during the development of the intervention and the intervention materials. Results The application of the different steps in the Intervention Mapping Protocol resulted in the creation of matrices of change objectives, followed by the selection of practical applications for five different intervention tools that could be used at the individual level of the preschool child, at the interpersonal level (i.e., parents/caregivers) and at the organizational level (i.e., kindergarten teachers). No cultural differences regarding preschoolers’ sedentary behavior were identified between the participating countries during the focus groups, so cultural and local adaptations of the intervention materials were not necessary to improve the adoption and implementation of the intervention. Conclusions A systematic and evidence-based approach was used for the development of this kindergarten-based family-involved intervention targeting preschoolers, with the inclusion of parental involvement. The application of the Intervention Mapping Protocol may lead to the development of more effective interventions. The detailed intervention matrices that were developed as part of the ToyBox-study can be used by other researchers as an aid in order to avoid repetitive work for the design of similar interventions. PMID:24552138
Intermittent kangaroo mother care: a NICU protocol.
Davanzo, Riccardo; Brovedani, Pierpaolo; Travan, Laura; Kennedy, Jacqueline; Crocetta, Anna; Sanesi, Cecilia; Strajn, Tamara; De Cunto, Angela
2013-08-01
The practice of kangaroo mother care (KMC) is steadily increasing in high-tech settings due to its proven benefits for both infants and parents. In spite of that, clear guidelines about how to implement this method of care are lacking, and as a consequence, some restrictions are applied in many neonatal intensive care units (NICUs), preventing its practice. Based on recommendations from the Expert Group of the International Network on Kangaroo Mother Care, we developed a hospital protocol in the neonatal unit of the Institute for Maternal and Child Health in Trieste, Italy, a level 3 unit, aimed to facilitate and promote KMC implementation in high-tech settings. Our guideline is therefore proposed, based both on current scientific literature and on practical considerations and experience. Future adjustments and improvements would be considered based on increasing clinical KMC use and further knowledge.
Security of modified Ping-Pong protocol in noisy and lossy channel
Han, Yun-Guang; Yin, Zhen-Qiang; Li, Hong-Wei; Chen, Wei; Wang, Shuang; Guo, Guang-Can; Han, Zheng-Fu
2014-01-01
The “Ping-Pong” (PP) protocol is a two-way quantum key protocol based on entanglement. In this protocol, Bob prepares one maximally entangled pair of qubits, and sends one qubit to Alice. Then, Alice performs some necessary operations on this qubit and sends it back to Bob. Although this protocol was proposed in 2002, its security in the noisy and lossy channel has not been proven. In this report, we add a simple and experimentally feasible modification to the original PP protocol, and prove the security of this modified PP protocol against collective attacks when the noisy and lossy channel is taken into account. Simulation results show that our protocol is practical. PMID:24816899
Security of modified Ping-Pong protocol in noisy and lossy channel.
Han, Yun-Guang; Yin, Zhen-Qiang; Li, Hong-Wei; Chen, Wei; Wang, Shuang; Guo, Guang-Can; Han, Zheng-Fu
2014-05-12
The "Ping-Pong" (PP) protocol is a two-way quantum key protocol based on entanglement. In this protocol, Bob prepares one maximally entangled pair of qubits, and sends one qubit to Alice. Then, Alice performs some necessary operations on this qubit and sends it back to Bob. Although this protocol was proposed in 2002, its security in the noisy and lossy channel has not been proven. In this report, we add a simple and experimentally feasible modification to the original PP protocol, and prove the security of this modified PP protocol against collective attacks when the noisy and lossy channel is taken into account. Simulation results show that our protocol is practical.
Witkiewitz, Katie; Bowen, Sarah; Harrop, Erin N.; Douglas, Haley; Enkema, Matthew; Sedgwick, Carly
2017-01-01
Mindfulness-based treatments are growing in popularity among addiction treatment providers, and several studies suggest the efficacy of incorporating mindfulness practices into the treatment of addiction, including the treatment of substance use disorders and behavioral addictions (i.e., gambling). The current paper provides a review of theoretical models of mindfulness in the treatment of addiction and several hypothesized mechanisms of change. We provide an overview of mindfulness-based relapse prevention (MBRP), including session content, treatment targets, and client feedback from participants who have received MBRP in the context of empirical studies. Future research directions regarding operationalization and measurement, identifying factors that moderate treatment effects, and protocol adaptations for specific populations are discussed. PMID:24611847
Spangenberg, Elin M F; Keeling, Linda J
2016-02-01
Welfare problems in laboratory mice can be a consequence of an ongoing experiment, or a characteristic of a particular genetic line, but in some cases, such as breeding animals, they are most likely to be a result of the design and management of the home cage. Assessment of the home cage environment is commonly performed using resource-based measures, like access to nesting material. However, animal-based measures (related to the health status and behaviour of the animals) can be used to assess the current welfare of animals regardless of the inputs applied (i.e. the resources or management). The aim of this study was to design a protocol for assessing the welfare of laboratory mice using only animal-based measures. The protocol, to be used as a benchmarking tool, assesses mouse welfare in the home cage and does not contain parameters related to experimental situations. It is based on parameters corresponding to the 12 welfare criteria established by the Welfare Quality® project. Selection of animal-based measures was performed by scanning existing published, web-based and informal protocols, and by choosing parameters that matched these criteria, were feasible in practice and, if possible, were already validated indicators of mouse welfare. The parameters should identify possible animal welfare problems and enable assessment directly in an animal room during cage cleaning procedures, without the need for extra equipment. Thermal comfort behaviours and positive emotional states are areas where more research is needed to find valid, reliable and feasible animal-based measures. © The Author(s) 2015.
Pellecchia, Melanie; Beidas, Rinad S; Marcus, Steven C; Fishman, Jessica; Kimberly, John R; Cannuscio, Carolyn C; Reisinger, Erica M; Rump, Keiran; Mandell, David S
2016-11-25
The number of children diagnosed with autism has rapidly outpaced the capacities of many public school systems to serve them, especially under-resourced, urban school districts. The intensive nature of evidence-based autism interventions, which rely heavily on one-to-one delivery, has caused schools to turn to computer-assisted interventions (CAI). There is little evidence regarding the feasibility, effectiveness, and implementation of CAI in public schools. While CAI has the potential to increase instructional time for students with autism, it may also result in unintended consequences such as reduction in the amount of interpersonal (as opposed to computerized) instruction students receive. The purpose of this study is to test the effectiveness of one such CAI-TeachTown-its implementation, and its effects on teachers' use of other evidence-based practices. This study protocol describes a type II hybrid cluster randomized effectiveness-implementation trial. We will train and coach 70 teachers in autism support classrooms in one large school district in the use of evidence-based practices for students with autism. Half of the teachers then will be randomly selected to receive training and access to TeachTown: Basics, a CAI for students with autism, for the students in their classrooms. The study examines: (1) the effectiveness of TeachTown for students with autism; (2) the extent to which teachers implement TeachTown the way it was designed (i.e., fidelity); and (3) whether its uptake increases or reduces the use of other evidence-based practices. This study will examine the implementation of new technology for children with ASD in public schools and will be the first to measure the effectiveness of CAI. As importantly, the study will investigate whether adding a new technology on top of existing practices increases or decreases their use. This study presents a unique method to studying both the implementation and exnovation of evidence-based practices for children with autism in school settings. NCT02695693 . Retrospectively registered on July 8, 2016.
Standardisation of neonatal clinical practice.
Bhutta, Z A; Giuliani, F; Haroon, A; Knight, H E; Albernaz, E; Batra, M; Bhat, B; Bertino, E; McCormick, K; Ochieng, R; Rajan, V; Ruyan, P; Cheikh Ismail, L; Paul, V
2013-09-01
The International Fetal and Newborn Growth Consortium for the 21(st) Century (INTERGROWTH-21(st) ) is a large-scale, population-based, multicentre project involving health institutions from eight geographically diverse countries, which aims to assess fetal, newborn and preterm growth under optimal conditions. Given the multicentre nature of the project and the expected number of preterm births, it is vital that all centres follow the same standardised clinical care protocols to assess and manage preterm infants, so as to ensure maximum validity of the resulting standards as indicators of growth and nutrition with minimal confounding. Moreover, it is well known that evidence-based clinical practice guidelines can reduce the delivery of inappropriate care and support the introduction of new knowledge into clinical practice. The INTERGROWTH-21(st) Neonatal Group produced an operations manual, which reflects the consensus reached by members of the group regarding standardised definitions of neonatal morbidities and the minimum standards of care to be provided by all centres taking part in the project. The operational definitions and summary management protocols were developed by consensus through a Delphi process based on systematic reviews of relevant guidelines and management protocols by authoritative bodies. This paper describes the process of developing the Basic Neonatal Care Manual, as well as the morbidity definitions and standardised neonatal care protocols applied across all the INTERGROWTH-21(st) participating centres. Finally, thoughts about implementation strategies are presented. © 2013 Royal College of Obstetricians and Gynaecologists.
Dos Santos, Raquel Rodrigues; Niquini, Roberta Pereira; Bastos, Francisco Inácio; Domingues, Rosa Maria Soares Madeira
2017-01-01
The study aimed to assess conformity with Brazil's standard protocol for diagnostic and therapeutic practices in the management of congenital syphilis by pediatricians in public maternity hospitals. A cross-sectional study was conducted in 2015 with 41 pediatricians working in all the public maternity hospitals in Teresina, the capital of Piauí State, Northeast Brazil, through self-completed questionnaires. The study assessed the conformity of knowledge and practices according to the Brazilian Ministry of Health protocols. The study has made evident low access to training courses (54%) and insufficient knowledge of the case definition of congenital syphilis (42%) and rapid tests for syphilis (39%). Flaws were observed in the diagnostic workup and treatment of newborns. Requesting VDRL (88%) and correct treatment of neurosyphilis (88%) were the practices that showed the highest conformity with standard protocols. Low conformity with protocols leads to missed opportunities for identifying and adequately treating congenital syphilis. Based on the barriers identified in the study, better access to diagnostic and treatment protocols, improved recording on prenatal cards and hospital patient charts, availability of tests and medicines, and educational work with pregnant women should be urgently implemented, aiming to reverse the currently inadequate management of congenital syphilis and to curb its spread.
Is the flexible GnRH antagonist protocol better suited for fresh eSET cycles?
Dahdouh, Elias M; Gomes, Francisco L A F; Granger, Louis; Carranza-Mamane, Belina; Faruqi, Faez; Kattygnarath, Tiao-Virirak; St-Michel, Pierre
2014-10-01
This study was performed to evaluate the efficacy of the flexible GnRH antagonist protocol in comparison with the long GnRH agonist protocol in elective single embryo transfer (eSET) practice. It was conducted in a publicly funded in vitro fertilization program. We performed a prospective cohort analysis of data from a private infertility clinic from August 2010 to August 2011. Three hundred fourteen women with normal ovarian reserve and undergoing fresh eSET cycles were included. Sixty-four women underwent follicular stimulation using a flexible GnRH antagonist protocol, and 250 underwent stimulation with a standard long mid-luteal GnRH agonist protocol. Implantation rates (35.9% in the GnRH antagonist group and 29.6% in the GnRH agonist group, P = 0.5) and ongoing pregnancy rates (32.8% in the GnRH antagonist group and 28.8% in the GnRH agonist group, P = 0.5) were equivalent in both groups. The duration of stimulation (9.8 ± 2 days vs. 10.7 ± 1.8 days, P < 0.001) and total FSH dose required (2044 vs. 2775 IU, P < 0.001) were lower in the GnRH antagonist group than in the GnRH agonist group. The number of mature oocytes (6.0 vs. 10.0, P < 0. 001) and number of embryos (5.0 vs. 7.0, P < 0.001) were also lower in GnRH antagonist group. However, the number of embryos cryopreserved was similar in both groups (median 2.0, P = 0.3). In women undergoing in vitro fertilization, the flexible GnRH antagonist protocol yields implantation and ongoing pregnancy rates that are similar to the long GnRH agonist protocol, and requires lower doses of gonadotropins and a shorter duration of treatment. The flexible GnRH antagonist protocol appears to be the protocol of choice for an eSET IVF program.
Surgeon preferences regarding antibiotic prophylaxis for ballistic fractures.
Marecek, Geoffrey S; Earhart, Jeffrey S; Gardner, Michael J; Davis, Jason; Merk, Bradley R
2016-06-01
Scant evidence exists to support antibiotic use for low velocity ballistic fractures (LVBF). We therefore sought to define current practice patterns. We hypothesized that most surgeons prescribe antibiotics for LVBF, prescribing is not driven by institutional protocols, and that decisions are based on protocols utilized for blunt trauma. A web-based questionnaire was emailed to the membership of the Orthopaedic Trauma Association (OTA). The questionnaire included demographic information and questions about LVBF treatment practices. Two hundred and twenty surgeons responded. One hundred and fifty-four (70 %) respondents worked at a Level-1 trauma center, 176 (80 %) had received fellowship education in orthopaedic trauma and 104 (47 %) treated at least 10 ballistic fractures annually. Responses were analyzed with SAS 9.3 for Windows (SAS Institute Inc, Cary, NC). One hundred eighty-six respondents (86 %) routinely provide antibiotics for LVBF. Those who did not were more apt to do so for intra-articular fractures (8/16, 50 %) and pelvic fractures with visceral injury (10/16, 63 %). Most surgeons (167, 76 %) do not believe the Gustilo-Anderson classification applies to ballistic fractures, and (20/29, 70 %) do not base their antibiotic choice on the classification system. Few institutions (58, 26 %) have protocols guiding antibiotic use for LVBF. Routine antibiotic use for LVBF is common; however, practice is not dictated by institutional protocol. Although antibiotic use generally follows current blunt trauma guidelines, surgeons do not base their treatment decisions the Gustilo-Anderson classification. Given the high rate of antibiotic use for LVBF, further study should focus on providing evidence-based treatment guidelines.
ERIC Educational Resources Information Center
Runge, Timothy J.; Knoster, Timothy P.; Moerer, Deanna; Breinich, Todd; Palmiero, James
2017-01-01
Schools have limited experience and little guidance to identify and install evidence-based and promising programs and practices/interventions (EBPs) within advanced tiers of School-Wide Positive Behavioral Intervention and Supports (SWPBIS). One form of guidance is the Hexagon Tool which can be used to ensure a match between the EBP and student…
Provably-Secure (Chinese Government) SM2 and Simplified SM2 Key Exchange Protocols
Nam, Junghyun; Kim, Moonseong
2014-01-01
We revisit the SM2 protocol, which is widely used in Chinese commercial applications and by Chinese government agencies. Although it is by now standard practice for protocol designers to provide security proofs in widely accepted security models in order to assure protocol implementers of their security properties, the SM2 protocol does not have a proof of security. In this paper, we prove the security of the SM2 protocol in the widely accepted indistinguishability-based Bellare-Rogaway model under the elliptic curve discrete logarithm problem (ECDLP) assumption. We also present a simplified and more efficient version of the SM2 protocol with an accompanying security proof. PMID:25276863
Survey of Usual Practice: Dysphagia Therapy in Head & Neck Cancer Patients
Krisciunas, Gintas P.; Sokoloff, William; Stepas, Katherine; Langmore, Susan E.
2012-01-01
There is no standardized dysphagia therapy for head and neck cancer patients and scant evidence to support any particular protocol, leaving institutions and individual speech language pathologists (SLPs) to determine their own protocols based on “typical” practices or anecdotal evidence. To gain an understanding of current usual practices, a national internet-based survey was developed and disseminated to SLPs who treat HNC patients. From a random sample of 4,000 ASHA SID 13 members, 1,931 fit the inclusion criteria, and 759 complete responses were recorded for a 39.3% response rate. Results were analyzed by institution type as well as by individual clinical experience. While some interesting trends emerged from the data, a lack of uniformity and consensus regarding best practices was apparent. This is undoubtedly due to a paucity of research adequately addressing the efficacy of any one therapy for dysphagia in the HNC population. PMID:22456699
Cong, Lin-Juan; Wang, Ru-Jie; Yu, Cong; Zhang, Jun-Yun
2016-01-01
Visual perceptual learning is known to be specific to the trained retinal location, feature, and task. However, location and feature specificity can be eliminated by double-training or TPE training protocols, in which observers receive additional exposure to the transfer location or feature dimension via an irrelevant task besides the primary learning task Here we tested whether these new training protocols could even make learning transfer across different tasks involving discrimination of basic visual features (e.g., orientation and contrast). Observers practiced a near-threshold orientation (or contrast) discrimination task. Following a TPE training protocol, they also received exposure to the transfer task via performing suprathreshold contrast (or orientation) discrimination in alternating blocks of trials in the same sessions. The results showed no evidence for significant learning transfer to the untrained near-threshold contrast (or orientation) discrimination task after discounting the pretest effects and the suprathreshold practice effects. These results thus do not support a hypothetical task-independent component in perceptual learning of basic visual features. They also set the boundary of the new training protocols in their capability to enable learning transfer.
Strong Password-Based Authentication in TLS Using the Three-PartyGroup Diffie-Hellman Protocol
DOE Office of Scientific and Technical Information (OSTI.GOV)
Abdalla, Michel; Bresson, Emmanuel; Chevassut, Olivier
2006-08-26
The Internet has evolved into a very hostile ecosystem where"phishing'' attacks are common practice. This paper shows that thethree-party group Diffie-Hellman key exchange can help protect againstthese attacks. We have developed a suite of password-based cipher suitesfor the Transport Layer Security (TLS) protocol that are not onlyprovably secure but also assumed to be free from patent and licensingrestrictions based on an analysis of relevant patents in thearea.
Loss-tolerant measurement-device-independent quantum private queries
Zhao, Liang-Yuan; Yin, Zhen-Qiang; Chen, Wei; Qian, Yong-Jun; Zhang, Chun-Mei; Guo, Guang-Can; Han, Zheng-Fu
2017-01-01
Quantum private queries (QPQ) is an important cryptography protocol aiming to protect both the user’s and database’s privacy when the database is queried privately. Recently, a variety of practical QPQ protocols based on quantum key distribution (QKD) have been proposed. However, for QKD-based QPQ the user’s imperfect detectors can be subjected to some detector- side-channel attacks launched by the dishonest owner of the database. Here, we present a simple example that shows how the detector-blinding attack can damage the security of QKD-based QPQ completely. To remove all the known and unknown detector side channels, we propose a solution of measurement-device-independent QPQ (MDI-QPQ) with single- photon sources. The security of the proposed protocol has been analyzed under some typical attacks. Moreover, we prove that its security is completely loss independent. The results show that practical QPQ will remain the same degree of privacy as before even with seriously uncharacterized detectors. PMID:28051101
2009-07-01
sediment protocol, respectively). The soil protocol evaluates impacts to adult salamanders and the sediment protocol evaluates impacts to larval tadpoles ...the sediment protocol evaluates impacts to larval tadpoles . When selecting appropriate receptors to derive ERA-based remedial goals, amphibians...Sediment tests are conducted with recently hatched tadpoles (i.e., Rana pipiens; Gosner Stages 17-20). Young tadpoles are placed in beakers
Scalable parallel communications
NASA Technical Reports Server (NTRS)
Maly, K.; Khanna, S.; Overstreet, C. M.; Mukkamala, R.; Zubair, M.; Sekhar, Y. S.; Foudriat, E. C.
1992-01-01
Coarse-grain parallelism in networking (that is, the use of multiple protocol processors running replicated software sending over several physical channels) can be used to provide gigabit communications for a single application. Since parallel network performance is highly dependent on real issues such as hardware properties (e.g., memory speeds and cache hit rates), operating system overhead (e.g., interrupt handling), and protocol performance (e.g., effect of timeouts), we have performed detailed simulations studies of both a bus-based multiprocessor workstation node (based on the Sun Galaxy MP multiprocessor) and a distributed-memory parallel computer node (based on the Touchstone DELTA) to evaluate the behavior of coarse-grain parallelism. Our results indicate: (1) coarse-grain parallelism can deliver multiple 100 Mbps with currently available hardware platforms and existing networking protocols (such as Transmission Control Protocol/Internet Protocol (TCP/IP) and parallel Fiber Distributed Data Interface (FDDI) rings); (2) scale-up is near linear in n, the number of protocol processors, and channels (for small n and up to a few hundred Mbps); and (3) since these results are based on existing hardware without specialized devices (except perhaps for some simple modifications of the FDDI boards), this is a low cost solution to providing multiple 100 Mbps on current machines. In addition, from both the performance analysis and the properties of these architectures, we conclude: (1) multiple processors providing identical services and the use of space division multiplexing for the physical channels can provide better reliability than monolithic approaches (it also provides graceful degradation and low-cost load balancing); (2) coarse-grain parallelism supports running several transport protocols in parallel to provide different types of service (for example, one TCP handles small messages for many users, other TCP's running in parallel provide high bandwidth service to a single application); and (3) coarse grain parallelism will be able to incorporate many future improvements from related work (e.g., reduced data movement, fast TCP, fine-grain parallelism) also with near linear speed-ups.
Experimental plug and play quantum coin flipping.
Pappa, Anna; Jouguet, Paul; Lawson, Thomas; Chailloux, André; Legré, Matthieu; Trinkler, Patrick; Kerenidis, Iordanis; Diamanti, Eleni
2014-04-24
Performing complex cryptographic tasks will be an essential element in future quantum communication networks. These tasks are based on a handful of fundamental primitives, such as coin flipping, where two distrustful parties wish to agree on a randomly generated bit. Although it is known that quantum versions of these primitives can offer information-theoretic security advantages with respect to classical protocols, a demonstration of such an advantage in a practical communication scenario has remained elusive. Here we experimentally implement a quantum coin flipping protocol that performs strictly better than classically possible over a distance suitable for communication over metropolitan area optical networks. The implementation is based on a practical plug and play system, developed by significantly enhancing a commercial quantum key distribution device. Moreover, we provide combined quantum coin flipping protocols that are almost perfectly secure against bounded adversaries. Our results offer a useful toolbox for future secure quantum communications.
NASA Astrophysics Data System (ADS)
Wang, Shuang; Yin, Zhen-Qiang; Chau, H. F.; Chen, Wei; Wang, Chao; Guo, Guang-Can; Han, Zheng-Fu
2018-04-01
In comparison to qubit-based protocols, qudit-based quantum key distribution ones generally allow two cooperative parties to share unconditionally secure keys under a higher channel noise. However, it is very hard to prepare and measure the required quantum states in qudit-based protocols in general. One exception is the recently proposed highly error tolerant qudit-based protocol known as the Chau15 (Chau 2015 Phys. Rev. A 92 062324). Remarkably, the state preparation and measurement in this protocol can be done relatively easily since the required states are phase encoded almost like the diagonal basis states of a qubit. Here we report the first proof-of-principle demonstration of the Chau15 protocol. One highlight of our experiment is that its post-processing is based on practical one-way manner, while the original proposal in Chau (2015 Phys. Rev. A 92 062324) relies on complicated two-way post-processing, which is a great challenge in experiment. In addition, by manipulating time-bin qudit and measurement with a variable delay interferometer, our realization is extensible to qudit with high-dimensionality and confirms the experimental feasibility of the Chau15 protocol.
Palm, Peter; Josephson, Malin; Mathiassen, Svend Erik; Kjellberg, Katarina
2016-06-01
We evaluated the intra- and inter-observer reliability and criterion validity of an observation protocol, developed in an iterative process involving practicing ergonomists, for assessment of working technique during cash register work for the purpose of preventing upper extremity symptoms. Two ergonomists independently assessed 17 15-min videos of cash register work on two occasions each, as a basis for examining reliability. Criterion validity was assessed by comparing these assessments with meticulous video-based analyses by researchers. Intra-observer reliability was acceptable (i.e. proportional agreement >0.7 and kappa >0.4) for 10/10 questions. Inter-observer reliability was acceptable for only 3/10 questions. An acceptable inter-observer reliability combined with an acceptable criterion validity was obtained only for one working technique aspect, 'Quality of movements'. Thus, major elements of the cashiers' working technique could not be assessed with an acceptable accuracy from short periods of observations by one observer, such as often desired by practitioners. Practitioner Summary: We examined an observation protocol for assessing working technique in cash register work. It was feasible in use, but inter-observer reliability and criterion validity were generally not acceptable when working technique aspects were assessed from short periods of work. We recommend the protocol to be used for educational purposes only.
47 CFR 12.3 - 911 and E911 analyses and reports.
Code of Federal Regulations, 2013 CFR
2013-10-01
... wireless 911 rules set forth in § 20.18 of this chapter; and interconnected Voice over Internet Protocol... Public Safety and Homeland Security Bureau (PSHSB) has the delegated authority to implement and activate... generation Internet Protocol-based E911 platform. (b) These reports are due 120 days from the date that the...
Voice rest after vocal fold surgery: current practice and evidence.
Coombs, A C; Carswell, A J; Tierney, P A
2013-08-01
Voice rest is commonly recommended after vocal fold surgery, but there is a lack of evidence base and no standard protocol. The aim of this study was to establish common practice regarding voice rest following vocal fold surgery. An online survey was circulated via e-mail invitation to members of the ENT UK Expert Panel between October and November 2011. The survey revealed that 86.5 per cent of respondents agreed that 'complete voice rest' means no sound production at all, but there was variability in how 'relative voice rest' was defined. There was no dominant type of voice rest routinely recommended after surgery for laryngeal papillomatosis or intermediate pathologies. There was considerable variability in the duration of voice rest recommended, with no statistically significant, most popular response (except for malignant lesions). Surgeons with less than 10 years of experience were more likely to recommend fewer days of voice rest. There is a lack of consistency in advice given to patients after vocal fold surgery, in terms of both type and length of voice rest. This may arise from an absence of robust evidence on which to base practice.
Sandoval-Sierra, Jose Vladimir; Diéguez-Uribeondo, Javier
2015-01-01
The description, identification and classification of organisms are the pillar in biodiversity and evolutionary studies. The fungal-like organism Saprolegnia contains important animal pathogens. However, its taxonomy is weak, making it difficult to perform further studies. This problem mainly arises from the unavailability of suitable holotypes. We propose a standardized protocol for describing Saprolegnia spp. that includes good cultural practices and proper holotype preservation. In order to illustrate this new proposal, we describe two species, Saprolegnia aenigmatica sp. nov. and Saprolegnia racemosa sp. nov., based on the recently described molecular operational taxonomic units (MOTUs), phylogenetic relationships, and the analyses of morphological features. We show that they belong to two different MOTUs that are grouped into two sister clades. Morphologically, we find that S. racemosa exhibits a species-specific character, i.e., aggrupation of oogonia in racemes, while S. aenigmatica does not have any specific characters. Analyses of a combined set of characters, i.e., length and breadth of sporangia, length/breadth ratio (l/b) of oogonia, cyst and oospore diameter, and the number of oospores per oogomium, allow distinguishing these two species. To improve Saprolegnia taxonomy, we propose to incorporate into the protologue: (i) several isolates of the new species; (ii) the rDNA sequences to compare them to data-bases of Saprolegnia sequences of reference; (iii) a phylogenetic analysis to check relationships with other species; (iv) to preserve holotypes in absolute ethanol and to include lyophilized material from holotype; and (v) the ex-type as a pure culture from single-spore isolates stored in at least two different collections.
2014-01-01
Background Healthcare reform in the United States is encouraging Federally Qualified Health Centers and other primary-care practices to integrate treatment for addiction and other behavioral health conditions into their practices. The potential of mobile health technologies to manage addiction and comorbidities such as HIV in these settings is substantial but largely untested. This paper describes a protocol to evaluate the implementation of an E-Health integrated communication technology delivered via mobile phones, called Seva, into primary-care settings. Seva is an evidence-based system of addiction treatment and recovery support for patients and real-time caseload monitoring for clinicians. Methods/Design Our implementation strategy uses three models of organizational change: the Program Planning Model to promote acceptance and sustainability, the NIATx quality improvement model to create a welcoming environment for change, and Rogers’s diffusion of innovations research, which facilitates adaptations of innovations to maximize their adoption potential. We will implement Seva and conduct an intensive, mixed-methods assessment at three diverse Federally Qualified Healthcare Centers in the United States. Our non-concurrent multiple-baseline design includes three periods — pretest (ending in four months of implementation preparation), active Seva implementation, and maintenance — with implementation staggered at six-month intervals across sites. The first site will serve as a pilot clinic. We will track the timing of intervention elements and assess study outcomes within each dimension of the Reach, Effectiveness, Adoption, Implementation, and Maintenance framework, including effects on clinicians, patients, and practices. Our mixed-methods approach will include quantitative (e.g., interrupted time-series analysis of treatment attendance, with clinics as the unit of analysis) and qualitative (e.g., staff interviews regarding adaptations to implementation protocol) methods, and assessment of implementation costs. Discussion If implementation is successful, the field will have a proven technology that helps Federally Qualified Health Centers and affiliated organizations provide addiction treatment and recovery support, as well as a proven strategy for implementing the technology. Seva also has the potential to improve core elements of addiction treatment, such as referral and treatment processes. A mobile technology for addiction treatment and accompanying implementation model could provide a cost-effective means to improve the lives of patients with drug and alcohol problems. Trial registration ClinicalTrials.gov (NCT01963234). PMID:24884976
Quanbeck, Andrew R; Gustafson, David H; Marsch, Lisa A; McTavish, Fiona; Brown, Randall T; Mares, Marie-Louise; Johnson, Roberta; Glass, Joseph E; Atwood, Amy K; McDowell, Helene
2014-05-29
Healthcare reform in the United States is encouraging Federally Qualified Health Centers and other primary-care practices to integrate treatment for addiction and other behavioral health conditions into their practices. The potential of mobile health technologies to manage addiction and comorbidities such as HIV in these settings is substantial but largely untested. This paper describes a protocol to evaluate the implementation of an E-Health integrated communication technology delivered via mobile phones, called Seva, into primary-care settings. Seva is an evidence-based system of addiction treatment and recovery support for patients and real-time caseload monitoring for clinicians. Our implementation strategy uses three models of organizational change: the Program Planning Model to promote acceptance and sustainability, the NIATx quality improvement model to create a welcoming environment for change, and Rogers's diffusion of innovations research, which facilitates adaptations of innovations to maximize their adoption potential. We will implement Seva and conduct an intensive, mixed-methods assessment at three diverse Federally Qualified Healthcare Centers in the United States. Our non-concurrent multiple-baseline design includes three periods - pretest (ending in four months of implementation preparation), active Seva implementation, and maintenance - with implementation staggered at six-month intervals across sites. The first site will serve as a pilot clinic. We will track the timing of intervention elements and assess study outcomes within each dimension of the Reach, Effectiveness, Adoption, Implementation, and Maintenance framework, including effects on clinicians, patients, and practices. Our mixed-methods approach will include quantitative (e.g., interrupted time-series analysis of treatment attendance, with clinics as the unit of analysis) and qualitative (e.g., staff interviews regarding adaptations to implementation protocol) methods, and assessment of implementation costs. If implementation is successful, the field will have a proven technology that helps Federally Qualified Health Centers and affiliated organizations provide addiction treatment and recovery support, as well as a proven strategy for implementing the technology. Seva also has the potential to improve core elements of addiction treatment, such as referral and treatment processes. A mobile technology for addiction treatment and accompanying implementation model could provide a cost-effective means to improve the lives of patients with drug and alcohol problems. ClinicalTrials.gov (NCT01963234).
ERIC Educational Resources Information Center
Gallimore, Ronald; Ermeling, Bradley A.; Saunders, William M.; Goldenberg, Claude
2009-01-01
A 5-year prospective, quasi-experimental investigation demonstrated that grade-level teams in 9 Title 1 schools using an inquiry-focused protocol to solve instructional problems significantly increased achievement. Teachers applying the inquiry protocol shifted attribution of improved student performance to their teaching rather than external…
The Utility of Home-Practice in Mindfulness-Based Group Interventions: A Systematic Review.
Lloyd, Annette; White, Ross; Eames, Catrin; Crane, Rebecca
2018-01-01
A growing body of research supports the efficacy of mindfulness-based interventions (MBIs). MBIs consider home-practice as essential to increasing the therapeutic effects of the treatment. To date however, the synthesis of the research conducted on the role of home-practice in controlled MBI studies has been a neglected area. This review aimed to conduct a narrative synthesis of published controlled studies, evaluating mindfulness-based group interventions, which have specifically measured home-practice. Empirical research literature published until June 2016 was searched using five databases. The search strategy focused on mindfulness-based stress reduction (MBSR), mindfulness-based cognitive therapy (MBCT), and home-practice. Included studies met the following criteria: controlled trials, participants 18 years and above, evaluations of MBSR or MBCT, utilised standardised quantitative outcome measures and monitored home-practice using a self-reported measure. Fourteen studies met the criteria and were included in the review. Across all studies, there was heterogeneity in the guidance and resources provided to participants and the approaches used for monitoring home-practice. In addition, the guidance on the length of home-practice was variable across studies, which indicates that research studies and teachers are not adhering to the published protocols. Finally, only seven studies examined the relationship between home-practice and clinical outcomes, of which four found that home-practice predicted improvements on clinical outcome measures. Future research should adopt a standardised approach for monitoring home-practice across MBIs. Additionally, studies should assess whether the amount of home-practice recommended to participants is in line with MBSR/MBCT manualised protocols. Finally, research should utilise experimental methodologies to explicitly explore the relationship between home-practice and clinical outcomes.
Experimental control in software reliability certification
NASA Technical Reports Server (NTRS)
Trammell, Carmen J.; Poore, Jesse H.
1994-01-01
There is growing interest in software 'certification', i.e., confirmation that software has performed satisfactorily under a defined certification protocol. Regulatory agencies, customers, and prospective reusers all want assurance that a defined product standard has been met. In other industries, products are typically certified under protocols in which random samples of the product are drawn, tests characteristic of operational use are applied, analytical or statistical inferences are made, and products meeting a standard are 'certified' as fit for use. A warranty statement is often issued upon satisfactory completion of a certification protocol. This paper outlines specific engineering practices that must be used to preserve the validity of the statistical certification testing protocol. The assumptions associated with a statistical experiment are given, and their implications for statistical testing of software are described.
Practical decoy state for quantum key distribution
DOE Office of Scientific and Technical Information (OSTI.GOV)
Ma Xiongfeng; Qi Bing; Zhao Yi
2005-07-15
Decoy states have recently been proposed as a useful method for substantially improving the performance of quantum key distribution (QKD). Here, we present a general theory of the decoy state protocol based on only two decoy states and one signal state. We perform optimization on the choice of intensities of the two decoy states and the signal state. Our result shows that a decoy state protocol with only two types of decoy states - the vacuum and a weak decoy state - asymptotically approaches the theoretical limit of the most general type of decoy state protocol (with an infinite numbermore » of decoy states). We also present a one-decoy-state protocol. Moreover, we provide estimations on the effects of statistical fluctuations and suggest that, even for long-distance (larger than 100 km) QKD, our two-decoy-state protocol can be implemented with only a few hours of experimental data. In conclusion, decoy state quantum key distribution is highly practical.« less
2014-10-01
offer a practical solution to calculating the grain -scale hetero- geneity present in the deformation field. Consequently, crystal plasticity models...process/performance simulation codes (e.g., crystal plasticity finite element method). 15. SUBJECT TERMS ICME; microstructure informatics; higher...iii) protocols for direct and efficient linking of materials models/databases into process/performance simulation codes (e.g., crystal plasticity
Kumar, Pardeep; Lee, Sang-Gon; Lee, Hoon-Jae
2012-01-01
A wireless medical sensor network (WMSN) can sense humans’ physiological signs without sacrificing patient comfort and transmit patient vital signs to health professionals’ hand-held devices. The patient physiological data are highly sensitive and WMSNs are extremely vulnerable to many attacks. Therefore, it must be ensured that patients’ medical signs are not exposed to unauthorized users. Consequently, strong user authentication is the main concern for the success and large scale deployment of WMSNs. In this regard, this paper presents an efficient, strong authentication protocol, named E-SAP, for healthcare application using WMSNs. The proposed E-SAP includes: (1) a two-factor (i.e., password and smartcard) professional authentication; (2) mutual authentication between the professional and the medical sensor; (3) symmetric encryption/decryption for providing message confidentiality; (4) establishment of a secure session key at the end of authentication; and (5) professionals can change their password. Further, the proposed protocol requires three message exchanges between the professional, medical sensor node and gateway node, and achieves efficiency (i.e., low computation and communication cost). Through the formal analysis, security analysis and performance analysis, we demonstrate that E-SAP is more secure against many practical attacks, and allows a tradeoff between the security and the performance cost for healthcare application using WMSNs. PMID:22438729
Kumar, Pardeep; Lee, Sang-Gon; Lee, Hoon-Jae
2012-01-01
A wireless medical sensor network (WMSN) can sense humans' physiological signs without sacrificing patient comfort and transmit patient vital signs to health professionals' hand-held devices. The patient physiological data are highly sensitive and WMSNs are extremely vulnerable to many attacks. Therefore, it must be ensured that patients' medical signs are not exposed to unauthorized users. Consequently, strong user authentication is the main concern for the success and large scale deployment of WMSNs. In this regard, this paper presents an efficient, strong authentication protocol, named E-SAP, for healthcare application using WMSNs. The proposed E-SAP includes: (1) a two-factor (i.e., password and smartcard) professional authentication; (2) mutual authentication between the professional and the medical sensor; (3) symmetric encryption/decryption for providing message confidentiality; (4) establishment of a secure session key at the end of authentication; and (5) professionals can change their password. Further, the proposed protocol requires three message exchanges between the professional, medical sensor node and gateway node, and achieves efficiency (i.e., low computation and communication cost). Through the formal analysis, security analysis and performance analysis, we demonstrate that E-SAP is more secure against many practical attacks, and allows a tradeoff between the security and the performance cost for healthcare application using WMSNs.
Wang, Yingwen; Kong, Meijing; Ge, Youhong
2016-12-01
Extravasation in a pediatric patient can cause a serious adverse event, but many nurses have insufficient experience to deal with it during intravenous administration. Our division implemented a best practice project, which included extravasation kit instruction preparation, staff education and an update of institutional policy and procedures. The project focused on auditing the extent to which the protocol was implemented and promoting its implementation. The objective of the project was to establish an evidence-based policy and procedure for extravasation management, improve knowledge regarding best practice of extravasation management among staff and formalize the documentation template for extravasation events. The Joanna Briggs Institute's Practical Application of Clinical Evidence System and Getting Research into Practice were used to examine compliance with criteria based on the best available evidence before and after the implementation of strategies to promote the use of the evidence-based practice protocol. Four criteria showed a noticeable improvement in compliance: increased use of extravasation kit (0-100%), updated policies and procedure (0-94%), staff education (19-94%) and documented outcomes (13-88%). The project successfully established effective strategies for establishing an extravasation kit instruction sheet, updating policies and procedures, continuous staff education and nursing documentation to ensure best practice and improve patient outcomes.
Urban, Ruth A; Rowe, Dorothy J
2015-02-01
The purpose of this study was to survey dental hygienists to determine their knowledge, attitudes and practices regarding the implementation of caries risk assessment, particularly caries management by risk assessment (CAMBRA), in private dental practices. A 17 item survey was developed to evaluate dental hygienists' knowledge, attitudes and practices related to CAMBRA and perceived barriers to CAMBRA implementation in private dental practice. Surveys were mailed to a randomized sample of 1,000 dental hygienists licensed to practice in California. Responses were tabulated for each respondent, and the response frequency for each survey item was calculated. Respondents' comments to the open-ended question were compiled, according to themes. The response rate was 18%. Only 66% of the respondents were familiar with the term CAMBRA, although 89% agreed with its underlying principles of risk assessment. CAMBRA protocol had been implemented in 40% of the respondents' employment sites. Respondents disagreed that time (45%) and cost of products (68%) were barriers to implementation. Many did not know their employers' knowledge or attitudes about CAMBRA and its implementation, as evidenced by a "don't know" response range of 29 to 48% for the 4 relevant statements. Respondents' comments included both successes and barriers implementing CAMBRA. CAMBRA protocol has not been widely implemented in private practice, although the current data do not indicate insurmountable barriers. Broader dissemination may be feasible if dental hygienists would obtain more comprehensive knowledge of evidence-based risk assessment protocols and would assume a leadership role in implementing CAMBRA protocols and procedures in private dental practices. Copyright © 2015 The American Dental Hygienists’ Association.
Rojo, Elena; Oruña, Clara; Sierra, Dolores; García, Gema; Del Moral, Ignacio; Maestre, Jose M
2016-04-01
We analyzed the impact of simulation-based training on clinical practice and work processes on teams caring for patients with possible Ebola virus disease (EVD) in Cantabria, Spain. The Government of Spain set up a special committee for the management of EVD, and the Spanish Ministry of Health and foreign health services created an action protocol. Each region is responsible for selecting a reference hospital and an in-house care team to care for patients under investigation. Laboratory-confirmed cases of EVD have to be transferred to the Carlos III Health Institute in Madrid. Predeployment training and follow-up support are required to help personnel work safely and effectively. Simulation-based scenarios were designed to give staff the opportunity to practice before encountering a real-life situation. Lessons learned by each team during debriefings were listed, and a survey administered 3 months later assessed the implementation of practice and system changes. Implemented changes were related to clinical practice (eg, teamwork principles application), protocol implementation (eg, addition of new processes and rewriting of confusing parts), and system and workflow (eg, change of shift schedule and rearrangement of room equipment). Simulation can be used to detect needed changes in protocol or guidelines or can be adapted to meet the needs of a specific team.
Cognitive Hypnotherapy as a Transdiagnostic Protocol for Emotional Disorders.
Alladin, Assen; Amundson, Jon
2016-01-01
This article describes cognitive hypnotherapy (CH), an integrative treatment that provides an evidence-based framework for synthesizing clinical practice and research. CH combines hypnotherapy with cognitive-behavior therapy in the management of emotional disorders. This blended version of clinical practice meets criteria for an assimilative model of integrative psychotherapy, which incorporates both theory and empirical findings. Issues related to (a) additive effect of hypnosis in treatment, (b) transdiagnostic consideration, and (c) unified treatment protocols in the treatment of emotional disorders are considered in light of cognitive hypnotherapy.
Fassier, J-B; Lamort-Bouché, M; Sarnin, P; Durif-Bruckert, C; Péron, J; Letrilliart, L; Durand, M-J
2016-02-01
Health promotion programs are expected to improve population health and reduce social inequalities in health. However, their theoretical foundations are frequently ill-defined, and their implementation faces many obstacles. The aim of this article is to describe the intervention mapping protocol in health promotion programs planning, used recently in several countries. The challenges of planning health promotion programs are presented, and the six steps of the intervention mapping protocol are described with an example. Based on a literature review, the use of this protocol, its requirements and potential limitations are discussed. The intervention mapping protocol has four essential characteristics: an ecological perspective (person-environment), a participative approach, the use of theoretical models in human and social sciences and the use of scientific evidence. It comprises six steps: conduct a health needs assessment, define change objectives, select theory-based change techniques and practical applications, organize techniques and applications into an intervention program (logic model), plan for program adoption, implementation, and sustainability, and generate an evaluation plan. This protocol was used in different countries and domains such as obesity, tobacco, physical activity, cancer and occupational health. Although its utilization requires resources and a critical stance, this protocol was used to develop interventions which efficacy was demonstrated. The intervention mapping protocol is an integrated process that fits the scientific and practical challenges of health promotion. It could be tested in France as it was used in other countries, in particular to reduce social inequalities in health. Copyright © 2016. Published by Elsevier Masson SAS.
2007-01-28
is interested in B2B and B2C e-commerce, enterprise resource planning, e-procurement, supply-chain management, data mining, and knowledge discovery... social networking tools, collaborative spaces, knowledge management, “connecting-enabling” protocols like RSS, and other tools. The intent of the ILE...delivered to them, what learning pedagogy is appropriate for them, the optimal level of social interaction for learning, and available resources
Kobulashvili, Teia; Höfler, Julia; Dobesberger, Judith; Ernst, Florian; Ryvlin, Philippe; Cross, J Helen; Braun, Kees; Dimova, Petia; Francione, Stefano; Hecimovic, Hrvoje; Helmstaedter, Christoph; Kimiskidis, Vasilios K; Lossius, Morten Ingvar; Malmgren, Kristina; Marusic, Petr; Steinhoff, Bernhard J; Boon, Paul; Craiu, Dana; Delanty, Norman; Fabo, Daniel; Gil-Nagel, Antonio; Guekht, Alla; Hirsch, Edouard; Kalviainen, Reetta; Mameniskiené, Ruta; Özkara, Çiğdem; Seeck, Margitta; Rubboli, Guido; Krsek, Pavel; Rheims, Sylvain; Trinka, Eugen
2016-05-01
The European Union-funded E-PILEPSY network aims to improve awareness of, and accessibility to, epilepsy surgery across Europe. In this study we assessed current clinical practices in epilepsy monitoring units (EMUs) in the participating centers. A 60-item web-based survey was distributed to 25 centers (27 EMUs) of the E-PILEPSY network across 22 European countries. The questionnaire was designed to evaluate the characteristics of EMUs, including organizational aspects, admission, and observation of patients, procedures performed, safety issues, cost, and reimbursement. Complete responses were received from all (100%) EMUs surveyed. Continuous observation of patients was performed in 22 (81%) EMUs during regular working hours, and in 17 EMUs (63%) outside of regular working hours. Fifteen (56%) EMUs requested a signed informed consent before admission. All EMUs performed tapering/withdrawal of antiepileptic drugs, 14 (52%) prior to admission to an EMU. Specific protocols on antiepileptic drugs (AED) tapering were available in four (15%) EMUs. Standardized Operating Procedures (SOP) for the treatment of seizure clusters and status epilepticus were available in 16 (59%). Safety measures implemented by EMUs were: alarm seizure buttons in 21 (78%), restricted patient's ambulation in 19 (70%), guard rails in 16 (59%), and specially designated bathrooms in 7 (26%). Average costs for one inpatient day in EMU ranged between 100 and 2200 Euros. This study shows a considerable diversity in the organization and practice patterns across European epilepsy monitoring units. The collected data may contribute to the development and implementation of evidence-based recommended practices in LTM services across Europe. Copyright © 2016 The Authors. Published by Elsevier Ltd.. All rights reserved.
Enhancement of Beaconless Location-Based Routing with Signal Strength Assistance for Ad-Hoc Networks
NASA Astrophysics Data System (ADS)
Chen, Guowei; Itoh, Kenichi; Sato, Takuro
Routing in Ad-hoc networks is unreliable due to the mobility of the nodes. Location-based routing protocols, unlike other protocols which rely on flooding, excel in network scalability. Furthermore, new location-based routing protocols, like, e. g. BLR [1], IGF [2], & CBF [3] have been proposed, with the feature of not requiring beacons in MAC-layer, which improve more in terms of scalability. Such beaconless routing protocols can work efficiently in dense network areas. However, these protocols' algorithms have no ability to avoid from routing into sparse areas. In this article, historical signal strength has been added as a factor into the BLR algorithm, which avoids routing into sparse area, and consequently improves the global routing efficiency.
Toward Synthesis, Analysis, and Certification of Security Protocols
NASA Technical Reports Server (NTRS)
Schumann, Johann
2004-01-01
Implemented security protocols are basically pieces of software which are used to (a) authenticate the other communication partners, (b) establish a secure communication channel between them (using insecure communication media), and (c) transfer data between the communication partners in such a way that these data only available to the desired receiver, but not to anyone else. Such an implementation usually consists of the following components: the protocol-engine, which controls in which sequence the messages of the protocol are sent over the network, and which controls the assembly/disassembly and processing (e.g., decryption) of the data. the cryptographic routines to actually encrypt or decrypt the data (using given keys), and t,he interface to the operating system and to the application. For a correct working of such a security protocol, all of these components must work flawlessly. Many formal-methods based techniques for the analysis of a security protocols have been developed. They range from using specific logics (e.g.: BAN-logic [4], or higher order logics [12] to model checking [2] approaches. In each approach, the analysis tries to prove that no (or at least not a modeled intruder) can get access to secret data. Otherwise, a scenario illustrating the &tack may be produced. Despite the seeming simplicity of security protocols ("only" a few messages are sent between the protocol partners in order to ensure a secure communication), many flaws have been detected. Unfortunately, even a perfect protocol engine does not guarantee flawless working of a security protocol, as incidents show. Many break-ins and security vulnerabilities are caused by exploiting errors in the implementation of the protocol engine or the underlying operating system. Attacks using buffer-overflows are a very common class of such attacks. Errors in the implementation of exception or error handling can open up additional vulnerabilities. For example, on a website with a log-in screen: multiple tries with invalid passwords caused the expected error message (too many retries). but let the user nevertheless pass. Finally, security can be compromised by silly implementation bugs or design decisions. In a commercial VPN software, all calls to the encryption routines were incidentally replaced by stubs, probably during factory testing. The product worked nicely. and the error (an open VPN) would have gone undetected, if a team member had not inspected the low-level traffic out of curiosity. Also, the use secret proprietary encryption routines can backfire, because such algorithms often exhibit weaknesses which can be exploited easily (see e.g., DVD encoding). Summarizing, there is large number of possibilities to make errors which can compromise the security of a protocol. In today s world with short time-to-market and the use of security protocols in open and hostile networks for safety-critical applications (e.g., power or air-traffic control), such slips could lead to catastrophic situations. Thus, formal methods and automatic reasoning techniques should not be used just for the formal proof of absence of an attack, but they ought to be used to provide an end-to-end tool-supported framework for security software. With such an approach all required artifacts (code, documentation, test cases) , formal analyses, and reliable certification will be generated automatically, given a single, high level specification. By a combination of program synthesis, formal protocol analysis, certification; and proof-carrying code, this goal is within practical reach, since all the important technologies for such an approach actually exist and only need to be assembled in the right way.
Lund, Travis J; Pilarz, Matthew; Velasco, Jonathan B; Chakraverty, Devasmita; Rosploch, Kaitlyn; Undersander, Molly; Stains, Marilyne
2015-01-01
Researchers, university administrators, and faculty members are increasingly interested in measuring and describing instructional practices provided in science, technology, engineering, and mathematics (STEM) courses at the college level. Specifically, there is keen interest in comparing instructional practices between courses, monitoring changes over time, and mapping observed practices to research-based teaching. While increasingly common observation protocols (Reformed Teaching Observation Protocol [RTOP] and Classroom Observation Protocol in Undergraduate STEM [COPUS]) at the postsecondary level help achieve some of these goals, they also suffer from weaknesses that limit their applicability. In this study, we leverage the strengths of these protocols to provide an easy method that enables the reliable and valid characterization of instructional practices. This method was developed empirically via a cluster analysis using observations of 269 individual class periods, corresponding to 73 different faculty members, 28 different research-intensive institutions, and various STEM disciplines. Ten clusters, called COPUS profiles, emerged from this analysis; they represent the most common types of instructional practices enacted in the classrooms observed for this study. RTOP scores were used to validate the alignment of the 10 COPUS profiles with reformed teaching. Herein, we present a detailed description of the cluster analysis method, the COPUS profiles, and the distribution of the COPUS profiles across various STEM courses at research-intensive universities. © 2015 T. J. Lund et al. CBE—Life Sciences Education © 2015 The American Society for Cell Biology. This article is distributed by The American Society for Cell Biology under license from the author(s). It is available to the public under an Attribution–Noncommercial–Share Alike 3.0 Unported Creative Commons License (http://creativecommons.org/licenses/by-nc-sa/3.0).
Weaver, Charlotte A; Warren, Judith J; Delaney, Connie
2005-12-01
The rise of evidence-base practice (EBP) as a standard for care delivery is rapidly emerging as a global phenomenon that is transcending political, economic and geographic boundaries. Evidence-based nursing (EBN) addresses the growing body of nursing knowledge supported by different levels of evidence for best practices in nursing care. Across all health care, including nursing, we face the challenge of how to most effectively close the gap between what is known and what is practiced. There is extensive literature on the barriers and difficulties of translating research findings into practical application. While the literature refers to this challenge as the "Bench to Bedside" lag, this paper presents three collaborative strategies that aim to minimize this gap. The Bedside strategy proposes to use the data generated from care delivery and captured in the massive data repositories of electronic health record (EHR) systems as empirical evidence that can be analysed to discover and then inform best practice. In the Classroom strategy, we present a description for how evidence-based nursing knowledge is taught in a baccalaureate nursing program. And finally, the Bench strategy describes applied informatics in converting paper-based EBN protocols into the workflow of clinical information systems. Protocols are translated into reference and executable knowledge with the goal of placing the latest scientific knowledge at the fingertips of front line clinicians. In all three strategies, information technology (IT) is presented as the underlying tool that makes this rapid translation of nursing knowledge into practice and education feasible.
NASA Astrophysics Data System (ADS)
Frey, Davide; Guerraoui, Rachid; Kermarrec, Anne-Marie; Koldehofe, Boris; Mogensen, Martin; Monod, Maxime; Quéma, Vivien
Gossip-based information dissemination protocols are considered easy to deploy, scalable and resilient to network dynamics. Load-balancing is inherent in these protocols as the dissemination work is evenly spread among all nodes. Yet, large-scale distributed systems are usually heterogeneous with respect to network capabilities such as bandwidth. In practice, a blind load-balancing strategy might significantly hamper the performance of the gossip dissemination.
McClelland, Shearwood; Chernykh, Marina; Dengina, Natalia; Gillespie, Erin F; Likhacheva, Anna; Usychkin, Sergey; Pankratov, Alexandr; Kharitonova, Ekaterina; Egorova, Yulia; Tsimafeyeu, Ilya; Tjulandin, Sergei; Thomas, Charles R; Mitin, Timur
2018-06-25
Radiation oncologists in Russia face a number of unique professional difficulties including lack of standardized training and continuing medical education. To combat this, under the auspices of the Russian Society of Clinical Oncology (RUSSCO), our group has developed a series of ongoing in-person interactive contouring workshops that are held during the major Russian oncology conferences in Moscow, Russia. Since November 2016 during each workshop, we utilized a web-based open-access interactive three-dimensional contouring atlas as part of our didactics. We sought to determine the impact of this resource on radiation oncology practice in Russia. We distributed an IRB-approved web-based survey to 172 practicing radiation oncologists in Russia. We inquired about practice demographics, RUSSCO contouring workshop attendance, and the clinical use of open-access English language interactive contouring atlas (eContour). The survey remained open for 2 months until November 2017. Eighty radiation oncologists completed the survey with a 46.5% response rate. Mean number of years in practice was 13.7. Sixty respondents (75%) attended at least one RUSSCO contouring workshop. Of those who were aware of eContour, 76% were introduced during a RUSSCO contouring workshop, and 81% continue to use it in their daily practice. The greatest obstacles to using the program were language barrier (51%) and internet access (38%). Nearly 90% reported their contouring practices changed since they started using the program, particularly for delineation of clinical target volumes (57%) and/or organs at risk (46%). More than 97% found the clinical pearls/links to cooperative group protocols in the software helpful in their daily practice. The majority used the contouring program several times per month (43%) or several times per week (41%). Face-to-face contouring instruction in combination with open-access web-based interactive contouring resource had a meaningful impact on perceived quality of radiation oncology contours among Russian practitioners and has the potential to have applications worldwide.
Crafting practice guidelines in the world of evidence-based medicine.
Chung, Kevin C; Shauver, Melissa J
2009-10-01
In the era of exponential increase in the medical literature, physicians and health policy-makers are relying on well-constructed, evidence-based practice guidelines to help ensure that the care given to patients is based on valid, scientific data. The construction of practice guidelines, however, may not always adhere to accepted research protocol. In this article, the authors detail the steps required to produce effective, evidence-based practice guidelines. The seven essential steps in crafting a practice guideline are presented: (1) defining a topic, (2) selecting a work group, (3) performing a literature review, (4) writing the guideline, (5) peer review, (6) making plans for review and revision, and (7) dissemination. Given the importance of practice guidelines in supporting everyday practice, this article strives to provide a practical guide in the development of this key component of evidence-based medicine.
Gemma, M; Toma, S; Lira Luce, F; Beretta, L; Braga, M; Bussi, M
2017-12-01
Enhanced recovery programs (ERP) represent a multimodal approach to perioperative patient care. The benefits of ERP are well demonstrated in colorectal surgery and Enhanced Recovery After Surgery (ERAS®) programs, that epitomise the ERP concept, have being introduced in different specialties, including vascular, gastric, pancreatic, urogynecologic and orthopaedic surgery. However, no ERP has been proposed for head and neck surgery. We developed an expert-opinion-based ERP for laryngeal surgery based on the key principles of colorectal surgery ERAS®. Twenty-four patients undergoing major laryngeal surgery (total and partial laryngectomies or surgical removal of oropharyngeal tumour with muscle flap reconstruction) were treated according to such an ERP protocol, which differed under several respects from our previous standard practice (described in 70 consecutive patients who underwent major laryngeal surgery before ERP implementation. The adherence rate to the different ERP items is reported. Adherence to ERP items was high. Nutritional assessment, antibiotic prophylaxis, postoperative nausea and vomit (PONV) prophylaxis and postoperative speech therapy targets were applied as required in 100% of cases. Some ERP items (antibiotic prophylaxis, intraoperative infusion rate, and postoperative speech therapy) were already frequently implemented before ERP adoption. Postoperative medical complications occurred in 8.3% of patients. Our expert opinion-based ERP protocol for major laryngeal surgery proved feasible. The degree of benefit deriving from its implementation has yet to be assessed. © Copyright by Società Italiana di Otorinolaringologia e Chirurgia Cervico-Facciale, Rome, Italy.
Principle of minimal work fluctuations.
Xiao, Gaoyang; Gong, Jiangbin
2015-08-01
Understanding and manipulating work fluctuations in microscale and nanoscale systems are of both fundamental and practical interest. For example, in considering the Jarzynski equality 〈e-βW〉=e-βΔF, a change in the fluctuations of e-βW may impact how rapidly the statistical average of e-βW converges towards the theoretical value e-βΔF, where W is the work, β is the inverse temperature, and ΔF is the free energy difference between two equilibrium states. Motivated by our previous study aiming at the suppression of work fluctuations, here we obtain a principle of minimal work fluctuations. In brief, adiabatic processes as treated in quantum and classical adiabatic theorems yield the minimal fluctuations in e-βW. In the quantum domain, if a system initially prepared at thermal equilibrium is subjected to a work protocol but isolated from a bath during the time evolution, then a quantum adiabatic process without energy level crossing (or an assisted adiabatic process reaching the same final states as in a conventional adiabatic process) yields the minimal fluctuations in e-βW, where W is the quantum work defined by two energy measurements at the beginning and at the end of the process. In the classical domain where the classical work protocol is realizable by an adiabatic process, then the classical adiabatic process also yields the minimal fluctuations in e-βW. Numerical experiments based on a Landau-Zener process confirm our theory in the quantum domain, and our theory in the classical domain explains our previous numerical findings regarding the suppression of classical work fluctuations [G. Y. Xiao and J. B. Gong, Phys. Rev. E 90, 052132 (2014)].
Yang, Ying-Ying; Yang, Ling-Yu; Hsu, Hui-Chi; Huang, Chia-Chang; Huang, Chin-Chou; Kirby, Ralph; Cheng, Hao Min; Chang, Ching-Chi; Chuang, Chiao-Lin; Liang, Jen-Feng; Lin, Chun-Chi; Lee, Wei-Shin; Ho, Shung-Tai; Lee, Fa-Yauh
2015-01-01
The current study focused on validating a protocol for training and auditing the resident's practice-based learning and improvement (PBLI) and quality improvement (QI) competencies for primary care. Twelve second-year (R2), 12 first-year (R1) and 12 postgraduate year-1 residents were enrolled into group A, B and C, respectively, as trainees. After three training protocols had been completed, a writing test, self-assessed questionnaire and mini-OSTE and end-of-rotation assessment were used in auditing the PBLI competency, performance and teaching ability of trainees. Baseline expert-assessed PBLI and QI knowledge application tool writing scores were low for the R1 and R2 residents. After three training protocols, PBLI and QI proficiencies, performance and teaching abilities were improved to similar levels cross the three training levels of residents based on the expert-assessed writing test-audited assessments and on the faculty and standardized clerk-assessed end-of-rotation-/mini-OSTE-audited assessments. The different four-level hierarchical protocols used to teach group A, B and C were equally beneficial and fitted their needs; namely the different levels of the trainees. Specifically, each level was able to augment their PBLI and QI proficiency. This educational intervention helps medical institutions to train residents as PBLI instructors.
ERIC Educational Resources Information Center
Whitworth, David E.
2016-01-01
Laboratory-based practical classes are a common feature of life science teaching, during which students learn how to perform experiments and generate/interpret data. Practical classes are typically instructional, concentrating on providing topic- and technique-specific skills, however to produce research-capable graduates it is also important to…
NASA Astrophysics Data System (ADS)
Amerimehr, Ali; Hadain Dehkordi, Massoud
2018-03-01
We analyze the security of a quantum secure direct communication and authentication protocol based on single photons. We first give an impersonation attack on the protocol. The cryptanalysis shows that there is a gap in the authentication procedure of the protocol so that an opponent can reveal the secret information by an undetectable attempt. We then propose an improvement for the protocol and show it closes the gap by applying a mutual authentication procedure. In the improved protocol single photons are transmitted once in a session, so it is easy to implement as the primary protocol. Furthermore, we use a novel technique for secret order rearrangement of photons by which not only quantum storage is eliminated also a secret key can be reused securely. So the new protocol is applicable in practical approaches like embedded system devices.
Mateus, Ana L P; Brodbelt, David C; Barber, Nick; Stärk, Katharina D C
2014-11-01
Responsible use of antimicrobials by veterinarians is essential to contain antimicrobial resistance in pathogens relevant to public health. Inappropriate antimicrobial use has been previously described in practice. However, there is scarce information on factors influencing antimicrobial usage in dogs and cats. We investigated intrinsic and extrinsic factors influencing decision-making of antimicrobial usage in first opinion small animal practices in the UK through the application of qualitative research methods. Semi-structured interviews were conducted with 21 veterinarians from seven veterinary first opinion practices in the UK in 2010. Topics investigated included: a) criteria used for selection of antimicrobials, b) influences by colleagues, c) influences by clients, d) pet characteristics, e) sources of knowledge, f) awareness of guidelines and g) protocols implemented in practice that may affect antimicrobial usage by veterinarians. Hypothetical scenarios selected to assess appropriateness of antimicrobial usage were: a) vomiting in a Yorkshire Terrier due to dietary indiscretion, b) deep pyoderma in a Shar-Pei, c) Feline Lower Urinary Tract disease in an 7 year-old male neutered cat and d) neutering of a 6-months dog. Interviews were recorded and transcribed by the interviewer. Thematic analysis was used to analyse content of transcribed interviews. Data management and analysis was conducted with qualitative analysis software NVivo8 (QSR International Pty Ltd). Antimicrobial usage by participants was influenced by factors other than clinical evidence and scientific knowledge. Intrinsic factors included veterinarian's preference of substances and previous experience. Extrinsic factors influencing antimicrobial selection were; perceived efficacy, ease of administration of formulations, perceived compliance, willingness and ability to treat by pet owners, and animal characteristics. Cost of therapy was only perceived as an influential factor in low, mixed socioeconomic areas. Veterinarians had limited awareness of current recommendations for responsible use in small animal practice. Social norms, particularly verbally agreed protocols influenced veterinarians. Inappropriate antimicrobial usage was identified in the therapy of non-infectious diseases and prophylaxis of routine clean surgical procedures. Discussion of clinical cases with peers and effectiveness meetings in the workplace were useful to veterinarians to share scientific knowledge. Effectiveness meetings can be a common ground for veterinarians to discuss and agree protocols for clinical conditions and surgical procedures. Protocols should be evidence-based, follow current recommendations and take into account the resources available in the workplace. Targeted training of veterinarians in the workplace with peer support should be used to promote responsible antimicrobial usage. Copyright © 2014 Elsevier B.V. All rights reserved.
Goal-setting protocol in adherence to exercise by Italian adults.
Annesi, James J
2002-04-01
A goal-setting protocol, based on research in goal setting and performance and personal construct theory, was tested for its effect on adherence to a new exercise program. The Goal-setting group (n = 50) had significantly less dropout (30%) than the control group (n = 50) (74%). The Goal-setting group also had significantly better attendance (p<.0001). Suggestions for increasing confidence in findings through further research and practical implications of using the protocol to improve exercise maintenance across settings were discussed.
Research in DRM architecture based on watermarking and PKI
NASA Astrophysics Data System (ADS)
Liu, Ligang; Chen, Xiaosu; Xiao, Dao-ju; Yi, Miao
2005-02-01
Analyze the virtue and disadvantage of the present digital copyright protecting system, design a kind of security protocol model of digital copyright protection, which equilibrium consider the digital media"s use validity, integrality, security of transmission, and trade equity, make a detailed formalize description to the protocol model, analyze the relationship of the entities involved in the digital work copyright protection. The analysis of the security and capability of the protocol model shows that the model is good at security and practicability.
Osborne, Nikola K P; Taylor, Michael C
2018-05-01
This article describes a New Zealand forensic agency's contextual information management protocol for bloodstain pattern evidence examined in the laboratory. In an effort to create a protocol that would have minimal impact on current work-flow, while still effectively removing task-irrelevant contextual information, the protocol was designed following an in-depth consultation with management and forensic staff. The resulting design was for a protocol of independent-checking (i.e. blind peer-review) where the checker's interpretation of the evidence is conducted in the absence of case information and the original examiner's notes or interpretation(s). At the conclusion of a ten-case trial period, there was widespread agreement that the protocol had minimal impact on the number of people required, the cost, or the time to complete an item examination. The agency is now looking to adopt the protocol into standard operating procedures and in some cases the protocol has been extended to cover other laboratory-based examinations (e.g. fabric damage, shoeprint examination, and physical fits). The protocol developed during this trial provides a useful example for agencies seeking to adopt contextual information management into their workflow. Copyright © 2018 The Chartered Society of Forensic Sciences. Published by Elsevier B.V. All rights reserved.
Multiprofissional electronic protocol in ophtalmology with enfasis in strabismus.
Ribeiro, Christie Graf; Moreira, Ana Tereza Ramos; Pinto, José Simão DE Paula; Malafaia, Osvaldo
2016-01-01
to create and validate an electronic database in ophthalmology focused on strabismus, to computerize this database in the form of a systematic data collection software named Electronic Protocol, and to incorporate this protocol into the Integrated System of Electronic Protocols (SINPE(c)). this is a descriptive study, with the methodology divided into three phases: (1) development of a theoretical ophthalmologic database with emphasis on strabismus; (2) computerization of this theoretical ophthalmologic database using SINPE(c) and (3) interpretation of the information with demonstration of results to validate the protocol. We inputed data from the charts of fifty patients with known strabismus through the Electronic Protocol for testing and validation. the new electronic protocol was able to store information regarding patient history, physical examination, laboratory exams, imaging results, diagnosis and treatment of patients with ophthalmologic diseases, with emphasis on strabismus. We included 2,141 items in this master protocol and created 20 new specific electronic protocols for strabismus, each with its own specifics. Validation was achieved through correlation and corroboration of the symptoms and confirmed diagnoses of the fifty included patients with the diagnostic criteria for the twenty new strabismus protocols. a new, validated electronic database focusing on ophthalmology, with emphasis on strabismus, was successfully created through the standardized collection of information, and computerization of the database using proprietary software. This protocol is ready for deployment to facilitate data collection, sorting and application for practitioners and researchers in numerous specialties. criar uma base eletrônica de dados em oftalmologia com ênfase em estrabismo através da coleta padronizada de informações. Informatizar esta base sob a forma de software para a coleta sistemática de dados chamado "Protocolo Eletrônico" e incorporar este "Protocolo Eletrônico" da Oftalmologia ao Sistema Integrado de Protocolos Eletrônicos (SINPE(c)). este é um estudo descritivo e a metodologia aplicada em seu desenvolvimento está didaticamente dividida em três fases: 1) criação da base teórica de dados clínicos de oftalmologia com ênfase em estrabismo; 2) informatização da base teórica dos dados utilizando o SINPE(c); e 3) interpretação das informações com demonstração dos resultados. A informatização da base de dados foi realizada pela utilização da concessão de uso do SINPE(c). Foram incluídos neste protocolo 50 pacientes com estrabismo para validação do protocolo. o protocolo eletrônico desenvolvido permitiu armazenar informações relacionadas à anamnese, exame físico, exames complementares, diagnóstico e tratamento de pacientes com doenças oftalmológicas, com ênfase em estrabismo. Foram incluídos neste trabalho 2141 itens no protocolo mestre e foram criados 20 protocolos específicos de estrabismo, cada um com suas particularidades. Os 50 pacientes que foram incluídos nos protocolos específicos demonstraram a eficácia do método empregado. foi criada uma base eletrônica de dados em oftalmologia com ênfase em estrabismo através da coleta padronizada de informações. Esta base de dados foi informatizada sob a forma de software onde os futuros usuários poderão utilizar o protocolo eletrônico multiprofissional de doenças oftalmológicas com ênfase em estrabismo para a coleta de seus dados.
Cong, Lin-Juan; Wang, Ru-Jie; Yu, Cong; Zhang, Jun-Yun
2016-01-01
Visual perceptual learning is known to be specific to the trained retinal location, feature, and task. However, location and feature specificity can be eliminated by double-training or TPE training protocols, in which observers receive additional exposure to the transfer location or feature dimension via an irrelevant task besides the primary learning task Here we tested whether these new training protocols could even make learning transfer across different tasks involving discrimination of basic visual features (e.g., orientation and contrast). Observers practiced a near-threshold orientation (or contrast) discrimination task. Following a TPE training protocol, they also received exposure to the transfer task via performing suprathreshold contrast (or orientation) discrimination in alternating blocks of trials in the same sessions. The results showed no evidence for significant learning transfer to the untrained near-threshold contrast (or orientation) discrimination task after discounting the pretest effects and the suprathreshold practice effects. These results thus do not support a hypothetical task-independent component in perceptual learning of basic visual features. They also set the boundary of the new training protocols in their capability to enable learning transfer. PMID:26873777
Analysis of practical backoff protocols for contention resolution with multiple servers
DOE Office of Scientific and Technical Information (OSTI.GOV)
Goldberg, L.A.; MacKenzie, P.D.
Backoff protocols are probably the most widely used protocols for contention resolution in multiple access channels. In this paper, we analyze the stochastic behavior of backoff protocols for contention resolution among a set of clients and servers, each server being a multiple access channel that deals with contention like an Ethernet channel. We use the standard model in which each client generates requests for a given server according to a Bemoulli distribution with a specified mean. The client-server request rate of a system is the maximum over all client-server pairs (i, j) of the sum of all request rates associatedmore » with either client i or server j. Our main result is that any superlinear polynomial backoff protocol is stable for any multiple-server system with a sub-unit client-server request rate. We confirm the practical relevance of our result by demonstrating experimentally that the average waiting time of requests is very small when such a system is run with reasonably few clients and reasonably small request rates such as those that occur in actual ethernets. Our result is the first proof of stability for any backoff protocol for contention resolution with multiple servers. Our result is also the first proof that any weakly acknowledgment based protocol is stable for contention resolution with multiple servers and such high request rates. Two special cases of our result are of interest. Hastad, Leighton and Rogoff have shown that for a single-server system with a sub-unit client-server request rate any modified superlinear polynomial backoff protocol is stable. These modified backoff protocols are similar to standard backoff protocols but require more random bits to implement. The special case of our result in which there is only one server extends the result of Hastad, Leighton and Rogoff to standard (practical) backoff protocols. Finally, our result applies to dynamic routing in optical networks.« less
Comparing Usual Care With a Warfarin Initiation Protocol After Mechanical Heart Valve Replacement.
Roberts, Gregory; Razooqi, Rasha; Quinn, Stephen
2017-03-01
The immediate postoperative warfarin sensitivity for patients receiving heart valve prostheses is increased. Established warfarin initiation protocols may lack clinical applicability, resulting in dosing based on clinical judgment. To compare current practice for warfarin initiation with a known warfarin initiation protocol, with doses proportionally reduced to account for the increased postoperative sensitivity. We compared the Mechanical Heart Valve Warfarin Initiation Protocol (Protocol group) with current practice (clinical judgment-Empirical group) for patients receiving mechanical heart valves in an observational before-and-after format. End points were the time to achieve a stable therapeutic international normalized ratio (INR), doses held in the first 6 days, and overanticoagulation in the first 6 days. The Protocol group (n = 37) achieved a stable INR more rapidly than the Empirical group (n = 77; median times 5.1 and 8.7 days, respectively; P = 0.002). Multivariable analysis indicated that the Protocol group (hazard ratio [HR] = 2.22; P = 0.005) and men (HR = 1.76; P = 0.043) more rapidly achieved a stable therapeutic INR. Age, serum albumin, amiodarone, presence of severe heart failure, and surgery type had no impact. Protocol patients had fewer doses held (1.1% vs 10.1%, P < 0.001) and no difference in overanticoagulation (2.7% vs 9.1%, P = 0.27). The Mechanical Heart Valve Warfarin Initiation Protocol provided a reliable approach to initiating warfarin in patients receiving mechanical aortic or mitral valves.
Recyclable amplification for single-photon entanglement from photon loss and decoherence
NASA Astrophysics Data System (ADS)
Zhou, Lan; Chen, Ling-Quan; Zhong, Wei; Sheng, Yu-Bo
2018-01-01
We put forward a highly efficient recyclable single-photon assisted amplification protocol, which can protect single-photon entanglement (SPE) from photon loss and decoherence. Making use of quantum nondemolition detection gates constructed with the help of cross-Kerr nonlinearity, our protocol has some attractive advantages. First, the parties can recover less-entangled SPE to be maximally entangled SPE, and reduce photon loss simultaneously. Second, if the protocol fails, the parties can repeat the protocol to reuse some discarded items, which can increase the success probability. Third, when the protocol is successful, they can similarly repeat the protocol to further increase the fidelity of the SPE. Thereby, our protocol provides a possible way to obtain high entanglement, high fidelity and high success probability simultaneously. In particular, our protocol shows higher success probability in the practical high photon loss channel. Based on the above features, our amplification protocol has potential for future application in long-distance quantum communication.
Furberg, Robert D; Ortiz, Alexa M; Zulkiewicz, Brittany A; Hudson, Jordan P; Taylor, Olivia M; Lewis, Megan A
2016-06-27
Tablet-based health care interventions have the potential to encourage patient care in a timelier manner, allow physicians convenient access to patient records, and provide an improved method for patient education. However, along with the continued adoption of tablet technologies, there is a concomitant need to develop protocols focusing on the configuration, management, and maintenance of these devices within the health care setting to support the conduct of clinical research. Develop three protocols to support tablet configuration, tablet management, and tablet maintenance. The Configurator software, Tile technology, and current infection control recommendations were employed to develop three distinct protocols for tablet-based digital health interventions. Configurator is a mobile device management software specifically for iPhone operating system (iOS) devices. The capabilities and current applications of Configurator were reviewed and used to develop the protocol to support device configuration. Tile is a tracking tag associated with a free mobile app available for iOS and Android devices. The features associated with Tile were evaluated and used to develop the Tile protocol to support tablet management. Furthermore, current recommendations on preventing health care-related infections were reviewed to develop the infection control protocol to support tablet maintenance. This article provides three protocols: the Configurator protocol, the Tile protocol, and the infection control protocol. These protocols can help to ensure consistent implementation of tablet-based interventions, enhance fidelity when employing tablets for research purposes, and serve as a guide for tablet deployments within clinical settings.
NASA Astrophysics Data System (ADS)
Hassan, Waleed K.; Al-Assam, Hisham
2017-05-01
The main problem associated with using symmetric/ asymmetric keys is how to securely store and exchange the keys between the parties over open networks particularly in the open environment such as cloud computing. Public Key Infrastructure (PKI) have been providing a practical solution for session key exchange for loads of web services. The key limitation of PKI solution is not only the need for a trusted third partly (e.g. certificate authority) but also the absent link between data owner and the encryption keys. The latter is arguably more important where accessing data needs to be linked with identify of the owner. Currently available key exchange protocols depend on using trusted couriers or secure channels, which can be subject to man-in-the-middle attack and various other attacks. This paper proposes a new protocol for Key Exchange using Biometric Identity Based Encryption (KE-BIBE) that enables parties to securely exchange cryptographic keys even an adversary is monitoring the communication channel between the parties. The proposed protocol combines biometrics with IBE in order to provide a secure way to access symmetric keys based on the identity of the users in unsecure environment. In the KE-BIOBE protocol, the message is first encrypted by the data owner using a traditional symmetric key before migrating it to a cloud storage. The symmetric key is then encrypted using public biometrics of the users selected by data owner to decrypt the message based on Fuzzy Identity-Based Encryption. Only the selected users will be able to decrypt the message by providing a fresh sample of their biometric data. The paper argues that the proposed solution eliminates the needs for a key distribution centre in traditional cryptography. It will also give data owner the power of finegrained sharing of encrypted data by control who can access their data.
Ramos-Gomez, F J; Crystal, Y O; Domejean, S; Featherstone, J D B
2012-11-01
Recent increases in caries prevalence in young children throughout the world highlight the need for a simple but effective infant oral care programme. This programme needs to include a medical disease prevention management model with an early establishment of a dental home and a treatment approach based on individual patient risk. This article presents an updated approach with practical forms and tools based on the principles of caries management by risk assessment, CAMBRA. This method will aid the general practitioner to develop and maintain a comprehensive protocol adequate for infant and young children oral care visits. Perinatal oral health is vitally important in preventing early childhood caries (ECC) in young children. Providing dental treatment to expectant mothers and their young children in a 'dual parallel track' is an effective innovative strategy and an efficient practice builder. It promotes prevention rather than intervention, and this may be the best way to achieve long-lasting oral health for young patients. General dental practice can adopt easy protocols that will promote early preventive visits and anticipatory guidance/counselling rather than waiting for the need for restorative treatment.
Kost, Rhonda G.; Dowd, Kathleen A.; Hurley, Arlene M.; Rainer, Tyler‐Lauren; Coller, Barry S.
2014-01-01
Abstract The development of translational clinical research protocols is complex. To assist investigators, we developed a structured supportive guidance process (Navigation) to expedite protocol development to the standards of good clinical practice (GCP), focusing on research ethics and integrity. Navigation consists of experienced research coordinators leading investigators through a concerted multistep protocol development process from concept initiation to submission of the final protocol. To assess the effectiveness of Navigation, we collect data on the experience of investigators, the intensity of support required for protocol development, IRB review outcomes, and protocol start and completion dates. One hundred forty‐four protocols underwent Navigation and achieved IRB approval since the program began in 2007, including 37 led by trainee investigators, 26 led by MDs, 9 by MD/PhDs, 57 by PhDs, and 12 by investigators with other credentials (e.g., RN, MPH). In every year, more than 50% of Navigated protocols were approved by the IRB within 30 days. For trainees who had more than one protocol navigated, the intensity of Navigation support required decreased over time. Navigation can increase access to translational studies for basic scientists, facilitate GCP training for investigators, and accelerate development and approval of protocols of high ethical and scientific quality. PMID:24405608
De Lepeleere, Sara; Verloigne, Maïté; Brown, Helen Elizabeth; Cardon, Greet; De Bourdeaudhuij, Ilse
2016-08-08
The increasing prevalence of childhood overweight/obesity caused by an unhealthy diet, insufficient physical activity (PA) and high levels of sedentary behaviour (SB) is a prominent public health concern. Parenting practices may contribute to healthy behaviour change in children, but well-researched examples are limited. The aim of this study is to describe the systematic development of an intervention for parents to prevent childhood overweight/obesity through the improvement of parenting practices. The six steps of the Intervention Mapping Protocol (IMP), a theory- and evidence-based tool to develop health-related interventions, were used as a framework to develop the 'Movie Models' programme. In Step 1, a needs assessment was performed to better understand the health problem of overweight/obesity in children and its association with diet, PA and SB. In Step 2, the programme goal (increasing the adoption of effective parenting practices) was sub-divided into performance objectives. Change objectives, which specify explicit actions required to accomplish the performance objectives, were also identified. Step 3 included the selection of theoretical methods (e.g. 'modelling' and 'images'), which were then translated into the practical strategy of online parenting videos. Step 4 comprised the development of a final intervention framework, and Step 5 included the planning of programme adoption and implementation. The final phase, Step 6, included the development of an effect- and process-evaluation plan. The IMP was used to structure the development of 'Movie Models', an intervention targeting specific parenting practices related to children's healthy diet, PA, SB, and parental self-efficacy. A clear framework for process analyses is offered, which aims to increase the potential effectiveness of an intervention and can be useful for those developing health promotion programmes. © The Author(s) 2016.
NASA Astrophysics Data System (ADS)
Brask, Jonatan Bohr; Martin, Anthony; Esposito, William; Houlmann, Raphael; Bowles, Joseph; Zbinden, Hugo; Brunner, Nicolas
2017-05-01
An approach to quantum random number generation based on unambiguous quantum state discrimination is developed. We consider a prepare-and-measure protocol, where two nonorthogonal quantum states can be prepared, and a measurement device aims at unambiguously discriminating between them. Because the states are nonorthogonal, this necessarily leads to a minimal rate of inconclusive events whose occurrence must be genuinely random and which provide the randomness source that we exploit. Our protocol is semi-device-independent in the sense that the output entropy can be lower bounded based on experimental data and a few general assumptions about the setup alone. It is also practically relevant, which we demonstrate by realizing a simple optical implementation, achieving rates of 16.5 Mbits /s . Combining ease of implementation, a high rate, and a real-time entropy estimation, our protocol represents a promising approach intermediate between fully device-independent protocols and commercial quantum random number generators.
Power, Sarah D; Kushki, Azadeh; Chau, Tom
2012-01-01
Near-infrared spectroscopy (NIRS) has been recently investigated for use in noninvasive brain-computer interface (BCI) technologies. Previous studies have demonstrated the ability to classify patterns of neural activation associated with different mental tasks (e.g., mental arithmetic) using NIRS signals. Though these studies represent an important step towards the realization of an NIRS-BCI, there is a paucity of literature regarding the consistency of these responses, and the ability to classify them on a single-trial basis, over multiple sessions. This is important when moving out of an experimental context toward a practical system, where performance must be maintained over longer periods. When considering response consistency across sessions, two questions arise: 1) can the hemodynamic response to the activation task be distinguished from a baseline (or other task) condition, consistently across sessions, and if so, 2) are the spatiotemporal characteristics of the response which best distinguish it from the baseline (or other task) condition consistent across sessions. The answers will have implications for the viability of an NIRS-BCI system, and the design strategies (especially in terms of classifier training protocols) adopted. In this study, we investigated the consistency of classification of a mental arithmetic task and a no-control condition over five experimental sessions. Mixed model linear regression on intrasession classification accuracies indicate that the task and baseline states remain differentiable across multiple sessions, with no significant decrease in accuracy (p = 0.67). Intersession analysis, however, revealed inconsistencies in spatiotemporal response characteristics. Based on these results, we investigated several different practical classifier training protocols, including scenarios in which the training and test data come from 1) different sessions, 2) the same session, and 3) a combination of both. Results indicate that when selecting optimal classifier training protocols for NIRS-BCI, a compromise between accuracy and convenience (e.g., in terms of duration/frequency of training data collection) must be considered.
Modified Dynamic Decode-and-Forward Relaying Protocol for Type II Relay in LTE-Advanced and Beyond
Nam, Sung Sik; Alouini, Mohamed-Slim; Choi, Seyeong
2016-01-01
In this paper, we propose a modified dynamic decode-and-forward (MoDDF) relaying protocol to meet the critical requirements for user equipment (UE) relays in next-generation cellular systems (e.g., LTE-Advanced and beyond). The proposed MoDDF realizes the fast jump-in relaying and the sequential decoding with an application of random codeset to encoding and re-encoding process at the source and the multiple UE relays, respectively. A subframe-by-subframe decoding based on the accumulated (or buffered) messages is employed to achieve energy, information, or mixed combining. Finally, possible early termination of decoding at the end user can lead to the higher spectral efficiency and more energy saving by reducing the frequency of redundant subframe transmission and decoding. These attractive features eliminate the need of directly exchanging control messages between multiple UE relays and the end user, which is an important prerequisite for the practical UE relay deployment. PMID:27898712
Modified Dynamic Decode-and-Forward Relaying Protocol for Type II Relay in LTE-Advanced and Beyond.
Nam, Sung Sik; Alouini, Mohamed-Slim; Choi, Seyeong
2016-01-01
In this paper, we propose a modified dynamic decode-and-forward (MoDDF) relaying protocol to meet the critical requirements for user equipment (UE) relays in next-generation cellular systems (e.g., LTE-Advanced and beyond). The proposed MoDDF realizes the fast jump-in relaying and the sequential decoding with an application of random codeset to encoding and re-encoding process at the source and the multiple UE relays, respectively. A subframe-by-subframe decoding based on the accumulated (or buffered) messages is employed to achieve energy, information, or mixed combining. Finally, possible early termination of decoding at the end user can lead to the higher spectral efficiency and more energy saving by reducing the frequency of redundant subframe transmission and decoding. These attractive features eliminate the need of directly exchanging control messages between multiple UE relays and the end user, which is an important prerequisite for the practical UE relay deployment.
Turner, D; Levine, A; Weiss, B; Hirsh, A; Shamir, R; Shaoul, R; Berkowitz, D; Bujanover, Y; Cohen, S; Eshach-Adiv, O; Jamal, Gera; Kori, M; Lerner, A; On, A; Rachman, L; Rosenbach, Y; Shamaly, H; Shteyer, E; Silbermintz, A; Yerushalmi, B
2010-12-01
There are no current recommendations for bowel cleansing before colonoscopy in children. The Israeli Society of Pediatric Gastroenterology and Nutrition (ISPGAN) established an iterative working group to formulate evidence-based guidelines for bowel cleansing in children prior to colonoscopy. Data were collected by systematic review of the literature and via a national-based survey of all endoscopy units in Israel. Based on the strength of evidence, the Committee reached consensus on six recommended protocols in children. Guidelines were finalized after an open audit of ISPGAN members. Data on 900 colonoscopies per year were accrued, which represents all annual pediatric colonoscopies performed in Israel. Based on the literature review, the national survey, and the open audit, several age-stratified pediatric cleansing protocols were proposed: two PEG-ELS protocols (polyethylene-glycol with electrolyte solution); Picolax-based protocol (sodium picosulphate with magnesium citrate); sodium phosphate protocol (only in children over the age of 12 years who are at low risk for renal damage); stimulant laxative-based protocol (e. g. bisacodyl); and a PEG 3350-based protocol. A population-based analysis estimated that the acute toxicity rate of oral sodium phosphate is at most 3/7320 colonoscopies (0.041 %). Recommendations on diet and enema use are provided in relation to each proposed protocol. There is no ideal bowel cleansing regimen and, thus, various protocols are in use. We propose several evidence-based protocols to optimize bowel cleansing in children prior to colonoscopy and minimize adverse events. © Georg Thieme Verlag KG Stuttgart · New York.
Hu, Fei; Zhang, Jiayan; Shi, Shupeng; Zhou, Zhang
2016-09-01
Febrile illness in young children usually indicates an underlying infection and is a cause of concern for parents and carers. It is very important that healthcare professionals know how to recognize fever, assess children with fever, treat children with fever and role of nurses and parents. This paper outlines a best practice implementation project on the management of fever in children in an emergency department. To audit current practice of fever management for children in an emergency department and to implement strategies to standardize pediatric fever management based on evidence-based practice guidelines. We used the Joanna Briggs Institute's Practical Application of Clinical Evidence System and Getting Research into Practice to examine compliance with fever management criteria based on the best available evidence before and after the implementation of strategies to spread the use of evidence-based practice protocols. We found significant improvements in pediatric fever management as measured by the knowledge scores of parents (54.5-83.7) and nurses (67.6-90.3). This suggested a need for continuous education. We found a noticeable improvement in compliance across all the five criteria; using correct methods to measure temperature (86-98%), staff education (0-100%), parents education (0-100%), using assessment tools (0-100%) and observed management (0-98%). This best practice implementation project demonstrated the use of effective strategies to standardize the protocol for fever management, implement assessment tool, develop multimedia materials, deliver continuous staff education and update nursing documentation and patient education pamphlets to ensure best practice is delivered by nurses to improve patient outcomes.
Detector-device-independent quantum secret sharing with source flaws.
Yang, Xiuqing; Wei, Kejin; Ma, Haiqiang; Liu, Hongwei; Yin, Zhenqiang; Cao, Zhu; Wu, Lingan
2018-04-10
Measurement-device-independent entanglement witness (MDI-EW) plays an important role for detecting entanglement with untrusted measurement device. We present a double blinding-attack on a quantum secret sharing (QSS) protocol based on GHZ state. Using the MDI-EW method, we propose a QSS protocol against all detector side-channels. We allow source flaws in practical QSS system, so that Charlie can securely distribute a key between the two agents Alice and Bob over long distances. Our protocol provides condition on the extracted key rate for the secret against both external eavesdropper and arbitrary dishonest participants. A tight bound for collective attacks can provide good bounds on the practical QSS with source flaws. Then we show through numerical simulations that using single-photon source a secure QSS over 136 km can be achieved.
Practical Computer Security through Cryptography
NASA Technical Reports Server (NTRS)
McNab, David; Twetev, David (Technical Monitor)
1998-01-01
The core protocols upon which the Internet was built are insecure. Weak authentication and the lack of low level encryption services introduce vulnerabilities that propagate upwards in the network stack. Using statistics based on CERT/CC Internet security incident reports, the relative likelihood of attacks via these vulnerabilities is analyzed. The primary conclusion is that the standard UNIX BSD-based authentication system is by far the most commonly exploited weakness. Encryption of Sensitive password data and the adoption of cryptographically-based authentication protocols can greatly reduce these vulnerabilities. Basic cryptographic terminology and techniques are presented, with attention focused on the ways in which technology such as encryption and digital signatures can be used to protect against the most commonly exploited vulnerabilities. A survey of contemporary security software demonstrates that tools based on cryptographic techniques, such as Kerberos, ssh, and PGP, are readily available and effectively close many of the most serious security holes. Nine practical recommendations for improving security are described.
Region-Based Collision Avoidance Beaconless Geographic Routing Protocol in Wireless Sensor Networks.
Lee, JeongCheol; Park, HoSung; Kang, SeokYoon; Kim, Ki-Il
2015-06-05
Due to the lack of dependency on beacon messages for location exchange, the beaconless geographic routing protocol has attracted considerable attention from the research community. However, existing beaconless geographic routing protocols are likely to generate duplicated data packets when multiple winners in the greedy area are selected. Furthermore, these protocols are designed for a uniform sensor field, so they cannot be directly applied to practical irregular sensor fields with partial voids. To prevent the failure of finding a forwarding node and to remove unnecessary duplication, in this paper, we propose a region-based collision avoidance beaconless geographic routing protocol to increase forwarding opportunities for randomly-deployed sensor networks. By employing different contention priorities into the mutually-communicable nodes and the rest of the nodes in the greedy area, every neighbor node in the greedy area can be used for data forwarding without any packet duplication. Moreover, simulation results are given to demonstrate the increased packet delivery ratio and shorten end-to-end delay, rather than well-referred comparative protocols.
Region-Based Collision Avoidance Beaconless Geographic Routing Protocol in Wireless Sensor Networks
Lee, JeongCheol; Park, HoSung; Kang, SeokYoon; Kim, Ki-Il
2015-01-01
Due to the lack of dependency on beacon messages for location exchange, the beaconless geographic routing protocol has attracted considerable attention from the research community. However, existing beaconless geographic routing protocols are likely to generate duplicated data packets when multiple winners in the greedy area are selected. Furthermore, these protocols are designed for a uniform sensor field, so they cannot be directly applied to practical irregular sensor fields with partial voids. To prevent the failure of finding a forwarding node and to remove unnecessary duplication, in this paper, we propose a region-based collision avoidance beaconless geographic routing protocol to increase forwarding opportunities for randomly-deployed sensor networks. By employing different contention priorities into the mutually-communicable nodes and the rest of the nodes in the greedy area, every neighbor node in the greedy area can be used for data forwarding without any packet duplication. Moreover, simulation results are given to demonstrate the increased packet delivery ratio and shorten end-to-end delay, rather than well-referred comparative protocols. PMID:26057037
ERIC Educational Resources Information Center
Biggers, Mandy Sue
2013-01-01
Using a framework for variations of classroom inquiry (National Research Council [NRC], 2000, p. 29), this study explored 40 inservice elementary teachers' planning, modification, and enactment of kit-based science curriculum materials. As part of the study, a new observation protocol was modified from an existing protocol (Practices of…
Colon cleansing protocol in children: research conditions vs. clinical practice.
Elitsur, Yoram; Balfaqih, Yaslam; Preston, Deborah
2018-04-01
Colon preparation rates are the limiting factor for a successful diagnostic colonoscopy in children. Different colon cleansing protocols have been published for use in children. Unfortunately, the applicability of those published research protocols has not been formally evaluated in routine clinical practice. We investigated the success rate of our previously published colon cleansing protocol as utilized in our clinical practice. This was a retrospective study. In the clinical practice, the colon cleansing protocol included PEG-3350 at a dose of 2 g/kg/day plus Dulcolax (Bisacodyl, Boehringer Ingelheim, TX USA) 5 mg/day for 2 days. Adequate colon preparation was graded between 1 - 5, as previously described, and grade ≥ 4.0 was considered an adequate preparation. Patients were instructed to complete a questionnaire that included PEG-3350 dose, number of stools per day, consistency of each stool, and side effects (vomiting, abdominal pain). Clinical and endoscopic results were compared between the protocol under research conditions and routine practice. The success rate of the colon preparation in our clinical practice was similar to the results observed under our research protocol (75 % vs. 73.6 %). Moreover, the total number of stools, stool consistency, and the intubation rate of the terminal ileum were also similar. We concluded, that in our experience, the colon cleansing protocol used under research conditions was effective and appropriate for use in routine clinical practice. We recommend testing each new protocol under the routine conditions of clinical practice to confirm its applicability for general practitioners.
de Ruijter, D; Smit, E S; de Vries, H; Hoving, C
2016-05-01
Dutch practice nurses sub-optimally adhere to evidence-based smoking cessation guidelines. Web-based computer-tailoring could be effective in improving their guideline adherence. Therefore, this paper aims to describe the development of a web-based computer-tailored program and the design of a randomized controlled trial testing its (cost-)effectiveness. Theoretically grounded in the I-Change Model and Self-Determination Theory, and based on the results of a qualitative needs assessment among practice nurses, a web-based computer-tailored program was developed including three modules with tailored advice, an online forum, modules with up-to-date information about smoking cessation, Frequently Asked Questions (FAQs) and project information, and a counseling checklist. The program's effects are assessed by comparing an intervention group (access to all modules) with a control group (access to FAQs, project information and counseling checklist only). Smoking cessation guideline adherence and behavioral predictors (i.e. intention, knowledge, attitude, self-efficacy, social influence, action and coping planning) are measured at baseline and at 6- and 12-month follow-up. Additionally, the program's indirect effects on smokers' quit rates and the number of quit attempts are assessed after 6 and 12months. This paper describes the development of a web-based computer-tailored adherence support program for practice nurses and the study design of a randomized controlled trial testing its (cost-)effectiveness. This program potentially contributes to improving the quality of smoking cessation care in Dutch general practices. If proven effective, the program could be adapted for use by other healthcare professionals, increasing the public health benefits of improved smoking cessation counseling for smokers. Copyright © 2016 Elsevier Inc. All rights reserved.
Simple protocols for oblivious transfer and secure identification in the noisy-quantum-storage model
DOE Office of Scientific and Technical Information (OSTI.GOV)
Schaffner, Christian
2010-09-15
We present simple protocols for oblivious transfer and password-based identification which are secure against general attacks in the noisy-quantum-storage model as defined in R. Koenig, S. Wehner, and J. Wullschleger [e-print arXiv:0906.1030]. We argue that a technical tool from Koenig et al. suffices to prove security of the known protocols. Whereas the more involved protocol for oblivious transfer from Koenig et al. requires less noise in storage to achieve security, our ''canonical'' protocols have the advantage of being simpler to implement and the security error is easier control. Therefore, our protocols yield higher OT rates for many realistic noise parameters.more » Furthermore, a proof of security of a direct protocol for password-based identification against general noisy-quantum-storage attacks is given.« less
Alternating-Offers Protocol for Multi-issue Bilateral Negotiation in Semantic-Enabled Marketplaces
NASA Astrophysics Data System (ADS)
Ragone, Azzurra; di Noia, Tommaso; di Sciascio, Eugenio; Donini, Francesco M.
We present a semantic-based approach to multi-issue bilateral negotiation for e-commerce. We use Description Logics to model advertisements, and relations among issues as axioms in a TBox. We then introduce a logic-based alternating-offers protocol, able to handle conflicting information, that merges non-standard reasoning services in Description Logics with utility thoery to find the most suitable agreements. We illustrate and motivate the theoretical framework, the logical language, and the negotiation protocol.
Kish, Mary Z
2014-10-01
The ability of a preterm infant to exclusively oral feed is a necessary standard for discharge readiness from the neonatal intensive care unit (NICU). Many of the interventions related to oral feeding advancement currently employed for preterm infants in the NICU are based on individual nursing observations and judgment. Studies involving standardized feeding protocols for oral feeding advancement have been shown to decrease variability in feeding practices, facilitate shortened transition times from gavage to oral feedings, improve bottle feeding performance, and significantly decrease the length of stay (LOS) in the NICU. This project critically evaluated the implementation of an oral feeding advancement protocol in a 74-bed level III NICU in an attempt to standardize the process of advancing oral feedings in medically stable preterm infants. A comprehensive review of the literature identified key features for successful oral feeding in preterm infants. Strong levels of evidence suggested an association between both nonnutritive sucking (NNS) opportunities and standardized feeding advancement protocols with successful oral feeding in preterm infants. These findings prompted a pilot practice change using a feeding advancement protocol and consisted of NNS and standardized oral feeding advancement opportunities. Time to exclusive oral feedings and LOS were compared pre- and postprotocol implementation during more than a 2-month evaluation period. Infants using NNS and the standardized oral feeding advancement protocol had an observed reduction in time to exclusive oral feedings and LOS, although statistical significance was not achieved.
QKD-based quantum private query without a failure probability
NASA Astrophysics Data System (ADS)
Liu, Bin; Gao, Fei; Huang, Wei; Wen, QiaoYan
2015-10-01
In this paper, we present a quantum-key-distribution (QKD)-based quantum private query (QPQ) protocol utilizing single-photon signal of multiple optical pulses. It maintains the advantages of the QKD-based QPQ, i.e., easy to implement and loss tolerant. In addition, different from the situations in the previous QKD-based QPQ protocols, in our protocol, the number of the items an honest user will obtain is always one and the failure probability is always zero. This characteristic not only improves the stability (in the sense that, ignoring the noise and the attack, the protocol would always succeed), but also benefits the privacy of the database (since the database will no more reveal additional secrets to the honest users). Furthermore, for the user's privacy, the proposed protocol is cheat sensitive, and for security of the database, we obtain an upper bound for the leaked information of the database in theory.
Gould, Natalie J; Lorencatto, Fabiana; Stanworth, Simon J; Michie, Susan; Prior, Maria E; Glidewell, Liz; Grimshaw, Jeremy M; Francis, Jill J
2014-07-29
Audits of blood transfusion demonstrate around 20% transfusions are outside national recommendations and guidelines. Audit and feedback is a widely used quality improvement intervention but effects on clinical practice are variable, suggesting potential for enhancement. Behavioural theory, theoretical frameworks of behaviour change and behaviour change techniques provide systematic processes to enhance intervention. This study is part of a larger programme of work to promote the uptake of evidence-based transfusion practice. The objectives of this study are to design two theoretically enhanced audit and feedback interventions; one focused on content and one on delivery, and investigate the feasibility and acceptability. Study A (Content): A coding framework based on current evidence regarding audit and feedback, and behaviour change theory and frameworks will be developed and applied as part of a structured content analysis to specify the key components of existing feedback documents. Prototype feedback documents with enhanced content and also a protocol, describing principles for enhancing feedback content, will be developed. Study B (Delivery): Individual semi-structured interviews with healthcare professionals and observations of team meetings in four hospitals will be used to specify, and identify views about, current audit and feedback practice. Interviews will be based on a topic guide developed using the Theoretical Domains Framework and the Consolidated Framework for Implementation Research. Analysis of transcripts based on these frameworks will form the evidence base for developing a protocol describing an enhanced intervention that focuses on feedback delivery. Study C (Feasibility and Acceptability): Enhanced interventions will be piloted in four hospitals. Semi-structured interviews, questionnaires and observations will be used to assess feasibility and acceptability. This intervention development work reflects the UK Medical Research Council's guidance on development of complex interventions, which emphasises the importance of a robust theoretical basis for intervention design and recommends systematic assessment of feasibility and acceptability prior to taking interventions to evaluation in a full-scale randomised study. The work-up includes specification of current practice so that, in the trials to be conducted later in this programme, there will be a clear distinction between the control (usual practice) conditions and the interventions to be evaluated.
Design and research on the platform of network manufacture product electronic trading
NASA Astrophysics Data System (ADS)
Zhou, Zude; Liu, Quan; Jiang, Xuemei
2003-09-01
With the rapid globalization of market and business, E-trading affects every manufacture enterprise. However, the security of network manufacturing products of transmission on Internet is very important. In this paper we discussed the protocol of fair exchange and platform for network manufacture products E-trading based on fair exchange protocol and digital watermarking techniques. The platform realized reliable and copyright protection.
A sessional blind signature based on quantum cryptography
NASA Astrophysics Data System (ADS)
Khodambashi, Siavash; Zakerolhosseini, Ali
2014-01-01
In this paper, we present a sessional blind signature protocol whose security is guaranteed by fundamental principles of quantum physics. It allows a message owner to get his message signed by an authorized signatory. However, the signatory is not capable of reading the message contents and everyone can verify authenticity of the message. For this purpose, we took advantage of a sessional signature as well as quantum entangled pairs which are generated with respect to it in our proposed protocol. We describe our proposed blind signature through an example and briefly discuss about its unconditional security. Due to the feasibility of the protocol, it can be widely employed for e-payment, e-government, e-business and etc.
Ellenbogen, Richard G; Batjer, Hunt; Cardenas, Javier; Berger, Mitchel; Bailes, Julian; Pieroth, Elizabeth; Heyer, Robert; Theodore, Nicholas; Hsu, Wellington; Nabel, Elizabeth; Maroon, Joe; Cantu, Robert; Barnes, Ronnie; Collins, James; Putukian, Margot; Lonser, Russell; Solomon, Gary; Sills, Allen
2018-03-16
One of the National Football League's (NFL) Head, Neck and Spine Committee's principal goals is to create a 'best practice' protocol for concussion diagnosis and management for its players. The science related to concussion diagnosis and management continues to evolve, thus the protocol has evolved contemporaneously. The Fifth International Conference on Concussion in Sport was held in Berlin in 2016, and guidelines for sports concussion diagnosis and management were revised and refined. The NFL Head, Neck and Spine Committee has synthesised the most recent empirical evidence for sports concussion diagnosis and management including the Berlin consensus statement and tailored it to the game played in the NFL. One of the goals of the Committee is to provide a standardised, reliable, efficient and evidence-based protocol for concussion diagnosis and management that can be applied in this professional sport during practice and game day. In this article, the end-of-season version of the 2017-18 NFL Concussion Diagnosis and Management Protocol is described along with its clinical rationale. Immediate actions for concussion programme enhancement and research are reviewed. It is the Committee's expectation that the protocol will undergo refinement and revision over time as the science and clinical practice related to concussion in sports crystallise. © Article author(s) (or their employer(s) unless otherwise stated in the text of the article) 2018. All rights reserved. No commercial use is permitted unless otherwise expressly granted.
Fast, efficient error reconciliation for quantum cryptography
DOE Office of Scientific and Technical Information (OSTI.GOV)
Buttler, W.T.; Lamoreaux, S.K.; Torgerson, J.R.
2003-05-01
We describe an error-reconciliation protocol, which we call Winnow, based on the exchange of parity and Hamming's 'syndrome' for N-bit subunits of a large dataset. The Winnow protocol was developed in the context of quantum-key distribution and offers significant advantages and net higher efficiency compared to other widely used protocols within the quantum cryptography community. A detailed mathematical analysis of the Winnow protocol is presented in the context of practical implementations of quantum-key distribution; in particular, the information overhead required for secure implementation is one of the most important criteria in the evaluation of a particular error-reconciliation protocol. The increasemore » in efficiency for the Winnow protocol is largely due to the reduction in authenticated public communication required for its implementation.« less
Pharmacology-based toxicity assessment: towards quantitative risk prediction in humans.
Sahota, Tarjinder; Danhof, Meindert; Della Pasqua, Oscar
2016-05-01
Despite ongoing efforts to better understand the mechanisms underlying safety and toxicity, ~30% of the attrition in drug discovery and development is still due to safety concerns. Changes in current practice regarding the assessment of safety and toxicity are required to reduce late stage attrition and enable effective development of novel medicines. This review focuses on the implications of empirical evidence generation for the evaluation of safety and toxicity during drug development. A shift in paradigm is needed to (i) ensure that pharmacological concepts are incorporated into the evaluation of safety and toxicity; (ii) facilitate the integration of historical evidence and thereby the translation of findings across species as well as between in vitro and in vivo experiments and (iii) promote the use of experimental protocols tailored to address specific safety and toxicity questions. Based on historical examples, we highlight the challenges for the early characterisation of the safety profile of a new molecule and discuss how model-based methodologies can be applied for the design and analysis of experimental protocols. Issues relative to the scientific rationale are categorised and presented as a hierarchical tree describing the decision-making process. Focus is given to four different areas, namely, optimisation, translation, analytical construct and decision criteria. From a methodological perspective, the relevance of quantitative methods for estimation and extrapolation of risk from toxicology and safety pharmacology experimental protocols, such as points of departure and potency, is discussed in light of advancements in population and Bayesian modelling techniques (e.g. non-linear mixed effects modelling). Their use in the evaluation of pharmacokinetics (PK) and pharmacokinetic-pharmacodynamic relationships (PKPD) has enabled great insight into the dose rationale for medicines in humans, both in terms of efficacy and adverse events. Comparable benefits can be anticipated for the assessment of safety and toxicity profile of novel molecules. © The Author 2016. Published by Oxford University Press on behalf of the UK Environmental Mutagen Society. All rights reserved. For permissions, please e-mail: journals.permissions@oup.com.
Knowles, Serena; Lam, Lawrence T; McInnes, Elizabeth; Elliott, Doug; Hardy, Jennifer; Middleton, Sandy
2015-01-01
Bowel management protocols have the potential to minimize complications for critically ill patients. Targeted implementation can increase the uptake of protocols by clinicians into practice. The theory of planned behaviour offers a framework in which to investigate clinicians' intention to perform the behaviour of interest. This study aimed to evaluate the effect of implementing a bowel management protocol on intensive care nursing and medical staffs' knowledge, attitude, subjective norms, perceived behavioural control, behaviour intentions, role perceptions and past behaviours in relation to three bowel management practices. A descriptive before and after survey using a self-administered questionnaire sent to nursing and medical staff working within three intensive care units before and after implementation of our bowel management protocol (pre: May - June 2008; post: Feb - May 2009). Participants had significantly higher knowledge scores post-implementation of our protocol (pre mean score 17.6; post mean score 19.3; p = 0.004). Post-implementation there was a significant increase in: self-reported past behaviour (pre mean score 5.38; post mean score 7.11; p = 0.002) and subjective norms scores (pre mean score 3.62; post mean score 4.18; p = 0.016) for bowel assessment; and behaviour intention (pre mean score 5.22; post mean score 5.65; p = 0.048) for administration of enema. This evaluation, informed by the theory of planned behaviour, has provided useful insights into factors that influence clinician intentions to perform evidence-based bowel management practices in intensive care. Addressing factors such as knowledge, attitudes and beliefs can assist in targeting implementation strategies to positively affect clinician behaviour change. Despite an increase in clinicians' knowledge scores, our implementation strategy did not, however, significantly change clinician behaviour intentions for all three bowel management practices. Further research is required to explore the influence of opinion leaders and organizational culture on clinicians' behaviour intentions related to bowel management for intensive care patients.
Classification of pregnancies of unknown location according to four different hCG-based protocols.
Fistouris, J; Bergh, C; Strandell, A
2016-10-01
How do four protocols based on serial human chorionic gonadotropin (hCG) measurements perform when classifying pregnancies of unknown location (PULs) as low or high risk of being an ectopic pregnancy (EP)? The use of cut-offs in hCG level changes published by NICE, and a logistic regression model, M4, correctly classify more PULs as high risk, compared with two other protocols. A logistic regression model, M4, based on the mean of two consecutive hCG values and the hCG ratio (hCG 48 h/hCG 0 h) that classify PULs into low- and high-risk groups for triage purposes, identifies more EPs than a protocol using the cut-offs between a 13% decline and a 66% rise in hCG levels over 48 h. A retrospective comparative study of four different hCG-based protocols classifying PULs as low or high risk of being an EP was performed at a gynaecological emergency unit over 3 years. We identified 915 women with a PUL. Initial transvaginal ultrasonography (TVS) findings categorised 187 of the PULs as probable intrauterine pregnancies (IUPs) and 16 as probable EPs. The rate of change in hCG levels over 48 h was calculated for each patient and subjected to three different hCG threshold intervals and a logistic regression model for outcome prediction. Each PUL was subsequently dichotomised to either low-risk (i.e. failed PUL/IUP) or high-risk (i.e. EP) classification, which allowed us to compare the diagnostic performance. In 'Protocol A', a PUL was classified as low risk if >13% hCG level decline or >66% hCG level rise was achieved; otherwise, the PUL was classified as high risk of being an EP. 'Protocol B' classified a PUL as low or high risk using cut-offs of 35-50% declining hCG levels and of 53% rising hCG levels. Similarly, 'Protocol C' used hCG level cut-offs published by NICE, 50% for declining hCG levels and 63% for rising hCG levels. Finally, if a logistic regression model 'Protocol M4' calculated a ≥5% risk of the PUL being an EP, it was classified as high risk, and otherwise the PUL was classified as low risk. When the time interval between two hCG measurements failed to meet an exact 48 h, extrapolation and interpolation of hCG values was made, using log linear transformation. Protocols A, B, C and M4 classified 73, 66, 55 and 56% of PULs as low risk. The sensitivity for protocols A, B, C and M4 was 68% (95% confidence interval (CI) 61-75%), 81% (74-86%), 87% (82-92%) and 88% (83-93%), respectively. The specificity was 82% (80-85%), 77% (74-80%), 66% (62-69%) and 67% (63-70%) for protocols A, B, C and M4, respectively. All comparisons of sensitivity and specificity between the protocols were statistically significant except for protocol C versus protocol M4. In protocol C, 87% (66-97%) of misclassified EPs had rising hCG levels, compared with 19% (6-41%) for protocol M4 (P < 0.01). In a secondary analysis excluding probable IUPs and probable EPs, the results for 712 PULs were analysed. The sensitivity subsequently remained stable for all protocols. Protocol M4 reached a 78% (74-81%) specificity, which was significantly higher than 70% (66-74%) for protocol C (P = 0.01) and protocol M4 classified 63% of PULs as low risk compared with 58% for protocol C. The retrospective design of the study is a limitation. The results are derived from a population where laparoscopy played an important role in PUL management and diagnosis of EPs, although it did reflect real clinical practice. Although we tried to adhere to definitions of PUL and final outcomes as in previous studies and a recent consensus statement, potential differences in this regard must be acknowledged. Where the time interval between two serial hCG measurements deviated from 48 h we estimated 48 h hCG values. A logistic regression model, M4, classifies more PULs correctly as low risk in a selected PUL population without probable IUPs and EPs and identifies as many EPs, in comparison with the cut-offs available in the NICE guideline. This advantage for model M4 may result in a reduction of unnecessary follow-up visits, when fewer low-risk PULs are misclassified as high risk. These findings, however, ought to be clarified in a randomised controlled trial. The study was supported by LUA/ALF grant No. 70940. There are no competing interests. © The Author 2016. Published by Oxford University Press on behalf of the European Society of Human Reproduction and Embryology. All rights reserved. For permissions, please e-mail: journals.permissions@oup.com.
SAMP, the Simple Application Messaging Protocol: Letting applications talk to each other
NASA Astrophysics Data System (ADS)
Taylor, M. B.; Boch, T.; Taylor, J.
2015-06-01
SAMP, the Simple Application Messaging Protocol, is a hub-based communication standard for the exchange of data and control between participating client applications. It has been developed within the context of the Virtual Observatory with the aim of enabling specialised data analysis tools to cooperate as a loosely integrated suite, and is now in use by many and varied desktop and web-based applications dealing with astronomical data. This paper reviews the requirements and design principles that led to SAMP's specification, provides a high-level description of the protocol, and discusses some of its common and possible future usage patterns, with particular attention to those factors that have aided its success in practice.
77 FR 24427 - Standards for Business Practices and Communication Protocols for Public Utilities
Federal Register 2010, 2011, 2012, 2013, 2014
2012-04-24
... equipment to produce the same level of end-use services (e.g. lighting, heating, motor drive) with less... also include updates to certain associated definitions as well as some formatting and organizational... first part establishes criteria for the use of equipment, technology, and procedures to quantify the...
Cicek, M N; Kahyaoglu, I; Kahyaoglu, S
2015-02-01
Elevated progesterone levels surpassing exact treshold values impede endometrial receptivity and decrease clinical pregnancy rates in different responder patients during assisted reproductive techniques. A progesterone (P): estradiol (E2) ratio of > 1 on the day of hCG administration has also been suggested to be a manifestation of low ovarian reserve. The clinical significance of P/E2 ratio on the day of hCG administration was investigated among poor responder patients. Based on the ESHRE Bologna consensus criteria related to poor ovarian response diagnosis, 48 poor responder patients were treated with the microdose flare-up regimen and 34 patients were treated with the multiple-dose GnRH antagonist protocol. All patients were destined to perform a ICSI-ET procedure at the end of the stimulation protocols. Progesterone levels and P/E2 ratios have been detected during controlled ovarian hyperstimulation. In the microdose flare-up group; the duration of stimulation, total gonadotropin dose used and hCG day E2 levels were significantly higher than the multiple dose antagonist group. However, the mean hCG day P/E2 rate in the microdose flare-up group was less than that in the multiple-dose antagonist group. The clinical pregnancy rates were non significantly higher in the multiple dose antagonist protocol group than in microdose flare-up group. Impaired endometrial receptivity caused by elevated P levels results with lower pregnancy rates. Regardless of the selected stimulation protocol, poor responder patients are not prone to exhibit high P and E2 secretion. Increased P/E2 ratio of > 1 on hCG day has limited value to predict cycle outcomes in poor responder patients because of ovarian follicle depletion.
Furberg, Robert D; Zulkiewicz, Brittany A; Hudson, Jordan P; Taylor, Olivia M; Lewis, Megan A
2016-01-01
Background Tablet-based health care interventions have the potential to encourage patient care in a timelier manner, allow physicians convenient access to patient records, and provide an improved method for patient education. However, along with the continued adoption of tablet technologies, there is a concomitant need to develop protocols focusing on the configuration, management, and maintenance of these devices within the health care setting to support the conduct of clinical research. Objective Develop three protocols to support tablet configuration, tablet management, and tablet maintenance. Methods The Configurator software, Tile technology, and current infection control recommendations were employed to develop three distinct protocols for tablet-based digital health interventions. Configurator is a mobile device management software specifically for iPhone operating system (iOS) devices. The capabilities and current applications of Configurator were reviewed and used to develop the protocol to support device configuration. Tile is a tracking tag associated with a free mobile app available for iOS and Android devices. The features associated with Tile were evaluated and used to develop the Tile protocol to support tablet management. Furthermore, current recommendations on preventing health care–related infections were reviewed to develop the infection control protocol to support tablet maintenance. Results This article provides three protocols: the Configurator protocol, the Tile protocol, and the infection control protocol. Conclusions These protocols can help to ensure consistent implementation of tablet-based interventions, enhance fidelity when employing tablets for research purposes, and serve as a guide for tablet deployments within clinical settings. PMID:27350013
Agents Based e-Commerce and Securing Exchanged Information
NASA Astrophysics Data System (ADS)
Al-Jaljouli, Raja; Abawajy, Jemal
Mobile agents have been implemented in e-Commerce to search and filter information of interest from electronic markets. When the information is very sensitive and critical, it is important to develop a novel security protocol that can efficiently protect the information from malicious tampering as well as unauthorized disclosure or at least detect any malicious act of intruders. In this chapter, we describe robust security techniques that ensure a sound security of information gathered throughout agent’s itinerary against various security attacks, as well as truncation attacks. A sound security protocol is described, which implements the various security techniques that would jointly prevent or at least detect any malicious act of intruders. We reason about the soundness of the protocol usingSymbolic Trace Analyzer (STA), a formal verification tool that is based on symbolic techniques. We analyze the protocol in key configurations and show that it is free of flaws. We also show that the protocol fulfils the various security requirements of exchanged information in MAS, including data-integrity, data-confidentiality, data-authenticity, origin confidentiality and data non-repudiability.
Garner, Bryan R; Zehner, Mark; Roosa, Mathew R; Martino, Steve; Gotham, Heather J; Ball, Elizabeth L; Stilen, Patricia; Speck, Kathryn; Vandersloot, Denna; Rieckmann, Traci R; Chaple, Michael; Martin, Erika G; Kaiser, David; Ford, James H
2017-11-17
Improving the extent to which evidence-based practices (EBPs)-treatments that have been empirically shown to be efficacious or effective-are integrated within routine practice is a well-documented challenge across numerous areas of health. In 2014, the National Institute on Drug Abuse funded a type 2 effectiveness-implementation hybrid trial titled the substance abuse treatment to HIV Care (SAT2HIV) Project. Aim 1 of the SAT2HIV Project tests the effectiveness of a motivational interviewing-based brief intervention (MIBI) for substance use as an adjunct to usual care within AIDS service organizations (ASOs) as part of its MIBI Experiment. Aim 2 of the SAT2HIV Project tests the effectiveness of implementation and sustainment facilitation (ISF) as an adjunct to the Addiction Technology Transfer Center (ATTC) model for training staff in motivational interviewing as part of its ISF Experiment. The current paper describes the study protocol for the ISF Experiment. Using a cluster randomized design, case management and leadership staff from 39 ASOs across the United States were randomized to receive either the ATTC strategy (control condition) or the ATTC + ISF strategy (experimental condition). The ATTC strategy is staff-focused and includes 10 discrete strategies (e.g., provide centralized technical assistance, conduct educational meetings, provide ongoing consultation). The ISF strategy is organization-focused and includes seven discrete strategies (e.g., use an implementation advisor, organize implementation team meetings, conduct cyclical small tests of change). Building upon the exploration-preparation-implementation-sustainment (EPIS) framework, the effectiveness of the ISF strategy is examined via three staff-level measures: (1) time-to-proficiency (i.e., preparation phase outcome), (2) implementation effectiveness (i.e., implementation phase outcome), and (3) level of sustainment (i.e., sustainment phase outcome). Although not without limitations, the ISF experiment has several strengths: a highly rigorous design (randomized, hypothesis-driven), high-need setting (ASOs), large sample size (39 ASOs), large geographic representation (23 states and the District of Columbia), and testing along multiple phases of the EPIS continuum (preparation, implementation, and sustainment). Thus, study findings will significantly improve generalizable knowledge regarding the best preparation, implementation, and sustainment strategies for advancing EBPs along the EPIS continuum. Moreover, increasing ASO's capacity to address substance use may improve the HIV Care Continuum. Trial registration ClinicalTrials.gov: NCT03120598.
Remote Entanglement by Coherent Multiplication of Concurrent Quantum Signals
NASA Astrophysics Data System (ADS)
Roy, Ananda; Jiang, Liang; Stone, A. Douglas; Devoret, Michel
2015-10-01
Concurrent remote entanglement of distant, noninteracting quantum entities is a crucial function for quantum information processing. In contrast with the existing protocols which employ the addition of signals to generate entanglement between two remote qubits, the continuous variable protocol we present is based on the multiplication of signals. This protocol can be straightforwardly implemented by a novel Josephson junction mixing circuit. Our scheme would be able to generate provable entanglement even in the presence of practical imperfections: finite quantum efficiency of detectors and undesired photon loss in current state-of-the-art devices.
Quantum Transduction with Adaptive Control
NASA Astrophysics Data System (ADS)
Zhang, Mengzhen; Zou, Chang-Ling; Jiang, Liang
2018-01-01
Quantum transducers play a crucial role in hybrid quantum networks. A good quantum transducer can faithfully convert quantum signals from one mode to another with minimum decoherence. Most investigations of quantum transduction are based on the protocol of direct mode conversion. However, the direct protocol requires the matching condition, which in practice is not always feasible. Here we propose an adaptive protocol for quantum transducers, which can convert quantum signals without requiring the matching condition. The adaptive protocol only consists of Gaussian operations, feasible in various physical platforms. Moreover, we show that the adaptive protocol can be robust against imperfections associated with finite squeezing, thermal noise, and homodyne detection, and it can be implemented to realize quantum state transfer between microwave and optical modes.
Quantum Transduction with Adaptive Control.
Zhang, Mengzhen; Zou, Chang-Ling; Jiang, Liang
2018-01-12
Quantum transducers play a crucial role in hybrid quantum networks. A good quantum transducer can faithfully convert quantum signals from one mode to another with minimum decoherence. Most investigations of quantum transduction are based on the protocol of direct mode conversion. However, the direct protocol requires the matching condition, which in practice is not always feasible. Here we propose an adaptive protocol for quantum transducers, which can convert quantum signals without requiring the matching condition. The adaptive protocol only consists of Gaussian operations, feasible in various physical platforms. Moreover, we show that the adaptive protocol can be robust against imperfections associated with finite squeezing, thermal noise, and homodyne detection, and it can be implemented to realize quantum state transfer between microwave and optical modes.
Comparison of IPSM 1990 photon dosimetry code of practice with IAEA TRS‐398 and AAPM TG‐51.
Henríquez, Francisco Cutanda
2009-01-01
Several codes of practice for photon dosimetry are currently used around the world, supported by different organizations. A comparison of IPSM 1990 with both IAEA TRS‐398 and AAPM TG‐51 has been performed. All three protocols are based on the calibration of ionization chambers in terms of standards of absorbed dose to water, as it is the case with other modern codes of practice. This comparison has been carried out for photon beams of nominal energies: 4 MV, 6 MV, 8 MV, 10 MV and 18 MV. An NE 2571 graphite ionization chamber was used in this study, cross‐calibrated against an NE 2611A Secondary Standard, calibrated in the National Physical Laboratory (NPL). Absolute dose in reference conditions was obtained using each of these three protocols including: beam quality indices, beam quality conversion factors both theoretical and NPL experimental ones, correction factors for influence quantities and absolute dose measurements. Each protocol recommendations have been strictly followed. Uncertainties have been obtained according to the ISO Guide to the Expression of Uncertainty in Measurement. Absorbed dose obtained according to all three protocols agree within experimental uncertainty. The largest difference between absolute dose results for two protocols is obtained for the highest energy: 0.7% between IPSM 1990 and IAEA TRS‐398 using theoretical beam quality conversion factors. PACS number: 87.55.tm
Searching Fragment Spaces with feature trees.
Lessel, Uta; Wellenzohn, Bernd; Lilienthal, Markus; Claussen, Holger
2009-02-01
Virtual combinatorial chemistry easily produces billions of compounds, for which conventional virtual screening cannot be performed even with the fastest methods available. An efficient solution for such a scenario is the generation of Fragment Spaces, which encode huge numbers of virtual compounds by their fragments/reagents and rules of how to combine them. Similarity-based searches can be performed in such spaces without ever fully enumerating all virtual products. Here we describe the generation of a huge Fragment Space encoding about 5 * 10(11) compounds based on established in-house synthesis protocols for combinatorial libraries, i.e., we encode practically evaluated combinatorial chemistry protocols in a machine readable form, rendering them accessible to in silico search methods. We show how such searches in this Fragment Space can be integrated as a first step in an overall workflow. It reduces the extremely huge number of virtual products by several orders of magnitude so that the resulting list of molecules becomes more manageable for further more elaborated and time-consuming analysis steps. Results of a case study are presented and discussed, which lead to some general conclusions for an efficient expansion of the chemical space to be screened in pharmaceutical companies.
Imakyure, Osamu; Shuto, Hideki; Nishikawa, Fumi; Hagiwara, Yoshifuka; Inoue, Sachiko; Koyanagi, Taeko; Hirakawa, Masaaki; Kataoka, Yasufumi
2010-08-01
The acquirement of basic knowledge of clinical trials and professional attitude in their practices is a general instructional objective in the Model Core Curriculum for Pharmaceutical Education. Unfortunately, the previous program of clinical trial education was not effective in the acquirement of a professional attitude in their practices. Then, we developed the new clinical trial education program using protocol through small group discussion (SGD) and roll-playing. Our program consists of 7 steps of practical training. In step 1, the students find some problems after presentation of the protocol including case and prescription. In step 2, they analyse the extracted problems and share the information obtained in SGD. In steps 3 and 5, five clinical case scenarios are presented to the students and they discuss which case is suitable for entry to the clinical trial or which case corresponds to the discontinuance criteria in the present designed protocol. In steps 4 and 6, the roll-playing is performed by teachers and students as doctors and clinical research coordinators (CRC) respectively. Further, we conducted a trial practice based on this program for the students. In the student's self-evaluation into five grades, the average score of the skill acquisition level in each step was 3.8-4.7 grade. Our clinical trial education program could be effective in educating the candidates for CRC or clinical pharmacists.
Pádua, Inês; Moreira, André; Moreira, Pedro; Barros, Renata
2018-06-12
Food allergy is a growing public health concern. The literature suggests that a significant number of reactions occur in community services, such as schools and restaurants. Therefore, suitable training and education for education and catering professionals using viable and practical tools is needed. The objective of this study is to evaluate the effectiveness of a Web-based food allergy training program for professionals working in schools and restaurants, designed to improve knowledge and good practices in the community. Free learning programs which contain educational animated videos about food allergy were developed for professionals working at schools and restaurants. The learning programs comprise of nine 5-minute videos, developed in video animation format using GoAnimate, with a total course length of 45-60 minutes. The courses for professionals at both schools and restaurants include contents about food allergy epidemiology, clinical manifestations, diagnosis and treatment, dietary avoidance, emergencies, labelling, and accidental exposure prevention. Additionally, specific topics for work practices at schools and restaurants were provided. Food allergy knowledge survey tools were developed to access the knowledge and management skills about food allergy of school and restaurant staff, at baseline and at the end of the food allergy program. The courses will be provided on the e-learning platform of the University of Porto and professionals from catering and education sectors will be invited to participate. Data collection will take place between September 2017 and October 2017, corresponding to a 2-month intervention. Final results will be disseminated in scientific journals and presented at national and international conferences. The Food Allergy Community Program intervention may improve school and restaurant professionals' commitment and skills to deal with food allergy in the community. Furthermore, this e-intervention program will provide an innovative contribution to understanding the impact of electronic health technologies on the learning process and the development of strategies for community interventions. RR1-10.2196/9770. ©Inês Pádua, André Moreira, Pedro Moreira, Renata Barros. Originally published in JMIR Research Protocols (http://www.researchprotocols.org), 12.06.2018.
Standards-Based Wireless Sensor Networking Protocols for Spaceflight Applications
NASA Technical Reports Server (NTRS)
Wagner, Raymond S.
2010-01-01
Wireless sensor networks (WSNs) have the capacity to revolutionize data gathering in both spaceflight and terrestrial applications. WSNs provide a huge advantage over traditional, wired instrumentation since they do not require wiring trunks to connect sensors to a central hub. This allows for easy sensor installation in hard to reach locations, easy expansion of the number of sensors or sensing modalities, and reduction in both system cost and weight. While this technology offers unprecedented flexibility and adaptability, implementing it in practice is not without its difficulties. Recent advances in standards-based WSN protocols for industrial control applications have come a long way to solving many of the challenges facing practical WSN deployments. In this paper, we will overview two of the more promising candidates - WirelessHART from the HART Communication Foundation and ISA100.11a from the International Society of Automation - and present the architecture for a new standards-based sensor node for networking and applications research.
Kelly, Kandace; Harrington, Linda; Matos, Pat; Turner, Barbara; Johnson, Constance
2016-01-01
Bar-code medication administration (BCMA) effectiveness is contingent upon compliance with best-practice protocols. We developed a 4-phased BCMA evaluation program to evaluate the degree of integration of current evidence into BCMA policies, procedures, and practices; identify barriers to best-practice BCMA use; and modify BCMA practice in concert with changes to the practice environment. This program provides an infrastructure for frontline nurses to partner with hospital leaders to continually evaluate and improve BCMA using a systematic process.
A Qualitative Analysis of an Advanced Practice Nurse-Directed Transitional Care Model Intervention
ERIC Educational Resources Information Center
Bradway, Christine; Trotta, Rebecca; Bixby, M. Brian; McPartland, Ellen; Wollman, M. Catherine; Kapustka, Heidi; McCauley, Kathleen; Naylor, Mary D.
2012-01-01
Purpose: The purpose of this study was to describe barriers and facilitators to implementing a transitional care intervention for cognitively impaired older adults and their caregivers lead by advanced practice nurses (APNs). Design and Methods: APNs implemented an evidence-based protocol to optimize transitions from hospital to home. An…
Celestin, Michael D; Hart, Alton; Moody-Thomas, Sarah
2014-05-29
Tobacco is a major cause of preventable illness and death. However, clinician use of an evidence-based guideline for treatment of tobacco use is low. This case study describes the process for conducting a pre-intervention assessment of clinician practices and beliefs regarding treatment of tobacco use. Louisiana State University Health System, one of the largest safety-net public hospital systems in the United States, consists of 10 facilities in population centers across the state of Louisiana. The system serves a large proportion of the state's underinsured and uninsured, low-income, and racial/ethnic minority populations, groups that have high rates of tobacco use. Activities included 1) partnering with hospital administrators to generate support for conducting a clinician assessment, 2) identifying and adapting a survey tool to assess clinicians' practices and beliefs regarding treatment of tobacco use, 3) developing a survey protocol and obtaining approval from the institutional review board, and 4) administering the survey electronically, using the hospital's e-mail system. Existing partnerships and system resources aided survey administration. Use of the hospital's internal e-mail system and distribution of an online survey were effective means to engage clinicians. Following notification, 43.6% of 4,508 clinicians opened their e-mail containing the invitation letter with a Web link to the survey; of these, 83.1% (1,634) completed the survey. Partnering with stakeholders and using existing resources within the health care system are essential to successful implementation of a system-wide survey of clinician practices and beliefs regarding treatment of tobacco use.
Lin, Chinsu; Thomson, Gavin; Hung, Shih-Hsiang; Lin, Yu-Dung
2012-12-30
This study introduces a GIS-based protocol for the simulation and evaluation of thinning treatments in recreational forest management. The protocol was implemented in a research study based on an area of recreational forest in Alishan National Scenic Area, Taiwan. Ground survey data were mapped to a GIS database, to create a precise, yet flexible, GIS-based digital forest. The digital forest model was used to generate 18 different thinning scenario images and one image of the existing unthinned forest. A questionnaire was completed by 456 participants while simultaneously viewing the scenario images. The questionnaire was used to determine the scenic beauty preferences of the respondents. Statistical analysis of the data revealed that the respondents preferred low density, upper-storey thinning treatments and a dispersed retention pattern of the remaining trees. High density upper-storey treatments evoked a strongly negative reaction in the observers. The experiment demonstrated that the proposed protocol is suitable for selecting an appropriate thinning strategy for recreational forest and that the protocol has practical value in recreational forest management. Copyright © 2012 Elsevier Ltd. All rights reserved.
An Approach to Verifying Completeness and Consistency in a Rule-Based Expert System.
1982-08-01
peolea with the se e S knowlede base by observing en t om. W0hile thorough testing is an "samt4 Pert of V*flfyL the ooIlst4ftl and capleteness of a...physicians at Stanford’s Oncology Day Care Center on the management of patients who are on experimental treatment protocols. These protocols serve to...for oncology protocol management . Prooceedings of 7th IJCAI, pp. 876- 881, Vancouver, B.C., August 1981. I. van Melle, W. A Domain-Independent system
Video-Based Modeling: Differential Effects due to Treatment Protocol
ERIC Educational Resources Information Center
Mason, Rose A.; Ganz, Jennifer B.; Parker, Richard I.; Boles, Margot B.; Davis, Heather S.; Rispoli, Mandy J.
2013-01-01
Identifying evidence-based practices for individuals with disabilities requires specification of procedural implementation. Video-based modeling (VBM), consisting of both video self-modeling and video modeling with others as model (VMO), is one class of interventions that has frequently been explored in the literature. However, current information…
Evidence-Based Language Practice
ERIC Educational Resources Information Center
Pollock, Eric J.
2005-01-01
The purpose of this paper was to examine evidence-based procedures in medicine and to demonstrate that the same protocols can be used in English language instruction. In the evidence-based methodology, studies are divided into those that address specific language problems. Integrated studies are presented as a systematic overview, meta-analysis,…
Hong, Eun-Mi; Park, Yongeun; Muirhead, Richard; Jeong, Jaehak; Pachepsky, Yakov A
2018-02-15
The Agricultural Policy/Environmental eXtender (APEX) is a watershed-scale water quality model that includes detailed representation of agricultural management. The objective of this work was to develop a process-based model for simulating the fate and transport of manure-borne bacteria on land and in streams with the APEX model. The bacteria model utilizes manure erosion rates to estimate the amount of edge-of-field bacteria export. Bacteria survival in manure is simulated as a two-stage process separately for each manure application event. In-stream microbial fate and transport processes include bacteria release from streambeds due to sediment resuspension during high flow events, active release from the streambed sediment during low flow periods, bacteria settling with sediment, and survival. Default parameter values were selected from published databases and evaluated based on field observations. The APEX model with the newly developed microbial fate and transport module was applied to simulate fate and transport of the fecal indicator bacterium Escherichia coli in the Toenepi watershed, New Zealand that was monitored for seven years. The stream network of the watershed ran through grazing lands with daily bovine waste deposition. Results show that the APEX with the bacteria module reproduced well the monitored pattern of E. coli concentrations at the watershed outlet. The APEX with the microbial fate and transport module will be utilized for predicting microbial quality of water as affected by various agricultural practices, evaluating monitoring protocols, and supporting the selection of management practices based on regulations that rely on fecal indicator bacteria concentrations. Published by Elsevier B.V.
Methodology capture: discriminating between the "best" and the rest of community practice
Eales, James M; Pinney, John W; Stevens, Robert D; Robertson, David L
2008-01-01
Background The methodologies we use both enable and help define our research. However, as experimental complexity has increased the choice of appropriate methodologies has become an increasingly difficult task. This makes it difficult to keep track of available bioinformatics software, let alone the most suitable protocols in a specific research area. To remedy this we present an approach for capturing methodology from literature in order to identify and, thus, define best practice within a field. Results Our approach is to implement data extraction techniques on the full-text of scientific articles to obtain the set of experimental protocols used by an entire scientific discipline, molecular phylogenetics. Our methodology for identifying methodologies could in principle be applied to any scientific discipline, whether or not computer-based. We find a number of issues related to the nature of best practice, as opposed to community practice. We find that there is much heterogeneity in the use of molecular phylogenetic methods and software, some of which is related to poor specification of protocols. We also find that phylogenetic practice exhibits field-specific tendencies that have increased through time, despite the generic nature of the available software. We used the practice of highly published and widely collaborative researchers ("expert" researchers) to analyse the influence of authority on community practice. We find expert authors exhibit patterns of practice common to their field and therefore act as useful field-specific practice indicators. Conclusion We have identified a structured community of phylogenetic researchers performing analyses that are customary in their own local community and significantly different from those in other areas. Best practice information can help to bridge such subtle differences by increasing communication of protocols to a wider audience. We propose that the practice of expert authors from the field of evolutionary biology is the closest to contemporary best practice in phylogenetic experimental design. Capturing best practice is, however, a complex task and should also acknowledge the differences between fields such as the specific context of the analysis. PMID:18761740
Pilliod, David S.; Goldberg, Caren S.; Arkle, Robert S.; Waits, Lisette P.
2013-01-01
Environmental DNA (eDNA) methods for detecting aquatic species are advancing rapidly, but with little evaluation of field protocols or precision of resulting estimates. We compared sampling results from traditional field methods with eDNA methods for two amphibians in 13 streams in central Idaho, USA. We also evaluated three water collection protocols and the influence of sampling location, time of day, and distance from animals on eDNA concentration in the water. We found no difference in detection or amount of eDNA among water collection protocols. eDNA methods had slightly higher detection rates than traditional field methods, particularly when species occurred at low densities. eDNA concentration was positively related to field-measured density, biomass, and proportion of transects occupied. Precision of eDNA-based abundance estimates increased with the amount of eDNA in the water and the number of replicate subsamples collected. eDNA concentration did not vary significantly with sample location in the stream, time of day, or distance downstream from animals. Our results further advance the implementation of eDNA methods for monitoring aquatic vertebrates in stream habitats.
Pace: Privacy-Protection for Access Control Enforcement in P2P Networks
NASA Astrophysics Data System (ADS)
Sánchez-Artigas, Marc; García-López, Pedro
In open environments such as peer-to-peer (P2P) systems, the decision to collaborate with multiple users — e.g., by granting access to a resource — is hard to achieve in practice due to extreme decentralization and the lack of trusted third parties. The literature contains a plethora of applications in which a scalable solution for distributed access control is crucial. This fact motivates us to propose a protocol to enforce access control, applicable to networks consisting entirely of untrusted nodes. The main feature of our protocol is that it protects both sensitive permissions and sensitive policies, and does not rely on any centralized authority. We analyze the efficiency (computational effort and communication overhead) as well as the security of our protocol.
Emoli, Alessandro; Cappuccio, Serena; Marche, Bruno; Musarò, Andrea; Scoppettuolo, Giancarlo; Pittiruti, Mauro
2014-01-01
The ISP (Safe Insertion of PICCs) protocol: a bundle of 8 recommendations to minimize the complications related to the peripherally inserted central venous catheters (PICC). The insertion of a peripherally inserted central venous catheter (PICC) is not without risks. The Italian Group for the Study of Long-Term Central Venous Access Devices (GAVeCeLT) has developed a protocol (SIP: Safe Implantation of PICCs) with the aim of minimizing the risks which may be associated with the placement of PICCs. The protocol is based on recommendations available in the literature and on the main clinical practice guidelines. The SIP protocol, a bundle of evidence-based recommendations, it is is easy to use, inexpensive, and cost-effective. If routinely used and carefully inplemented, it greatly reduces complications such as failure of venipuncture, accidental arterial puncture, damage of median nerve, infection and catheter related venous thrombosis.
Hensel, Kendi L; Carnes, Michael S; Stoll, Scott T
2016-11-01
The structural and physiologic changes in a woman's body during pregnancy can predispose pregnant women to low back pain and its associated disability, as well as to complications of pregnancy, labor, and delivery. Anecdotal and empirical evidence has indicated that osteopathic manipulative treatment (OMT) may be efficacious in improving pain and functionality in women who are pregnant. Based on that premise, the Pregnancy Research on Osteopathic Manipulation Optimizing Treatment Effects (PROMOTE) study was designed as a prospective, randomized, placebo-controlled, and blinded clinical trial to evaluate the efficacy of an OMT protocol for pain during third-trimester pregnancy. The OMT protocol developed for the PROMOTE study was based on physiologic theory and the concept of the interrelationship of structure and function. The 12 well-defined, standardized OMT techniques used in the protocol are commonly taught at osteopathic medical schools in the United States. These techniques can be easily replicated as a 20-minute protocol applied in conjunction with usual prenatal care, thus making it feasible to implement into clinical practice. This article presents an overview of the study design and treatment protocols used in the PROMOTE study.
A universal data access and protocol integration mechanism for smart home
NASA Astrophysics Data System (ADS)
Shao, Pengfei; Yang, Qi; Zhang, Xuan
2013-03-01
With the lack of standardized or completely missing communication interfaces in home electronics, there is no perfect solution to address every aspect in smart homes based on existing protocols and technologies. In addition, the central control unit (CCU) of smart home system working point-to-point between the multiple application interfaces and the underlying hardware interfaces leads to its complicated architecture and unpleasant performance. A flexible data access and protocol integration mechanism is required. The current paper offers a universal, comprehensive data access and protocol integration mechanism for a smart home. The universal mechanism works as a middleware adapter with unified agreements of the communication interfaces and protocols, offers an abstraction of the application level from the hardware specific and decoupling the hardware interface modules from the application level. Further abstraction for the application interfaces and the underlying hardware interfaces are executed based on adaption layer to provide unified interfaces for more flexible user applications and hardware protocol integration. This new universal mechanism fundamentally changes the architecture of the smart home and in some way meets the practical requirement of smart homes more flexible and desirable.
Developing an organizing framework to guide nursing research in the Children’s Oncology Group (COG)
Kelly, Katherine Patterson; Hooke, Mary C.; Ruccione, Kathleen; Landier, Wendy; Haase, Joan
2014-01-01
Objectives To describe the development and application of an organizing research framework to guide COG Nursing research. Data Sources Research articles, reports and meeting minutes Conclusion An organizing research framework helps to outline research focus and articulate the scientific knowledge being produced by nurses in the pediatric cooperative group. Implication for Nursing Practice The use of an organizing framework for COG nursing research can facilitate clinical nurses’ understanding of how children and families sustain or regain optimal health when faced with a pediatric cancer diagnosis through interventions designed to promote individual and family resilience. The Children’s Oncology Group (COG) is the sole National Cancer Institute (NCI)-supported cooperative pediatric oncology clinical trials group and the largest organization in the world devoted exclusively to pediatric cancer research. It was founded in 2000 following the merger of the four legacy NCI-supported pediatric clinical trials groups (Children’s Cancer Group [CCG], Pediatric Oncology Group [POG], National Wilms Tumor Study Group, and Intergroup Rhabdomyosarcoma Study Group). The COG currently has over 200 member institutions across North America, Australia, New Zealand and Europe and a multidisciplinary membership of over 8,000 pediatric, radiation, and surgical oncologists, nurses, clinical research associates, pharmacists, behavioral scientists, pathologists, laboratory scientists, patient/parent advocates and other pediatric cancer specialists. The COG Nursing Discipline was formed from the merger of the legacy CCG and POG Nursing Committees, and current membership exceeds 2000 registered nurses. The discipline has a well-developed infrastructure that promotes nursing involvement throughout all levels of the organization, including representation on disease, protocol, scientific, executive and other administrative committees (e.g., nominating committee, data safety monitoring boards). COG nurses facilitate delivery of protocol-based treatments for children enrolled on COG protocols, and Nursing Discipline initiatives support nursing research, professional and patient/family education, evidence-based practice, and a patient-reported outcomes resource center. The research agenda of the Nursing Discipline is enacted through a well-established nursing scholar program. PMID:24559776
A quality improvement initiative to reduce necrotizing enterocolitis across hospital systems.
Nathan, Amy T; Ward, Laura; Schibler, Kurt; Moyer, Laurel; South, Andrew; Kaplan, Heather C
2018-04-20
Necrotizing enterocolitis (NEC) is a devastating intestinal disease in premature infants. Local rates of NEC were unacceptably high. We hypothesized that utilizing quality improvement methodology to standardize care and apply evidence-based practices would reduce our rate of NEC. A multidisciplinary team used the model for improvement to prioritize interventions. Three neonatal intensive care units (NICUs) developed a standardized feeding protocol for very low birth weight (VLBW) infants, and employed strategies to increase the use of human milk, maximize intestinal perfusion, and promote a healthy microbiome. The primary outcome measure, NEC in VLBW infants, decreased from 0.17 cases/100 VLBW patient days to 0.029, an 83% reduction, while the compliance with a standardized feeding protocol improved. Through reliable implementation of evidence-based practices, this project reduced the regional rate of NEC by 83%. A key outcome and primary driver of success was standardization across multiple NICUs, resulting in consistent application of best practices and reduction in variation.
2007-01-01
Background Evidence-based practice (EBP) is an expected approach to improving the quality of patient care and service delivery in health care systems internationally that is yet to be realized. Given the current evidence-practice gap, numerous authors describe barriers to achieving EBP. One recurrently identified barrier is the setting or context of practice, which is likewise cited as a potential part of the solution to the gap. The purpose of this study is to identify key contextual elements and related strategic processes in organizations that find and use evidence at multiple levels, in an ongoing, integrated fashion, in contrast to those that do not. Methods The core theoretical framework for this multi-method explanatory case study is Pettigrew and Whipp's Content, Context, and Process model of strategic change. This framework focuses data collection on three entities: the Why of strategic change, the What of strategic change, and the How of strategic change, in this case related to implementation and normalization of EBP. The data collection plan, designed to capture relevant organizational context and related outcomes, focuses on eight interrelated factors said to characterize a receptive context. Selective, purposive sampling will provide contrasting results between two cases (departments of nursing) and three embedded units in each. Data collection methods will include quantitative tools (e.g., regarding culture) and qualitative approaches including focus groups, interviews, and documents review (e.g., regarding integration and “success”) relevant to the EBP initiative. Discussion This study should provide information regarding contextual elements and related strategic processes key to successful implementation and sustainability of EBP, specifically in terms of a pervasive pattern in an acute care hospital-based health care setting. Additionally, this study will identify key contextual elements that differentiate successful implementation and sustainability of EBP efforts, both within varying levels of a hospital-based clinical setting and across similar hospital settings interested in EBP. PMID:17266756
Relationship Factors Contributing to the Progression of Combat Related PTSD and Suiciality Over Time
2015-04-01
6 Table 1. Hiring and orientation of project staff, purchasing and installing equipment...continues to refine and maintain detailed protocols for data checking and downloading, and ethics training for all study personnel (e.g., general...human subjects certification, documented agreement to specific ethical practices regarding this study). Five University of Colorado Institutional Review
Hu, Jun; Mercer, Jay; Peyton, Liam; Kantarcioglu, Murat; Malin, Bradley; Buckeridge, David; Samet, Saeed; Earle, Craig
2011-01-01
Background Providers have been reluctant to disclose patient data for public-health purposes. Even if patient privacy is ensured, the desire to protect provider confidentiality has been an important driver of this reluctance. Methods Six requirements for a surveillance protocol were defined that satisfy the confidentiality needs of providers and ensure utility to public health. The authors developed a secure multi-party computation protocol using the Paillier cryptosystem to allow the disclosure of stratified case counts and denominators to meet these requirements. The authors evaluated the protocol in a simulated environment on its computation performance and ability to detect disease outbreak clusters. Results Theoretical and empirical assessments demonstrate that all requirements are met by the protocol. A system implementing the protocol scales linearly in terms of computation time as the number of providers is increased. The absolute time to perform the computations was 12.5 s for data from 3000 practices. This is acceptable performance, given that the reporting would normally be done at 24 h intervals. The accuracy of detection disease outbreak cluster was unchanged compared with a non-secure distributed surveillance protocol, with an F-score higher than 0.92 for outbreaks involving 500 or more cases. Conclusion The protocol and associated software provide a practical method for providers to disclose patient data for sentinel, syndromic or other indicator-based surveillance while protecting patient privacy and the identity of individual providers. PMID:21486880
Kertai, Miklos D.; Whitlock, Elizabeth L.; Avidan, Michael S.
2011-01-01
Cardiac surgery presents particular challenges for the anesthesiologist. In addition to standard and advanced monitors typically used during cardiac surgery, anesthesiologists may consider monitoring the brain with raw or processed electroencephalography (EEG). There is strong evidence that a protocol incorporating the processed EEG Bispectral Index (BIS) decreases the incidence intraoperative awareness compared with standard practice. However there is conflicting evidence that incorporating the BIS into cardiac anesthesia practice improves “fast-tracking,” decreases anesthetic drug use, or detects cerebral ischemia. Recent research, including many cardiac surgical patients, shows that a protocol based on BIS monitoring is not superior to a protocol based on end tidal anesthetic concentration monitoring in preventing awareness. There has been a resurgence of interest in the anesthesia literature in limited montage EEG monitoring, including nonproprietary processed indices. This has been accompanied by research showing that with structured training, anesthesiologists can glean useful information from the raw EEG trace. In this review, we discuss both the hypothesized benefits and limitations of BIS and frontal channel EEG monitoring in the cardiac surgical population. PMID:22253267
An Enhanced Reservation-Based MAC Protocol for IEEE 802.15.4 Networks
Afonso, José A.; Silva, Helder D.; Macedo, Pedro; Rocha, Luis A.
2011-01-01
The IEEE 802.15.4 Medium Access Control (MAC) protocol is an enabling standard for wireless sensor networks. In order to support applications requiring dedicated bandwidth or bounded delay, it provides a reservation-based scheme named Guaranteed Time Slot (GTS). However, the GTS scheme presents some drawbacks, such as inefficient bandwidth utilization and support to a maximum of only seven devices. This paper presents eLPRT (enhanced Low Power Real Time), a new reservation-based MAC protocol that introduces several performance enhancing features in comparison to the GTS scheme. This MAC protocol builds on top of LPRT (Low Power Real Time) and includes various mechanisms designed to increase data transmission reliability against channel errors, improve bandwidth utilization and increase the number of supported devices. A motion capture system based on inertial and magnetic sensors has been used to validate the protocol. The effectiveness of the performance enhancements introduced by each of the new features is demonstrated through the provision of both simulation and experimental results. PMID:22163826
Lee, Young Han
2018-04-04
The purposes of this study are to evaluate the feasibility of protocol determination with a convolutional neural networks (CNN) classifier based on short-text classification and to evaluate the agreements by comparing protocols determined by CNN with those determined by musculoskeletal radiologists. Following institutional review board approval, the database of a hospital information system (HIS) was queried for lists of MRI examinations, referring department, patient age, and patient gender. These were exported to a local workstation for analyses: 5258 and 1018 consecutive musculoskeletal MRI examinations were used for the training and test datasets, respectively. The subjects for pre-processing were routine or tumor protocols and the contents were word combinations of the referring department, region, contrast media (or not), gender, and age. The CNN Embedded vector classifier was used with Word2Vec Google news vectors. The test set was tested with each classification model and results were output as routine or tumor protocols. The CNN determinations were evaluated using the receiver operating characteristic (ROC) curves. The accuracies were evaluated by a radiologist-confirmed protocol as the reference protocols. The optimal cut-off values for protocol determination between routine protocols and tumor protocols was 0.5067 with a sensitivity of 92.10%, a specificity of 95.76%, and an area under curve (AUC) of 0.977. The overall accuracy was 94.2% for the ConvNet model. All MRI protocols were correct in the pelvic bone, upper arm, wrist, and lower leg MRIs. Deep-learning-based convolutional neural networks were clinically utilized to determine musculoskeletal MRI protocols. CNN-based text learning and applications could be extended to other radiologic tasks besides image interpretations, improving the work performance of the radiologist.
ASCOT: a text mining-based web-service for efficient search and assisted creation of clinical trials
2012-01-01
Clinical trials are mandatory protocols describing medical research on humans and among the most valuable sources of medical practice evidence. Searching for trials relevant to some query is laborious due to the immense number of existing protocols. Apart from search, writing new trials includes composing detailed eligibility criteria, which might be time-consuming, especially for new researchers. In this paper we present ASCOT, an efficient search application customised for clinical trials. ASCOT uses text mining and data mining methods to enrich clinical trials with metadata, that in turn serve as effective tools to narrow down search. In addition, ASCOT integrates a component for recommending eligibility criteria based on a set of selected protocols. PMID:22595088
Korkontzelos, Ioannis; Mu, Tingting; Ananiadou, Sophia
2012-04-30
Clinical trials are mandatory protocols describing medical research on humans and among the most valuable sources of medical practice evidence. Searching for trials relevant to some query is laborious due to the immense number of existing protocols. Apart from search, writing new trials includes composing detailed eligibility criteria, which might be time-consuming, especially for new researchers. In this paper we present ASCOT, an efficient search application customised for clinical trials. ASCOT uses text mining and data mining methods to enrich clinical trials with metadata, that in turn serve as effective tools to narrow down search. In addition, ASCOT integrates a component for recommending eligibility criteria based on a set of selected protocols.
García-Ramos, Amador; Torrejón, Alejandro; Feriche, Belén; Morales-Artacho, Antonio J; Pérez-Castilla, Alejandro; Padial, Paulino; Jaric, Slobodan
2018-02-01
This study explored the feasibility of the force-velocity relationship (F-V) to detect the acute effects of different fatigue protocols on the selective changes of the maximal capacities of upper body muscles to produce force, velocity, and power. After determining the bench press one-repetition maximum (1RM), participants' F-V relationships were assessed during the bench press throw exercise on five separate sessions after performing one of the following fatiguing protocols: 60%1RM failure, 60%1RM non-failure, 80%1RM failure, 80%1RM non-failure, and no-fatigue. In the non-failure protocols, participants performed half the maximum number of repetitions than in their respective failure protocols. The main findings revealed that (1) all F-V relationships were highly linear (median r = 0.997 and r = 0.982 for averaged across participants and individual data, respectively), (2) the fatiguing protocols were ranked based on the magnitude of power loss as follows: 60%1RM failure > 80%1RM failure > 60%1RM non-failure > 80%1RM non-failure, while (3) the assessed maximum force and velocity outputs showed a particularly prominent reduction in the protocols based on the lowest and highest levels of fatigue (i.e., 80%1RM non-failure and 60%1RM failure), respectively. The results support the use of F-V to assess the effects of fatigue on the distinctive capacities of the muscles to produce force, velocity, and power output while performing multi-joint tasks, while the assessed maximum force and velocity capacities showed a particularly prominent reduction in the protocols based on the lowest and highest levels of fatigue (i.e., 80%1RM non-failure and 60%1RM failure), respectively.
Security of two-state and four-state practical quantum bit-commitment protocols
NASA Astrophysics Data System (ADS)
Loura, Ricardo; Arsenović, Dušan; Paunković, Nikola; Popović, Duška B.; Prvanović, Slobodan
2016-12-01
We study cheating strategies against a practical four-state quantum bit-commitment protocol [A. Danan and L. Vaidman, Quant. Info. Proc. 11, 769 (2012)], 10.1007/s11128-011-0284-4 and its two-state variant [R. Loura et al., Phys. Rev. A 89, 052336 (2014)], 10.1103/PhysRevA.89.052336 when the underlying quantum channels are noisy and the cheating party is constrained to using single-qubit measurements only. We show that simply inferring the transmitted photons' states by using the Breidbart basis, optimal for ambiguous (minimum-error) state discrimination, does not directly produce an optimal cheating strategy for this bit-commitment protocol. We introduce a strategy, based on certain postmeasurement processes and show it to have better chances at cheating than the direct approach. We also study to what extent sending forged geographical coordinates helps a dishonest party in breaking the binding security requirement. Finally, we investigate the impact of imperfect single-photon sources in the protocols. Our study shows that, in terms of the resources used, the four-state protocol is advantageous over the two-state version. The analysis performed can be straightforwardly generalized to any finite-qubit measurement, with the same qualitative results.
Frozen embryo transfer: a review on the optimal endometrial preparation and timing.
Mackens, S; Santos-Ribeiro, S; van de Vijver, A; Racca, A; Van Landuyt, L; Tournaye, H; Blockeel, C
2017-11-01
What is the optimal endometrial preparation protocol for a frozen embryo transfer (FET)? Although the optimal endometrial preparation protocol for FET needs further research and is yet to be determined, we propose a standardized timing strategy based on the current available evidence which could assist in the harmonization and comparability of clinic practice and future trials. Amid a continuous increase in the number of FET cycles, determining the optimal endometrial preparation protocol has become paramount to maximize ART success. In current daily practice, different FET preparation methods and timing strategies are used. This is a review of the current literature on FET preparation methods, with special attention to the timing of the embryo transfer. Literature on the topic was retrieved in PubMed and references from relevant articles were investigated until June 2017. The number of high quality randomized controlled trials (RCTs) is scarce and, hence, the evidence for the best protocol for FET is poor. Future research should compare both the pregnancy and neonatal outcomes between HRT and true natural cycle (NC) FET. In terms of embryo transfer timing, we propose to start progesterone intake on the theoretical day of oocyte retrieval in HRT and to perform blastocyst transfer at hCG + 7 or LH + 6 in modified or true NC, respectively. As only a few high quality RCTs on the optimal preparation for FET are available in the existing literature, no definitive conclusion for benefit of one protocol over the other can be drawn so far. Caution when using HRT for FET is warranted since the rate of early pregnancy loss is alarmingly high in some reports. S.M. is funded by the Research Fund of Flanders (FWO). H.T. and C.B. report grants from Merck, Goodlife, Besins and Abbott during the conduct of the study. Not applicable. © The Author 2017. Published by Oxford University Press on behalf of the European Society of Human Reproduction and Embryology. All rights reserved. For Permissions, please e-mail: journals.permissions@oup.com
A neural networks-based hybrid routing protocol for wireless mesh networks.
Kojić, Nenad; Reljin, Irini; Reljin, Branimir
2012-01-01
The networking infrastructure of wireless mesh networks (WMNs) is decentralized and relatively simple, but they can display reliable functioning performance while having good redundancy. WMNs provide Internet access for fixed and mobile wireless devices. Both in urban and rural areas they provide users with high-bandwidth networks over a specific coverage area. The main problems affecting these networks are changes in network topology and link quality. In order to provide regular functioning, the routing protocol has the main influence in WMN implementations. In this paper we suggest a new routing protocol for WMN, based on good results of a proactive and reactive routing protocol, and for that reason it can be classified as a hybrid routing protocol. The proposed solution should avoid flooding and creating the new routing metric. We suggest the use of artificial logic-i.e., neural networks (NNs). This protocol is based on mobile agent technologies controlled by a Hopfield neural network. In addition to this, our new routing metric is based on multicriteria optimization in order to minimize delay and blocking probability (rejected packets or their retransmission). The routing protocol observes real network parameters and real network environments. As a result of artificial logic intelligence, the proposed routing protocol should maximize usage of network resources and optimize network performance.
A Neural Networks-Based Hybrid Routing Protocol for Wireless Mesh Networks
Kojić, Nenad; Reljin, Irini; Reljin, Branimir
2012-01-01
The networking infrastructure of wireless mesh networks (WMNs) is decentralized and relatively simple, but they can display reliable functioning performance while having good redundancy. WMNs provide Internet access for fixed and mobile wireless devices. Both in urban and rural areas they provide users with high-bandwidth networks over a specific coverage area. The main problems affecting these networks are changes in network topology and link quality. In order to provide regular functioning, the routing protocol has the main influence in WMN implementations. In this paper we suggest a new routing protocol for WMN, based on good results of a proactive and reactive routing protocol, and for that reason it can be classified as a hybrid routing protocol. The proposed solution should avoid flooding and creating the new routing metric. We suggest the use of artificial logic—i.e., neural networks (NNs). This protocol is based on mobile agent technologies controlled by a Hopfield neural network. In addition to this, our new routing metric is based on multicriteria optimization in order to minimize delay and blocking probability (rejected packets or their retransmission). The routing protocol observes real network parameters and real network environments. As a result of artificial logic intelligence, the proposed routing protocol should maximize usage of network resources and optimize network performance. PMID:22969360
Modelling the protocol stack in NCS with deterministic and stochastic petri net
NASA Astrophysics Data System (ADS)
Hui, Chen; Chunjie, Zhou; Weifeng, Zhu
2011-06-01
Protocol stack is the basis of the networked control systems (NCS). Full or partial reconfiguration of protocol stack offers both optimised communication service and system performance. Nowadays, field testing is unrealistic to determine the performance of reconfigurable protocol stack; and the Petri net formal description technique offers the best combination of intuitive representation, tool support and analytical capabilities. Traditionally, separation between the different layers of the OSI model has been a common practice. Nevertheless, such a layered modelling analysis framework of protocol stack leads to the lack of global optimisation for protocol reconfiguration. In this article, we proposed a general modelling analysis framework for NCS based on the cross-layer concept, which is to establish an efficiency system scheduling model through abstracting the time constraint, the task interrelation, the processor and the bus sub-models from upper and lower layers (application, data link and physical layer). Cross-layer design can help to overcome the inadequacy of global optimisation based on information sharing between protocol layers. To illustrate the framework, we take controller area network (CAN) as a case study. The simulation results of deterministic and stochastic Petri-net (DSPN) model can help us adjust the message scheduling scheme and obtain better system performance.
2012-01-01
Background Management of cancer treatment-related symptoms is an important safety issue given that symptoms can become life-threatening and often occur when patients are at home. With funding from the Canadian Partnership Against Cancer, a pan-Canadian steering committee was established with representation from eight provinces to develop symptom protocols using a rigorous methodology (CAN-IMPLEMENT©). Each protocol is based on a systematic review of the literature to identify relevant clinical practice guidelines. Protocols were validated by cancer nurses from across Canada. The aim of this study is to build an effective and sustainable approach for implementing evidence-informed protocols for nurses to use when providing remote symptom assessment, triage, and guidance in self-management for patients experiencing symptoms while undergoing cancer treatments. Methods A prospective mixed-methods study design will be used. Guided by the Knowledge to Action Framework, the study will involve (a) establishing an advisory knowledge user team in each of three targeted settings; (b) assessing factors influencing nurses’ use of protocols using interviews/focus groups and a standardized survey instrument; (c) adapting protocols for local use, ensuring fidelity of the content; (d) selecting intervention strategies to overcome known barriers and implementing the protocols; (e) conducting think-aloud usability testing; (f) evaluating protocol use and outcomes by conducting an audit of 100 randomly selected charts at each of the three settings; and (g) assessing satisfaction with remote support using symptom protocols and change in nurses’ barriers to use using survey instruments. The primary outcome is sustained use of the protocols, defined as use in 75% of the calls. Descriptive analysis will be conducted for the barriers, use of protocols, and chart audit outcomes. Content analysis will be conducted on interviews/focus groups and usability testing with comparisons across settings. Discussion Given the importance of patient safety, patient-centered care, and delivery of quality services, learning how to effectively implement evidence-informed symptom protocols in oncology healthcare services is essential for ensuring safe, consistent, and effective care for individuals with cancer. This study is likely to have a significant contribution to the delivery of remote oncology services, as well as influence symptom management by patients at home. PMID:23164244
Greenberger-Horne-Zeilinger states-based blind quantum computation with entanglement concentration.
Zhang, Xiaoqian; Weng, Jian; Lu, Wei; Li, Xiaochun; Luo, Weiqi; Tan, Xiaoqing
2017-09-11
In blind quantum computation (BQC) protocol, the quantum computability of servers are complicated and powerful, while the clients are not. It is still a challenge for clients to delegate quantum computation to servers and keep the clients' inputs, outputs and algorithms private. Unfortunately, quantum channel noise is unavoidable in the practical transmission. In this paper, a novel BQC protocol based on maximally entangled Greenberger-Horne-Zeilinger (GHZ) states is proposed which doesn't need a trusted center. The protocol includes a client and two servers, where the client only needs to own quantum channels with two servers who have full-advantage quantum computers. Two servers perform entanglement concentration used to remove the noise, where the success probability can almost reach 100% in theory. But they learn nothing in the process of concentration because of the no-signaling principle, so this BQC protocol is secure and feasible.
Prado, Maíra; Simão, Renata Antoun; Gomes, Brenda Paula Figueiredo de Almeida
2014-06-01
The development and maintenance of the sealing of the root canal system is the key to the success of root canal treatment. The resin-based adhesive material has the potential to reduce the microleakage of the root canal because of its adhesive properties and penetration into dentinal walls. Moreover, the irrigation protocols may have an influence on the adhesiveness of resin-based sealers to root dentin. The objective of the present study was to evaluate the effect of different irrigant protocols on coronal bacterial microleakage of gutta-percha/AH Plus and Resilon/Real Seal Self-etch systems. One hundred ninety pre-molars were used. The teeth were divided into 18 experimental groups according to the irrigation protocols and filling materials used. The protocols used were: distilled water; sodium hypochlorite (NaOCl)+eDTA; NaOCl+H3PO4; NaOCl+eDTA+chlorhexidine (CHX); NaOCl+H3PO4+CHX; CHX+eDTA; CHX+ H3PO4; CHX+eDTA+CHX and CHX+H3PO4+CHX. Gutta-percha/AH Plus or Resilon/Real Seal Se were used as root-filling materials. The coronal microleakage was evaluated for 90 days against Enterococcus faecalis. Data were statistically analyzed using Kaplan-Meier survival test, Kruskal-Wallis and Mann-Whitney tests. No significant difference was verified in the groups using chlorhexidine or sodium hypochlorite during the chemo-mechanical preparation followed by eDTA or phosphoric acid for smear layer removal. The same results were found for filling materials. However, the statistical analyses revealed that a final flush with 2% chlorhexidine reduced significantly the coronal microleakage. A final flush with 2% chlorhexidine after smear layer removal reduces coronal microleakage of teeth filled with gutta-percha/AH Plus or Resilon/Real Seal SE.
Treatment algorithms and protocolized care.
Morris, Alan H
2003-06-01
Excess information in complex ICU environments exceeds human decision-making limits and likely contributes to unnecessary variation in clinical care, increasing the likelihood of clinical errors. I reviewed recent critical care clinical trials searching for information about the impact of protocol use on clinically pertinent outcomes. Several recently published clinical trials illustrate the importance of distinguishing efficacy and effectiveness trials. One of these trials illustrates the danger of conducting effectiveness trials before the efficacy of an intervention is established. The trials also illustrate the importance of distinguishing guidelines and inadequately explicit protocols from adequately explicit protocols. Only adequately explicit protocols contain enough detail to lead different clinicians to the same decision when faced with the same clinical scenario. Differences between guidelines and protocols are important. Guidelines lack detail and provide general guidance that requires clinicians to fill in many gaps. Computerized or paper-based protocols are detailed and, when used for complex clinical ICU problems, can generate patient-specific, evidence-based therapy instructions that can be carried out by different clinicians with almost no interclinician variability. Individualization of patient therapy can be preserved by these protocols when they are driven by individual patient data. Explicit decision-support tools (eg, guidelines and protocols) have favorable effects on clinician and patient outcomes and can reduce the variation in clinical practice. Guidelines and protocols that aid ICU decision makers should be more widely distributed.
School-Based Methylphenidate Placebo Protocols: Methodological and Practical Issues.
ERIC Educational Resources Information Center
Hyman, Irwin A.; Wojtowicz, Alexandra; Lee, Kee Duk; Haffner, Mary Elizabeth; Fiorello, Catherine A.; And Others
1998-01-01
Focuses on methodological issues involved in choosing instruments to monitor behavior, once a comprehensive evaluation has suggested trials on Ritalin. Case examples illustrate problems of teacher compliance in filling out measures, supplying adequate placebos, and obtaining physical cooperation. Emerging school-based methodologies are discussed…
Turcios, Jacqueline; Cook, Barbara; Irwin, Julia; Rispoli, Taylor; Landi, Nicole
2017-07-31
This paper includes a detailed description of a familiarization protocol, which is used as an integral component of a larger research protocol to collect electroencephalography (EEG) data and Event-Related Potentials (ERPs). At present, the systems available for the collection of high-quality EEG/ERP data make significant demands on children with developmental disabilities, such as those with an Autism Spectrum Disorder (ASD). Children with ASD may have difficulty adapting to novel situations, tolerating uncomfortable sensory stimuli, and sitting quietly. This familiarization protocol uses Evidence-Based Practices (EBPs) to increase research participants' knowledge and understanding of the specific activities and steps of the research protocol. The tools in this familiarization protocol are a social narrative, a visual schedule, the Premack principle, role-playing, and modeling. The goal of this familiarization protocol is to increase understanding and agency and to potentially reduce anxiety for child participants, resulting in a greater likelihood of the successful completion of the research protocol for the collection of EEG/ERP data.
Quantum key distribution using basis encoding of Gaussian-modulated coherent states
NASA Astrophysics Data System (ADS)
Huang, Peng; Huang, Jingzheng; Zhang, Zheshen; Zeng, Guihua
2018-04-01
The continuous-variable quantum key distribution (CVQKD) has been demonstrated to be available in practical secure quantum cryptography. However, its performance is restricted strongly by the channel excess noise and the reconciliation efficiency. In this paper, we present a quantum key distribution (QKD) protocol by encoding the secret keys on the random choices of two measurement bases: the conjugate quadratures X and P . The employed encoding method can dramatically weaken the effects of channel excess noise and reconciliation efficiency on the performance of the QKD protocol. Subsequently, the proposed scheme exhibits the capability to tolerate much higher excess noise and enables us to reach a much longer secure transmission distance even at lower reconciliation efficiency. The proposal can work alternatively to strengthen significantly the performance of the known Gaussian-modulated CVQKD protocol and serve as a multiplier for practical secure quantum cryptography with continuous variables.
Variability in donation after cardiac death protocols: a national survey.
Fugate, Jennifer E; Stadtler, Maria; Rabinstein, Alejandro A; Wijdicks, Eelco F M
2011-02-27
As donation after cardiac death practices expand, the number of institutional policies is increasing. We contacted organ procurement organizations throughout the United States and requested protocols in hospitals in their donor service areas. Sixty-four protocols were obtained with representation from 16 different states. The terminology and recommended practices varied substantially. The methods for death determination were not specified in 28 (44%) protocols. Most adhered to a 2- to 5-min observation time between circulatory arrest and organ procurement, but 10 (16%) provided no information. This variability reveals a need to define a uniform standard in donation after cardiac death protocols and death determination practices.
Massoudi, Btissame; Blanker, Marco H; van Valen, Evelien; Wouters, Hans; Bockting, Claudi L H; Burger, Huibert
2017-06-13
The majority of patients with depressive disorders are treated by general practitioners (GPs) and are prescribed antidepressant medication. Patients prefer psychological treatments but they are under-used, mainly due to time constraints and limited accessibility. A promising approach to deliver psychological treatment is blended care, i.e. guided online treatment. However, the cost-effectiveness of blended care formatted as an online psychological treatment supported by the patients' own GP or general practice mental health worker (MHW) in routine primary care is unknown. We aim to demonstrate non-inferiority of blended care compared with usual care in patients with depressive symptoms or a depressive disorder in general practice. Additionally, we will explore the real-time course over the day of emotions and affect, and events within individuals during treatment. This is a pragmatic non-inferiority trial including 300 patients with depressive symptoms, recruited by collaborating GPs and MHWs. After inclusion, participants are randomized to either blended care or usual care in routine general practice. Blended care consists of the 'Act and Feel' treatment: an eight-week web-based program based on behavioral activation with integrated monitoring of depressive symptomatology and automatized feedback. GPs or their MHWs coach the participants through regular face-to-face or telephonic consultations with at least three sessions. Depressive symptomatology, health status, functional impairment, treatment satisfaction, daily activities and resource use are assessed during a follow-up period of 12 months. During treatment, real-time fluctuations in emotions and affect, and daily events will be rated using ecological momentary assessment. The primary outcome is the reduction of depressive symptoms from baseline to three months follow-up. We will conduct intention-to-treat analyses and supplementary per-protocol analyses. This trial will show whether blended care might be an appropriate treatment strategy for patients with depressive symptoms and depressive disorder in general practice. Netherlands Trial Register: NTR4757; 25 August 2014. http://www.trialregister.nl/trialreg/admin/rctview.asp?TC=4757 . (Archived by WebCite® at http://www.webcitation.org/6mnXNMGef ).
Sánchez-de-Madariaga, Ricardo; Muñoz, Adolfo; Castro, Antonio L; Moreno, Oscar; Pascual, Mario
2018-01-01
This research shows a protocol to assess the computational complexity of querying relational and non-relational (NoSQL (not only Structured Query Language)) standardized electronic health record (EHR) medical information database systems (DBMS). It uses a set of three doubling-sized databases, i.e. databases storing 5000, 10,000 and 20,000 realistic standardized EHR extracts, in three different database management systems (DBMS): relational MySQL object-relational mapping (ORM), document-based NoSQL MongoDB, and native extensible markup language (XML) NoSQL eXist. The average response times to six complexity-increasing queries were computed, and the results showed a linear behavior in the NoSQL cases. In the NoSQL field, MongoDB presents a much flatter linear slope than eXist. NoSQL systems may also be more appropriate to maintain standardized medical information systems due to the special nature of the updating policies of medical information, which should not affect the consistency and efficiency of the data stored in NoSQL databases. One limitation of this protocol is the lack of direct results of improved relational systems such as archetype relational mapping (ARM) with the same data. However, the interpolation of doubling-size database results to those presented in the literature and other published results suggests that NoSQL systems might be more appropriate in many specific scenarios and problems to be solved. For example, NoSQL may be appropriate for document-based tasks such as EHR extracts used in clinical practice, or edition and visualization, or situations where the aim is not only to query medical information, but also to restore the EHR in exactly its original form. PMID:29608174
Sánchez-de-Madariaga, Ricardo; Muñoz, Adolfo; Castro, Antonio L; Moreno, Oscar; Pascual, Mario
2018-03-19
This research shows a protocol to assess the computational complexity of querying relational and non-relational (NoSQL (not only Structured Query Language)) standardized electronic health record (EHR) medical information database systems (DBMS). It uses a set of three doubling-sized databases, i.e. databases storing 5000, 10,000 and 20,000 realistic standardized EHR extracts, in three different database management systems (DBMS): relational MySQL object-relational mapping (ORM), document-based NoSQL MongoDB, and native extensible markup language (XML) NoSQL eXist. The average response times to six complexity-increasing queries were computed, and the results showed a linear behavior in the NoSQL cases. In the NoSQL field, MongoDB presents a much flatter linear slope than eXist. NoSQL systems may also be more appropriate to maintain standardized medical information systems due to the special nature of the updating policies of medical information, which should not affect the consistency and efficiency of the data stored in NoSQL databases. One limitation of this protocol is the lack of direct results of improved relational systems such as archetype relational mapping (ARM) with the same data. However, the interpolation of doubling-size database results to those presented in the literature and other published results suggests that NoSQL systems might be more appropriate in many specific scenarios and problems to be solved. For example, NoSQL may be appropriate for document-based tasks such as EHR extracts used in clinical practice, or edition and visualization, or situations where the aim is not only to query medical information, but also to restore the EHR in exactly its original form.
Maintenance of Certification Part 4 Credit and recruitment for practice-based research.
Gorzkowski, Julie A; Klein, Jonathan D; Harris, Donna L; Kaseeska, Kristen R; Whitmore Shaefer, Regina M; Bocian, Alison B; Davis, James B; Gotlieb, Edward M; Wasserman, Richard C
2014-10-01
Competing priorities in pediatric practice have created challenges for practice-based research. To increase recruitment success, researchers must design studies that provide added value to participants. This study evaluates recruitment of pediatricians into a study, before and after the development and addition of a quality improvement (QI) curriculum approved for American Board of Pediatrics Maintenance of Certification (MOC) Part 4 Credit as an enrollment incentive. Researchers implemented multiple outreach methods to enroll pediatric practices over 28 months. Field note review revealed that many physicians declined enrollment, stating that they prioritized MOC Part 4 projects over research studies. A QI curriculum meeting standards for MOC Part 4 Credit was developed and added to the study protocol as an enrollment incentive. Enrollment rates and characteristics of practitioners enrolled pre- and post-MOC were compared. Pre-MOC enrollment contributed 48% of practices in 22 months; post-MOC enrollment contributed 49% of practices in 6 months. An average of 3.5 practices enrolled per month pre-MOC, compared with 13.1 per month post-MOC (P < .001). Clinicians in pre- and post-MOC groups were similar in age, gender, race, and time spent on patient care; practices enrolled post-MOC were more likely to be located in federally designated Medically Underserved Areas than those enrolled pre-MOC (28.6% vs 12%, P = .03). Addition of MOC Part 4 Credit increased recruitment success and increased enrollment of pediatricians working in underserved areas. Including QI initiatives meeting MOC Part 4 criteria in practice-based research protocols may enhance participation and aid in recruiting diverse practice and patient populations. Copyright © 2014 by the American Academy of Pediatrics.
ERIC Educational Resources Information Center
Schirmer, Barbara R.; Lockman, Alison S.; Schirmer, Todd N.
2016-01-01
We conducted this conceptual study to determine if the Institute of Education Sciences/National Science Foundation pipeline of evidence guidelines could be applied as a protocol that researchers could follow in establishing evidence of effective instructional practices. To do this, we compared these guidelines, new drug development process, and…
ERIC Educational Resources Information Center
Borckardt, Jeffrey J.; Nash, Michael R.; Murphy, Martin D.; Moore, Mark; Shaw, Darlene; O'Neil, Patrick
2008-01-01
Both researchers and practitioners need to know more about how laboratory treatment protocols translate to real-world practice settings and how clinical innovations can be systematically tested and communicated to a skeptical scientific community. The single-case time-series study is well suited to opening a productive discourse between practice…
Hogue, Aaron; Bobek, Molly; Tau, Gregory Z.; Levin, Frances R.
2014-01-01
Attention-Deficit/Hyperactivity Disorder (ADHD) is highly prevalent among adolescents enrolled in behavioral health services but remains undertreated in this age group. Also the first-line treatment for adolescent ADHD, stimulant medication, is underutilized in routine practice. This article briefly describes three behavioral interventions designed to promote stronger integration of medication interventions into treatment planning for adolescent ADHD: family ADHD psychoeducation, family-based medication decision-making, and behavior therapist leadership in coordinating medication integration. It then introduces the Medication Integration Protocol (MIP), which incorporates all three interventions into a five-task protocol: ADHD Assessment and Medication Consult; ADHD Psychoeducation and Client Acceptance; ADHD Symptoms and Family Relations; ADHD Medication and Family Decision-Making; and Medication Management and Integration Planning. The article concludes by highlighting what behavior therapists should know about best practices for medication integration across diverse settings and populations: integrating medication interventions into primary care, managing medication priorities and polypharmacy issues for adolescents with multiple diagnoses, providing ADHD medications to adolescent substance users, and the compatibility of MIP intervention strategies with everyday practice conditions. PMID:25505817
Hogue, Aaron; Bobek, Molly; Tau, Gregory Z; Levin, Frances R
2014-10-01
Attention-Deficit/Hyperactivity Disorder (ADHD) is highly prevalent among adolescents enrolled in behavioral health services but remains undertreated in this age group. Also the first-line treatment for adolescent ADHD, stimulant medication, is underutilized in routine practice. This article briefly describes three behavioral interventions designed to promote stronger integration of medication interventions into treatment planning for adolescent ADHD: family ADHD psychoeducation, family-based medication decision-making, and behavior therapist leadership in coordinating medication integration. It then introduces the Medication Integration Protocol (MIP), which incorporates all three interventions into a five-task protocol: ADHD Assessment and Medication Consult; ADHD Psychoeducation and Client Acceptance; ADHD Symptoms and Family Relations; ADHD Medication and Family Decision-Making; and Medication Management and Integration Planning. The article concludes by highlighting what behavior therapists should know about best practices for medication integration across diverse settings and populations: integrating medication interventions into primary care, managing medication priorities and polypharmacy issues for adolescents with multiple diagnoses, providing ADHD medications to adolescent substance users, and the compatibility of MIP intervention strategies with everyday practice conditions.
Gill, Kathryn J; Campbell, Emily; Gauthier, Gail; Xenocostas, Spyridoula; Charney, Dara; Macaulay, Ann C
2014-08-20
Substance abuse is a worldwide public health concern. Extensive scientific research has shown that screening and brief interventions for substance use disorders administered in primary care provide substantial benefit at relatively low cost. Frontline health clinicians are well placed to detect and treat patients with substance use disorders. Despite effectiveness shown in research, there are many factors that impact the implementation of these practices in real-world clinical practice. Recently, the Ministry of Health and Social Services in Quebec, Canada, issued two policy documents aimed at introducing screening and early intervention for substance abuse into frontline healthcare clinics in Quebec. The current research protocol was developed in order to study the process of implementation of evidence-based addiction treatment practices at three primary care clinics in Montreal (Phase 1). In addition, the research protocol was designed to examine the efficacy of overall policy implementation, including barriers and facilitators to addictions program development throughout Quebec (Phase 2). Phase 1 will provide an in-depth case study of knowledge translation and implementation. The study protocol will utilize an integrated knowledge translation strategy to build collaborative mechanisms for knowledge exchange between researchers, addiction specialists, and frontline practitioners (guided by the principles of participatory-action research), and directly examine the process of knowledge uptake and barriers to transfer using both qualitative and quantitative methodologies. Evaluation will involve multiple measures, time points and domains; program uptake and effectiveness will be determined by changes in healthcare service delivery, sustainability and outcomes. In Phase 2, qualitative methods will be utilized to examine the contextual facilitators and barriers that frontline organizations face in implementing services for substance dependence. Phase 2 will provide the first study exploring the wide-scale implementation of frontline services for substance dependence in the province of Quebec and yield needed information about how to effectively implement mandated policies into clinical practice and impact public health. Findings from this research program will contribute to the understanding of factors associated with implementation of frontline services for substance dependence and help to inform future policy and organizational support for the implementation of evidence-based practices.
International Convergence on Geoscience Cyberinfrastructure
NASA Astrophysics Data System (ADS)
Allison, M. L.; Atkinson, R.; Arctur, D. K.; Cox, S.; Jackson, I.; Nativi, S.; Wyborn, L. A.
2012-04-01
There is growing international consensus on addressing the challenges to cyber(e)-infrastructure for the geosciences. These challenges include: Creating common standards and protocols; Engaging the vast number of distributed data resources; Establishing practices for recognition of and respect for intellectual property; Developing simple data and resource discovery and access systems; Building mechanisms to encourage development of web service tools and workflows for data analysis; Brokering the diverse disciplinary service buses; Creating sustainable business models for maintenance and evolution of information resources; Integrating the data management life-cycle into the practice of science. Efforts around the world are converging towards de facto creation of an integrated global digital data network for the geosciences based on common standards and protocols for data discovery and access, and a shared vision of distributed, web-based, open source interoperable data access and integration. Commonalities include use of Open Geospatial Consortium (OGC) and ISO specifications and standardized data interchange mechanisms. For multidisciplinarity, mediation, adaptation, and profiling services have been successfully introduced to leverage the geosciences standards which are commonly used by the different geoscience communities -introducing a brokering approach which extends the basic SOA archetype. Principal challenges are less technical than cultural, social, and organizational. Before we can make data interoperable, we must make people interoperable. These challenges are being met by increased coordination of development activities (technical, organizational, social) among leaders and practitioners in national and international efforts across the geosciences to foster commonalities across disparate networks. In doing so, we will 1) leverage and share resources, and developments, 2) facilitate and enhance emerging technical and structural advances, 3) promote interoperability across scientific domains, 4) support the promulgation and institutionalization of agreed-upon standards, protocols, and practice, and 5) enhance knowledge transfer not only across the community, but into the domain sciences, 6) lower existing entry barriers for users and data producers, 7) build on the existing disciplinary infrastructures leveraging their service buses. . All of these objectives are required for establishing a permanent and sustainable cyber(e)-infrastructure for the geosciences. The rationale for this approach is well articulated in the AuScope mission statement: "Many of these problems can only be solved on a national, if not global scale. No single researcher, research institution, discipline or jurisdiction can provide the solutions. We increasingly need to embrace e-Research techniques and use the internet not only to access nationally distributed datasets, instruments and compute infrastructure, but also to build online, 'virtual' communities of globally dispersed researchers." Multidisciplinary interoperability can be successfully pursued by adopting a "system of systems" or a "Network of Networks" philosophy. This approach aims to: (a) supplement but not supplant systems mandates and governance arrangements; (b) keep the existing capacities as autonomous as possible; (c) lower entry barriers; (d) Build incrementally on existing infrastructures (information systems); (e) incorporate heterogeneous resources by introducing distribution and mediation functionalities. This approach has been adopted by the European INSPIRE (Infrastructure for Spatial Information in the European Community) initiative and by the international GEOSS (Global Earth Observation System of Systems) programme.
Developing family planning nurse practitioner protocols.
Hawkins, J W; Roberto, D
1984-01-01
This article focuses on the process of development of protocols for family planning nurse practitioners. A rationale for the use of protocols, a definition of the types and examples, and the pros and cons of practice with protocols are presented. A how-to description for the development process follows, including methods and a suggested tool for critique and evaluation. The aim of the article is to assist nurse practitioners in developing protocols for their practice.
Clearing muddied waters: Capture of environmental DNA from turbid waters.
Williams, Kelly E; Huyvaert, Kathryn P; Piaggio, Antoinette J
2017-01-01
Understanding the differences in efficiencies of various methods to concentrate, extract, and amplify environmental DNA (eDNA) is vital for best performance of eDNA detection. Aquatic systems vary in characteristics such as turbidity, eDNA concentration, and inhibitor load, thus affecting eDNA capture efficiency. Application of eDNA techniques to the detection of terrestrial invasive or endangered species may require sampling at intermittent water sources that are used for drinking and cooling; these water bodies may often be stagnant and turbid. We present our best practices technique for the detection of wild pig eDNA in water samples, a protocol that will have wide applicability to the detection of elusive vertebrate species. We determined the best practice for eDNA capture in a turbid water system was to concentrate DNA from a 15 mL water sample via centrifugation, purify DNA with the DNeasy mericon Food kit, and remove inhibitors with Zymo Inhibitor Removal Technology columns. Further, we compared the sensitivity of conventional PCR to quantitative PCR and found that quantitative PCR was more sensitive in detecting lower concentrations of eDNA. We show significant differences in efficiencies among methods in each step of eDNA capture, emphasizing the importance of optimizing best practices for the system of interest.
Clearing muddied waters: Capture of environmental DNA from turbid waters
Huyvaert, Kathryn P.; Piaggio, Antoinette J.
2017-01-01
Understanding the differences in efficiencies of various methods to concentrate, extract, and amplify environmental DNA (eDNA) is vital for best performance of eDNA detection. Aquatic systems vary in characteristics such as turbidity, eDNA concentration, and inhibitor load, thus affecting eDNA capture efficiency. Application of eDNA techniques to the detection of terrestrial invasive or endangered species may require sampling at intermittent water sources that are used for drinking and cooling; these water bodies may often be stagnant and turbid. We present our best practices technique for the detection of wild pig eDNA in water samples, a protocol that will have wide applicability to the detection of elusive vertebrate species. We determined the best practice for eDNA capture in a turbid water system was to concentrate DNA from a 15 mL water sample via centrifugation, purify DNA with the DNeasy mericon Food kit, and remove inhibitors with Zymo Inhibitor Removal Technology columns. Further, we compared the sensitivity of conventional PCR to quantitative PCR and found that quantitative PCR was more sensitive in detecting lower concentrations of eDNA. We show significant differences in efficiencies among methods in each step of eDNA capture, emphasizing the importance of optimizing best practices for the system of interest. PMID:28686659
Camden, C; Wilson, B; Kirby, A; Sugden, D; Missiuna, C
2015-01-01
Developmental coordination disorder (DCD) is a prevalent health condition that is frequently unrecognized despite the substantial evidence that has accumulated regarding how it affects children's health, education and skills. Most literature focuses on measurement of impairment and description of intervention approaches for individual children; little is known about the principles that should guide best practice and service delivery for children with DCD as a population. The purpose of this study was to identify these principles. A scoping review was used to 'map' the information available to inform intervention and service delivery. Scholarly and grey literature written in English was identified in six databases, using a combination of keywords (e.g. guidelines, management, models and DCD); a 'snow-balling' technique was also used in Canada and the UK to access clinical protocols used in publicly funded health care systems. Over 500 documents were screened: 31 met inclusion criteria as they outlined practice principles for children with DCD as a population. Data regarding best practices were independently extracted by two reviewers and then compared with achieve consistency and consensus. Two over-arching themes emerged, with five principles: (1) Organizing services to efficiently meet the comprehensive needs of children (e.g. Increasing awareness of DCD and coordination; Implementing clearly defined pathways; Using a graduated/staged approach); (2) Working collaboratively to offer evidence-based services (e.g. Integration of child and family views; Evidence-based interventions fostering function, participation and prevention). Numerous documents support each of the principles, reflecting agreement across studies about recommended organization of services. While these principles may apply to many populations of children with disabilities, this review highlights how essential these principles are in DCD. Researchers, managers, clinicians, community partners and families are encouraged to work together in designing, implementing and evaluating interventions that reflect these principles. © 2014 The Authors. Child: Care, Health and Development published by John Wiley & Sons Ltd.
Redesigning a large school-based clinical trial in response to changes in community practice
Gerald, Lynn B; Gerald, Joe K; McClure, Leslie A; Harrington, Kathy; Erwin, Sue; Bailey, William C
2011-01-01
Background Asthma exacerbations are seasonal with the greatest risk in elementary-age students occurring shortly after returning to school following summer break. Recent research suggests that this seasonality in children is primarily related to viral respiratory tract infections. Regular hand washing is the most effective method to prevent the spread of viral respiratory infections; unfortunately, achieving hand washing recommendations in schools is difficult. Therefore, we designed a study to evaluate the effect of hand sanitizer use in elementary schools on exacerbations among children with asthma. Purpose To describe the process of redesigning the trial in response to changes in the safety profile of the hand sanitizer as well as changes in hand hygiene practice in the schools. Methods The original trial was a randomized, longitudinal, subject-blinded, placebo-controlled, community-based crossover trial. The primary aim was to evaluate the incremental effectiveness of hand sanitizer use in addition to usual hand hygiene practices to decrease asthma exacerbations in elementary-age children. Three events occurred that required major modifications to the original study protocol: (1) safety concerns arose regarding the hand sanitizer’s active ingredient; (2) no substitute placebo hand sanitizer was available; and (3) community preferences changed regarding hand hygiene practices in the schools. Results The revised protocol is a randomized, longitudinal, community-based crossover trial. The primary aim is to evaluate the incremental effectiveness of a two-step hand hygiene process (hand hygiene education plus institutionally provided alcohol-based hand sanitizer) versus usual care to decrease asthma exacerbations. Enrollment was completed in May 2009 with 527 students from 30 schools. The intervention began in August 2009 and will continue through May 2011. Study results should be available at the end of 2011. Limitations The changed design does not allow us to directly measure the effectiveness of hand sanitizer use as a supplement to traditional hand washing practices. Conclusions The need to balance a rigorous study design with one that is acceptable to the community requires investigators to be actively involved with community collaborators and able to adapt study protocols to fit changing community practices. PMID:21730079
Redesigning a large school-based clinical trial in response to changes in community practice.
Gerald, Lynn B; Gerald, Joe K; McClure, Leslie A; Harrington, Kathy; Erwin, Sue; Bailey, William C
2011-06-01
Asthma exacerbations are seasonal with the greatest risk in elementary-age students occurring shortly after returning to school following summer break. Recent research suggests that this seasonality in children is primarily related to viral respiratory tract infections. Regular hand washing is the most effective method to prevent the spread of viral respiratory infections; unfortunately, achieving hand washing recommendations in schools is difficult. Therefore, we designed a study to evaluate the effect of hand sanitizer use in elementary schools on exacerbations among children with asthma. To describe the process of redesigning the trial in response to changes in the safety profile of the hand sanitizer as well as changes in hand hygiene practice in the schools. The original trial was a randomized, longitudinal, subject-blinded, placebo-controlled, community-based crossover trial. The primary aim was to evaluate the incremental effectiveness of hand sanitizer use in addition to usual hand hygiene practices to decrease asthma exacerbations in elementary-age children. Three events occurred that required major modifications to the original study protocol: (1) safety concerns arose regarding the hand sanitizer's active ingredient; (2) no substitute placebo hand sanitizer was available; and (3) community preferences changed regarding hand hygiene practices in the schools. The revised protocol is a randomized, longitudinal, community-based crossover trial. The primary aim is to evaluate the incremental effectiveness of a two-step hand hygiene process (hand hygiene education plus institutionally provided alcohol-based hand sanitizer) versus usual care to decrease asthma exacerbations. Enrollment was completed in May 2009 with 527 students from 30 schools. The intervention began in August 2009 and will continue through May 2011. Study results should be available at the end of 2011. The changed design does not allow us to directly measure the effectiveness of hand sanitizer use as a supplement to traditional hand washing practices. The need to balance a rigorous study design with one that is acceptable to the community requires investigators to be actively involved with community collaborators and able to adapt study protocols to fit changing community practices.
Hersh, Andrew M; Hirshberg, Eliotte L; Wilson, Emily L; Orme, James F; Morris, Alan H; Lanspa, Michael J
2018-04-26
Practice guidelines recommend against Intensive Insulin Therapy (IIT) in critically ill patients based on trials that had high rates of severe hypoglycemia. Intermountain Healthcare uses a computerized intravenous insulin protocol (eProtocol-insulin) that allows choice of blood glucose (BG) targets (80-110 mg/dl versus 90-140 mg/dl), and has low rates of severe hypoglycemia. We sought to study the effects of BG target on mortality in adult patients in cardiac intensive care units (ICUs) that have very low rates of severe hypoglycemia. Critically ill patients receiving intravenous insulin were treated with either of two BG targets (80-110 mg/dl versus 90-140 mg/dl). We created a propensity score for BG target using factors believed to have influenced clinicians' choice, and then performed a propensity-score-adjusted regression analysis for 30-day mortality. 1809 patients met inclusion criteria. Baseline patient characteristics were similar. Median glucose was lower in the 80-110 mg/dl group (104 mg/dl vs. 122 mg/dl, p<0.001). Severe hypoglycemia occurred at very low rates in both groups (1.16% vs. 0.35%, p=0.051). Unadjusted 30-day mortality was lower in the 80-110 mg/dl group (4.3% vs 9.2%, p<0.001). This remained after propensity-score-adjusted regression (OR 0.65; 95% CI, 0.43-0.98; p=0.04). Tight glucose control can be achieved with low rates of severe hypoglycemia, and is associated with decreased 30-day mortality in a cohort of largely cardiac patients. While such findings should not be used to guide clinical practice at present, the use of tight glucose control should be re-examined using a protocol that has low rates of severe hypoglycemia. Copyright © 2018. Published by Elsevier Inc.
NASA Astrophysics Data System (ADS)
Kosmowski, Frédéric; Stevenson, James; Campbell, Jeff; Ambel, Alemayehu; Haile Tsegay, Asmelash
2017-10-01
Maintaining permanent coverage of the soil using crop residues is an important and commonly recommended practice in conservation agriculture. Measuring this practice is an essential step in improving knowledge about the adoption and impact of conservation agriculture. Different data collection methods can be implemented to capture the field level crop residue coverage for a given plot, each with its own implication on survey budget, implementation speed and respondent and interviewer burden. In this paper, six alternative methods of crop residue coverage measurement are tested among the same sample of rural households in Ethiopia. The relative accuracy of these methods are compared against a benchmark, the line-transect method. The alternative methods compared against the benchmark include: (i) interviewee (respondent) estimation; (ii) enumerator estimation visiting the field; (iii) interviewee with visual-aid without visiting the field; (iv) enumerator with visual-aid visiting the field; (v) field picture collected with a drone and analyzed with image-processing methods and (vi) satellite picture of the field analyzed with remote sensing methods. Results of the methodological experiment show that survey-based methods tend to underestimate field residue cover. When quantitative data on cover are needed, the best estimates are provided by visual-aid protocols. For categorical analysis (i.e., >30% cover or not), visual-aid protocols and remote sensing methods perform equally well. Among survey-based methods, the strongest correlates of measurement errors are total farm size, field size, distance, and slope. Results deliver a ranking of measurement options that can inform survey practitioners and researchers.
Kosmowski, Frédéric; Stevenson, James; Campbell, Jeff; Ambel, Alemayehu; Haile Tsegay, Asmelash
2017-10-01
Maintaining permanent coverage of the soil using crop residues is an important and commonly recommended practice in conservation agriculture. Measuring this practice is an essential step in improving knowledge about the adoption and impact of conservation agriculture. Different data collection methods can be implemented to capture the field level crop residue coverage for a given plot, each with its own implication on survey budget, implementation speed and respondent and interviewer burden. In this paper, six alternative methods of crop residue coverage measurement are tested among the same sample of rural households in Ethiopia. The relative accuracy of these methods are compared against a benchmark, the line-transect method. The alternative methods compared against the benchmark include: (i) interviewee (respondent) estimation; (ii) enumerator estimation visiting the field; (iii) interviewee with visual-aid without visiting the field; (iv) enumerator with visual-aid visiting the field; (v) field picture collected with a drone and analyzed with image-processing methods and (vi) satellite picture of the field analyzed with remote sensing methods. Results of the methodological experiment show that survey-based methods tend to underestimate field residue cover. When quantitative data on cover are needed, the best estimates are provided by visual-aid protocols. For categorical analysis (i.e., >30% cover or not), visual-aid protocols and remote sensing methods perform equally well. Among survey-based methods, the strongest correlates of measurement errors are total farm size, field size, distance, and slope. Results deliver a ranking of measurement options that can inform survey practitioners and researchers.
2013-01-01
Background The use of computerized systems to support evidence-based practice is commonplace in contemporary medicine. Despite the prolific use of electronic support systems there has been relatively little research on the uptake of web-based systems in the oncology setting. Our objective was to examine the uptake of a web-based oncology protocol system (http://www.eviq.org.au) by Australian cancer clinicians. Methods We used web-logfiles and Google Analytics to examine the characteristics of eviQ registrants from October 2009-December 2011 and patterns of use by cancer clinicians during a typical month. Results As of December 2011, there were 16,037 registrants; 85% of whom were Australian health care professionals. During a typical month 87% of webhits occurred in standard clinical hours (08:00 to 18:00 weekdays). Raw webhits were proportional to the size of clinician groups: nurses (47% of Australian registrants), followed by doctors (20%), and pharmacists (14%). However, pharmacists had up to three times the webhit rate of other clinical groups. Clinicians spent five times longer viewing chemotherapy protocol pages than other content and the protocols viewed reflect the most common cancers: lung, breast and colorectal. Conclusions Our results demonstrate eviQ is used by a range of health professionals involved in cancer treatment at the point-of-care. Continued monitoring of electronic decision support systems is vital to understanding how they are used in clinical practice and their impact on processes of care and patient outcomes. PMID:23497080
Pilot study of six Colorado dental hygiene independent practices.
Astroth, D B; Cross-Poline, G N
1998-01-01
The purpose of this pilot study was to gather demographic data about six Colorado dental hygienists who were practicing independently and their practices as well as assess productivity and service mix, evaluate structure and process, and compare the findings in these practices to those of a study of California Health Manpower Pilot Project #139. A convenience sample of six dental hygiene independent practices was studied. A 21-item survey was distributed by mail to obtain demographic and practice information. Weekly surveys tracking patient visits and services provided were completed for three months. A general office audit to evaluate structure and a record audit of 22 patient records to evaluate process were conducted during visits at each practice site. The overall responses for each phase of this study were tabulated and frequencies were calculated using the SPSS/PC+ statistical package. The dental hygienists had practiced for an average of 13 years prior to establishing their practices. Four of the six practices were office-based, one was institution-based, and one was office- and institution-based. Health history, extraoral/intraoral examination, periodontal probing, adult prophylaxis, and oral hygiene instruction were provided during a majority of patient visits. The general office audit revealed compliance with infection control, office protocols for emergency situations, and practice management protocols. The patient record audit indicated a high standard for process of care for the practice sites. The six practices revealed a variety of backgrounds among the dental hygienists and diverse practice characteristics regarding both the populations served and practice settings. The services provided were consistent with allowable services for unsupervised practice. Compliance with specific guidelines was verified during the general office and patient record audits. Consistent with the findings of California Health Manpower Pilot Project #139, the care provided by the Colorado dental hygiene independent practitioners in this study and the environment in which the care was provided do not exhibit any undue risk to the health and safety of the public.
[Systematization of nursing assistance in critical care unit].
Truppel, Thiago Christel; Meier, Marineli Joaquim; Calixto, Riciana do Carmo; Peruzzo, Simone Aparecida; Crozeta, Karla
2009-01-01
This is a methodological research, which aimed at organizing the systematization of nursing assistance in a critical care unit. The following steps were carried out: description of the nursing practice; transcription of nursing diagnoses; elaboration of a protocol for nursing diagnosis based in International Classification for Nursing Practice (ICNP); determination of nursing prescriptions and the elaboration of guidelines for care and procedures. The nursing practice and care complexity in ICU were characterized. Thus, systematization of nursing assistance is understood as a valuable tool for nursing practice.
[Recommendations in neonatal resuscitation].
2004-01-01
The recommendations for neonatal resuscitation are not always based on sufficient scientific evidence and thus expert consensus based on current research, knowledge, and experience are useful for formulating practical protocols that are easy to follow. The latest recommendations, in 2000, modified previously published recommendations and are included in the present text.
Young, Doris; Furler, John; Vale, Margarite; Walker, Christine; Segal, Leonie; Dunning, Patricia; Best, James; Blackberry, Irene; Audehm, Ralph; Sulaiman, Nabil; Dunbar, James; Chondros, Patty
2007-04-11
The PEACH study is based on an innovative 'telephone coaching' program that has been used effectively in a post cardiac event trial. This intervention will be tested in a General Practice setting in a pragmatic trial using existing Practice Nurses (PN) as coaches for people with type 2 diabetes (T2D). Actual clinical care often fails to achieve standards, that are based on evidence that self-management interventions (educational and psychological) and intensive pharmacotherapy improve diabetes control. Telephone coaching in our study focuses on both. This paper describes our study protocol, which aims to test whether goal focused telephone coaching in T2D can improve diabetes control and reduce the treatment gap between guideline based standards and actual clinical practice. In a cluster randomised controlled trial, general practices employing Practice Nurses (PNs) are randomly allocated to an intervention or control group. We aim to recruit 546 patients with poorly controlled T2D (HbA1c >7.5%) from 42 General Practices that employ PNs in Melbourne, Australia. PNs from General Practices allocated to the intervention group will be trained in diabetes telephone coaching focusing on biochemical targets addressing both patient self-management and engaging patients to work with their General Practitioners (GPs) to intensify pharmacological treatment according to the study clinical protocol. Patients of intervention group practices will receive 8 telephone coaching sessions and one face-to-face coaching session from existing PNs over 18 months plus usual care and outcomes will be compared to the control group, who will only receive only usual care from their GPs. The primary outcome is HbA1c levels and secondary outcomes include cardiovascular disease risk factors, behavioral risk factors and process of care measures. Understanding how to achieve comprehensive treatment of T2D in a General Practice setting is the focus of the PEACH study. This study explores the potential role for PNs to help reduce the treatment and outcomes gap in people with T2D by using telephone coaching. The intervention, if found to be effective, has potential to be sustained and embedded within real world General Practice.
Security of the arbitrated quantum signature protocols revisited
NASA Astrophysics Data System (ADS)
Kejia, Zhang; Dan, Li; Qi, Su
2014-01-01
Recently, much attention has been paid to the study of arbitrated quantum signature (AQS). Among these studies, the cryptanalysis of some AQS protocols and a series of improved ideas have been proposed. Compared with the previous analysis, we present a security criterion, which can judge whether an AQS protocol is able to prevent the receiver (i.e. one participant in the signature protocol) from forging a legal signature. According to our results, it can be seen that most AQS protocols which are based on the Zeng and Keitel (ZK) model are susceptible to a forgery attack. Furthermore, we present an improved idea of the ZK protocol. Finally, some supplement discussions and several interesting topics are provided.
Connecting Reflective Practice, Dialogic Protocols, and Professional Learning
ERIC Educational Resources Information Center
Nehring, James; Laboy, Wilfredo T.; Catarius, Lynn
2010-01-01
In recent years, elements of reflective practice have been popularized in state school professional development. As reflective practice has moved into the mainstream, dialogic protocols have been developed by numerous organizations to structure discourse for deep understanding, enhance professional practice and advance organizational learning.…
Jiang, Xiaochun; Chen, Kun; Wang, Jing; Shao, Kang; Fu, Tao; Shao, Feng; Lu, Donglian; Liang, Jiangong; Foda, M Frahat; Han, Heyou
2013-06-21
A new electrochemical immunosensor based on solid-state voltammetry was fabricated for the detection of Escherichia coli (E. coli) by using graphene oxide-Ag nanoparticle composites (P-GO-Ag) as labels. To construct the platform, Au nanoparticles (AuNPs) were first self-assembled on an Au electrode surface through cysteamine and served as an effective matrix for antibody (Ab) attachment. Under a sandwich-type immunoassay format, the analyte and the probe (P-GO-Ag-Ab) were successively captured onto the immunosensor. Finally, the bonded AgNPs were detected through a solid-state redox process in 0.2 M of KCl solution. Combining the advantages of the high-loading capability of graphene oxide with promoted electron-transfer rate of AuNPs, this immunosensor produced a 26.92-fold signal enhancement compared with the unamplified protocol. Under the optimal conditions, the immunosensor exhibited a wide linear dependence on the logarithm of the concentration of E. coli ranging from 50 to 1.0 × 10(6) cfu mL(-1) with a detection limit of 10 cfu mL(-1). Moreover, as a practical application, the proposed immunosensor was used to monitor E. coli in lake water with satisfactory results.
Collavini, Silvia; Kosta, Ivet; Völker, Sebastian F; Cabanero, German; Grande, Hans J; Tena-Zaera, Ramón; Delgado, Juan Luis
2016-06-08
[70]Fullerene is presented as an efficient alternative electron-selective contact (ESC) for regular-architecture perovskite solar cells (PSCs). A smart and simple, well-described solution processing protocol for the preparation of [70]- and [60]fullerene-based solar cells, namely the fullerene saturation approach (FSA), allowed us to obtain similar power conversion efficiencies for both fullerene materials (i.e., 10.4 and 11.4 % for [70]- and [60]fullerene-based devices, respectively). Importantly, despite the low electron mobility and significant visible-light absorption of [70]fullerene, the presented protocol allows the employment of [70]fullerene as an efficient ESC. The [70]fullerene film thickness and its solubility in the perovskite processing solutions are crucial parameters, which can be controlled by the use of this simple solution processing protocol. The damage to the [70]fullerene film through dissolution during the perovskite deposition is avoided through the saturation of the perovskite processing solution with [70]fullerene. Additionally, this fullerene-saturation strategy improves the performance of the perovskite film significantly and enhances the power conversion efficiency of solar cells based on different ESCs (i.e., [60]fullerene, [70]fullerene, and TiO2 ). Therefore, this universal solution processing protocol widens the opportunities for the further development of PSCs. © 2016 WILEY-VCH Verlag GmbH & Co. KGaA, Weinheim.
ICU nurses' oral-care practices and the current best evidence.
DeKeyser Ganz, Freda; Fink, Naomi Farkash; Raanan, Ofra; Asher, Miriam; Bruttin, Madeline; Nun, Maureen Ben; Benbinishty, Julie
2009-01-01
The purpose of this study was to describe the oral-care practices of ICU nurses, to compare those practices with current evidence-based practice, and to determine if the use of evidence-based practice was associated with personal demographic or professional characteristics. A national survey of oral-care practices of ICU nurses was conducted using a convenience sample of 218 practicing ICU nurses in 2004-05. The survey instrument included questions about demographic and professional characteristics and a checklist of oral-care practices. Nurses rated their perceived level of priority concerning oral care on a scale from 0 to 100. A score was computed representing the sum of 14 items related to equipment, solutions, assessments, and techniques associated with the current best evidence. This score was then statistically analyzed using ANOVA to determine differences of EBP based on demographic and professional characteristics. The most commonly used equipment was gauze pads (84%), followed by tongue depressors (55%), and toothbrushes (34%). Chlorhexidine was the most common solution used (75%). Less than half (44%) reported brushing their patients' teeth. The majority performed an oral assessment before beginning oral care (71%); however, none could describe what assessment tool was used. Only 57% of nurses reported documenting their oral care. Nurses rated oral care of intubated patients with a priority of 67+/-27.1. Wide variations were noted within and between units in terms of which techniques, equipment, and solutions were used. No significant relationships were found between the use of an evidence-based protocol and demographic and professional characteristics or with the priority given to oral care. While nurses ranked oral care a high priority, many did not implement the latest evidence into their current practice. The level of research utilization was not related to personal or professional characteristics. Therefore attempts should be made to encourage all ICU nurses to introduce and use evidence-based, oral-care protocols. Practicing ICU nurses in this survey were often not adhering to the latest evidence-based practice and therefore need to be educated and encouraged to do so in order to improve patient care.
Managing barriers to empathy in the clinical encounter: a qualitative interview study with GPs.
Derksen, Frans Awm; Olde Hartman, Tim C; Bensing, Jozien M; Lagro-Janssen, Antoine Lm
2016-12-01
Current daily general practice has become increasingly technical and somatically oriented (where attention to patients' feelings is decreased) due to an increase in protocol-based guidelines. Priorities in GP-patient communication have shifted from a focus on listening and empathy to task-oriented communication. To explore what barriers GPs experience when applying empathy in daily practice, and how these barriers are managed. Thirty Dutch GPs with sufficient heterogeneity in sex, age, type of practice, and rural or urban setting were interviewed. The consolidated criteria for reporting qualitative research (COREQ) were applied. The verbatim transcripts were then analysed. According to participating GPs, the current emphasis on protocol-driven care can be a significant barrier to genuineness in communication. Other potential barriers mentioned were time pressures and constraints, and dealing with patients displaying 'unruly behaviour' or those with personality disorders. GPs indicated that it can be difficult to balance emotional involvement and professional distance. Longer consulting times, smaller practice populations, and efficient practice organisation were described as practical solutions. In order to focus on a patient-as-person approach, GPs strongly suggested that deviating from guidelines should be possible when necessary as an element of good-quality care. Joining intercollegiate counselling groups was also discussed. In addition to practical solutions for barriers to behaving empathically, GPs indicated that they needed more freedom to balance working with protocols and guidelines, as well as a patient-as-person and patient-as-partner approach. This balance is necessary to remain connected with patients and to deliver care that is truly personal. © British Journal of General Practice 2016.
WE-E-304-00: Implementing SBRT Protocols
DOE Office of Scientific and Technical Information (OSTI.GOV)
NONE
2015-06-15
SBRT is having a dramatic impact on radiation therapy of early-stage, locally advanced cancers. A number of national protocols have been and are being developed to assess the clinical efficacy of SBRT for various anatomical sites, such as lung and spine. Physics credentialing for participating and implementation of trial protocols involve a broad spectrum of requirements from image guidance, motion management, to planning technology and dosimetric constrains. For radiation facilities that do not have extensive experiences in SBRT treatment and protocol credentialing, these complex processes of credentialing and implementation could be very challenging and, sometimes, may lead to ineffective evenmore » unsuccessful execution of these processes. In this proposal, we will provide comprehensive review of some current SBRT protocols, explain the requirements and their underline rationales, illustrate representative failed and successful experiences, related to SBRT credentialing, and discuss strategies for effective SBRT credentialing and implementation. Learning Objectives: Understand requirements and challenges of SBRT credentailing and implentation Discuss processes and strategies of effective SBRT credentailing Discuss practical considerations, potential pitfalls and solutions of SBRT implentation.« less
WE-E-304-02: Implementing SBRT Protocols: A NRG CIRO Perspective
DOE Office of Scientific and Technical Information (OSTI.GOV)
Xiao, Y.
2015-06-15
SBRT is having a dramatic impact on radiation therapy of early-stage, locally advanced cancers. A number of national protocols have been and are being developed to assess the clinical efficacy of SBRT for various anatomical sites, such as lung and spine. Physics credentialing for participating and implementation of trial protocols involve a broad spectrum of requirements from image guidance, motion management, to planning technology and dosimetric constrains. For radiation facilities that do not have extensive experiences in SBRT treatment and protocol credentialing, these complex processes of credentialing and implementation could be very challenging and, sometimes, may lead to ineffective evenmore » unsuccessful execution of these processes. In this proposal, we will provide comprehensive review of some current SBRT protocols, explain the requirements and their underline rationales, illustrate representative failed and successful experiences, related to SBRT credentialing, and discuss strategies for effective SBRT credentialing and implementation. Learning Objectives: Understand requirements and challenges of SBRT credentailing and implentation Discuss processes and strategies of effective SBRT credentailing Discuss practical considerations, potential pitfalls and solutions of SBRT implentation.« less
Björklund, Katja; Liski, Antti; Samposalo, Hanna; Lindblom, Jallu; Hella, Juho; Huhtinen, Heini; Ojala, Tiina; Alasuvanto, Paula; Koskinen, Hanna-Leena; Kiviruusu, Olli; Hemminki, Elina; Punamäki, Raija-Leena; Sund, Reijo; Solantaus, Tytti; Santalahti, Päivi
2014-10-07
Schools provide a natural context to promote children's mental health. However, there is a need for more evidence-based, high quality school intervention programs combined with an accurate evaluation of their general effectiveness and effectiveness of specific intervention methods. The aim of this paper is to present a study protocol of a cluster randomized controlled trial evaluating the "Together at School" intervention program. The intervention program is designed to promote social-emotional skills and mental health by utilizing whole-school approach and focuses on classroom curriculum, work environment of school staff, and parent-teacher collaboration methods. The evaluation study examines the effects of the intervention on children's socio-emotional skills and mental health in a cluster randomized controlled trial design with 1) an intervention group and 2) an active control group. Altogether 79 primary school participated at baseline. A multi-informant setting involves the children themselves, their parents, and teachers. The primary outcomes are measured using parent and teacher ratings of children's socio-emotional skills and psychological problems measured by the Strengths and Difficulties Questionnaire and the Multisource Assessment of Social Competence Scale. Secondary outcomes for the children include emotional understanding, altruistic behavior, and executive functions (e.g. working memory, planning, and inhibition). Secondary outcomes for the teachers include ratings of e.g. school environment, teaching style and well-being. Secondary outcomes for both teachers and parents include e.g. emotional self-efficacy, child rearing practices, and teacher-parent collaboration. The data was collected at baseline (autumn 2013), 6 months after baseline, and will be collected also 18 months after baseline from the same participants. This study protocol outlines a trial which aims to add to the current state of intervention programs by presenting and studying a contextually developed and carefully tested intervention program which is tailored to fit a national school system. Identification of effective intervention elements to promote children's mental health in early school years is crucial for optimal later development. ClinicalTrials.gov register: NCT02178332.
Measles, social media and surveillance in Baltimore City.
Warren, Katherine E; Wen, Leana S
2017-09-01
Baltimore City was faced with two potential measles outbreaks in 2015. Both cases occurred in the wake of national media attention paid to the Disneyland outbreaks of the same year. A comparative case study approach was used applying qualitative data to elicit best practices in infectious disease protocols in the age of social media. The research also used search engine data from Google Trends to track constituent engagement over time. Across the two case studies, the Baltimore City Health Department identified a number of best practices to inform the public via social media and minimize levels of misinformation and panic. These practices included clarity in messaging across platforms and public health jurisdictions; pre-emptor alerts of potential measles cases to control and shape the media messaging; and targeted, in-person outreach to engage groups in a culturally competent manner. The Baltimore City Health Department's response drew out a critical need for re-examining infectious disease protocols in the age of social media (e.g. contact notification, quarantine, media sensitivity) and anti-vaccination movements that pose new obstacles to government intervention. The benefits and challenges of greater connectivity between providers, patients, and public health officers are discussed. © The Author 2016. Published by Oxford University Press on behalf of Faculty of Public Health. All rights reserved. For permissions, please e-mail: journals.permissions@oup.com.
Conducting Clinically Based Intimate Partner Violence Research: Safety Protocol Recommendations.
Anderson, Jocelyn C; Glass, Nancy E; Campbell, Jacquelyn C
Maintaining safety is of utmost importance during research involving participants who have experienced intimate partner violence (IPV). Limited guidance on safety protocols to protect participants is available, particularly information related to technology-based approaches to informed consent, data collection, and contacting participants during the course of a study. The purpose of the article is to provide details on the safety protocol developed and utilized with women receiving care at an urban HIV clinic and who were taking part in an observational study of IPV, mental health symptoms, and substance abuse and their relationship to HIV treatment adherence. The protocol presents the technological strategies to promote safety and allow autonomy in participant decision-making throughout the research process, including Voice over Internet Protocol telephone numbers, and tablet-based eligibility screening and data collection. Protocols for management of participants at risk for suicide and/or intimate partner homicide that included automated high-risk messaging to participants and research staff and facilitated disclosure of risk to clinical staff based on participant preferences are discussed. Use of technology and partnership with clinic staff helped to provide an environment where research regarding IPV could be conducted without undue burden or risk to participants. Utilizing tablet-based survey administration provided multiple practical and safety benefits for participants. Most women who screened into high-risk categories for suicide or intimate partner homicide did not choose to have their results shared with their healthcare providers, indicating the importance of allowing participants control over information sharing whenever possible.
Transcultural Endocrinology: Adapting Type-2 Diabetes Guidelines on a Global Scale.
Nieto-Martínez, Ramfis; González-Rivas, Juan P; Florez, Hermes; Mechanick, Jeffrey I
2016-12-01
Type-2 diabetes (T2D) needs to be prevented and treated effectively to reduce its burden and consequences. White papers, such as evidence-based clinical practice guidelines (CPG) and their more portable versions, clinical practice algorithms and clinical checklists, may improve clinical decision-making and diabetes outcomes. However, CPG are underused and poorly validated. Protocols that translate and implement these CPG are needed. This review presents the global dimension of T2D, details the importance of white papers in the transculturalization process, compares relevant international CPG, analyzes cultural variables, and summarizes translation strategies that can improve care. Specific protocols and algorithmic tools are provided. Copyright © 2016 Elsevier Inc. All rights reserved.
Positron Emission Tomography: Principles, Technology, and Recent Developments
NASA Astrophysics Data System (ADS)
Ziegler, Sibylle I.
2005-04-01
Positron emission tomography (PET) is a nuclear medical imaging technique for quantitative measurement of physiologic parameters in vivo (an overview of principles and applications can be found in [P.E. Valk, et al., eds. Positron Emission Tomography. Basic Science and Clinical Practice. 2003, Springer: Heidelberg]), based on the detection of small amounts of posi-tron-emitter-labelled biologic molecules. Various radiotracers are available for neuro-logical, cardiological, and oncological applications in the clinic and in research proto-cols. This overview describes the basic principles, technology, and recent develop-ments in PET, followed by a section on the development of a tomograph with ava-lanche photodiodes dedicated for small animal imaging as an example of efforts in the domain of high resolution tomographs.
Task Analyses for Difficult-to-Assess Collective Tasks
2014-02-01
FOR THE KLE MISSION Review and rehearse social nuances, customs, and etiquette of the host nation, e.g., gift exchange expectations. Practice... etiquette to foster rapport with the leader and demonstrate cultural awareness. Negotiate with the key leader in a manner that demonstrates...requirements for police applicants by establishing minimum entry requirements, physical fitness tests, literacy tests, and medical screening protocols
Optimal approach to quantum communication using dynamic programming.
Jiang, Liang; Taylor, Jacob M; Khaneja, Navin; Lukin, Mikhail D
2007-10-30
Reliable preparation of entanglement between distant systems is an outstanding problem in quantum information science and quantum communication. In practice, this has to be accomplished by noisy channels (such as optical fibers) that generally result in exponential attenuation of quantum signals at large distances. A special class of quantum error correction protocols, quantum repeater protocols, can be used to overcome such losses. In this work, we introduce a method for systematically optimizing existing protocols and developing more efficient protocols. Our approach makes use of a dynamic programming-based searching algorithm, the complexity of which scales only polynomially with the communication distance, letting us efficiently determine near-optimal solutions. We find significant improvements in both the speed and the final-state fidelity for preparing long-distance entangled states.
Evaluating the Process of Generating a Clinical Trial Protocol
Franciosi, Lui G.; Butterfield, Noam N.; MacLeod, Bernard A.
2002-01-01
The research protocol is the principal document in the conduct of a clinical trial. Its generation requires knowledge about the research problem, the potential experimental confounders, and the relevant Good Clinical Practices for conducting the trial. However, such information is not always available to authors during the writing process. A checklist of over 80 items has been developed to better understand the considerations made by authors in generating a protocol. It is based on the most cited requirements for designing and implementing the randomised controlled trial. Items are categorised according to the trial's research question, experimental design, statistics, ethics, and standard operating procedures. This quality assessment tool evaluates the extent that a generated protocol deviates from the best-planned clinical trial.
Tsang, Lap Fung; Cheng, Hang Cheong; Ho, Hon Shuen; Hsu, Yung Chak; Chow, Chiu Man; Law, Heung Wah; Fong, Lup Chau; Leung, Lok Ming; Kong, Ivy Ching Yan; Chan, Chi Wai; Sham, Alice So Yuen
2016-05-01
Although various drains have long been used in total joint replacement, evidence suggests inconsistent practice exists in the use of drainage systems including intermittently applying suction or free of drainage suction, and variations in the optimal timing for wound drain removal. A comprehensive systematic review of available evidence up to 2013 was conducted in a previous study and a protocol was adapted for clinical application according to the summary of the retrieved information (Tsang, 2015). To determine if the protocol could reduce blood loss and blood transfusion after operation and to develop a record form so as to enhance communication of drainage record amongst surgeons and nurses. A quasi-experimental time-series design was undertaken. In the conventional group, surgeons ordered free drainage if the drain output was more than 300 ml. The time of removal of the drain was based on their professional judgement. In the protocol group the method of drainage was dependant of the drainage output as was the timing of the removal of the drain. A standardized record form was developed to guide operating room and orthopaedic ward nurses to manage the drainage system. The drain was removed significantly earlier in the protocol group. Blood loss rate at the first hour of post-operation was extremely low in the protocol group due to clamping effect. Blood loss in volume during the first three hours in the protocol group was significantly lower than that in the conventional group. Only in 11.1% and 4% of cases was it necessary to clamp at the three and four hour post-operative hours. No clamping was required at the two and eight hour postoperative period. There was no significant difference in blood loss during the removal of the drain and during blood transfusion, which was required for patients upon removal of the drain in the two groups. This is the first clinical study to develop an evidence-based protocol to manage wound drain effectively in Hong Kong. Total blood loss and blood transfusions were not significantly different between the conventional and protocol groups. A standard documentation document is beneficial to enhance communication between doctors and nurses as well as to monitor and observe drainage effectively. Copyright © 2016 Elsevier Ltd. All rights reserved.
Kamradt, Martina; Kaufmann-Kolle, Petra; Andres, Edith; Brand, Tonia; Klingenberg, Anja; Glassen, Katharina; Poß-Doering, Regina; Uhlmann, Lorenz; Hees, Katharina; Weber, Dorothea; Gutscher, Andreas; Wambach, Veit; Szecsenyi, Joachim; Wensing, Michel
2018-02-05
Despite many initiatives to enhance the rational use of antibiotics, there remains substantial room for improvement. The overall aim of this study is to optimise the appropriate use of antibiotics in German ambulatory care in patients with acute non-complicated infections (respiratory tract infections, such as bronchitis, sinusitis, tonsillitis and otitis media), community-acquired pneumonia and non-complicated cystitis, in order to counter the advancing antimicrobial resistance development. A three-armed cluster randomised trial will be conducted in 14 practice networks in two German federal states (Bavaria and North Rhine-Westphalia) and an added cohort that reflects standard care. The trial is accompanied by a process evaluation. Each arm will receive a different set of implementation strategies. Arm A receives a standard set, comprising of e-learning on communication with patients and quality circles with data-based feedback for physicians, information campaigns for the public, patient information material and performance-based additional reimbursement. Arm B receives this standard set plus e-learning on communication with patients and quality circles with data-based feedback tailored for non-physician health professionals of the practice team and information material for tablet computers (culture sensitive). Arm C receives the standard set as well as a computerised decision support system and quality circles in local multidisciplinary groups. The study aims to recruit 193 practices which will provide data on 23,934 patients each year (47,867 patients in total). The outcome evaluation is based on claims data and refers to established indicators of the European Surveillance of Antimicrobial Consumption Network (ESAC-Net). Primary and secondary outcomes relate to prescribing of antibiotics, which will be analysed in multivariate regression models. The process evaluation is based on interviews with surveys among physicians, non-physician health professionals of the practice team and stakeholders. A patient survey is conducted in one of the study arms. Interview data will be qualitatively analysed using thematic framework analysis. Survey data of physicians, non-physician health professionals of the practice team and patients will use descriptive and exploratory statistics for analysis. The ARena trial will examine the effectiveness of large scale implementation strategies and explore their delivery in routine practice. ISRCTN, ISRCTN58150046 . Registered 24 August 2017.
McGoey, Tara; Root, Zach; Bruner, Mark W; Law, Barbi
2016-01-01
Existing reviews of physical activity (PA) interventions designed to increase PA behavior exclusively in children (ages 5 to 11years) focus primarily on the efficacy (e.g., internal validity) of the interventions without addressing the applicability of the results in terms of generalizability and translatability (e.g., external validity). This review used the RE-AIM (Reach, Efficacy/Effectiveness, Adoption, Implementation, Maintenance) framework to measure the degree to which randomized and non-randomized PA interventions in children report on internal and external validity factors. A systematic search for controlled interventions conducted within the past 12years identified 78 studies that met the inclusion criteria. Based on the RE-AIM criteria, most of the studies focused on elements of internal validity (e.g., sample size, intervention location and efficacy/effectiveness) with minimal reporting of external validity indicators (e.g., representativeness of participants, start-up costs, protocol fidelity and sustainability). Results of this RE-AIM review emphasize the need for future PA interventions in children to report on real-world challenges and limitations, and to highlight considerations for translating evidence-based results into health promotion practice. Copyright © 2015 Elsevier Inc. All rights reserved.
Methodological approach to moving nutritional science evidence into practice.
Crawford, Cindy; Teo, Lynn; Elfenbaum, Pamela; Enslein, Viviane; Deuster, Patricia A; Berry, Kevin
2017-06-01
The Metabolically Optimized Brain study explored nutritional science believed to be ready to place into practice to help improve US service members' cognitive performance and, thereby, optimize mission-readiness. A transparent, step-wise, research approach was used for informing evidence-based decisions among and for various, diverse stakeholders. A steering committee and subject-matter experts convened to devise the protocol and independent systematic reviews were performed to determine the quality of the evidence for nutritional science in 4 areas relevant to military populations: (1) caffeinated foods and beverages; (2) omega-3 polyunsaturated fatty acids; (3) plant-based foods and beverages or their phytochemical constituents; and (4) whole dietary patterns. A research expert panel was asked to then recommend future research directions and solutions likely to benefit warfighters. An implementation expert panel further considered how to apply sound nutritional science in a cost-effective manner. This article summarizes the methodological processes, high-level results, global research recommendations, and priorities for implementation. Specific results of the individual dietary interventions, as well as recommendations for moving this field of research and practice forward, are detailed throughout the current supplement. © The Author(s) 2017. Published by Oxford University Press on behalf of the International Life Sciences Institute. All rights reserved. For Permissions, please e-mail: journals.permissions@oup.com.
Performing private database queries in a real-world environment using a quantum protocol.
Chan, Philip; Lucio-Martinez, Itzel; Mo, Xiaofan; Simon, Christoph; Tittel, Wolfgang
2014-06-10
In the well-studied cryptographic primitive 1-out-of-N oblivious transfer, a user retrieves a single element from a database of size N without the database learning which element was retrieved. While it has previously been shown that a secure implementation of 1-out-of-N oblivious transfer is impossible against arbitrarily powerful adversaries, recent research has revealed an interesting class of private query protocols based on quantum mechanics in a cheat sensitive model. Specifically, a practical protocol does not need to guarantee that the database provider cannot learn what element was retrieved if doing so carries the risk of detection. The latter is sufficient motivation to keep a database provider honest. However, none of the previously proposed protocols could cope with noisy channels. Here we present a fault-tolerant private query protocol, in which the novel error correction procedure is integral to the security of the protocol. Furthermore, we present a proof-of-concept demonstration of the protocol over a deployed fibre.
Performing private database queries in a real-world environment using a quantum protocol
Chan, Philip; Lucio-Martinez, Itzel; Mo, Xiaofan; Simon, Christoph; Tittel, Wolfgang
2014-01-01
In the well-studied cryptographic primitive 1-out-of-N oblivious transfer, a user retrieves a single element from a database of size N without the database learning which element was retrieved. While it has previously been shown that a secure implementation of 1-out-of-N oblivious transfer is impossible against arbitrarily powerful adversaries, recent research has revealed an interesting class of private query protocols based on quantum mechanics in a cheat sensitive model. Specifically, a practical protocol does not need to guarantee that the database provider cannot learn what element was retrieved if doing so carries the risk of detection. The latter is sufficient motivation to keep a database provider honest. However, none of the previously proposed protocols could cope with noisy channels. Here we present a fault-tolerant private query protocol, in which the novel error correction procedure is integral to the security of the protocol. Furthermore, we present a proof-of-concept demonstration of the protocol over a deployed fibre. PMID:24913129
Weltermann, Birgitta; Kersting, Christine
2016-01-01
Care for seniors is complex because patients often have more than one disease, one medication, and one physician. It is a key challenge for primary care physicians to structure the various aspects of each patient's care, to integrate each patient's preferences, and to maintain a long-term overview. This article describes the design for the development and feasibility testing of the clinical decision support system (CDSS) eCare*Seniors© which is electronic health record (EHR)-based allowing for a long-term, comprehensive, evidence-based, and patient preference-oriented management of multimorbid seniors. This mixed-methods study is designed in three steps. First, focus groups and practice observations will be conducted to develop criteria for software design from a physicians' and practice assistants' perspective. Second, based on these criteria, a CDSS prototype will be developed. Third, the prototype's feasibility will be tested by five primary care practices in the care of 30 multimorbid seniors. Primary outcome is the usability of the software measured by the validated system usability scale (SUS) after 3 months. Secondary outcomes are the (a) willingness to routinely use the CDSS, (b) degree of utilization of the CDSS, (c) acceptance of the CDSS, (d) willingness of the physicians to purchase the CDSS, and (e) willingness of the practice assistants to use the CDSS in the long term. These outcomes will be measured using semi-structured interviews and software usage data. If the SUS score reaches ≥70 %, feasibility testing will be judged successful. Otherwise, the CDSS prototype will be refined according to the users' needs and retested by the physicians and practice assistants until it is fully adapted to their requirements and reaches a usability score ≥70 %. The study will support the development of a CDSS which is primary care-defined, user-friendly, easy-to-comprehend, workflow-oriented, and comprehensive. The software will assist physicians and practices in their long-term, individualized care for multimorbid seniors. German Clinical Trials Register, DRKS00008777.
Boudjema, Sophia; Tarantini, Clément; Peretti-Watel, Patrick; Brouqui, Philippe
2017-05-01
We used videorecordings of routine care to analyze health care providers' deviance from protocols and organized follow-up interviews that were conducted by an anthropologist and a nurse. After consent, health care workers were recorded during routine care by an automatic video remote control. Each participant was invited to watch her or his recorded behaviors on 2 different videos showing routine practices and her or his deviance from protocols, and to comment on them. After this step an in-depth interview based on preestablished guidelines was organized and explanations regarding the observed deviance was discussed. This design was intended to reveal the HCWs' subjectivity; that is, how they perceive hand hygiene issues in their daily routine, what concrete difficulties they face, and how they try to resolve them. We selected 43 of 250 videorecordings created during the study, which allowed us to study 15 out of 20 health care professionals. Twenty out of 43 videos showed 1 or more breaches in the hand hygiene protocol. The breaches were frequently linked to glove abuse. Deviance from protocols was explained by the health care workers as the result of an adaptive behavior; that is, facing work constraints that were disconnected from infection control protocols. Professional practices and protocols should be revisited to create simple messages that are adapted to the mandatory needs in a real life clinic environment. Copyright © 2017 Association for Professionals in Infection Control and Epidemiology, Inc. Published by Elsevier Inc. All rights reserved.
Clinically Practical Magnetic Resonance Protocol for Improved Specificity in Breast Cancer Diagnosis
2007-06-01
Protocol for Improved Specificity in Breast Cancer Diagnosis PRINCIPAL INVESTIGATOR: Luminita Alina Tudorica, Ph.D. CONTRACTING...TITLE AND SUBTITLE 5a. CONTRACT NUMBER Clinically Practical Magnetic Resonance Protocol for Improved Specificity in Breast Cancer Diagnosis 5b... breast cancer study in a clinical setting. This study aims to improve specificity of breast cancer detection by using a combined MRI/MRS protocol. In
Stahmer, Aubyn C; Suhrheinrich, Jessica; Schetter, Patricia L; McGee Hassrick, Elizabeth
2018-01-08
This study examines how system-wide (i.e., region, district, and school) mechanisms such as leadership support, training requirements, structure, collaboration, and education affect the use of evidence-based practices (EBPs) in schools and how this affects the outcomes for students with autism spectrum disorder (ASD). Despite growing evidence for the positive effects of EBPs for ASD, these practices are not consistently or effectively used in schools. Although special education programs are mandated to use EBPs, there are very few evidence-based methods for selecting, implementing, and sustaining EBPs. Research focuses primarily on teacher training, without attention to contextual factors (e.g., implementation climate, attitudes toward EBPs, resource allocation, and social networks) that may impact outcomes. Using an implementation science framework, this project will prospectively examine relations between system-wide factors and teachers' use of EBPs and student education outcomes. Survey data will be collected from approximately 85 regional special education directors, 170 regional program specialists, 265 district special education directors, 265 behavior specialists, 925 school principals, 3538 special education teachers, and 2700 paraprofessionals. Administrative data for the students with ASD served by participating teachers will be examined. A total of 79 regional-, district-, and school-level personnel will also participate in social network interviews. Mixed methods, including surveys, administrative data, and observational checklists, will be used to gather in-depth information about system-wide malleable factors that relate to positive teacher implementation of EBPs and student outcomes. Multi-level modeling will be used to assess system-wide malleable factors related to EBP implementation which will be linked to the trainer, teacher, and student outcomes and examined based on moderators (e.g., district size, Special Education Local Plan Area structure, teachers' ASD experience). Finally, a dynamic social network approach will be used to map EBP-related connectivity across all levels of the system for selected regions. Dynamic network analysis will be used to gauge the degree to which and ways that EBP trainings, resources, and interventions are shared (or not shared) among school staff. Results are expected to inform the development of system-wide interventions to improve the school-based implementation of EBPs for students with ASD.
Risks and benefits of citrate anticoagulation for continuous renal replacement therapy.
Shum, H P; Yan, W W; Chan, T M
2015-04-01
Heparin, despite its significant side-effects, is the most commonly used anticoagulant for continuous renal replacement therapy in critical care setting. In recent years, citrate has gained much popularity by improving continuous renal replacement therapy circuit survival and decreasing blood transfusion requirements. However, its complex metabolic consequences warrant modification in the design of the citrate-based continuous renal replacement therapy protocol. With thorough understanding of the therapeutic mechanism of citrate, a simple and practicable protocol can be devised. Citrate-based continuous renal replacement therapy can be safely and widely used in the clinical setting with appropriate clinical staff training.
Garner, Shelby L; Traverse, Ramona D
2014-01-01
Undiagnosed and untreated sleep-disordered breathing can lead to negative health outcomes and increased utilization of health resources among patients with heart failure. The purpose of this evidence-based practice project was to implement and evaluate a new multifaceted sleep-disordered breathing screening protocol in a heart failure disease management clinic. The combined use of a symptoms questionnaire, the Epworth sleepiness scale, and overnight pulse oximetry was significantly more effective in identifying patients with a positive diagnosis of sleep-disordered breathing than using the Epworth sleepiness scale alone (P < .05).
A Transcription and Translation Protocol for Sensitive Cross-Cultural Team Research.
Clark, Lauren; Birkhead, Ana Sanchez; Fernandez, Cecilia; Egger, Marlene J
2017-10-01
Assurance of transcript accuracy and quality in interview-based qualitative research is foundational for data accuracy and study validity. Based on our experience in a cross-cultural ethnographic study of women's pelvic organ prolapse, we provide practical guidance to set up step-by-step interview transcription and translation protocols for team-based research on sensitive topics. Beginning with team decisions about level of detail in transcription, completeness, and accuracy, we operationalize the process of securing vendors to deliver the required quality of transcription and translation. We also share rubrics for assessing transcript quality and the team protocol for managing transcripts (assuring consistency of format, insertion of metadata, anonymization, and file labeling conventions) and procuring an acceptable initial translation of Spanish-language interviews. Accurate, complete, and systematically constructed transcripts in both source and target languages respond to the call for more transparency and reproducibility of scientific methods.
A self-paced motor imagery based brain-computer interface for robotic wheelchair control.
Tsui, Chun Sing Louis; Gan, John Q; Hu, Huosheng
2011-10-01
This paper presents a simple self-paced motor imagery based brain-computer interface (BCI) to control a robotic wheelchair. An innovative control protocol is proposed to enable a 2-class self-paced BCI for wheelchair control, in which the user makes path planning and fully controls the wheelchair except for the automatic obstacle avoidance based on a laser range finder when necessary. In order for the users to train their motor imagery control online safely and easily, simulated robot navigation in a specially designed environment was developed. This allowed the users to practice motor imagery control with the core self-paced BCI system in a simulated scenario before controlling the wheelchair. The self-paced BCI can then be applied to control a real robotic wheelchair using a protocol similar to that controlling the simulated robot. Our emphasis is on allowing more potential users to use the BCI controlled wheelchair with minimal training; a simple 2-class self paced system is adequate with the novel control protocol, resulting in a better transition from offline training to online control. Experimental results have demonstrated the usefulness of the online practice under the simulated scenario, and the effectiveness of the proposed self-paced BCI for robotic wheelchair control.
A Generic Communication Protocol for Remote Laboratories: an Implementation on e-lab
DOE Office of Scientific and Technical Information (OSTI.GOV)
Henriques, Rafael B.; Fernandes, H.; Duarte, Andre S.
2015-07-01
The remote laboratories at IST (Instituto Superior Tecnico), e-lab, serve as a valuable tool for education and training based on remote control technologies. Due to the high number and increase of remotely operated experiments a generic protocol was developed to perform the communication between the software driver and the respective experimental setup in an easier and more unified way. The training in these fields of students and personnel can take advantage of such infrastructure with the purpose of deploying new experiments in a faster way. More than 10 experiments using the generic protocol are available on-line in a 24 xmore » 7 way. (authors)« less
Roger Ryder; Pamela J. Edwards; Pamela J. Edwards
2005-01-01
There has been a long-standing interest in improving Best Management Practice (BMP) monitoring within and among states. States monitoring the implementation and effectiveness of BMPs for forest operations take a variety of approaches. This creates inconsistencies in data collection and how results are reported. Since 1990 attempts have been made to develop a consistent...
Piersson, A D; Nunoo, G; Gorleku, P N
2018-05-01
The aim of this study was to investigate current brain MRI practice, pattern of brain MRI requests, and their appropriateness using the American College of Radiology (ACR) Appropriateness Criteria. We used direct observation and questionnaires to obtain data concerning routine brain MRI practice. We then retrospectively analyzed (i) demographic characteristics, (ii) clinical history, and (iii) appropriateness of brain MRI requests against published criteria. All patients were administered the screening questionnaire; however, no reviews were undertaken directly with patients, and no signature of the radiographer was recorded. Apart from routine brain protocol, there were dedicated protocols for epilepsy and stroke. Brain MRI images from 161 patients (85 Males; 76 Females) were analyzed. The age group with most brain MRI requests were from 26 to 45 year olds. The commonest four clinical indications for imaging were brain tumour, headache, seizure, and stroke. Using the ACR Appropriateness Criteria, almost 43% of the brain MRI scans analyzed were found to be "usually appropriate", 38% were "maybe appropriate" and 19% were categorized as "usually not appropriate". There was knowledge gap with regards to MRI safety in local practice, thus there is the utmost need for MRI safety training. Data on the commonest indications for performing brain MRI in this study should be used to inform local neuroradiological practice. Dedicated stroke and epilepsy MRI protocols require additional sequences i.e. MRA and 3D T1 volume acquisition, respectively. The ACR Appropriateness Criteria is recommended for use by the referring practitioners to improve appropriateness of brain MRI requests. Copyright © 2017 The College of Radiographers. Published by Elsevier Ltd. All rights reserved.
Ruiter, Emilie L M; Fransen, Gerdine A J; Molleman, Gerard R M; van der Velden, Koos; Engels, Rutger C M E
2015-02-14
Although parental support is an important component in overweight prevention programs for children, current programs pay remarkably little attention to the role of parenting. To close this gap, we developed a web-based parenting program for parents entitled "Making a healthy deal with your child". This e-learning program can be incorporated into existing prevention programs, thereby improving these interventions by reinforcing the role of parenting and providing parents with practical tools for use in everyday situations in order to stimulate a healthy lifestyle. Here, we report the research design of a study to determine the effectiveness of our e-learning program. The effectiveness of an e-learning program was studied in a two-armed cluster randomized controlled trial. Parents of children 9-13 years of age who live in the Nijmegen region, the Netherlands, and who participated in the existing school-based overweight prevention program "Scoring for Health" were invited to participate in this study. Our goal was to recruit 322 parent-child dyads. At the school grade level, parents were randomly assigned to either the intervention group (which received e-learning and a brochure) or the control group (which received only the brochure); the participants were stratified by ethnicity. Measurements were taken from both the parents and the children at baseline, and then 5 and 12 months after baseline. Primary outcomes included the child's dietary and sedentary behavior, and level of physical activity. Secondary outcomes included general parenting style, specific parenting practices (e.g., set of rules, modeling, and monitoring), and parental self-efficacy. We hypothesize that children of parents who follow the e-learning program will have a healthier diet, will be less sedentary, and will have a higher level of physical activity compared to the children in the control group. If the e-learning program is found to be effective, it can be incorporated into existing overweight prevention programs for children (e.g., "Scoring for Health"), as well as activities regarding Youth Health Care. Dutch Trial Register: NTR3938 . Date of registration: April 7(th), 2013.
Design of a component-based integrated environmental modeling framework
Integrated environmental modeling (IEM) includes interdependent science-based components (e.g., models, databases, viewers, assessment protocols) that comprise an appropriate software modeling system. The science-based components are responsible for consuming and producing inform...
Frederickson, Tiffany A; Renner, Catherine Hackett; Swegle, James R; Sahr, Sheryl M
2013-01-01
The elderly individuals are the most rapidly growing cohort within the US population, and a corresponding increase is being seen in elderly trauma patients. Elderly patients are more likely to have a hospital length of stay (LOS) in excess of 10 days. They account for 60% of total ICU days. Length of stay is frequently used as a proxy measure for improvement in injury outcomes, changes in quality of care, and hospital outcomes. Patient care protocols are typically created from evidence-based guidelines that serve to reduce variation in care from patient to patient. Patient care protocols have been found to positively impact patient care with reduced duration of mechanical ventilation, shorter LOS in the ICU and shorter overall hospitalization time, reduced mortality, and reduced health care costs. The following study was designed to assess the impact of the implementation of 4 patient care protocols within an elderly trauma population. We hypothesized that the implementation of these protocols would have a beneficial impact on patient care that could be measured by a decrease in hospital LOS. An archival, retrospective pretest/posttest study was performed on elderly trauma patients. The new protocols helped guide practical changes in care that resulted in a 32% decrease in LOS for our elderly trauma patients which exceeds the 25% decrease found in other studies. Additionally, the "Other" category for each variable was less frequently used in the post-protocol phase than in the pre-protocol phase, suggesting a spillover effect on the level of detail recorded in the patient chart. With less variation in practices in the post-protocol phase, Injury Severity score, and admission systolic blood pressure emerged as significant predictors of LOS.
Assessing L2 Competency in Early Immersion Classrooms.
ERIC Educational Resources Information Center
Weber, Sandra; Tardif, Claudette
1991-01-01
Reports on a study that explored the use of puppets and classroom-based interview protocols as a practical way for teachers and researchers to get feedback on young students' learning in second-language classrooms. (21 references) (GLR)
Williams, Nombasa
2010-03-01
Currently an ecological model for conceptualizing and capturing the refugee parenting experience is lacking. After an extensive review of the literature related to the usages of Bronfenbrenner's ecological model of child development, a gap was found in knowledge and research centred on describing the environment of pre-resettlement (i.e. pre-flight, flight, migration, camp) contexts and their impact on refugee parents and carer experiences. The culture of the refugee parenting experience may be characterized by disruptions in and alterations to family structure and organization; values and norms; and gender roles. This paper begins by examining the definition and usages of existing ecological frameworks in the 20th and 21st century. Particular attention is drawn to the gaps in the existing literature and an ecological model is offered. The paper concludes with a discussion of the implications for practice. The outcomes of this paper suggest the need for practitioners, policymakers and researchers to engage and develop culturally competent, relevant and appropriate interventions (i.e. reconciling differing beliefs and behaviours concerning child-rearing practices; affirming positive parenting practices of these families during engagement protocols and processes; adopting a strengths-based orientation) in the area of child protection whilst at the same time safeguarding and promoting the welfare of children within pre- and post-resettlement contexts.
Practical private database queries based on a quantum-key-distribution protocol
DOE Office of Scientific and Technical Information (OSTI.GOV)
Jakobi, Markus; Humboldt-Universitaet zu Berlin, D-10117 Berlin; Simon, Christoph
2011-02-15
Private queries allow a user, Alice, to learn an element of a database held by a provider, Bob, without revealing which element she is interested in, while limiting her information about the other elements. We propose to implement private queries based on a quantum-key-distribution protocol, with changes only in the classical postprocessing of the key. This approach makes our scheme both easy to implement and loss tolerant. While unconditionally secure private queries are known to be impossible, we argue that an interesting degree of security can be achieved by relying on fundamental physical principles instead of unverifiable security assumptions inmore » order to protect both the user and the database. We think that the scope exists for such practical private queries to become another remarkable application of quantum information in the footsteps of quantum key distribution.« less
Maintaining Perioperative Normothermia: Sustaining an Evidence-Based Practice Improvement Project.
Levin, Rona F; Wright, Fay; Pecoraro, Kathleen; Kopec, Wendy
2016-02-01
Unintentional perioperative hypothermia has been shown to cause serious patient complications and, thus, to increase health care costs. In 2009, an evidence-based practice improvement project produced a significant decrease in unintentional perioperative hypothermia in colorectal surgical patients through monitoring of OR ambient room temperature. Project leaders engaged all interdisciplinary stakeholders in the original project, which facilitated the sustainability of the intervention method. An important aspect of sustainability is ongoing monitoring and evaluation of a new intervention method. Therefore, continued evaluation of outcomes of the protocol developed in 2009 was scheduled at specific time points after the initial small test of change with colorectal patients. This article focuses on how attention to sustainability factors during implementation of an improvement project led to the sustainability of a protocol for monitoring OR ambient room temperature with all types of surgical patients five years after the initial project. Copyright © 2016 AORN, Inc. Published by Elsevier Inc. All rights reserved.
In silico toxicology protocols.
Myatt, Glenn J; Ahlberg, Ernst; Akahori, Yumi; Allen, David; Amberg, Alexander; Anger, Lennart T; Aptula, Aynur; Auerbach, Scott; Beilke, Lisa; Bellion, Phillip; Benigni, Romualdo; Bercu, Joel; Booth, Ewan D; Bower, Dave; Brigo, Alessandro; Burden, Natalie; Cammerer, Zoryana; Cronin, Mark T D; Cross, Kevin P; Custer, Laura; Dettwiler, Magdalena; Dobo, Krista; Ford, Kevin A; Fortin, Marie C; Gad-McDonald, Samantha E; Gellatly, Nichola; Gervais, Véronique; Glover, Kyle P; Glowienke, Susanne; Van Gompel, Jacky; Gutsell, Steve; Hardy, Barry; Harvey, James S; Hillegass, Jedd; Honma, Masamitsu; Hsieh, Jui-Hua; Hsu, Chia-Wen; Hughes, Kathy; Johnson, Candice; Jolly, Robert; Jones, David; Kemper, Ray; Kenyon, Michelle O; Kim, Marlene T; Kruhlak, Naomi L; Kulkarni, Sunil A; Kümmerer, Klaus; Leavitt, Penny; Majer, Bernhard; Masten, Scott; Miller, Scott; Moser, Janet; Mumtaz, Moiz; Muster, Wolfgang; Neilson, Louise; Oprea, Tudor I; Patlewicz, Grace; Paulino, Alexandre; Lo Piparo, Elena; Powley, Mark; Quigley, Donald P; Reddy, M Vijayaraj; Richarz, Andrea-Nicole; Ruiz, Patricia; Schilter, Benoit; Serafimova, Rositsa; Simpson, Wendy; Stavitskaya, Lidiya; Stidl, Reinhard; Suarez-Rodriguez, Diana; Szabo, David T; Teasdale, Andrew; Trejo-Martin, Alejandra; Valentin, Jean-Pierre; Vuorinen, Anna; Wall, Brian A; Watts, Pete; White, Angela T; Wichard, Joerg; Witt, Kristine L; Woolley, Adam; Woolley, David; Zwickl, Craig; Hasselgren, Catrin
2018-07-01
The present publication surveys several applications of in silico (i.e., computational) toxicology approaches across different industries and institutions. It highlights the need to develop standardized protocols when conducting toxicity-related predictions. This contribution articulates the information needed for protocols to support in silico predictions for major toxicological endpoints of concern (e.g., genetic toxicity, carcinogenicity, acute toxicity, reproductive toxicity, developmental toxicity) across several industries and regulatory bodies. Such novel in silico toxicology (IST) protocols, when fully developed and implemented, will ensure in silico toxicological assessments are performed and evaluated in a consistent, reproducible, and well-documented manner across industries and regulatory bodies to support wider uptake and acceptance of the approaches. The development of IST protocols is an initiative developed through a collaboration among an international consortium to reflect the state-of-the-art in in silico toxicology for hazard identification and characterization. A general outline for describing the development of such protocols is included and it is based on in silico predictions and/or available experimental data for a defined series of relevant toxicological effects or mechanisms. The publication presents a novel approach for determining the reliability of in silico predictions alongside experimental data. In addition, we discuss how to determine the level of confidence in the assessment based on the relevance and reliability of the information. Copyright © 2018 The Authors. Published by Elsevier Inc. All rights reserved.
Link-state-estimation-based transmission power control in wireless body area networks.
Kim, Seungku; Eom, Doo-Seop
2014-07-01
This paper presents a novel transmission power control protocol to extend the lifetime of sensor nodes and to increase the link reliability in wireless body area networks (WBANs). We first experimentally investigate the properties of the link states using the received signal strength indicator (RSSI). We then propose a practical transmission power control protocol based on both short- and long-term link-state estimations. Both the short- and long-term link-state estimations enable the transceiver to adapt the transmission power level and target the RSSI threshold range, respectively, to simultaneously satisfy the requirements of energy efficiency and link reliability. Finally, the performance of the proposed protocol is experimentally evaluated in two experimental scenarios-body posture change and dynamic body motion-and compared with the typical WBAN transmission power control protocols, a real-time reactive scheme, and a dynamic postural position inference mechanism. From the experimental results, it is found that the proposed protocol increases the lifetime of the sensor nodes by a maximum of 9.86% and enhances the link reliability by reducing the packet loss by a maximum of 3.02%.
The advantages of absorbed-dose calibration factors.
Rogers, D W
1992-01-01
A formalism for clinical external beam dosimetry based on use of ion chamber absorbed-dose calibration factors is outlined in the context and notation of the AAPM TG-21 protocol. It is shown that basing clinical dosimetry on absorbed-dose calibration factors ND leads to considerable simplification and reduced uncertainty in dose measurement. In keeping with a protocol which is used in Germany, a quantity kQ is defined which relates an absorbed-dose calibration factor in a beam of quality Q0 to that in a beam of quality Q. For 38 cylindrical ion chambers, two sets of values are presented for ND/NX and Ngas/ND and for kQ for photon beams with beam quality specified by the TPR20(10) ratio. One set is based on TG-21's protocol to allow the new formalism to be used while maintaining equivalence to the TG-21 protocol. To demonstrate the magnitude of the overall error in the TG-21 protocol, the other set uses corrected versions of the TG-21 equations and the more consistent physical data of the IAEA Code of Practice. Comparisons are made to procedures based on air-kerma or exposure calibration factors and it is shown that accuracy and simplicity are gained by avoiding the determination of Ngas from NX. It is also shown that the kQ approach simplifies the use of plastic phantoms in photon beams since kQ values change by less than 0.6% compared to those in water although an overall correction factor of 0.973 is needed to go from absorbed dose in water calibration factors to those in PMMA or polystyrene. Values of kQ calculated using the IAEA Code of Practice are presented but are shown to be anomalous because of the way the effective point of measurement changes for 60Co beams. In photon beams the major difference between the IAEA Code of Practice and the corrected AAPM TG-21 protocol is shown to be the Prepl correction factor. Calculated kQ curves and three parameter equations for them are presented for each wall material and are shown to represent accurately the kQ curve for all ion chambers in this study with a wall of that specified material and a thickness less than 0.25 g/cm2. Values of kQ can be measured using the primary standards for absorbed dose in photon beams.
2010-01-01
Background Fellowships are a component of many professional education programs. They provide opportunities to develop skills and competencies in an environment where time is protected and resources and technical support are more readily available. The SEA-ORCHID fellowships program aimed to increase capacity for evidence-based practice and research synthesis, and to encourage fellows to become leaders in these areas. Methods Fellows included doctors, nurses, midwives and librarians working in the maternal and neonatal areas of nine hospitals in South East Asia. Fellowships were undertaken in Australia and involved specific outputs related to evidence-based practice or research synthesis. Training and support was tailored according to the type of output and the fellow's experience and expertise. We evaluated the fellowships program quantitatively and qualitatively through written evaluations, interviews and follow-up of fellowship activities. Results During 2006-07, 23 fellows from Thailand, Indonesia, Malaysia and the Philippines undertook short-term fellowships (median four weeks) in Australia. The main outputs were drafts of Cochrane systematic reviews, clinical practice guidelines and protocols for randomised trials, and training materials to support evidence-based practice. Protocols for Cochrane systematic reviews were more likely to be completed than other outcomes. The fellows identified several components that were critical to the program's overall success; these included protected time, tailored training, and access to technical expertise and resources. On returning home, fellows identified a lack of time and limited access to the internet and evidence-based resources as barriers to completing their outputs. The support of colleagues and senior staff was noted as an important enabler of progress, and research collaborators from other institutions and countries were also important sources of support. Conclusions The SEA-ORCHID fellowships program provided protected time to work on an output which would facilitate evidence-based practice. While the fellows faced substantial barriers to completing their fellowship outputs once they returned home, these fellowships resulted in a greater understanding, enthusiasm and skills for evidence-based practice. The experience of the SEA-ORCHID fellowships program may be useful for other initiatives aiming to build capacity in evidence-based practice. PMID:20492706
Lanspa, Michael J.; Wilson, Emily L.; Sward, Katherine A.; Jephson, Al; Larsen, Gitte Y.; Morris, Alan H.
2017-01-01
Abstract Background: Computer clinical decision support (CDS) systems are uncommon in the pediatric intensive care unit (PICU), despite evidence suggesting they improve outcomes in adult ICUs. We reasoned that a bedside CDS protocol for intravenous insulin titration, eProtocol-insulin, would be feasible and safe in critically ill children. Methods: We retrospectively reviewed data from non-diabetic children admitted to the PICU with blood glucose (BG) ≥140 mg/dL who were managed with intravenous insulin by either unaided clinician titration or eProtocol-insulin. Primary outcomes were BG measurements in target range (80–110 mg/dL) and severe hypoglycemia (BG ≤40 mg/dL); secondary outcomes were 60-day mortality and PICU length of stay. We assessed bedside nurse satisfaction with the eProtocol-insulin protocol by using a 5-point Likert scale and measured clinician compliance with eProtocol-insulin recommendations. Results: Over 5 years, 69 children were titrated with eProtocol-insulin versus 104 by unaided clinicians. eProtocol-insulin achieved target range more frequently than clinician titration (41% vs. 32%, P < 0.001). Severe hypoglycemia was uncommon in both groups (4.3% of patients in eProtocol-insulin, 8.7% in clinician titration, P = 0.37). There were no differences in mean time to BG target or median BG between the groups. Mortality was 23% in both groups. Clinician compliance with eProtocol-insulin recommendations was 89%. Nurses believed that eProtocol-insulin was easy to understand and safer than clinician titration. Conclusions: eProtocol-insulin is safe for titration of intravenous insulin in critically ill children. Clinical research protocols and quality improvement initiatives aimed at optimizing BG control should utilize detailed computer protocols that enable replicable clinician decisions. PMID:28248127
Cambon, L; Bergman, P; Le Faou, Al; Vincent, I; Le Maitre, B; Pasquereau, A; Arwidson, P; Thomas, D; Alla, F
2017-01-01
Introduction A French national smoking cessation service, Tabac Info Service, has been developed to provide an adapted quitline and a web and mobile application involving personalised contacts (eg, questionnaires, advice, activities, messages) to support smoking cessation. This paper presents the study protocol of the evaluation of the application (e-intervention Tabac Info Service (e-TIS)). The primary objective is to assess the efficacy of e-TIS. The secondary objectives are to (1) describe efficacy variations with regard to users' characteristics, (2) analyse mechanisms and contextual conditions of e-TIS efficacy. Methods and analyses The study design is a two-arm pragmatic randomised controlled trial including a process evaluation with at least 3000 participants randomised to the intervention or to the control arm (current practices). Inclusion criteria are: aged 18 years or over, current smoker, having completed the online consent forms, possessing a mobile phone with android or apple systems and using mobile applications, wanting to stop smoking sooner or later. The primary outcome is the point prevalence abstinence of 7 days at 6 months later. Data will be analysed in intention to treat (primary) and per protocol analyses. A logistic regression will be carried out to estimate an OR (95% CI) for efficacy. A multivariate multilevel analysis will explore the influence on results of patients' characteristics (sex, age, education and socioprofessional levels, dependency, motivation, quit experiences) and contextual factors, conditions of use, behaviour change techniques. Ethics and dissemination The study protocol was reviewed by the ethical and deontological institutional review board of the French Institute for Public Health Surveillance on 18 April 2016. The findings of this study will allow us to characterise the efficacy of e-TIS and conditions of its efficacy. These findings will be disseminated through peer-reviewed articles. Trial registration number NCT02841683; Pre-results. PMID:28237958
Paul, Jijo; Banckwitz, Rosemarie; Krauss, Bernhard; Vogl, Thomas J; Maentele, Werner; Bauer, Ralf W
2012-04-01
To determine effective dose (E) during standard chest CT using an organ dose-based and a dose-length-product-based (DLP) approach for four different scan protocols including high-pitch and dual-energy in a dual-source CT scanner of the second generation. Organ doses were measured with thermo luminescence dosimeters (TLD) in an anthropomorphic male adult phantom. Further, DLP-based dose estimates were performed by using the standard 0.014mSv/mGycm conversion coefficient k. Examinations were performed on a dual-source CT system (Somatom Definition Flash, Siemens). Four scan protocols were investigated: (1) single-source 120kV, (2) single-source 100kV, (3) high-pitch 120kV, and (4) dual-energy with 100/Sn140kV with equivalent CTDIvol and no automated tube current modulation. E was then determined following recommendations of ICRP publication 103 and 60 and specific k values were derived. DLP-based estimates differed by 4.5-16.56% and 5.2-15.8% relatively to ICRP 60 and 103, respectively. The derived k factors calculated from TLD measurements were 0.0148, 0.015, 0.0166, and 0.0148 for protocol 1, 2, 3 and 4, respectively. Effective dose estimations by ICRP 103 and 60 for single-energy and dual-energy protocols show a difference of less than 0.04mSv. Estimates of E based on DLP work equally well for single-energy, high-pitch and dual-energy CT examinations. The tube potential definitely affects effective dose in a substantial way. Effective dose estimations by ICRP 103 and 60 for both single-energy and dual-energy examinations differ not more than 0.04mSv. Copyright © 2011 Elsevier Ireland Ltd. All rights reserved.
Diversity of faculty practice in workshop classrooms
NASA Astrophysics Data System (ADS)
Franklin, Scott V.; Chapman, Tricia
2013-01-01
We present a temporally fine-grained characterization of faculty practice in workshop-style introductory physics courses. Practice is binned in five minute intervals and coded through two complementary observational protocols: the Reform Teaching Observation Protocol provides a summative assessment of fidelity to reform-teaching principles, while the Teaching Dimensions Observation Protocol records direct practice. We find that the TDOP's direct coding of practice explains nuances in the holistic RTOP score, with higher RTOP scores corresponding to less lecture, but not necessarily more student-directed activities. Despite using similar materials, faculty show significant differences in practice that manifests in both TDOP and RTOP scores. We also find a significant dependence of practice on course subject reflected in both RTOP and TDOP scores, with Electricity & Magnetism using more instructor-centered practices (lecture, illustration, etc.) than Mechanics courses.
Hershberg, Julie A; Rose, Dorian K; Tilson, Julie K; Brutsch, Bettina; Correa, Anita; Gallichio, Joann; McLeod, Molly; Moore, Craig; Wu, Sam; Duncan, Pamela W; Behrman, Andrea L
2017-01-01
Despite efforts to translate knowledge into clinical practice, barriers often arise in adapting the strict protocols of a randomized, controlled trial (RCT) to the individual patient. The Locomotor Experience Applied Post-Stroke (LEAPS) RCT demonstrated equal effectiveness of 2 intervention protocols for walking recovery poststroke; both protocols were more effective than usual care physical therapy. The purpose of this article was to provide knowledge-translation tools to facilitate implementation of the LEAPS RCT protocols into clinical practice. Participants from 2 of the trial's intervention arms: (1) early Locomotor Training Program (LTP) and (2) Home Exercise Program (HEP) were chosen for case presentation. The two cases illustrate how the protocols are used in synergy with individual patient presentations and clinical expertise. Decision algorithms and guidelines for progression represent the interface between implementation of an RCT standardized intervention protocol and clinical decision-making. In each case, the participant presents with a distinct clinical challenge that the therapist addresses by integrating the participant's unique presentation with the therapist's expertise while maintaining fidelity to the LEAPS protocol. Both participants progressed through an increasingly challenging intervention despite their own unique presentation. Decision algorithms and exercise progression for the LTP and HEP protocols facilitate translation of the RCT protocol to the real world of clinical practice. The two case examples to facilitate translation of the LEAPS RCT into clinical practice by enhancing understanding of the protocols, their progression, and their application to individual participants.Video Abstract available for more insights from the authors (see Supplemental Digital Content 1, available at: http://links.lww.com/JNPT/A147).
Eggins, Suzanne; Slade, Diana
2012-01-01
Clinical handover -- the transfer between clinicians of responsibility and accountability for patients and their care (AMA 2006) -- is a pivotal and high-risk communicative event in hospital practice. Studies focusing on critical incidents, mortality, risk and patient harm in hospitals have highlighted ineffective communication -- including incomplete and unstructured clinical handovers -- as a major contributing factor (NSW Health 2005; ACSQHC 2010). In Australia, as internationally, Health Departments and hospital management have responded by introducing standardised handover communication protocols. This paper problematises one such protocol - the ISBAR tool - and argues that the narrow understanding of communication on which such protocols are based may seriously constrain their ability to shape effective handovers. Based on analysis of audio-recorded shift-change clinical handovers between medical staff we argue that handover communication must be conceptualised as inherently interactive and that attempts to describe, model and teach handover practice must recognise both informational and interactive communication strategies. By comparing the communicative performance of participants in authentic handover events we identify communication strategies that are more and less likely to lead to an effective handover and demonstrate the importance of focusing close up on communication to improve the quality and safety of healthcare interactions.
Mitchell, Marc; Hedt-Gauthier, Bethany L; Msellemu, Daniel; Nkaka, Melania; Lesh, Neal
2013-08-27
Poor adherence to the Integrated Management of Childhood Illness (IMCI) protocol reduces the potential impact on under-five morbidity and mortality. Electronic technology could improve adherence; however there are few studies demonstrating the benefits of such technology in a resource-poor settings. This study estimates the impact of electronic technology on adherence to the IMCI protocols as compared to the current paper-based protocols in Tanzania. In four districts in Tanzania, 18 clinics were randomly selected for inclusion. At each site, observers documented critical parts of the clinical assessment of children aged 2 months to 5 years. The first set of observations occurred during examination of children using paper-based IMCI (pIMCI) and the next set of observations occurred during examination using the electronic IMCI (eIMCI). Children were re-examined by an IMCI expert and the diagnoses were compared. A total of 1221 children (671 paper, 550 electronic) were observed. For all ten critical IMCI items included in both systems, adherence to the protocol was greater for eIMCI than for pIMCI. The proportion assessed under pIMCI ranged from 61% to 98% compared to 92% to 100% under eIMCI (p < 0.05 for each of the ten assessment items). Use of electronic systems improved the completeness of assessment of children with acute illness in Tanzania. With the before-after nature of the design, potential for temporal confounding is the primary limitation. However, the data collection for both phases occurred over a short period (one month) and so temporal confounding was expected to be minimal. The results suggest that the use of electronic IMCI protocols can improve the completeness and consistency of clinical assessments and future studies will examine the long-term health and health systems impact of eIMCI.
Tocopherol and tocotrienol homologs in parenteral lipid emulsions
Xu, Zhidong; Harvey, Kevin A; Pavlina, Thomas M; Zaloga, Gary P; Siddiqui, Rafat A
2015-01-01
Parenteral lipid emulsions, which are made of oils from plant and fish sources, contain different types of tocopherols and tocotrienols (vitamin E homologs). The amount and types of vitamin E homologs in various lipid emulsions vary considerably and are not completely known. The objective of this analysis was to develop a quantitative method to determine levels of all vitamin E homologs in various lipid emulsions. An HPLC system was used to measure vitamin E homologs using a Pinnacle DB Silica normal phase column and an isocratic, n-hexane:1,4 dioxane (98:2) mobile phase. An optimized protocol was used to report vitamin E homolog concentrations in soybean oil-based (Intralipid®, Ivelip®, Lipofundin® N, Liposyn® III, and Liposyn® II), medium- and long-chain fatty acid-based (Lipofundin®, MCT and Structolipid®), olive oil-based (ClinOleic®), and fish oil-based (Omegaven®) and mixture of these oils-based (SMOFlipid®, Lipidem®) commercial parenteral lipid emulsions. Total content of all vitamin E homologs varied greatly between different emulsions, ranging from 57.9 to 383.9 µg/mL. Tocopherols (α, β, γ, δ) were the predominant vitamin E homologs for all emulsions, with tocotrienol content < 0.3%. In all of the soybean emulsions, except for Lipofundin® N, the predominant vitamin E homolog was γ-tocopherol, which ranged from 57–156 µg/mL. ClinOleic® predominantly contained α-tocopherol (32 µg/mL), whereas α-tocopherol content in Omegaven® was higher than most of the other lipid emulsions (230 µg/mL). Practical applications The information on the types and quantity of vitamin E homologs in various lipid emulsions will be extremely useful to physicians and healthcare personnel in selecting appropriate lipid emulsions that are exclusively used in patients with inadequate gastrointestinal function, including hospitalized and critically ill patients. Some emulsions may require vitamin E supplementation in order to meet minimal human requirements. PMID:25685054
NASA Astrophysics Data System (ADS)
Shukla, Chitra; Thapliyal, Kishore; Pathak, Anirban
2017-12-01
Semi-quantum protocols that allow some of the users to remain classical are proposed for a large class of problems associated with secure communication and secure multiparty computation. Specifically, first-time semi-quantum protocols are proposed for key agreement, controlled deterministic secure communication and dialogue, and it is shown that the semi-quantum protocols for controlled deterministic secure communication and dialogue can be reduced to semi-quantum protocols for e-commerce and private comparison (socialist millionaire problem), respectively. Complementing with the earlier proposed semi-quantum schemes for key distribution, secret sharing and deterministic secure communication, set of schemes proposed here and subsequent discussions have established that almost every secure communication and computation tasks that can be performed using fully quantum protocols can also be performed in semi-quantum manner. Some of the proposed schemes are completely orthogonal-state-based, and thus, fundamentally different from the existing semi-quantum schemes that are conjugate coding-based. Security, efficiency and applicability of the proposed schemes have been discussed with appropriate importance.
Enhanced Multi-Modal Access to Planetary Exploration
NASA Technical Reports Server (NTRS)
Lamarra, Norm; Doyle, Richard; Wyatt, Jay
2003-01-01
Tomorrow's Interplanetary Network (IPN) will evolve from JPL's Deep-Space Network (DSN) and provide key capabilities to future investigators, such as simplified acquisition of higher-quality science at remote sites and enriched access to these sites. These capabilities could also be used to foster public interest, e.g., by making it possible for students to explore these environments personally, eventually perhaps interacting with a virtual world whose models could be populated by data obtained continuously from the IPN. Our paper looks at JPL's approach to making this evolution happen, starting from improved communications. Evolving space protocols (e.g., today's CCSDS proximity and file-transfer protocols) will provide the underpinning of such communications in the next decades, just as today's rich web was enabled by progress in Internet Protocols starting from the early 1970's (ARPAnet research). A key architectural thrust of this effort is to deploy persistent infrastructure incrementally, using a layered service model, where later higher-layer capabilities (such as adaptive science planning) are enabled by earlier lower-layer services (such as automated routing of object-based messages). In practice, there is also a mind shift needed from an engineering culture raised on point-to-point single-function communications (command uplink, telemetry downlink), to one in which assets are only indirectly accessed, via well-defined interfaces. We are aiming to foster a 'community of access' both among space assets and the humans who control them. This enables appropriate (perhaps eventually optimized) sharing of services and resources to the greater benefit of all participants. We envision such usage to be as automated in the future as using a cell phone is today - with all the steps in creating the real-time link being automated.
Giuliani, Sara; McArthur, Alexa; Greenwood, John
2015-11-01
Major burn injury patients commonly fast preoperatively before multiple surgical procedures. The Societies of Anesthesiology in Europe and the United States recommend fasting from clear fluids for two hours and solids for six to eight hours preoperatively. However, at the Royal Adelaide Hospital, patients often fast from midnight proceeding the day of surgery. This project aims to promote evidence-based practice to minimize extended preoperative fasting in major burn patients. A baseline audit was conducted measuring the percentage compliance with audit criteria, specifically on preoperative fasting documentation and appropriate instructions in line with evidence-based guidelines. Strategies were then implemented to address areas of non-compliance, which included staff education, development of documentation tools and completion of a perioperative feeding protocol for major burn patients. Following this, a post implementation audit assessed the extent of change compared with the baseline audit results. Education on evidence-based fasting guidelines was delivered to 54% of staff. This resulted in a 19% improvement in compliance with fasting documentation and a 52% increase in adherence to appropriate evidence-based instructions. There was a notable shift from the most common fasting instruction being "fast from midnight" to "fast from 03:00 hours", with an overall four-hour reduction in fasting per theater admission. These results demonstrate that education improves compliance with documentation and preoperative fasting that is more reflective of evidence-based practice. Collaboration with key stakeholders and a hospital wide fasting protocol is warranted to sustain change and further advance compliance with evidence-based practice at an organizational level.
The Roles of Pharmacy Schools in Bridging the Gap Between Law and Practice.
Adams, Alex J; Dering-Anderson, Allison; Klepser, Michael E; Klepser, Donald
2018-05-01
Progressive pharmacy laws do not always lead to progressive pharmacy practice. Progressive laws are necessary, but not sufficient for pharmacy services to take off in practice. Pharmacy schools can play critical roles by working collaboratively with community pharmacies to close the gap between law and practice. Our experiences launching pharmacy-based point-of-care testing services in community pharmacy settings illustrate some of the roles schools can play, including: developing and providing standardized training, developing template protocols, providing workflow support, sparking collaboration across pharmacies, providing policy support, and conducting research.
Experimental investigation of practical unforgeable quantum money
NASA Astrophysics Data System (ADS)
Bozzio, Mathieu; Orieux, Adeline; Trigo Vidarte, Luis; Zaquine, Isabelle; Kerenidis, Iordanis; Diamanti, Eleni
2018-01-01
Wiesner's unforgeable quantum money scheme is widely celebrated as the first quantum information application. Based on the no-cloning property of quantum mechanics, this scheme allows for the creation of credit cards used in authenticated transactions offering security guarantees impossible to achieve by classical means. However, despite its central role in quantum cryptography, its experimental implementation has remained elusive because of the lack of quantum memories and of practical verification techniques. Here, we experimentally implement a quantum money protocol relying on classical verification that rigorously satisfies the security condition for unforgeability. Our system exploits polarization encoding of weak coherent states of light and operates under conditions that ensure compatibility with state-of-the-art quantum memories. We derive working regimes for our system using a security analysis taking into account all practical imperfections. Our results constitute a major step towards a real-world realization of this milestone protocol.
Aggregating quantum repeaters for the quantum internet
NASA Astrophysics Data System (ADS)
Azuma, Koji; Kato, Go
2017-09-01
The quantum internet holds promise for accomplishing quantum teleportation and unconditionally secure communication freely between arbitrary clients all over the globe, as well as the simulation of quantum many-body systems. For such a quantum internet protocol, a general fundamental upper bound on the obtainable entanglement or secret key has been derived [K. Azuma, A. Mizutani, and H.-K. Lo, Nat. Commun. 7, 13523 (2016), 10.1038/ncomms13523]. Here we consider its converse problem. In particular, we present a universal protocol constructible from any given quantum network, which is based on running quantum repeater schemes in parallel over the network. For arbitrary lossy optical channel networks, our protocol has no scaling gap with the upper bound, even based on existing quantum repeater schemes. In an asymptotic limit, our protocol works as an optimal entanglement or secret-key distribution over any quantum network composed of practical channels such as erasure channels, dephasing channels, bosonic quantum amplifier channels, and lossy optical channels.
Multi-server blind quantum computation over collective-noise channels
NASA Astrophysics Data System (ADS)
Xiao, Min; Liu, Lin; Song, Xiuli
2018-03-01
Blind quantum computation (BQC) enables ordinary clients to securely outsource their computation task to costly quantum servers. Besides two essential properties, namely correctness and blindness, practical BQC protocols also should make clients as classical as possible and tolerate faults from nonideal quantum channel. In this paper, using logical Bell states as quantum resource, we propose multi-server BQC protocols over collective-dephasing noise channel and collective-rotation noise channel, respectively. The proposed protocols permit completely or almost classical client, meet the correctness and blindness requirements of BQC protocol, and are typically practical BQC protocols.
Meehan, M J
1996-03-01
The recent introduction of therapist-driven protocols has given the appearance of restricting the professional judgment of respiratory therapists with decision-tree robotics while contemporaneously catapulting them into the practice of medicine. This is happening in the midst of a spiraling litigation climate. This article examines the legal aspects--from malpractice to licensure--of this exciting new practice known as therapist-driven respiratory protocols.
Straight Talk About Birth Control: A Contraceptive Education Protocol for Home Care.
Schoenberg, Leslie
Home healthcare providers play a critical role in the prevention of unintended pregnancies by providing evidence-based contraception education during home visits. This article describes an innovative and comprehensive contraception protocol that was developed for Nurse-Family Partnership to improve contraception education for home healthcare patients. The protocol focused on increasing uptake of long-acting reversible contraception (LARC) for high-risk prenatal and postpartum home healthcare patients. The protocol was designed to reduce early subsequent pregnancies and thereby improve outcomes for mothers and their infants. An evidence-based translation project was designed and piloted in three California counties. The protocol consisted of a contraception education module for nurses and a patient education toolkit. The toolkit included an interactive patient education workbook emphasizing LARC methods for nurses to complete with their patients along with other teaching tools. The project was evaluated using pre- and posttest surveys that measured changes in nurses' knowledge, attitudes, and practice before, after, and 2 months after implementation. Outcomes revealed the following statistically significant results: (a) nurses' knowledge doubled at the first posttest and persisted at 2 months, (b) nurses' attitudes improved on two of the three measures, and (c) there was a 17.7% increase in the frequency of LARC birth control education 2 months after implementation. An evidence-based contraception protocol can promote acceptance of LARC methods and improve home healthcare clinician comfort with and frequency of birth control education.
Smith, Michelle K; Jones, Francis H M; Gilbert, Sarah L; Wieman, Carl E
2013-01-01
Instructors and the teaching practices they employ play a critical role in improving student learning in college science, technology, engineering, and mathematics (STEM) courses. Consequently, there is increasing interest in collecting information on the range and frequency of teaching practices at department-wide and institution-wide scales. To help facilitate this process, we present a new classroom observation protocol known as the Classroom Observation Protocol for Undergraduate STEM or COPUS. This protocol allows STEM faculty, after a short 1.5-hour training period, to reliably characterize how faculty and students are spending their time in the classroom. We present the protocol, discuss how it differs from existing classroom observation protocols, and describe the process by which it was developed and validated. We also discuss how the observation data can be used to guide individual and institutional change.
Smith, Michelle K.; Jones, Francis H. M.; Gilbert, Sarah L.; Wieman, Carl E.
2013-01-01
Instructors and the teaching practices they employ play a critical role in improving student learning in college science, technology, engineering, and mathematics (STEM) courses. Consequently, there is increasing interest in collecting information on the range and frequency of teaching practices at department-wide and institution-wide scales. To help facilitate this process, we present a new classroom observation protocol known as the Classroom Observation Protocol for Undergraduate STEM or COPUS. This protocol allows STEM faculty, after a short 1.5-hour training period, to reliably characterize how faculty and students are spending their time in the classroom. We present the protocol, discuss how it differs from existing classroom observation protocols, and describe the process by which it was developed and validated. We also discuss how the observation data can be used to guide individual and institutional change. PMID:24297289
Inhibitors to Responsibility-Based Professional Development with In-Service Teachers
ERIC Educational Resources Information Center
Hemphill, Michael A.
2015-01-01
Researchers of continuing professional development (CPD) in physical education have called for new models that move beyond the traditional CPD model. The outcomes of CPD protocols are hard to predict even when they align with the best practices. Responsibility-based CPD has become the focus of recent attention to assist physical educators in…
DOE Office of Scientific and Technical Information (OSTI.GOV)
Lim, Charles Ci Wen; Xu, Feihu; Siopsis, George
Quantum position verification (QPV) is the art of verifying the geographical location of an untrusted party. It has recently been shown that the widely studied Bennett & Brassard 1984 (BB84) QPV protocol is insecure after the 3 dB loss point assuming local operations and classical communication (LOCC) adversaries. Here in this paper, we propose a time-reversed entanglement swapping QPV protocol (based on measurement-device-independent quantum cryptography) that is highly robust against quantum channel loss. First, assuming ideal qubit sources, we show that the protocol is secure against LOCC adversaries for any quantum channel loss, thereby overcoming the 3 dB loss limit.more » Then, we analyze the security of the protocol in a more practical setting involving weak laser sources and linear optics. Lastly, in this setting, we find that the security only degrades by an additive constant and the protocol is able to verify positions up to 47 dB channel loss.« less
Loss-tolerant quantum secure positioning with weak laser sources
NASA Astrophysics Data System (ADS)
Lim, Charles Ci Wen; Xu, Feihu; Siopsis, George; Chitambar, Eric; Evans, Philip G.; Qi, Bing
2016-09-01
Quantum position verification (QPV) is the art of verifying the geographical location of an untrusted party. Recently, it has been shown that the widely studied Bennett & Brassard 1984 (BB84) QPV protocol is insecure after the 3 dB loss point assuming local operations and classical communication (LOCC) adversaries. Here, we propose a time-reversed entanglement swapping QPV protocol (based on measurement-device-independent quantum cryptography) that is highly robust against quantum channel loss. First, assuming ideal qubit sources, we show that the protocol is secure against LOCC adversaries for any quantum channel loss, thereby overcoming the 3 dB loss limit. Then, we analyze the security of the protocol in a more practical setting involving weak laser sources and linear optics. In this setting, we find that the security only degrades by an additive constant and the protocol is able to verify positions up to 47 dB channel loss.
Application of evidence-based dentistry: from research to clinical periodontal practice.
Kwok, Vivien; Caton, Jack G; Polson, Alan M; Hunter, Paul G
2012-06-01
Dentists need to make daily decisions regarding patient care, and these decisions should essentially be scientifically sound. Evidence-based dentistry is meant to empower clinicians to provide the most contemporary treatment. The benefits of applying the evidence-based method in clinical practice include application of the most updated treatment and stronger reasoning to justify the treatment. A vast amount of information is readily accessible with today's digital technology, and a standardized search protocol can be developed to ensure that a literature search is valid, specific and repeatable. It involves developing a preset question (population, intervention, comparison and outcome; PICO) and search protocol. It is usually used academically to perform commissioned reviews, but it can also be applied to answer simple clinical queries. The scientific evidence thus obtained can then be considered along with patient preferences and values, clinical patient circumstances and the practitioner's experience and judgment in order to make the treatment decision. This paper describes how clinicians can incorporate evidence-based methods into patient care and presents a clinical example to illustrate the process. © 2012 John Wiley & Sons A/S.
ERIC Educational Resources Information Center
Chorpita, Bruce F.; Daleiden, Eric L.
2009-01-01
This study applied the distillation and matching model to 322 randomized clinical trials for child mental health treatments. The model involved initial data reduction of 615 treatment protocol descriptions by means of a set of codes describing discrete clinical strategies, referred to as practice elements. Practice elements were then summarized in…
Performance evaluation of reactive and proactive routing protocol in IEEE 802.11 ad hoc network
NASA Astrophysics Data System (ADS)
Hamma, Salima; Cizeron, Eddy; Issaka, Hafiz; Guédon, Jean-Pierre
2006-10-01
Wireless technology based on the IEEE 802.11 standard is widely deployed. This technology is used to support multiple types of communication services (data, voice, image) with different QoS requirements. MANET (Mobile Adhoc NETwork) does not require a fixed infrastructure. Mobile nodes communicate through multihop paths. The wireless communication medium has variable and unpredictable characteristics. Furthermore, node mobility creates a continuously changing communication topology in which paths break and new one form dynamically. The routing table of each router in an adhoc network must be kept up-to-date. MANET uses Distance Vector or Link State algorithms which insure that the route to every host is always known. However, this approach must take into account the adhoc networks specific characteristics: dynamic topologies, limited bandwidth, energy constraints, limited physical security, ... Two main routing protocols categories are studied in this paper: proactive protocols (e.g. Optimised Link State Routing - OLSR) and reactive protocols (e.g. Ad hoc On Demand Distance Vector - AODV, Dynamic Source Routing - DSR). The proactive protocols are based on periodic exchanges that update the routing tables to all possible destinations, even if no traffic goes through. The reactive protocols are based on on-demand route discoveries that update routing tables only for the destination that has traffic going through. The present paper focuses on study and performance evaluation of these categories using NS2 simulations. We have considered qualitative and quantitative criteria. The first one concerns distributed operation, loop-freedom, security, sleep period operation. The second are used to assess performance of different routing protocols presented in this paper. We can list end-to-end data delay, jitter, packet delivery ratio, routing load, activity distribution. Comparative study will be presented with number of networking context consideration and the results show the appropriate routing protocol for two kinds of communication services (data and voice).
2015-09-01
Gateway 2 4. Voice Packet Flow: SIP , Session Description Protocol (SDP), and RTP 3 5. Voice Data Analysis 5 6. Call Analysis 6 7. Call Metrics 6...analysis processing is designed for a general VoIP system architecture based on Session Initiation Protocol ( SIP ) for negotiating call sessions and...employs Skinny Client Control Protocol for network communication between the phone and the local CallManager (e.g., for each dialed digit), SIP
Ko, Gary T; So, Wing-Yee; Tong, Peter C; Le Coguiec, Francois; Kerr, Debborah; Lyubomirsky, Greg; Tamesis, Beaver; Wolthers, Troels; Nan, Jennifer; Chan, Juliana
2010-05-13
The Joint Asia Diabetes Evaluation (JADE) Program is a web-based program incorporating a comprehensive risk engine, care protocols, and clinical decision support to improve ambulatory diabetes care. The JADE Program uses information technology to facilitate healthcare professionals to create a diabetes registry and to deliver an evidence-based care and education protocol tailored to patients' risk profiles. With written informed consent from participating patients and care providers, all data are anonymized and stored in a databank to establish an Asian Diabetes Database for research and publication purpose. The JADE electronic portal (e-portal: http://www.jade-adf.org) is implemented as a Java application using the Apache web server, the mySQL database and the Cocoon framework. The JADE e-portal comprises a risk engine which predicts 5-year probability of major clinical events based on parameters collected during an annual comprehensive assessment. Based on this risk stratification, the JADE e-portal recommends a care protocol tailored to these risk levels with decision support triggered by various risk factors. Apart from establishing a registry for quality assurance and data tracking, the JADE e-portal also displays trends of risk factor control at each visit to promote doctor-patient dialogues and to empower both parties to make informed decisions. The JADE Program is a prototype using information technology to facilitate implementation of a comprehensive care model, as recommended by the International Diabetes Federation. It also enables health care teams to record, manage, track and analyze the clinical course and outcomes of people with diabetes.
NASA Astrophysics Data System (ADS)
Zhizhimov, Oleg; Mazov, Nikolay; Skibin, Sergey
Questions concerned with construction and operation of the distributed information systems on the basis of ANSI/NISO Z39.50 Information Retrieval Protocol are discussed in the paper. The paper is based on authors' practice in developing ZooPARK server. Architecture of distributed information systems, questions of reliability of such systems, minimization of search time and administration are examined. Problems with developing of distributed information systems are also described.
The Surviving Sepsis Campaign: Where have we been and where are we going?
Dellinger, R Phillip
2015-04-01
The Surviving Sepsis Campaign develops and promotes evidence-based guidelines and performance-improvement practices aimed at reducing deaths from sepsis worldwide. The most recent guidelines, published in 2013, provide detailed management strategies for acute care, fluid resuscitation, and vasopressor use. In addition, the campaign has developed simple, short protocols for what to do within 3 and 6 hours of recognition of sepsis. These protocols are associated with reduced mortality rates. Copyright © 2015 Cleveland Clinic.
Zhao, Xia; Wei, Aoqi; Lu, Xiaoyu; Lu, Kui
2017-08-01
3-Sulfanyloxindoles were synthesised by triphenylphosphine-mediated transition-metal-free thiolation of oxindoles using sulfonyl chlorides as sulfenylation reagents. The above reaction was promoted by iodide anions, which was ascribed to the in situ conversion of sulfenyl chlorides into the more reactive sulfenyl iodides. Moreover, the thiolation of 3-aryloxindoles was facilitated by bases. The use of a transition-metal-free protocol, readily available reagents, and mild reaction conditions make this protocol more practical for preparing 3-sulfanyloxindoles than traditional methods.
NASA Astrophysics Data System (ADS)
Andreo, Pedro; Saiful Huq, M.; Westermark, Mathias; Song, Haijun; Tilikidis, Aris; DeWerd, Larry; Shortt, Ken
2002-09-01
A new international Code of Practice for radiotherapy dosimetry co-sponsored by several international organizations has been published by the IAEA, TRS-398. It is based on standards of absorbed dose to water, whereas previous protocols (TRS-381 and TRS-277) were based on air kerma standards. To estimate the changes in beam calibration caused by the introduction of TRS-398, a detailed experimental comparison of the dose determination in reference conditions in high-energy photon and electron beams has been made using the different IAEA protocols. A summary of the formulation and reference conditions in the various Codes of Practice, as well as of their basic data, is presented first. Accurate measurements have been made in 25 photon and electron beams from 10 clinical accelerators using 12 different cylindrical and plane-parallel chambers, and dose ratios under different conditions of TRS-398 to the other protocols determined. A strict step-by-step checklist was followed by the two participating clinical institutions to ascertain that the resulting calculations agreed within tenths of a per cent. The maximum differences found between TRS-398 and the previous Codes of Practice TRS-277 (2nd edn) and TRS-381 are of the order of 1.5-2.0%. TRS-398 yields absorbed doses larger than the previous protocols, around 1.0% for photons (TRS-277) and for electrons (TRS-381 and TRS-277) when plane-parallel chambers are cross-calibrated. For the Markus chamber, results show a very large variation, although a fortuitous cancellation of the old stopping powers with the ND,w/NK ratios makes the overall discrepancy between TRS-398 and TRS-277 in this case smaller than for well-guarded plane-parallel chambers. Chambers of the Roos-type with a 60Co ND,w calibration yield the maximum discrepancy in absorbed dose, which varies between 1.0% and 1.5% for TRS-381 and between 1.5% and 2.0% for TRS-277. Photon beam calibrations using directly measured or calculated TPR20,10 from a percentage dose data at SSD = 100 cm were found to be indistinguishable. Considering that approximately 0.8% of the differences between TRS-398 and the NK-based protocols are caused by the change to the new type of standards, the remaining difference in absolute dose is due either to a close similarity in basic data or to a fortuitous cancellation of the discrepancies in data and type of chamber calibration. It is emphasized that the NK-ND,air and ND,w formalisms have very similar uncertainty when the same criteria are used for both procedures. Arguments are provided in support of the recommendation for a change in reference dosimetry based on standards of absorbed dose to water.
An Identity-Based Anti-Quantum Privacy-Preserving Blind Authentication in Wireless Sensor Networks.
Zhu, Hongfei; Tan, Yu-An; Zhu, Liehuang; Wang, Xianmin; Zhang, Quanxin; Li, Yuanzhang
2018-05-22
With the development of wireless sensor networks, IoT devices are crucial for the Smart City; these devices change people's lives such as e-payment and e-voting systems. However, in these two systems, the state-of-art authentication protocols based on traditional number theory cannot defeat a quantum computer attack. In order to protect user privacy and guarantee trustworthy of big data, we propose a new identity-based blind signature scheme based on number theorem research unit lattice, this scheme mainly uses a rejection sampling theorem instead of constructing a trapdoor. Meanwhile, this scheme does not depend on complex public key infrastructure and can resist quantum computer attack. Then we design an e-payment protocol using the proposed scheme. Furthermore, we prove our scheme is secure in the random oracle, and satisfies confidentiality, integrity, and non-repudiation. Finally, we demonstrate that the proposed scheme outperforms the other traditional existing identity-based blind signature schemes in signing speed and verification speed, outperforms the other lattice-based blind signature in signing speed, verification speed, and signing secret key size.
An Identity-Based Anti-Quantum Privacy-Preserving Blind Authentication in Wireless Sensor Networks
Zhu, Hongfei; Tan, Yu-an; Zhu, Liehuang; Wang, Xianmin; Zhang, Quanxin; Li, Yuanzhang
2018-01-01
With the development of wireless sensor networks, IoT devices are crucial for the Smart City; these devices change people’s lives such as e-payment and e-voting systems. However, in these two systems, the state-of-art authentication protocols based on traditional number theory cannot defeat a quantum computer attack. In order to protect user privacy and guarantee trustworthy of big data, we propose a new identity-based blind signature scheme based on number theorem research unit lattice, this scheme mainly uses a rejection sampling theorem instead of constructing a trapdoor. Meanwhile, this scheme does not depend on complex public key infrastructure and can resist quantum computer attack. Then we design an e-payment protocol using the proposed scheme. Furthermore, we prove our scheme is secure in the random oracle, and satisfies confidentiality, integrity, and non-repudiation. Finally, we demonstrate that the proposed scheme outperforms the other traditional existing identity-based blind signature schemes in signing speed and verification speed, outperforms the other lattice-based blind signature in signing speed, verification speed, and signing secret key size. PMID:29789475
Reyon, Deepak; Khayter, Cyd; Regan, Maureen R; Joung, J Keith; Sander, Jeffry D
2012-10-01
Engineered transcription activator-like effector nucleases (TALENs) are broadly useful tools for performing targeted genome editing in a wide variety of organisms and cell types including plants, zebrafish, C. elegans, rat, human somatic cells, and human pluripotent stem cells. Here we describe detailed protocols for the serial, hierarchical assembly of TALENs that require neither PCR nor specialized multi-fragment ligations and that can be implemented by any laboratory. These restriction enzyme and ligation (REAL)-based protocols can be practiced using plasmid libraries and user-friendly, Web-based software that both identifies target sites in sequences of interest and generates printable graphical guides that facilitate assembly of TALENs. With the described platform of reagents, protocols, and software, researchers can easily engineer multiple TALENs within 2 weeks using standard cloning techniques. 2012 by John Wiley & Sons, Inc.
J-PAKE: Authenticated Key Exchange without PKI
NASA Astrophysics Data System (ADS)
Hao, Feng; Ryan, Peter
Password Authenticated Key Exchange (PAKE) is one of the important topics in cryptography. It aims to address a practical security problem: how to establish secure communication between two parties solely based on a shared password without requiring a Public Key Infrastructure (PKI). After more than a decade of extensive research in this field, there have been several PAKE protocols available. The EKE and SPEKE schemes are perhaps the two most notable examples. Both techniques are however patented. In this paper, we review these techniques in detail and summarize various theoretical and practical weaknesses. In addition, we present a new PAKE solution called J-PAKE. Our strategy is to depend on well-established primitives such as the Zero-Knowledge Proof (ZKP). So far, almost all of the past solutions have avoided using ZKP for the concern on efficiency. We demonstrate how to effectively integrate the ZKP into the protocol design and meanwhile achieve good efficiency. Our protocol has comparable computational efficiency to the EKE and SPEKE schemes with clear advantages on security.
Electronic Clinical Trial Protocol Distribution via the World-Wide Web
Afrin, Lawrence B.; Kuppuswamy, Valarmathi; Slater, Barbara; Stuart, Robert K.
1997-01-01
Clinical trials today typically are inefficient, paper-based operations. Poor community physician awareness of available trials and difficult referral mechanisms also contribute to poor accrual. The Physicians Research Network (PRN) web was developed for more efficient trial protocol distribution and eligibility inquiries. The Medical University of South Carolina's Hollings Cancer Center trials program and two community oncology practices served as a testbed. In 581 man-hours over 18 months, 147 protocols were loaded into PRN. The trials program eliminated all protocol hardcopies except the masters, reduced photocopier use 59%, and saved 1.0 full-time equivalents (FTE), but 1.0 FTE was needed to manage PRN. There were no known security breaches, downtime, or content-related problems. Therefore, PRN is a paperless, user-preferred, reliable, secure method for distributing protocols and reducing distribution errors and delays because only a single copy of each protocol is maintained. Furthermore, PRN is being extended to serve other aspects of trial operations. PMID:8988471
PRADO, Maíra; SIMÃO, Renata Antoun; GOMES, Brenda Paula Figueiredo de Almeida
2014-01-01
The development and maintenance of the sealing of the root canal system is the key to the success of root canal treatment. The resin-based adhesive material has the potential to reduce the microleakage of the root canal because of its adhesive properties and penetration into dentinal walls. Moreover, the irrigation protocols may have an influence on the adhesiveness of resin-based sealers to root dentin. Objective The objective of the present study was to evaluate the effect of different irrigant protocols on coronal bacterial microleakage of gutta-percha/AH Plus and Resilon/Real Seal Self-etch systems. Material and Methods One hundred ninety pre-molars were used. The teeth were divided into 18 experimental groups according to the irrigation protocols and filling materials used. The protocols used were: distilled water; sodium hypochlorite (NaOCl)+eDTA; NaOCl+H3PO4; NaOCl+eDTA+chlorhexidine (CHX); NaOCl+H3PO4+CHX; CHX+eDTA; CHX+ H3PO4; CHX+eDTA+CHX and CHX+H3PO4+CHX. Gutta-percha/AH Plus or Resilon/Real Seal Se were used as root-filling materials. The coronal microleakage was evaluated for 90 days against Enterococcus faecalis. Data were statistically analyzed using Kaplan-Meier survival test, Kruskal-Wallis and Mann-Whitney tests. Results No significant difference was verified in the groups using chlorhexidine or sodium hypochlorite during the chemo-mechanical preparation followed by eDTA or phosphoric acid for smear layer removal. The same results were found for filling materials. However, the statistical analyses revealed that a final flush with 2% chlorhexidine reduced significantly the coronal microleakage. Conclusion A final flush with 2% chlorhexidine after smear layer removal reduces coronal microleakage of teeth filled with gutta-percha/AH Plus or Resilon/Real Seal SE. PMID:25025557
Brunelli, Alessandro; Salati, Michele; Refai, Majed; Di Nunzio, Luca; Xiumé, Francesco; Sabbatini, Armando
2010-01-01
The objective of this randomised trial was to assess the effectiveness of a new fast-track chest tube removal protocol taking advantage of digital monitoring of air leak compared to a traditional protocol using visual and subjective assessment of air leak (bubbles). One hundred and sixty-six patients submitted to pulmonary lobectomy for lung cancer were randomised in two groups with different chest tube removal protocols: (1) in the new protocol, chest tube was removed based on digitally recorded measurements of air leak flow; (2) in the traditional protocol, the chest tube removal was based on an instantaneous assessment of air leak during daily rounds. The two groups were compared in terms of chest tube duration, hospital stay and costs. The two groups were well matched for several preoperative and operative variables. Compared to the traditional protocol, the new digital recording protocol showed mean reductions in chest tube duration (p=0.0007), hospital stay (p=0.007) of 0.9 day, and a mean cost saving of euro 476 per patient (p=0.008). In the new chest tube removal protocol, 51% of patients had their chest tube removed by the second postoperative day versus only 12% of those in the traditional protocol. The application of a chest tube removal protocol using a digital drainage unit featuring a continuous recording of air leak was safe and cost effective. Although future studies are warranted to confirm these results in other settings, the use of this new protocol is now routinely applied in our practice. Copyright 2009 European Association for Cardio-Thoracic Surgery. Published by Elsevier B.V. All rights reserved.
Community of Practice: A Path to Strategic Learning
DOE Office of Scientific and Technical Information (OSTI.GOV)
Nancy M. Carlson
2003-04-01
To explore the concept of community of practice, the research initially concentrates on a strategic business process in a research and applied engineering laboratory discovering essential communication tools and processes needed to cultivate a high functioning cross-disciplinary team engaged in proposal preparation. Qualitative research in the human ecology of the proposal process blends topic-oriented ethnography and grounded theory and includes an innovative addition to qualitative interviewing, called meta-inquiry. Meta-inquiry uses an initial interview protocol with a homogeneous pool of informants to enhance the researcher's sensitivity to the unique cultures involved in the proposal process before developing a formal interview protocol.more » In this study the preanalysis process uses data from editors, graphic artists, text processors, and production coordinators to assess, modify, enhance, and focus the formal interview protocol with scientists, engineers, and technical managers-the heterogeneous informants. Thus this human ecology-based interview protocol values homogeneous and heterogeneous informant data and acquires data from which concepts, categories, properties, and both substantive and formal theory emerges. The research discovers the five essential processes of owning, visioning, reviewing, producing, and contributing for strategic learning to occur in a proposal community of practice. The apprenticeship, developmental, and nurturing perspectives of adult learning provide the proposal community of practice with cohesion, interdependence, and caring, while core and boundary practices provide insight into the tacit and explicit dimensions of the proposal process. By making these dimensions explicit, the necessary competencies, absorptive capacity, and capabilities needed for strategic learning are discovered. Substantive theory emerges and provides insight into the ability of the proposal community of practice to evolve, flourish, and adapt to the strategic advantage of the laboratory. The substantive theory explores the dimensions of owning, visioning, reviewing, producing, and contributing and their interrelationship to community learning dynamics. Through dialogue, creative tension, and imagination, the proposal community of practice focuses on actionable goals linked by proactively participating in practice, creating possibilities, evaluating and enhancing potential, producing a valued product, and confirming strategic value. Lastly, a formal theory emerges linking competency-capacity-capability, cohesion, interdependence, and caring as essential attributes of strategic learning communities.« less
Sturgill, Jeremiah; Howell, Scott; Perry, Maureen Munnelly; Kothari, Hemali
2016-11-01
Approximately 14% of Americans are living with chronic kidney disease (CKD). The prevalence of end-stage renal disease (ESRD), the result of progressing CKD continues to rise by 21,000 per year. There are no updated, evidence-based antibiotic prophylaxis guidelines for patients with renal disease undergoing dental treatment. The most recent was a scientific statement from the American Heart Association (AHA) in 2003. Presented in three parts, the goal of the first part of this study is to determine the current protocol being used to treat renal patients at U.S. dental schools. A 21 multiple-choice question survey was e-mailed to 58 clinic deans of accredited dental schools in the United States regarding renal treatment protocol details including antibiotic prophylaxis. Fifty-two percent of programs report having no established renal patient treatment protocol. For programs with a protocol, when using prophylactic antibiotics, 54% followed AHA protocol, whereas 62% used a modified protocol. There is a lack of consistent, established protocols among undergraduate dental programs. It is suggested that evidence-based guidelines for the safe treatment of patients be developed. © 2016 Special Care Dentistry Association and Wiley Periodicals, Inc.
Gschwind, Yves J; Kressig, Reto W; Lacroix, Andre; Muehlbauer, Thomas; Pfenninger, Barbara; Granacher, Urs
2013-10-09
With increasing age neuromuscular deficits (e.g., sarcopenia) may result in impaired physical performance and an increased risk for falls. Prominent intrinsic fall-risk factors are age-related decreases in balance and strength / power performance as well as cognitive decline. Additional studies are needed to develop specifically tailored exercise programs for older adults that can easily be implemented into clinical practice. Thus, the objective of the present trial is to assess the effects of a fall prevention program that was developed by an interdisciplinary expert panel on measures of balance, strength / power, body composition, cognition, psychosocial well-being, and falls self-efficacy in healthy older adults. Additionally, the time-related effects of detraining are tested. Healthy old people (n = 54) between the age of 65 to 80 years will participate in this trial. The testing protocol comprises tests for the assessment of static / dynamic steady-state balance (i.e., Sharpened Romberg Test, instrumented gait analysis), proactive balance (i.e., Functional Reach Test; Timed Up and Go Test), reactive balance (i.e., perturbation test during bipedal stance; Push and Release Test), strength (i.e., hand grip strength test; Chair Stand Test), and power (i.e., Stair Climb Power Test; countermovement jump). Further, body composition will be analysed using a bioelectrical impedance analysis system. In addition, questionnaires for the assessment of psychosocial (i.e., World Health Organisation Quality of Life Assessment-Bref), cognitive (i.e., Mini Mental State Examination), and fall risk determinants (i.e., Fall Efficacy Scale - International) will be included in the study protocol. Participants will be randomized into two intervention groups or the control / waiting group. After baseline measures, participants in the intervention groups will conduct a 12-week balance and strength / power exercise intervention 3 times per week, with each training session lasting 30 min. (actual training time). One intervention group will complete an extensive supervised training program, while the other intervention group will complete a short version ('3 times 3') that is home-based and controlled by weekly phone calls. Post-tests will be conducted right after the intervention period. Additionally, detraining effects will be measured 12 weeks after program cessation. The control group / waiting group will not participate in any specific intervention during the experimental period, but will receive the extensive supervised program after the experimental period. It is expected that particularly the supervised combination of balance and strength / power training will improve performance in variables of balance, strength / power, body composition, cognitive function, psychosocial well-being, and falls self-efficacy of older adults. In addition, information regarding fall risk assessment, dose-response-relations, detraining effects, and supervision of training will be provided. Further, training-induced health-relevant changes, such as improved performance in activities of daily living, cognitive function, and quality of life, as well as a reduced risk for falls may help to lower costs in the health care system. Finally, practitioners, therapists, and instructors will be provided with a scientifically evaluated feasible, safe, and easy-to-administer exercise program for fall prevention.
Cost-effectiveness of risk stratified followup after urethral reconstruction: a decision analysis.
Belsante, Michael J; Zhao, Lee C; Hudak, Steven J; Lotan, Yair; Morey, Allen F
2013-10-01
We propose a novel risk stratified followup protocol for use after urethroplasty and explore potential cost savings. Decision analysis was performed comparing a symptom based, risk stratified protocol for patients undergoing excision and primary anastomosis urethroplasty vs a standard regimen of close followup for urethroplasty. Model assumptions included that excision and primary anastomosis has a 94% success rate, 11% of patients with successful urethroplasty had persistent lower urinary tract symptoms requiring cystoscopic evaluation, patients in whom treatment failed undergo urethrotomy and patients with recurrence on symptom based surveillance have a delayed diagnosis requiring suprapubic tube drainage. The Nationwide Inpatient Sample from 2010 was queried to identify the number of urethroplasties performed per year in the United States. Costs were obtained based on Medicare reimbursement rates. The 5-year cost of a symptom based, risk stratified followup protocol is $430 per patient vs $2,827 per patient using standard close followup practice. An estimated 7,761 urethroplasties were performed in the United States in 2010. Assuming that 60% were excision and primary anastomosis, and with more than 5 years of followup, the risk stratified protocol was projected to yield an estimated savings of $11,165,130. Sensitivity analysis showed that the symptom based, risk stratified followup protocol was far more cost-effective than standard close followup in all settings. Less than 1% of patients would be expected to have an asymptomatic recurrence using the risk stratified followup protocol. A risk stratified, symptom based approach to urethroplasty followup would produce a significant reduction in health care costs while decreasing unnecessary followup visits, invasive testing and radiation exposure. Copyright © 2013 American Urological Association Education and Research, Inc. Published by Elsevier Inc. All rights reserved.
Maternal–Child Microbiome: Specimen Collection, Storage and Implications for Research and Practice
Jordan, Sheila; Baker, Brenda; Dunn, Alexis; Edwards, Sara; Ferranti, Erin; Mutic, Abby D.; Yang, Irene; Rodriguez, Jeannie
2017-01-01
Background The maternal microbiome is a key contributor to the development and outcomes of pregnancy and the health status of both mother and infant. Significant advances are occurring in the science of the maternal and child microbiome and hold promise in improving outcomes related to pregnancy complications, child development, and chronic health conditions of mother and child. Objectives The purpose of the paper is to review site-specific considerations in the collection and storage of maternal and child microbiome samples and its implications for nursing research and practice. Approach Microbiome sampling protocols were reviewed and synthesized. Precautions across sampling protocols were also noted. Results Oral, vaginal, gut, placental, and breastmilk are viable sources for sampling the maternal and/or child microbiome. Prior to sampling special considerations need to be addressed related to various factors including current medications, health status, and hygiene practices. Proper storage of samples will avoid degradation of cellular and DNA structures vital for analysis. Discussion Changes in the microbiome throughout the perinatal, postpartum and childhood periods are dramatic and significant to outcomes of the pregnancy and the long-term health of mother and child. Proper sampling techniques are required to produce reliable results from which evidence-based practice recommendations will be built. Ethical and practical issues surrounding study design and protocol development must also be considered when researching vulnerable groups such as pregnant women and infants. Nurses hold the responsibility to both perform the research and to translate findings from microbiome investigations for clinical use. PMID:28252577
Research on mobile electronic commerce security technology based on WPKI
NASA Astrophysics Data System (ADS)
Zhang, Bo
2013-07-01
Through the in-depth study on the existing mobile e-commerce and WAP protocols, this paper presents a security solution of e-commerce system based on WPKI, and describes its implementation process and specific implementation details. This solution uniformly distributes the key used by the various participating entities , to fully ensure the confidentiality, authentication, fairness and integrity of mobile e-commerce payments, therefore has some pract ical value for improving the security of e-commerce system.
Langschmidt, Jenna; Caine, Paul L; Wearn, Christopher M; Bamford, Amy; Wilson, Yvonne T; Moiemen, Naiem S
2014-08-01
Hydrotherapy is widely used in burns management however there are risks associated with its use, in particular cross-infection. Data regarding indications and techniques in common use is deficient. This study aimed to investigate hydrotherapy practices in the UK and Ireland. A survey of the hydrotherapy practice of major burn care providers was performed by e mail and where necessary, follow up telephone contact. The survey included 28 burn care providers. 27 reported using hydrotherapy. Only 11 (41%) had defined indication criteria with 4 (15%) implementing a specific protocol. Variations in hydrotherapy practice were seen. Hydrotherapy is used nationwide, however considerable variation in practice exists. One area worthy of further consideration is the need for appropriate standards of infection control. Copyright © 2013 Elsevier Ltd and ISBI. All rights reserved.
Trivedi, Hari; Mesterhazy, Joseph; Laguna, Benjamin; Vu, Thienkhai; Sohn, Jae Ho
2018-04-01
Magnetic resonance imaging (MRI) protocoling can be time- and resource-intensive, and protocols can often be suboptimal dependent upon the expertise or preferences of the protocoling radiologist. Providing a best-practice recommendation for an MRI protocol has the potential to improve efficiency and decrease the likelihood of a suboptimal or erroneous study. The goal of this study was to develop and validate a machine learning-based natural language classifier that can automatically assign the use of intravenous contrast for musculoskeletal MRI protocols based upon the free-text clinical indication of the study, thereby improving efficiency of the protocoling radiologist and potentially decreasing errors. We utilized a deep learning-based natural language classification system from IBM Watson, a question-answering supercomputer that gained fame after challenging the best human players on Jeopardy! in 2011. We compared this solution to a series of traditional machine learning-based natural language processing techniques that utilize a term-document frequency matrix. Each classifier was trained with 1240 MRI protocols plus their respective clinical indications and validated with a test set of 280. Ground truth of contrast assignment was obtained from the clinical record. For evaluation of inter-reader agreement, a blinded second reader radiologist analyzed all cases and determined contrast assignment based on only the free-text clinical indication. In the test set, Watson demonstrated overall accuracy of 83.2% when compared to the original protocol. This was similar to the overall accuracy of 80.2% achieved by an ensemble of eight traditional machine learning algorithms based on a term-document matrix. When compared to the second reader's contrast assignment, Watson achieved 88.6% agreement. When evaluating only the subset of cases where the original protocol and second reader were concordant (n = 251), agreement climbed further to 90.0%. The classifier was relatively robust to spelling and grammatical errors, which were frequent. Implementation of this automated MR contrast determination system as a clinical decision support tool may save considerable time and effort of the radiologist while potentially decreasing error rates, and require no change in order entry or workflow.
Practical guidance for the implementation of stress echocardiography.
Suzuki, Kengo; Hirano, Yutaka; Yamada, Hirotsugu; Murata, Mitsushige; Daimon, Masao; Takeuchi, Masaaki; Seo, Yoshihiro; Izumi, Chisato; Akaishi, Makoto
2018-06-06
Exercise stress testing has been widely undertaken for the diagnosis of heart diseases. The accurate assessment of clinical conditions can be conducted by comparing the findings obtained from the results of stress echocardiography with the changes in the blood/heart rate and electrocardiograms. Numerous overseas studies have reported the utility of stress echocardiography in diagnosing myocardial ischemia; in Japan, the use of this modality for this purpose was included in the national health insurance reimbursable list in 2012. Nevertheless, stress echocardiography is far from being a widespread practice in Japan. This might be due to insufficient equipment (e.g., ergometers, space for test implementation) at each medical institution, shortage of technicians and sonographers who are well experienced and who are responsible for obtaining images during stress testing. The other possible reasons include the limited evidence available in Japan and the lack of a standardized testing protocol. Further dissemination of the practice of exercise stress echocardiography in this country is deemed necessary to establish satisfactory evidence for the use of stress echocardiography in the Japanese population. To this end, efforts are underway to develop a standardized protocol and report format to be adopted throughout Japan. We here present a guideline created by the Guideline Development Committee of the Japanese Society of Echocardiography that describes safe and effective stress echocardiography protocols and report formats. The readers are encouraged to perform exercise stress echocardiography using the proposed template for consensus document and report attached to this guideline.
E-Learning and Evidence Based Practice in Schools
ERIC Educational Resources Information Center
Quong, Terrence
2016-01-01
JCTIC has used open source software to develop a unique school online environment that has made evidence based practice viable in their school. In this paper the proposition is made that eLearning enables evidence based practice which in turn leads to improved student outcomes. Much has been written about evidence based practice in schools, but…
Development and Integration of WWW-Based Services in an Existing University Environment.
ERIC Educational Resources Information Center
Garofalakis, John; Kappos, Panagiotis; Tsakalidis, Athanasios; Tsaknakis, John; Tzimas, Giannis; Vassiliadis, Vassilios
This paper describes the experience and the problems solved in the process of developing and integrating advanced World Wide Web-based services into the University of Patras (Greece) system. In addition to basic network services (e.g., e-mail, file transfer protocol), the final system will integrate the following set of advanced services: a…
Living better with dementia: strengths-based social work practice and dementia care.
McGovern, Justine
2015-01-01
This article first argues that quality of life is possible despite the onset of dementia in late life. It also demonstrates how core concepts of social work practice, such as family systems theory, the strengths perspective, and use of self, can be applied to practice with dementia-affected persons. In addition, it provides practical suggestions for supporting care partners in nurturing "we-ness", focusing on what remains rather than was is lost, and remaining authentic. When strengths-based social work practice is integrated into dementia care protocols, wellbeing can increase. As a result, the more than 40 million persons worldwide who are affected by dementia do not have to resign themselves to the despair, devastation and inevitable demise of quality of life that dominate perception of the illness.
Finite-key analysis for the 1-decoy state QKD protocol
NASA Astrophysics Data System (ADS)
Rusca, Davide; Boaron, Alberto; Grünenfelder, Fadri; Martin, Anthony; Zbinden, Hugo
2018-04-01
It has been shown that in the asymptotic case of infinite-key length, the 2-decoy state Quantum Key Distribution (QKD) protocol outperforms the 1-decoy state protocol. Here, we present a finite-key analysis of the 1-decoy method. Interestingly, we find that for practical block sizes of up to 108 bits, the 1-decoy protocol achieves for almost all experimental settings higher secret key rates than the 2-decoy protocol. Since using only one decoy is also easier to implement, we conclude that it is the best choice for QKD, in most common practical scenarios.
D'Aiuto, Leonardo; Zhi, Yun; Kumar Das, Dhanjit; Wilcox, Madeleine R; Johnson, Jon W; McClain, Lora; MacDonald, Matthew L; Di Maio, Roberto; Schurdak, Mark E; Piazza, Paolo; Viggiano, Luigi; Sweet, Robert; Kinchington, Paul R; Bhattacharjee, Ayantika G; Yolken, Robert; Nimgaonka, Vishwajit L; Nimgaonkar, Vishwajit L
2014-01-01
Induced pluripotent stem cell (iPSC)-based technologies offer an unprecedented opportunity to perform high-throughput screening of novel drugs for neurological and neurodegenerative diseases. Such screenings require a robust and scalable method for generating large numbers of mature, differentiated neuronal cells. Currently available methods based on differentiation of embryoid bodies (EBs) or directed differentiation of adherent culture systems are either expensive or are not scalable. We developed a protocol for large-scale generation of neuronal stem cells (NSCs)/early neural progenitor cells (eNPCs) and their differentiation into neurons. Our scalable protocol allows robust and cost-effective generation of NSCs/eNPCs from iPSCs. Following culture in neurobasal medium supplemented with B27 and BDNF, NSCs/eNPCs differentiate predominantly into vesicular glutamate transporter 1 (VGLUT1) positive neurons. Targeted mass spectrometry analysis demonstrates that iPSC-derived neurons express ligand-gated channels and other synaptic proteins and whole-cell patch-clamp experiments indicate that these channels are functional. The robust and cost-effective differentiation protocol described here for large-scale generation of NSCs/eNPCs and their differentiation into neurons paves the way for automated high-throughput screening of drugs for neurological and neurodegenerative diseases.
Use of clinical guidelines in remote Australia: A realist evaluation.
Reddy, Sandeep; Orpin, Victoria; Herring, Sally; Mackie-Schneider, Stephanie; Struber, Janet
2018-02-01
The aim of this evaluation was to assess the acceptability, accessibility, and compliance with the 2014 editions of the Remote Primary Health Care Manuals (RPHCM) in health care centres across remote areas of Northern and Central Australia. To undertake a comprehensive evaluation that considered context, the evaluation used a realist evaluation framework. The evaluation used a variety of methods including interviews and survey to develop and test a programme theory. Many remote health practitioners have adopted standardized, evidence-based practice because of the use of the RPHCM. The mechanisms that led to the use of the manuals include acceptance of the worth of the protocols to their clinical practice, reliance on manual content to guide their practice, the perception of credibility, the applicability of RPHCM content to the context, and a fear of the consequences of not using the RPHCMs. Some remote health practitioners are less inclined to use the RPHCM regularly because of a perception that the content is less suited to their needs and daily practice or it is hard to navigate or understand. The evaluation concluded that there is work to be done to widen the RPHCM user base, and organizations need to increase support for their staff to use the RPHCM protocols better. These measures are expected to enable standardized clinical practice in the remote context. © 2017 John Wiley & Sons, Ltd.
Peacock, Lisa M; Thomassee, May E; Williams, Valerie L; Young, Amy E
2015-06-01
Office-based surgery is increasingly desired by patients and providers due to ease of access, overall efficiency, reimbursement, and satisfaction. The adoption of office-based surgery requires careful consideration of safety, efficacy, cost, and feasibility within a providers practice. This article reviews the currently available data regarding patient and provider satisfaction as well as practical considerations of staffing, equipment, and supplies. To aid the practitioner, issues of office-based anesthesia and safety with references to currently available national guidelines and protocols are provided. Included is a brief review of billing, coding, and reimbursement. Technical procedural aspects with information and recommendations are summarized.
Managing barriers to empathy in the clinical encounter: a qualitative interview study with GPs
Derksen, Frans AWM; Hartman, Tim C olde; Bensing, Jozien M; Lagro-Janssen, Antoine LM
2016-01-01
Background Current daily general practice has become increasingly technical and somatically oriented (where attention to patients’ feelings is decreased) due to an increase in protocol-based guidelines. Priorities in GP–patient communication have shifted from a focus on listening and empathy to task-oriented communication. Aim To explore what barriers GPs experience when applying empathy in daily practice, and how these barriers are managed. Design and setting Thirty Dutch GPs with sufficient heterogeneity in sex, age, type of practice, and rural or urban setting were interviewed. Method The consolidated criteria for reporting qualitative research (COREQ) were applied. The verbatim transcripts were then analysed. Results According to participating GPs, the current emphasis on protocol-driven care can be a significant barrier to genuineness in communication. Other potential barriers mentioned were time pressures and constraints, and dealing with patients displaying ‘unruly behaviour’ or those with personality disorders. GPs indicated that it can be difficult to balance emotional involvement and professional distance. Longer consulting times, smaller practice populations, and efficient practice organisation were described as practical solutions. In order to focus on a patient-as-person approach, GPs strongly suggested that deviating from guidelines should be possible when necessary as an element of good-quality care. Joining intercollegiate counselling groups was also discussed. Conclusion In addition to practical solutions for barriers to behaving empathically, GPs indicated that they needed more freedom to balance working with protocols and guidelines, as well as a patient-as-person and patient-as-partner approach. This balance is necessary to remain connected with patients and to deliver care that is truly personal. PMID:27884917
The state of rhizospheric science in the era of multi-omics: A practical guide to omics technologies
DOE Office of Scientific and Technical Information (OSTI.GOV)
White, Richard Allen; Rivas-Ubach, Albert; Borkum, Mark I.
Over the past century, the significance of the rhizosphere as a complex, biological system, comprised of vast, interconnected networks of microbial organisms that interact directly with their plant hosts (e.g., archæa, bacteria, fungi, eukaryotes, and viruses) has been increasingly recognized by the scientific community. Providing a nutritional base to the terrestrial biosphere, the rhizosphere is integral to plant growth, crop production and ecosystem health. Lack of mechanistic understanding of the rhizosphere constitutes a critical knowledge gap, inhibiting our ability to predict and control the terrestrial ecosystem in order to achieve desirable outcomes (e.g., bioenergy production, crop yield maximization, and soilbasedmore » carbon sequestration). Application of multi-omics has the potential to significantly advance our knowledge of rhizospheric science. This review covers: cutting- and bleeding-edge, multi-omic techniques and technologies; methods and protocols for specific rhizospheric science questions; and, challenges to be addressed during this century of rhizospheric science.« less
Development of an alcohol withdrawal protocol: CNS collaborative exemplar.
Phillips, Susan; Haycock, Camille; Boyle, Deborah
2006-01-01
The purpose of this process improvement project was to develop an Alcohol Withdrawal Syndrome (AWS) management protocol for acute care. The prevalence of alcohol abuse in our society presents challenges for health professionals, and few nurses have received formal education on the identification and treatment of AWS, which has frequently resulted in ineffective, nonstandardized care. However, nurses practicing in medical-surgical, emergency, trauma, and critical care settings must be astute in the assessment and management of AWS. DESIGN/BACKGROUND/RATIONALE: Following an analysis of existing management protocols, a behavioral health clinical nurse specialist was asked to lead a work team composed of physicians, pharmacists, and nurses to develop a new evidence-based alcohol withdrawal protocol for acute care. By implementing a standardized assessment tool and treatment protocol, clinical nurse specialists empowered nursing staff with strategies to prevent the serious medical complications associated with AWS. FINDINGS/OUTCOMES: The development and integration of a safe and effective treatment protocol to manage AWS was facilitated by collaborative, evidence-based decision making. Clinical experience and specialty expertise were integrated by clinical nurse specialists skilled in group dynamics, problem-solving, and the implementation of change. Improving care of patients in AWS is an exemplar for clinical nurse specialist roles as change agent and patient advocate.
Rapid Waterborne Pathogen Detection with Mobile Electronics.
Wu, Tsung-Feng; Chen, Yu-Chen; Wang, Wei-Chung; Kucknoor, Ashwini S; Lin, Che-Jen; Lo, Yu-Hwa; Yao, Chun-Wei; Lian, Ian
2017-06-09
Pathogen detection in water samples, without complex and time consuming procedures such as fluorescent-labeling or culture-based incubation, is essential to public safety. We propose an immunoagglutination-based protocol together with the microfluidic device to quantify pathogen levels directly from water samples. Utilizing ubiquitous complementary metal-oxide-semiconductor (CMOS) imagers from mobile electronics, a low-cost and one-step reaction detection protocol is developed to enable field detection for waterborne pathogens. 10 mL of pathogen-containing water samples was processed using the developed protocol including filtration enrichment, immune-reaction detection and imaging processing. The limit of detection of 10 E. coli O157:H7 cells/10 mL has been demonstrated within 10 min of turnaround time. The protocol can readily be integrated into a mobile electronics such as smartphones for rapid and reproducible field detection of waterborne pathogens.
Are we ready for the ERAS protocol in colorectal surgery?
Kisielewski, Michał; Rubinkiewicz, Mateusz; Pędziwiatr, Michał; Pisarska, Magdalena; Migaczewski, Marcin; Dembiński, Marcin; Major, Piotr; Rembiasz, Kazimierz; Budzyński, Andrzej
2017-01-01
Modern perioperative care principles in elective colorectal surgery have already been established by international surgical authorities. Nevertheless, barriers to the introduction of routine evidence-based clinical care and changing dogmas still exist. One of the factors is the surgeon. To assess perioperative care trends in elective colorectal surgery among general surgery consultants in surgical departments in Malopolska Voivodeship, Poland. An anonymous standardized 20-question questionnaire was developed based on ERAS principles and sent out to Malopolska Voivodeship general surgery departments. Answers of general surgery consultants showed the level of acceptance of elements of perioperative care. The overall response rate was 66%. Several elements (antibiotic and antithrombotic prophylaxis, postoperative oxygen therapy, no nasogastric tubes) had quite a high acceptance rate. On the other hand, most crucial surgical perioperative elements (lack of mechanical bowel preparation, preoperative oral carbohydrate loading, use of laparoscopy and lack of drains, early fluid and oral diet intake, early mobilization) were not followed according to evidence-based ERAS protocol recommendations. Surgeons were not willing to change their practice, but were supportive of changes in anesthesiologist-dependent elements of perioperative care, such as restrictive fluid therapy, use of transversus abdominis plane blocks, etc. Many elements of perioperative care in elective colorectal surgery in Malopolska Voivodeship are still dictated by dogma and are not evidence-based. The level of acceptance of many important ERAS protocol elements is low. Surgeons are ready to accept only changes that do not interfere with their practice.
Nearest private query based on quantum oblivious key distribution
NASA Astrophysics Data System (ADS)
Xu, Min; Shi, Run-hua; Luo, Zhen-yu; Peng, Zhen-wan
2017-12-01
Nearest private query is a special private query which involves two parties, a user and a data owner, where the user has a private input (e.g., an integer) and the data owner has a private data set, and the user wants to query which element in the owner's private data set is the nearest to his input without revealing their respective private information. In this paper, we first present a quantum protocol for nearest private query, which is based on quantum oblivious key distribution (QOKD). Compared to the classical related protocols, our protocol has the advantages of the higher security and the better feasibility, so it has a better prospect of applications.
The clinical application of research utilization: amphotericin B.
Reedy, A M; Shivnan, J C; Hanson, J L; Haisfield, M E; Gregory, R E
1994-05-01
To describe the first application of the research utilization process by clinical nurses using the Stetler-Marram Model of Research Utilization to the practice of amphotericin B administration; to share the findings; and to discuss issues encountered in the process and their solutions. Published articles identified through computerized literature searches, published abstracts and books, personal communication with one author, and an informal survey of other cancer centers' amphotericin B infusion practices; research articles were selected for review if studies included settings and patient populations similar to those of the authors and if they used experimental designs. Studies were reviewed for scientific merit and clinical applicability according to the Stetler-Marram model; findings were used to develop a specific nursing protocol for infusion times of amphotericin B based on clinical criteria. The Stetler-Marram model helped staff nurses decide how to apply research findings to practice, although using it was difficult and required mentorship. A research base exists for amphotericin B administration time but not for test doses or premedications to prevent or minimize side effects. Staff nurses can use the Stetler-Marram model but need resources and support from individuals, committees, and administration. A specific protocol representing a practice change was implemented and may be applicable to other settings.
Developing the skills required for evidence-based practice.
French, B
1998-01-01
The current health care environment requires practitioners with the skills to find and apply the best currently available evidence for effective health care, to contribute to the development of evidence-based practice protocols, and to evaluate the impact of utilizing validated research findings in practice. Current approaches to teaching research are based mainly on gaining skills by participation in the research process. Emphasis on the requirement for rigour in the process of creating new knowledge is assumed to lead to skill in the process of using research information created by others. This article reflects upon the requirements for evidence-based practice, and the degree to which current approaches to teaching research prepare practitioners who are able to find, evaluate and best use currently available research information. The potential for using the principles of systematic review as a teaching and learning strategy for research is explored, and some of the possible strengths and weakness of this approach are highlighted.
Khan, Imtiaz A; Fraser, Adam; Bray, Mark-Anthony; Smith, Paul J; White, Nick S; Carpenter, Anne E; Errington, Rachel J
2014-12-01
Experimental reproducibility is fundamental to the progress of science. Irreproducible research decreases the efficiency of basic biological research and drug discovery and impedes experimental data reuse. A major contributing factor to irreproducibility is difficulty in interpreting complex experimental methodologies and designs from written text and in assessing variations among different experiments. Current bioinformatics initiatives either are focused on computational research reproducibility (i.e. data analysis) or laboratory information management systems. Here, we present a software tool, ProtocolNavigator, which addresses the largely overlooked challenges of interpretation and assessment. It provides a biologist-friendly open-source emulation-based tool for designing, documenting and reproducing biological experiments. ProtocolNavigator was implemented in Python 2.7, using the wx module to build the graphical user interface. It is a platform-independent software and freely available from http://protocolnavigator.org/index.html under the GPL v2 license. © The Author 2014. Published by Oxford University Press. All rights reserved. For Permissions, please e-mail: journals.permissions@oup.com.
Stilo, A; Parisi, S; Delia, S; Anastasi, F; Bruno, G; Laganà, P
2009-01-01
The birth of Hygiene Package and of the Reg. CE no 2073/2005 in the food production field signalled a change in Italy. This process started in Italy in 1997 with the legislative decree no 155 on Self-control but in reality, it was implemented in the UK in 1990 with the promulgation of the Food Safety Act. This legal act was influenced by some basic rules corresponding to the application of HACCP standards. Since 1990 the British chains of distribution (Retailers) have involved all aspects of the food line in this type of responsibility. Due to this growing awareness for a need for greater regulation, a protocol, edited by British Retail Consortium was created in 1998. This protocol acted as a "stamp" of approval for food products and it is now known as the BRC Global Food Standard. In July 2008, this protocol became effective in its fifth version. After the birth of BRC, also French and German Retailers have established a standard practically equivalent and perhaps more pertinent to safety food, that is International Food Standard (IFS). The new approach is specific to the food field and strictly applies criteria which will ensure "safety, quality and legality" of food products, similarly to ISO 22000:2005 (mainly based on BRC & IFS past experiences). New standards aim to create a sort of green list with fully "proper and fit" Suppliers only, because of comprehensible exigencies of Retailers. It is expected, as we have shown, that Auditor authorities who are responsible for ensuring that inspections are now carried out like the Hygiene Package, will find these new standards useful. The advantages of streamlining this system is that it will allow enterprises to diligently enforce food safety practices without fear of upset or legal consequence, to improve the quality (HACCP) of management & traceability system; to restrict wastes, reprocessing and withdrawal of products. However some discordances about the interpretation of certain sub-field norms (e.g., water management) are evident and should be carefully discussed once more.
Venous Access Devices: Clinical Rounds
Matey, Laurl; Camp-Sorrell, Dawn
2016-01-01
Nursing management of venous access devices (VADs) requires knowledge of current evidence, as well as knowledge of when evidence is limited. Do you know which practices we do based on evidence and those that we do based on institutional history or preference? This article will present complex VAD infection and occlusion complications and some of the controversies associated with them. Important strategies for identifying these complications, troubleshooting, and evaluating the evidence related to lack of blood return, malposition, infection, access and maintenance protocols, and scope of practice issues are presented. PMID:28083553
Steglitz, Jeremy; Sommers, Mary; Talen, Mary R; Thornton, Louise K; Spring, Bonnie
2015-07-01
Primary care clinicians are well-positioned to intervene in the obesity epidemic. We studied whether implementation of an obesity intake protocol and electronic health record (EHR) form to guide behavior modification would facilitate identification and management of adult obesity in a Federally Qualified Health Center serving low-income, Hispanic patients. In three studies, we examined clinician and patient outcomes before and after the addition of the weight management protocol and form. In the Clinician Study, 12 clinicians self-reported obesity management practices. In the Population Study, BMI and order data from 5000 patients and all 40 clinicians in the practice were extracted from the EHR preintervention and postintervention. In the Exposure Study, EHR-documented outcomes for a sub-sample of 46 patients actually exposed to the obesity management form were compared to matched controls. Clinicians reported that the intake protocol and form increased their performance of obesity-related assessments and their confidence in managing obesity. However, no improvement in obesity management practices or patient weight-loss was evident in EHR records for the overall clinic population. Further analysis revealed that only 55 patients were exposed to the form. Exposed patients were twice as likely to receive weight-loss counseling following the intervention, as compared to before, and more likely than matched controls. However, their obesity outcomes did not differ. Results suggest that an obesity intake protocol and EHR-based weight management form may facilitate clinician weight-loss counseling among those exposed to the form. Significant implementation barriers can limit exposure, however, and need to be addressed. © The Author 2015. Published by Oxford University Press on behalf of the American Medical Informatics Association. All rights reserved. For Permissions, please email: journals.permissions@oup.com.
Grant, Aileen; Dreischulte, Tobias; Treweek, Shaun; Guthrie, Bruce
2012-08-28
Trials of complex interventions are criticized for being 'black box', so the UK Medical Research Council recommends carrying out a process evaluation to explain the trial findings. We believe it is good practice to pre-specify and publish process evaluation protocols to set standards and minimize bias. Unlike protocols for trials, little guidance or standards exist for the reporting of process evaluations. This paper presents the mixed-method process evaluation protocol of a cluster randomized trial, drawing on a framework designed by the authors. This mixed-method evaluation is based on four research questions and maps data collection to a logic model of how the data-driven quality improvement in primary care (DQIP) intervention is expected to work. Data collection will be predominately by qualitative case studies in eight to ten of the trial practices, focus groups with patients affected by the intervention and quantitative analysis of routine practice data, trial outcome and questionnaire data and data from the DQIP intervention. We believe that pre-specifying the intentions of a process evaluation can help to minimize bias arising from potentially misleading post-hoc analysis. We recognize it is also important to retain flexibility to examine the unexpected and the unintended. From that perspective, a mixed-methods evaluation allows the combination of exploratory and flexible qualitative work, and more pre-specified quantitative analysis, with each method contributing to the design, implementation and interpretation of the other.As well as strengthening the study the authors hope to stimulate discussion among their academic colleagues about publishing protocols for evaluations of randomized trials of complex interventions. DATA-DRIVEN QUALITY IMPROVEMENT IN PRIMARY CARE TRIAL REGISTRATION: ClinicalTrials.gov: NCT01425502.
WE-E-304-01: SBRT Credentialing: Understanding the Process From Inquiry to Approval
DOE Office of Scientific and Technical Information (OSTI.GOV)
Followill, D.
SBRT is having a dramatic impact on radiation therapy of early-stage, locally advanced cancers. A number of national protocols have been and are being developed to assess the clinical efficacy of SBRT for various anatomical sites, such as lung and spine. Physics credentialing for participating and implementation of trial protocols involve a broad spectrum of requirements from image guidance, motion management, to planning technology and dosimetric constrains. For radiation facilities that do not have extensive experiences in SBRT treatment and protocol credentialing, these complex processes of credentialing and implementation could be very challenging and, sometimes, may lead to ineffective evenmore » unsuccessful execution of these processes. In this proposal, we will provide comprehensive review of some current SBRT protocols, explain the requirements and their underline rationales, illustrate representative failed and successful experiences, related to SBRT credentialing, and discuss strategies for effective SBRT credentialing and implementation. Learning Objectives: Understand requirements and challenges of SBRT credentailing and implentation Discuss processes and strategies of effective SBRT credentailing Discuss practical considerations, potential pitfalls and solutions of SBRT implentation.« less
Portable ultrasonography in mass casualty incidents: The CAVEAT examination.
Stawicki, Stanislaw Peter; Howard, James M; Pryor, John P; Bahner, David P; Whitmill, Melissa L; Dean, Anthony J
2010-11-18
Ultrasonography used by practicing clinicians has been shown to be of utility in the evaluation of time-sensitive and critical illnesses in a range of environments, including pre-hospital triage, emergency department, and critical care settings. The increasing availability of light-weight, robust, user-friendly, and low-cost portable ultrasound equipment is particularly suited for use in the physically and temporally challenging environment of a multiple casualty incident (MCI). Currently established ultrasound applications used to identify potentially lethal thoracic or abdominal conditions offer a base upon which rapid, focused protocols using hand-carried emergency ultrasonography could be developed. Following a detailed review of the current use of portable ultrasonography in military and civilian MCI settings, we propose a protocol for sonographic evaluation of the chest, abdomen, vena cava, and extremities for acute triage. The protocol is two-tiered, based on the urgency and technical difficulty of the sonographic examination. In addition to utilization of well-established bedside abdominal and thoracic sonography applications, this protocol incorporates extremity assessment for long-bone fractures. Studies of the proposed protocol will need to be conducted to determine its utility in simulated and actual MCI settings.
Tadokoro, Yuriko; Horiuchi, Shigeko; Takahata, Kaori; Shuo, Takuya; Sawano, Erika; Shinohara, Kazuyuki
2017-12-08
This pilot study using a quasi-experimental design was conducted to evaluate the feasibility (i.e., limited efficacy, practicality, and acceptability) of our intervention protocol involving inhalation of the scent of clary sage essential oil by pregnant women and measurement of their preinhalation and postinhalation oxytocin levels. Participants were women of singleton pregnancies between 38 and 40 gestation weeks (N = 11). The experiment group (n = 5) inhaled the scent of clary sage essential oil diluted 50-fold with 10 mL of odorless propylene glycol for 20 min. Regarding limited efficacy, the oxytocin level 15 min postinhalation increased in 3 women and was unmeasurable in 2. The control group (n = 6) inhaled similarly without the 50-fold dilution of clary sage essential oil. Their oxytocin level increased in 2 women, decreased in 2, and was unmeasurable in 2. Uterine contraction was not observed in both groups. Regarding practicality, 3 of the 11 women could not collect sufficient saliva. The cortisol level decreased in both groups postinhalation. The protocol had no negative effects. Regarding acceptability, burden of the protocol was not observed. Trial registration The Clinical Trials Registry of University Hospital Medical Information Network in Japan-UMIN000017830. Registered: June 8, 2015.
In-memory interconnect protocol configuration registers
DOE Office of Scientific and Technical Information (OSTI.GOV)
Cheng, Kevin Y.; Roberts, David A.
Systems, apparatuses, and methods for moving the interconnect protocol configuration registers into the main memory space of a node. The region of memory used for storing the interconnect protocol configuration registers may also be made cacheable to reduce the latency of accesses to the interconnect protocol configuration registers. Interconnect protocol configuration registers which are used during a startup routine may be prefetched into the host's cache to make the startup routine more efficient. The interconnect protocol configuration registers for various interconnect protocols may include one or more of device capability tables, memory-side statistics (e.g., to support two-level memory data mappingmore » decisions), advanced memory and interconnect features such as repair resources and routing tables, prefetching hints, error correcting code (ECC) bits, lists of device capabilities, set and store base address, capability, device ID, status, configuration, capabilities, and other settings.« less
Talaminos-Barroso, Alejandro; Estudillo-Valderrama, Miguel A; Roa, Laura M; Reina-Tosina, Javier; Ortega-Ruiz, Francisco
2016-06-01
M2M (Machine-to-Machine) communications represent one of the main pillars of the new paradigm of the Internet of Things (IoT), and is making possible new opportunities for the eHealth business. Nevertheless, the large number of M2M protocols currently available hinders the election of a suitable solution that satisfies the requirements that can demand eHealth applications. In the first place, to develop a tool that provides a benchmarking analysis in order to objectively select among the most relevant M2M protocols for eHealth solutions. In the second place, to validate the tool with a particular use case: the respiratory rehabilitation. A software tool, called Distributed Computing Framework (DFC), has been designed and developed to execute the benchmarking tests and facilitate the deployment in environments with a large number of machines, with independence of the protocol and performance metrics selected. DDS, MQTT, CoAP, JMS, AMQP and XMPP protocols were evaluated considering different specific performance metrics, including CPU usage, memory usage, bandwidth consumption, latency and jitter. The results obtained allowed to validate a case of use: respiratory rehabilitation of chronic obstructive pulmonary disease (COPD) patients in two scenarios with different types of requirement: Home-Based and Ambulatory. The results of the benchmark comparison can guide eHealth developers in the choice of M2M technologies. In this regard, the framework presented is a simple and powerful tool for the deployment of benchmark tests under specific environments and conditions. Copyright © 2016 Elsevier Ireland Ltd. All rights reserved.
Emulation Platform for Cyber Analysis of Wireless Communication Network Protocols
DOE Office of Scientific and Technical Information (OSTI.GOV)
Van Leeuwen, Brian P.; Eldridge, John M.
Wireless networking and mobile communications is increasing around the world and in all sectors of our lives. With increasing use, the density and complexity of the systems increase with more base stations and advanced protocols to enable higher data throughputs. The security of data transported over wireless networks must also evolve with the advances in technologies enabling more capable wireless networks. However, means for analysis of the effectiveness of security approaches and implementations used on wireless networks are lacking. More specifically a capability to analyze the lower-layer protocols (i.e., Link and Physical layers) is a major challenge. An analysis approachmore » that incorporates protocol implementations without the need for RF emissions is necessary. In this research paper several emulation tools and custom extensions that enable an analysis platform to perform cyber security analysis of lower layer wireless networks is presented. A use case of a published exploit in the 802.11 (i.e., WiFi) protocol family is provided to demonstrate the effectiveness of the described emulation platform.« less
Toward an interim standard for patient-centered knowledge-access.
Tuttle, M. S.; Sherertz, D. D.; Fagan, L. M.; Carlson, R. W.; Cole, W. G.; Schipma, P. B.; Nelson, S. J.
1993-01-01
Most care-giver "knowledge" needs arise at the point of care and are "patient-centered." Many of these knowledge needs can be met using existing on-line knowledge sources, but the process is too time-consuming, currently, for even the computer-proficient. We are developing a set of public domain standards aimed at bringing potentially relevant knowledge to the point of care in a straight-forward and timely fashion. The standards will a) make use of selected items from a Computer-based Patient Record (CPR), e.g., a diagnosis and measure of severity, b) anticipate certain care-giver knowledge needs, e.g., "therapy," "protocols," "complications," and c) try to satisfy those needs from available knowledge sources, e.g., knowledge-bases, citation databases, practice guidelines, and on-line textbooks. The standards will use templates, i.e., fill-in-the-blank structures, to anticipate knowledge needs and UMLS Metathesaurus enhancements to represent the content of knowledge sources. Together, the standards will form the specification for a "Knowledge-Server" (KS) designed to be accessed from any CPR system. Plans are in place to test an interim version of this specification in the context of medical oncology. We are accumulating anecdotal evidence that a KS operating in conjunction with a CPR is much more compelling to users than either a CPR or a KS operating alone. PMID:8130537
Research-Based Implementation of Peer Instruction: A Literature Review
Vickrey, Trisha; Rosploch, Kaitlyn; Rahmanian, Reihaneh; Pilarz, Matthew; Stains, Marilyne
2015-01-01
Current instructional reforms in undergraduate science, technology, engineering, and mathematics (STEM) courses have focused on enhancing adoption of evidence-based instructional practices among STEM faculty members. These practices have been empirically demonstrated to enhance student learning and attitudes. However, research indicates that instructors often adapt rather than adopt practices, unknowingly compromising their effectiveness. Thus, there is a need to raise awareness of the research-based implementation of these practices, develop fidelity of implementation protocols to understand adaptations being made, and ultimately characterize the true impact of reform efforts based on these practices. Peer instruction (PI) is an example of an evidence-based instructional practice that consists of asking students conceptual questions during class time and collecting their answers via clickers or response cards. Extensive research has been conducted by physics and biology education researchers to evaluate the effectiveness of this practice and to better understand the intricacies of its implementation. PI has also been investigated in other disciplines, such as chemistry and computer science. This article reviews and summarizes these various bodies of research and provides instructors and researchers with a research-based model for the effective implementation of PI. Limitations of current studies and recommendations for future empirical inquiries are also provided. PMID:25713095
Magee, Michelle F
2007-05-15
Evolving elements of best practices for providing targeted glycemic control in the hospital setting, clinical performance measurement, basal-bolus plus correction-dose insulin regimens, components of standardized subcutaneous (s.c.) insulin order sets, and strategies for implementation and cost justification of glycemic control initiatives are discussed. Best practices for targeted glycemic control should address accurate documentation of hyperglycemia, initial patient assessment, management plan, target blood glucose range, blood glucose monitoring frequency, maintenance of glycemic control, criteria for glucose management consultations, and standardized insulin order sets and protocols. Establishing clinical performance measures, including desirable processes and outcomes, can help ensure the success of targeted hospital glycemic control initiatives. The basal-bolus plus correction-dose regimen for insulin administration will be used to mimic the normal physiologic pattern of endogenous insulin secretion. Standardized insulin order sets and protocols are being used to minimize the risk of error in insulin therapy. Components of standardized s.c. insulin order sets include specification of the hyperglycemia diagnosis, finger stick blood glucose monitoring frequency and timing, target blood glucose concentration range, cutoff values for excessively high or low blood glucose concentrations that warrant alerting the physician, basal and prandial or nutritional (i.e., bolus) insulin, correction doses, hypoglycemia treatment, and perioperative or procedural dosage adjustments. The endorsement of hospital administrators and key physician and nursing leaders is needed for glycemic control initiatives. Initiatives may be cost justified on the basis of the billings for clinical diabetes management services and/or the return- on-investment accrued to reductions in hospital length of stay, readmissions, and accurate documentation and coding of unrecognized or uncontrolled diabetes, and diabetes complications. Standardized insulin order sets and protocols may minimize risk of insulin errors. The endorsement of these protocols by administrators, physicians, nurses, and pharmacists is also needed for success.
Yourkavitch, Jennifer; Zalisk, Kirsten; Prosnitz, Debra; Luhanga, Misheck; Nsona, Humphreys
2016-11-01
The World Health Organization contracted annual data quality assessments of Rapid Access Expansion (RAcE) projects to review integrated community case management (iCCM) data quality and the monitoring and evaluation (M&E) system for iCCM, and to suggest ways to improve data quality. The first RAcE data quality assessment was conducted in Malawi in January 2014 and we present findings pertaining to data from the health management information system at the community, facility and other sub-national levels because RAcE grantees rely on that for most of their monitoring data. We randomly selected 10 health facilities (10% of eligible facilities) from the four RAcE project districts, and collected quantitative data with an adapted and comprehensive tool that included an assessment of Malawi's M&E system for iCCM data and a data verification exercise that traced selected indicators through the reporting system. We rated the iCCM M&E system across five function areas based on interviews and observations, and calculated verification ratios for each data reporting level. We also conducted key informant interviews with Health Surveillance Assistants and facility, district and central Ministry of Health staff. Scores show a high-functioning M&E system for iCCM with some deficiencies in data management processes. The system lacks quality controls, including data entry verification, a protocol for addressing errors, and written procedures for data collection, entry, analysis and management. Data availability was generally high except for supervision data. The data verification process identified gaps in completeness and consistency, particularly in Health Surveillance Assistants' record keeping. Staff at all levels would like more training in data management. This data quality assessment illuminates where an otherwise strong M&E system for iCCM fails to ensure some aspects of data quality. Prioritizing data management with documented protocols, additional training and approaches to create efficient supervision practices may improve iCCM data quality. © The Author 2016. Published by Oxford University Press in association with The London School of Hygiene and Tropical Medicine. All rights reserved. For permissions, please e-mail: journals.permissions@oup.com.
External evaluation of the Dimension Vista 1500® intelligent lab system.
Bruneel, Arnaud; Dehoux, Monique; Barnier, Anne; Boutten, Anne
2012-09-01
Dimension Vista® analyzer combines four technologies (photometry, nephelometry, V-LYTE® integrated multisensor potentiometry, and LOCI® chemiluminescence) into one high-throughput system. We assessed analytical performance of assays routinely performed in our emergency laboratory according to the VALTEC protocol, and practicability. Precision was good for most parameters. Analytical domain was large and suitable for undiluted analysis in most clinical settings encountered in our hospital. Data were comparable and correlated to our routine analyzers (Roche Modular DP®, Abbott AXSYM®, Siemens Dimension® RxL, and BN ProSpec®). Performance of nephelometric and LOCI modules was excellent. Functional sensitivity of high-sensitivity C-reactive protein and cardiac troponin I were 0.165 mg/l and 0.03 ng/ml, respectively (coefficient of variation; CV < 10%). The influence of interfering substances (i.e., hemoglobin, bilirubin, or lipids) was moderate, and Dimension Vista® specifically alerted for interference according to HIL (hemolysis, icterus, lipemia) indices. Good instrument performance and full functionality (no reagent or sample carryover in the conditions evaluated, effective sample-volume detection, and clot detection) were confirmed. Simulated routine testing demonstrated excellent practicability, throughput, ease of use of software and security. Performance and practicability of Dimension Vista® are highly suitable for both routine and emergency use. Since no volume detection and thus no warning is available on limited sample racks, pediatric samples require special caution to the Siemens protocol to be analyzed in secured conditions. Our experience in routine practice is also discussed, i.e., the impact of daily workload, "manual" steps resulting from dilutions and pediatric samples, maintenances, flex hydration on instrument's performance on throughput and turnaround time. © 2012 Wiley Periodicals, Inc.
A secure RFID authentication protocol for healthcare environments using elliptic curve cryptosystem.
Zhao, Zhenguo
2014-05-01
With the fast advancement of the wireless communication technology and the widespread use of medical systems, the radio frequency identification (RFID) technology has been widely used in healthcare environments. As the first important protocol for ensuring secure communication in healthcare environment, the RFID authentication protocols derive more and more attentions. Most of RFID authentication protocols are based on hash function or symmetric cryptography. To get more security properties, elliptic curve cryptosystem (ECC) has been used in the design of RFID authentication protocol. Recently, Liao and Hsiao proposed a new RFID authentication protocol using ECC and claimed their protocol could withstand various attacks. In this paper, we will show that their protocol suffers from the key compromise problem, i.e. an adversary could get the private key stored in the tag. To enhance the security, we propose a new RFID authentication protocol using ECC. Detailed analysis shows the proposed protocol not only could overcome weaknesses in Liao and Hsiao's protocol but also has the same performance. Therefore, it is more suitable for healthcare environments.
Experimental study on all-fiber-based unidimensional continuous-variable quantum key distribution
NASA Astrophysics Data System (ADS)
Wang, Xuyang; Liu, Wenyuan; Wang, Pu; Li, Yongmin
2017-06-01
We experimentally demonstrated an all-fiber-based unidimensional continuous-variable quantum key distribution (CV QKD) protocol and analyzed its security under collective attack in realistic conditions. A pulsed balanced homodyne detector, which could not be accessed by eavesdroppers, with phase-insensitive efficiency and electronic noise, was considered. Furthermore, a modulation method and an improved relative phase-locking technique with one amplitude modulator and one phase modulator were designed. The relative phase could be locked precisely with a standard deviation of 0.5° and a mean of almost zero. Secret key bit rates of 5.4 kbps and 700 bps were achieved for transmission fiber lengths of 30 and 50 km, respectively. The protocol, which simplified the CV QKD system and reduced the cost, displayed a performance comparable to that of a symmetrical counterpart under realistic conditions. It is expected that the developed protocol can facilitate the practical application of the CV QKD.
MO-E-18A-01: Imaging: Best Practices In Pediatric Imaging
DOE Office of Scientific and Technical Information (OSTI.GOV)
Willis, C; Strauss, K; MacDougall, R
This imaging educational program will focus on solutions to common pediatric imaging challenges. The speakers will present collective knowledge on best practices in pediatric imaging from their experience at dedicated children's hospitals. Areas of focus will include general radiography, the use of manual and automatic dose management in computed tomography, and enterprise-wide radiation dose management in the pediatric practice. The educational program will begin with a discussion of the complexities of exposure factor control in pediatric projection radiography. Following this introduction will be two lectures addressing the challenges of computed tomography (CT) protocol optimization in the pediatric population. The firstmore » will address manual CT protocol design in order to establish a managed radiation dose for any pediatric exam on any CT scanner. The second CT lecture will focus on the intricacies of automatic dose modulation in pediatric imaging with an emphasis on getting reliable results in algorithmbased technique selection. The fourth and final lecture will address the key elements needed to developing a comprehensive radiation dose management program for the pediatric environment with particular attention paid to new regulations and obligations of practicing medical physicists. Learning Objectives: To understand how general radiographic techniques can be optimized using exposure indices in order to improve pediatric radiography. To learn how to establish diagnostic dose reference levels for pediatric patients as a function of the type of examination, patient size, and individual design characteristics of the CT scanner. To learn how to predict the patient's radiation dose prior to the exam and manually adjust technique factors if necessary to match the patient's dose to the department's established dose reference levels. To learn how to utilize manufacturer-provided automatic dose modulation technology to consistently achieve patient doses within the department's established size-based diagnostic reference range. To understand the key components of an enterprise-wide pediatric dose management program that integrates the expanding responsibilities of medial physicists in the new era of dose monitoring.« less
DOE Office of Scientific and Technical Information (OSTI.GOV)
Hood, F.C.
1992-05-01
Quality assurance and quality control (QA/QC) of analytical chemistry laboratory activities are essential to the validity and usefulness of resultant data. However, in themselves, conventional QA/QC measures will not always ensure that fraudulent data are not generated. Conventional QA/QC measures are based on the assumption that work will be done in good faith; to assure against fraudulent practices, QA/QC measures must be tailored to specific analyses protocols in anticipation of intentional misapplication of those protocols. Application of specific QA/QC measures to ensure against fraudulent practices result in an increased administrative burden being placed on the analytical process; accordingly, in keepingmore » with graded QA philosophy, data quality objectives must be used to identify specific points of concern for special control to minimize the administrative impact.« less
QA/QC in the laboratory. Session F
DOE Office of Scientific and Technical Information (OSTI.GOV)
Hood, F.C.
1992-05-01
Quality assurance and quality control (QA/QC) of analytical chemistry laboratory activities are essential to the validity and usefulness of resultant data. However, in themselves, conventional QA/QC measures will not always ensure that fraudulent data are not generated. Conventional QA/QC measures are based on the assumption that work will be done in good faith; to assure against fraudulent practices, QA/QC measures must be tailored to specific analyses protocols in anticipation of intentional misapplication of those protocols. Application of specific QA/QC measures to ensure against fraudulent practices result in an increased administrative burden being placed on the analytical process; accordingly, in keepingmore » with graded QA philosophy, data quality objectives must be used to identify specific points of concern for special control to minimize the administrative impact.« less
Publication trends of study protocols in rehabilitation.
Jesus, Tiago S; Colquhoun, Heather L
2017-09-04
Growing evidence points for the need to publish study protocols in the health field. To observe whether the growing interest in publishing study protocols in the broader health field has been translated into increased publications of rehabilitation study protocols. Observational study using publication data and its indexation in PubMed. Not applicable. Not applicable. PubMed was searched with appropriate combinations of Medical Subject Headings up to December 2014. The effective presence of study protocols was manually screened. Regression models analyzed the yearly growth of publications. Two-sample Z-tests analyzed whether the proportion of Systematic Reviews (SRs) and Randomized Controlled Trials (RCTs) among study protocols differed from that of the same designs for the broader rehabilitation research. Up to December 2014, 746 publications of rehabilitation study protocols were identified, with an exponential growth since 2005 (r2=0.981; p<0.001). RCT protocols were the most common among rehabilitation study protocols (83%), while RCTs were significantly more prevalent among study protocols than among the broader rehabilitation research (83% vs. 35.8%; p<0.001). For SRs, the picture was reversed: significantly less common among study protocols (2.8% vs. 9.3%; p<0.001). Funding was more often reported by rehabilitation study protocols than the broader rehabilitation research (90% vs. 53.1%; p<0.001). Rehabilitation journals published a significantly lower share of rehabilitation study protocols than they did for the broader rehabilitation research (1.8% vs.16.7%; p<0.001). Identifying the reasons for these discrepancies and reverting unwarranted disparities (e.g. low rate of publication for rehabilitation SR protocols) are likely new avenues for rehabilitation research and its publication. SRs, particularly those aggregating RCT results, are considered the best standard of evidence to guide rehabilitation clinical practice; however, that standard can be improved in rigor and/or transparency if the publications of rehabilitation SRs protocols become more common.
A Protocol for Advanced Psychometric Assessment of Surveys
Squires, Janet E.; Hayduk, Leslie; Hutchinson, Alison M.; Cranley, Lisa A.; Gierl, Mark; Cummings, Greta G.; Norton, Peter G.; Estabrooks, Carole A.
2013-01-01
Background and Purpose. In this paper, we present a protocol for advanced psychometric assessments of surveys based on the Standards for Educational and Psychological Testing. We use the Alberta Context Tool (ACT) as an exemplar survey to which this protocol can be applied. Methods. Data mapping, acceptability, reliability, and validity are addressed. Acceptability is assessed with missing data frequencies and the time required to complete the survey. Reliability is assessed with internal consistency coefficients and information functions. A unitary approach to validity consisting of accumulating evidence based on instrument content, response processes, internal structure, and relations to other variables is taken. We also address assessing performance of survey data when aggregated to higher levels (e.g., nursing unit). Discussion. In this paper we present a protocol for advanced psychometric assessment of survey data using the Alberta Context Tool (ACT) as an exemplar survey; application of the protocol to the ACT survey is underway. Psychometric assessment of any survey is essential to obtaining reliable and valid research findings. This protocol can be adapted for use with any nursing survey. PMID:23401759
Simpson, Sharon A; Butler, Christopher C; Hood, Kerry; Cohen, David; Dunstan, Frank; Evans, Meirion R; Rollnick, Stephen; Moore, Laurence; Hare, Monika; Bekkers, Marie-Jet; Evans, John
2009-01-01
Background After some years of a downward trend, antibiotic prescribing rates in the community have tended to level out in many countries. There is also wide variation in antibiotic prescribing between general practices, and between countries. There are still considerable further gains that could be made in reducing inappropriate antibiotic prescribing, but complex interventions are required. Studies to date have generally evaluated the effect of interventions on antibiotic prescribing in a single consultation and pragmatic evaluations that assess maintenance of new skills are rare. This paper describes the protocol for a pragmatic, randomized evaluation of a complex intervention aimed at reducing antibiotic prescribing by primary care clinicians. Methods and design We developed a Social Learning Theory based, blended learning program (on-line learning, a practice based seminar, and context bound learning) called the STAR Educational Program. The 'why of change' is addressed by providing clinicians in general practice with information on antibiotic resistance in urine samples submitted by their practice and their antibiotic prescribing data, and facilitating a practice-based seminar on the implications of this data. The 'how of change' is addressed through context-bound communication skills training and information on antibiotic indication and choice. This intervention will be evaluated in a trial involving 60 general practices, with general practice as the unit of randomization (clinicians from each practice to either receive the STAR Educational Program or not) and analysis. The primary outcome will be the number of antibiotic items dispensed over one year. An economic and process evaluation will also be conducted. Discussion This trial will be the first to evaluate the effectiveness of this type of theory-based, blended learning intervention aimed at reducing antibiotic prescribing by primary care clinicians. Novel aspects include feedback of practice level data on antimicrobial resistance and prescribing, use of principles from motivational interviewing, training in enhanced communication skills that incorporates context-bound experience and reflection, and using antibiotic dispensing over one year (as opposed to antibiotic prescribing in a single consultation) as the main outcome. Trial registration Current Controlled Trials ISRCTN63355948. PMID:19309493
Simpson, Sharon A; Butler, Christopher C; Hood, Kerry; Cohen, David; Dunstan, Frank; Evans, Meirion R; Rollnick, Stephen; Moore, Laurence; Hare, Monika; Bekkers, Marie-Jet; Evans, John
2009-03-23
After some years of a downward trend, antibiotic prescribing rates in the community have tended to level out in many countries. There is also wide variation in antibiotic prescribing between general practices, and between countries. There are still considerable further gains that could be made in reducing inappropriate antibiotic prescribing, but complex interventions are required. Studies to date have generally evaluated the effect of interventions on antibiotic prescribing in a single consultation and pragmatic evaluations that assess maintenance of new skills are rare. This paper describes the protocol for a pragmatic, randomized evaluation of a complex intervention aimed at reducing antibiotic prescribing by primary care clinicians. We developed a Social Learning Theory based, blended learning program (on-line learning, a practice based seminar, and context bound learning) called the STAR Educational Program. The 'why of change' is addressed by providing clinicians in general practice with information on antibiotic resistance in urine samples submitted by their practice and their antibiotic prescribing data, and facilitating a practice-based seminar on the implications of this data. The 'how of change' is addressed through context-bound communication skills training and information on antibiotic indication and choice. This intervention will be evaluated in a trial involving 60 general practices, with general practice as the unit of randomization (clinicians from each practice to either receive the STAR Educational Program or not) and analysis. The primary outcome will be the number of antibiotic items dispensed over one year. An economic and process evaluation will also be conducted. This trial will be the first to evaluate the effectiveness of this type of theory-based, blended learning intervention aimed at reducing antibiotic prescribing by primary care clinicians. Novel aspects include feedback of practice level data on antimicrobial resistance and prescribing, use of principles from motivational interviewing, training in enhanced communication skills that incorporates context-bound experience and reflection, and using antibiotic dispensing over one year (as opposed to antibiotic prescribing in a single consultation) as the main outcome. Current Controlled Trials ISRCTN63355948.
A decentralized software bus based on IP multicas ting
NASA Technical Reports Server (NTRS)
Callahan, John R.; Montgomery, Todd
1995-01-01
We describe decentralized reconfigurable implementation of a conference management system based on the low-level Internet Protocol (IP) multicasting protocol. IP multicasting allows low-cost, world-wide, two-way transmission of data between large numbers of conferencing participants through the Multicasting Backbone (MBone). Each conference is structured as a software bus -- a messaging system that provides a run-time interconnection model that acts as a separate agent (i.e., the bus) for routing, queuing, and delivering messages between distributed programs. Unlike the client-server interconnection model, the software bus model provides a level of indirection that enhances the flexibility and reconfigurability of a distributed system. Current software bus implementations like POLYLITH, however, rely on a centralized bus process and point-to-point protocols (i.e., TCP/IP) to route, queue, and deliver messages. We implement a software bus called the MULTIBUS that relies on a separate process only for routing and uses a reliable IP multicasting protocol for delivery of messages. The use of multicasting means that interconnections are independent of IP machine addresses. This approach allows reconfiguration of bus participants during system execution without notifying other participants of new IP addresses. The use of IP multicasting also permits an economy of scale in the number of participants. We describe the MULITIBUS protocol elements and show how our implementation performs better than centralized bus implementations.
Practical State Machine Replication with Confidentiality
DOE Office of Scientific and Technical Information (OSTI.GOV)
Duan, Sisi; Zhang, Haibin
2016-01-01
We study how to enable arbitrary randomized algorithms in Byzantine fault-tolerant (BFT) settings. We formalize a randomized BFT protocol and provide a simple and efficient construction that can be built on any existing BFT protocols while adding practically no overhead. We go one step further to revisit a confidential BFT protocol (Yin et al., SOSP '03). We show that their scheme is potentially susceptible to safety and confidentiality attacks. We then present a new protocol that is secure in the stronger model we formalize, by extending the idea of a randomized BFT protocol. Our protocol uses only efficient symmetric cryptography,more » while Yin et al.'s uses costly threshold signatures. We implemented and evaluated our protocols on microbenchmarks and real-world use cases. We show that our randomized BFT protocol is as efficient as conventional BFT protocols, and our confidential BFT protocol is two to three orders of magnitude faster than Yin et al.'s, which is less secure than ours.« less
2010-01-01
Background The Joint Asia Diabetes Evaluation (JADE) Program is a web-based program incorporating a comprehensive risk engine, care protocols, and clinical decision support to improve ambulatory diabetes care. Methods The JADE Program uses information technology to facilitate healthcare professionals to create a diabetes registry and to deliver an evidence-based care and education protocol tailored to patients' risk profiles. With written informed consent from participating patients and care providers, all data are anonymized and stored in a databank to establish an Asian Diabetes Database for research and publication purpose. Results The JADE electronic portal (e-portal: http://www.jade-adf.org) is implemented as a Java application using the Apache web server, the mySQL database and the Cocoon framework. The JADE e-portal comprises a risk engine which predicts 5-year probability of major clinical events based on parameters collected during an annual comprehensive assessment. Based on this risk stratification, the JADE e-portal recommends a care protocol tailored to these risk levels with decision support triggered by various risk factors. Apart from establishing a registry for quality assurance and data tracking, the JADE e-portal also displays trends of risk factor control at each visit to promote doctor-patient dialogues and to empower both parties to make informed decisions. Conclusions The JADE Program is a prototype using information technology to facilitate implementation of a comprehensive care model, as recommended by the International Diabetes Federation. It also enables health care teams to record, manage, track and analyze the clinical course and outcomes of people with diabetes. PMID:20465815
DOE Office of Scientific and Technical Information (OSTI.GOV)
Lee, Juhui; School of Computatioal Sciences, Korea Institute for Advanced Study, Seoul 130-722; Lee, Soojoon
Extending the eavesdropping strategy devised by Zhang, Li, and Guo [Zhang, Li, and Guo, Phys. Rev. A 63, 036301 (2001)], we show that the multiparty quantum communication protocol based on entanglement swapping, which was proposed by Cabello (e-print quant-ph/0009025), is not secure. We modify the protocol so that entanglement swapping can secure multiparty quantum communication, such as multiparty quantum key distribution and quantum secret sharing of classical information, and show that the modified protocol is secure against the Zhang-Li-Guo strategy for eavesdropping as well as the basic intercept-resend attack.0.
Privacy Preserving Quantum Anonymous Transmission via Entanglement Relay
NASA Astrophysics Data System (ADS)
Yang, Wei; Huang, Liusheng; Song, Fang
2016-06-01
Anonymous transmission is an interesting and crucial issue in computer communication area, which plays a supplementary role to data privacy. In this paper, we put forward a privacy preserving quantum anonymous transmission protocol based on entanglement relay, which constructs anonymous entanglement from EPR pairs instead of multi-particle entangled state, e.g. GHZ state. Our protocol achieves both sender anonymity and receiver anonymity against an active adversary and tolerates any number of corrupt participants. Meanwhile, our protocol obtains an improvement in efficiency compared to quantum schemes in previous literature.
The covert channel over HTTP protocol
NASA Astrophysics Data System (ADS)
Graniszewski, Waldemar; Krupski, Jacek; Szczypiorski, Krzysztof
2016-09-01
The paper presents a new steganographic method - the covert channel is created over HTTP protocol header, i.e. trailer field. HTTP protocol is one of the most frequently used in the Internet. The popularity of the Web servers and network traffic from, and to them, is one of the requirements for undetectable message exchange. To study this kind of the information hiding technique an application in Javascript language based on the Node.js framework was written. The results of the experiment that was performed to send a message in the covert channel are also presented.
Privacy Preserving Quantum Anonymous Transmission via Entanglement Relay.
Yang, Wei; Huang, Liusheng; Song, Fang
2016-06-01
Anonymous transmission is an interesting and crucial issue in computer communication area, which plays a supplementary role to data privacy. In this paper, we put forward a privacy preserving quantum anonymous transmission protocol based on entanglement relay, which constructs anonymous entanglement from EPR pairs instead of multi-particle entangled state, e.g. GHZ state. Our protocol achieves both sender anonymity and receiver anonymity against an active adversary and tolerates any number of corrupt participants. Meanwhile, our protocol obtains an improvement in efficiency compared to quantum schemes in previous literature.
Privacy Preserving Quantum Anonymous Transmission via Entanglement Relay
Yang, Wei; Huang, Liusheng; Song, Fang
2016-01-01
Anonymous transmission is an interesting and crucial issue in computer communication area, which plays a supplementary role to data privacy. In this paper, we put forward a privacy preserving quantum anonymous transmission protocol based on entanglement relay, which constructs anonymous entanglement from EPR pairs instead of multi-particle entangled state, e.g. GHZ state. Our protocol achieves both sender anonymity and receiver anonymity against an active adversary and tolerates any number of corrupt participants. Meanwhile, our protocol obtains an improvement in efficiency compared to quantum schemes in previous literature. PMID:27247078
Barbé, Silvia; Bertolini, Edson; Roselló, Montserrat; Llop, Pablo
2014-01-01
Erwinia piriflorinigrans is a new pathogenic species of the bacterial genus Erwinia that has been described recently in Spain. Accurate detection and identification of E. piriflorinigrans are challenging because its symptoms on pear blossoms are similar to those caused by Erwinia amylovora, the causal agent of fire blight. Moreover, these two species share phenotypic and molecular characteristics. Two specific and sensitive conventional and real-time PCR protocols were developed to identify and detect E. piriflorinigrans and to differentiate it from E. amylovora and other species of this genus. These protocols were based on sequences from plasmid pEPIR37, which is present in all strains of E. piriflorinigrans analyzed. After the stability of the plasmid was demonstrated, the specificities of the protocols were confirmed by the amplification of all E. piriflorinigrans strains tested, whereas 304 closely related pathogenic and nonpathogenic Erwinia strains and microbiota from pear trees were not amplified. In sensitivity assays, 103 cells/ml extract were detected in spiked plant material by conventional or real-time PCR, and 102 cells/ml were detected in DNA extracted from spiked plant material by real-time PCR. The protocols developed here succeeded in detecting E. piriflorinigrans in 102 out of 564 symptomatic and asymptomatic naturally infected pear samples (flowers, cortex stem tissue, leaves, shoots, and fruitlets), in necrotic Pyracantha sp. blossoms, and in necrotic pear and apple tissues infected with both E. amylovora and E. piriflorinigrans. Therefore, these new tools can be used in epidemiological studies that will enhance our understanding of the life cycle of E. piriflorinigrans in different hosts and plant tissues and its interaction with E. amylovora. PMID:24509928
Barbé, Silvia; Bertolini, Edson; Roselló, Montserrat; Llop, Pablo; López, María M
2014-04-01
Erwinia piriflorinigrans is a new pathogenic species of the bacterial genus Erwinia that has been described recently in Spain. Accurate detection and identification of E. piriflorinigrans are challenging because its symptoms on pear blossoms are similar to those caused by Erwinia amylovora, the causal agent of fire blight. Moreover, these two species share phenotypic and molecular characteristics. Two specific and sensitive conventional and real-time PCR protocols were developed to identify and detect E. piriflorinigrans and to differentiate it from E. amylovora and other species of this genus. These protocols were based on sequences from plasmid pEPIR37, which is present in all strains of E. piriflorinigrans analyzed. After the stability of the plasmid was demonstrated, the specificities of the protocols were confirmed by the amplification of all E. piriflorinigrans strains tested, whereas 304 closely related pathogenic and nonpathogenic Erwinia strains and microbiota from pear trees were not amplified. In sensitivity assays, 10(3) cells/ml extract were detected in spiked plant material by conventional or real-time PCR, and 10(2) cells/ml were detected in DNA extracted from spiked plant material by real-time PCR. The protocols developed here succeeded in detecting E. piriflorinigrans in 102 out of 564 symptomatic and asymptomatic naturally infected pear samples (flowers, cortex stem tissue, leaves, shoots, and fruitlets), in necrotic Pyracantha sp. blossoms, and in necrotic pear and apple tissues infected with both E. amylovora and E. piriflorinigrans. Therefore, these new tools can be used in epidemiological studies that will enhance our understanding of the life cycle of E. piriflorinigrans in different hosts and plant tissues and its interaction with E. amylovora.
NASA Astrophysics Data System (ADS)
Pavičić, Mladen
2013-04-01
We show that in any quantum direct communication protocol that is based on Ψ and Φ Bell states, an eavesdropper can always tell Ψ from Φ states without altering the transmission in any way in the message mode. This renders all protocols that make use of only one Ψ state and one Φ state completely insecure in the message mode. All four-Bell-state protocols require a revision and this might be of importance for new implementations of entanglement-based cryptographic protocols. The detection rate of an eavesdropper is 25% per control transmission, i.e., a half of the rate in the two-state (ping-pong) protocol. An eavesdropper can detect control probes with certainty in the standard control transmission without a photon in the Alice-to-Bob's travel mode and with near certainty in a transmission with a fake photon in the travel mode. Resending of measured control photons via the travel mode would make an eavesdropper completely invisible.
Saleem, Kashif; Derhab, Abdelouahid; Orgun, Mehmet A; Al-Muhtadi, Jalal; Rodrigues, Joel J P C; Khalil, Mohammed Sayim; Ali Ahmed, Adel
2016-03-31
The deployment of intelligent remote surveillance systems depends on wireless sensor networks (WSNs) composed of various miniature resource-constrained wireless sensor nodes. The development of routing protocols for WSNs is a major challenge because of their severe resource constraints, ad hoc topology and dynamic nature. Among those proposed routing protocols, the biology-inspired self-organized secure autonomous routing protocol (BIOSARP) involves an artificial immune system (AIS) that requires a certain amount of time to build up knowledge of neighboring nodes. The AIS algorithm uses this knowledge to distinguish between self and non-self neighboring nodes. The knowledge-building phase is a critical period in the WSN lifespan and requires active security measures. This paper proposes an enhanced BIOSARP (E-BIOSARP) that incorporates a random key encryption mechanism in a cost-effective manner to provide active security measures in WSNs. A detailed description of E-BIOSARP is presented, followed by an extensive security and performance analysis to demonstrate its efficiency. A scenario with E-BIOSARP is implemented in network simulator 2 (ns-2) and is populated with malicious nodes for analysis. Furthermore, E-BIOSARP is compared with state-of-the-art secure routing protocols in terms of processing time, delivery ratio, energy consumption, and packet overhead. The findings show that the proposed mechanism can efficiently protect WSNs from selective forwarding, brute-force or exhaustive key search, spoofing, eavesdropping, replaying or altering of routing information, cloning, acknowledgment spoofing, HELLO flood attacks, and Sybil attacks.
Saleem, Kashif; Derhab, Abdelouahid; Orgun, Mehmet A.; Al-Muhtadi, Jalal; Rodrigues, Joel J. P. C.; Khalil, Mohammed Sayim; Ali Ahmed, Adel
2016-01-01
The deployment of intelligent remote surveillance systems depends on wireless sensor networks (WSNs) composed of various miniature resource-constrained wireless sensor nodes. The development of routing protocols for WSNs is a major challenge because of their severe resource constraints, ad hoc topology and dynamic nature. Among those proposed routing protocols, the biology-inspired self-organized secure autonomous routing protocol (BIOSARP) involves an artificial immune system (AIS) that requires a certain amount of time to build up knowledge of neighboring nodes. The AIS algorithm uses this knowledge to distinguish between self and non-self neighboring nodes. The knowledge-building phase is a critical period in the WSN lifespan and requires active security measures. This paper proposes an enhanced BIOSARP (E-BIOSARP) that incorporates a random key encryption mechanism in a cost-effective manner to provide active security measures in WSNs. A detailed description of E-BIOSARP is presented, followed by an extensive security and performance analysis to demonstrate its efficiency. A scenario with E-BIOSARP is implemented in network simulator 2 (ns-2) and is populated with malicious nodes for analysis. Furthermore, E-BIOSARP is compared with state-of-the-art secure routing protocols in terms of processing time, delivery ratio, energy consumption, and packet overhead. The findings show that the proposed mechanism can efficiently protect WSNs from selective forwarding, brute-force or exhaustive key search, spoofing, eavesdropping, replaying or altering of routing information, cloning, acknowledgment spoofing, HELLO flood attacks, and Sybil attacks. PMID:27043572
Refining MARGINS Mini-Lessons Using Classroom Observations
NASA Astrophysics Data System (ADS)
Iverson, E. A.; Manduca, C. A.; McDaris, J. R.; Lee, S.
2009-12-01
One of the challenges that we face in developing teaching materials or activities from research findings is testing the materials to determine that they work as intended. Traditionally faculty develop material for their own class, notice what worked and didn’t, and improve them the next year. However, as we move to a community process of creating and sharing teaching materials, a community-based process for testing materials is appropriate. The MARGINS project has piloted such a process for testing teaching materials and activities developed as part of its mini-lesson project (http://serc.carleton.edu/margins/index.html). Building on prior work developing mechanisms for community review of teaching resources (e.g. Kastens, 2002; Hancock and Manduca, 2005; Mayhew and Hall, 2007), the MARGINS evaluation team developed a structured classroom observation protocol. The goals of field testing are to a) gather structured, consistent feedback for the lesson authors based on classroom use; b) guide reviewers of these lessons to reflect on research-based educational practice as a framework for their comments; c) collect information on the data and observations that the reviewer used to underpin their review; d) determine which mini-lessons are ready to be made widely available on the website. The protocol guides faculty observations on why they used the activity, the effectiveness of the activity in their classroom, the success of the activity in leading to the desired learning, and what other faculty need to successfully use the activity. Available online (http://serc.carleton.edu/margins/protocol.html), the protocol can be downloaded and completed during instruction with the activity. In order to encourage review of mini-lessons using the protocol, a workshop focused on review and revision of activities was held in May 2009. In preparation for the workshop, 13 of the 28 participants chose to field test a mini-lesson prior to the workshop and reported that they found this process instructive. Activity authors found the observations very helpful and the first mini-lessons have now been revised using feedback from testers. Initial results show that the tested mini-lessons give students hands-on experience with scientific data and help students make connections between geologic phenomena and data. Productive feedback ranged from suggestions for improving activity design, adaptations for other audiences, suggestions for clearer presentation, and tips for using the materials. The team plans to broaden the use of the protocol to test and refine all of the mini-lessons in the MARGINS collection.
ERIC Educational Resources Information Center
Forbes, Cory T.; Biggers, Mandy; Zangori, Laura
2013-01-01
Within the field of science education, there remains little agreement as to the definition and characteristics of classroom inquiry. The emerging emphasis on scientific practices in science education reform discourse is underpinned by a need to better articulate the constituent elements of inquiry-based science. While a small number of…
A Practicum for Oral Cancer Teaching.
ERIC Educational Resources Information Center
Barr, Charles E.; Goldberg, Marshal D.
1983-01-01
A hospital-based method for teaching general practice dental residents, involving patients for whom the residents are responsible, is described. Residents present prepared cases of dental patients according to a predetermined protocol: a talk, complete documentation of clinical history and laboratory findings, and discussion of therapy and…
Principal Leadership of Data Team Protocols within a Professional Learning Community
ERIC Educational Resources Information Center
Chambers, Charmelle
2014-01-01
The following document represents a Problem Based Learning Project (PBL) focusing on school leadership practices leading to increased student achievement. Current research findings indicate effective principals recognize the importance of building teacher capacity through promoting collaborative team work. School principals effectively leading…
How to write a surgical clinical research protocol: literature review and practical guide.
Rosenthal, Rachel; Schäfer, Juliane; Briel, Matthias; Bucher, Heiner C; Oertli, Daniel; Dell-Kuster, Salome
2014-02-01
The study protocol is the core document of every clinical research project. Clinical research in studies involving surgical interventions presents some specific challenges, which need to be accounted for and described in the study protocol. The aim of this review is to provide a practical guide for developing a clinical study protocol for surgical interventions with a focus on methodologic issues. On the basis of an in-depth literature search of methodologic literature and on some cardinal published surgical trials and observational studies, the authors provides a 10-step guide for developing a clinical study protocol in surgery. This practical guide outlines key methodologic issues important when planning an ethically and scientifically sound research project involving surgical interventions, with the ultimate goal of providing high-level evidence relevant for health care decision making in surgery. Copyright © 2014 Elsevier Inc. All rights reserved.
Tzialla, Chryssoula; Berardi, Alberto; Farina, Claudio; Clerici, Pierangelo; Borghesi, Alessandro; Viora, Elsa; Scollo, Paolo; Stronati, Mauro
2017-11-02
There are no Italian data regarding the strategies for preventing neonatal group B streptococcal (GBS) infection. We conducted a national survey in order to explore obstetrical, neonatal and microbiological practices for the GBS prevention. Three distinct questionnaires were sent to obstetricians, neonatologists and microbiologists. Questionnaires included data on prenatal GBS screening, maternal risk factors, intrapartum antibiotic prophylaxis, microbiological information concerning specimen processing and GBS antimicrobial susceptibility. All respondent obstetrical units used the culture-based screening approach to identify women who should receive intrapartum antibiotic prophylaxis, and more than half of the microbiological laboratories (58%) reported using specimen processing consistent with CDC guidelines. Most neonatal units (89 out of 107, 82%) reported using protocols for preventing GBS early-onset sepsis consistent with CDC guidelines. The screening-based strategy is largely prevalent in Italy, and most protocols for preventing GBS early-onset sepsis are consistent with CDC guidelines. However, we found discrepancies in practices among centers that may reflect the lack of Italian guidelines issued by public health organizations.
Conner, Kenneth R.; Wood, Jane; Pisani, Anthony R.; Kemp, Janet
2013-01-01
Substance use disorders (SUD) confer risk for suicide yet there are no empirically supported suicide prevention training curricula tailored to SUD treatment providers. We assessed the efficacy of a 2-hour training that featured a suicide prevention training video produced by the Department of Veterans Affairs (VA). The video was based on Treatment Improvement Protocol Number 50, TIP 50, a practical manual to manage suicide risk produced by the Substance Abuse and Mental Health Services Administration (SAMHSA). The training was provided in small groups to 273 SUD treatment providers in 18 states. Results were evaluated using self-report assessments obtained at pre-test, post-test, and 2-month follow-up. Statistically significant changes (p<.001) within subjects were obtained on self-efficacy, knowledge, and frequency of suicide prevention practice behaviors. The positive results together with the brevity of the training and its ease of implementation indicate high potential for widespread adoption and the importance of further study. PMID:22417671
Responsibility for managing healthcare-associated infections: where does the buck stop?
Duerden, B I
2009-12-01
The prevention and control of healthcare-associated infections (HCAIs) requires a tripartite partnership between clinicians and carers, managers and government/Department of Health (DoH) across the whole health and social care community. Mandatory surveillance of meticillin-resistant Staphylococcus aureus bacteraemia and Clostridium difficile infection has shown a significant fall from peak numbers in 2003/04 and 2006, respectively, and there is now a zero tolerance approach to preventable infections and poor practice. Success so far has been based on senior management commitment, enhanced real-time surveillance, implementation of clinical protocols (high impact interventions, prudent prescribing), improved hand hygiene and environmental cleaning, and training and audit, backed up by a heightened performance management focus through targets and legislation (Code of Practice). DoH improvement teams have supported National Health Service trusts in implementing change. Responsibility for managing HCAI is a combination of managerial responsibility based upon compliance assurance that procedures and protocols are being implemented and personal professional responsibility of all clinicians and other healthcare workers.
Standardization of a Videofluoroscopic Swallow Study Protocol to Investigate Dysphagia in Dogs.
Harris, R A; Grobman, M E; Allen, M J; Schachtel, J; Rawson, N E; Bennett, B; Ledyayev, J; Hopewell, B; Coates, J R; Reinero, C R; Lever, T E
2017-03-01
Videofluoroscopic swallow study (VFSS) is the gold standard for diagnosis of dysphagia in veterinary medicine but lacks standardized protocols that emulate physiologic feeding practices. Age impacts swallow function in humans but has not been evaluated by VFSS in dogs. To develop a protocol with custom kennels designed to allow free-feeding of 3 optimized formulations of contrast media and diets that address limitations of current VFSS protocols. We hypothesized that dogs evaluated by a free-feeding VFSS protocol would show differences in objective swallow metrics based on age. Healthy juvenile, adult, and geriatric dogs (n = 24). Prospective, experimental study. Custom kennels were developed to maintain natural feeding behaviors during VFSS. Three food consistencies (thin liquid, pureed food, and dry kibble) were formulated with either iohexol or barium to maximize palatability and voluntary prehension. Dogs were evaluated by 16 swallow metrics and compared across age groups. Development of a standardized VFSS protocol resulted in successful collection of swallow data in healthy dogs. No significant differences in swallow metrics were observed among age groups. Substantial variability was observed in healthy dogs when evaluated under these physiologic conditions. Features typically attributed to pathologic states, such as gastric reflux, were seen in healthy dogs. Development of a VFSS protocol that reflects natural feeding practices may allow emulation of physiology resulting in clinical signs of dysphagia. Age did not result in significant changes in swallow metrics, but additional studies are needed, particularly in light of substantial normal variation. Copyright © 2017 The Authors. Journal of Veterinary Internal Medicine published by Wiley Periodicals, Inc. on behalf of the American College of Veterinary Internal Medicine.
Pediatric nurses' beliefs and pain management practices: an intervention pilot.
Van Hulle Vincent, Catherine; Wilkie, Diana J; Wang, Edward
2011-10-01
We evaluated feasibility of the Internet-based Relieve Children's Pain (RCP) protocol to improve nurses' management of children's pain. RCP is an interactive, content-focused, and Kolb's experiential learning theory-based intervention. Using a one-group, pretest-posttest design, we evaluated feasibility of RCP and pretest-posttest difference in scores for nurses' beliefs, and simulated and actual pain management practices. Twenty-four RNs completed an Internet-based Pain Beliefs and Practices Questionnaire (PBPQ, alpha=.83) before and after they completed the RCP and an Acceptability Scale afterward. Mean total PBPQ scores significantly improved from pretest to posttest as did simulated practice scores. After RCP in actual hospital practice, nurses administered significantly more ibuprofen and ketorolac and children's pain intensity significantly decreased. Findings showed strong evidence for the feasibility of RCP and study procedures and significant improvement in nurses' beliefs and pain management practices. The 2-hr RCP program is promising and warrants replication with an attention control group and a larger sample.
Abreu, Pedro; Pedrosa, Rui; Sá, Maria José; Cerqueira, João; Sousa, Lívia; Da Silva, Ana Martins; Pinheiro, Joaquim; De Sá, João; Batista, Sónia; Simões, Rita Moiron; Pereira, Daniela Jardim; Vilela, Pedro; Vale, José
2018-05-30
Magnetic resonance imaging is established as a recognizable tool in the diagnosis and monitoring of multiple sclerosis patients. In the present, among multiple sclerosis centers, there are different magnetic resonance imaging sequences and protocols used to study multiple sclerosis that may hamper the optimal use of magnetic resonance imaging in multiple sclerosis. In this context, the Group of Studies of Multiple Sclerosis and the Portuguese Society of Neuroradiology, after a joint discussion, appointed a committee of experts to create recommendations adapted to the national reality on the use of magnetic resonance imaging in multiple sclerosis. The purpose of this document is to publish the first Portuguese consensus recommendations on the use of magnetic resonance imaging in multiple sclerosis in clinical practice. The Group of Studies of Multiple Sclerosis and the Portuguese Society of Neuroradiology, after discussion of the topic in national meetings and after a working group meeting held in Figueira da Foz on May 2017, have appointed a committee of experts that have developed by consensus several standard protocols on the use of magnetic resonance imaging in the diagnosis and follow-up of multiple sclerosis. The document obtained was based on the best scientific evidence and expert opinion. Subsequently, the majority of Portuguese multiple sclerosis consultants and departments of neuroradiology scrutinized and reviewed the consensus paper; comments and suggestions were considered. Technical magnetic resonance imaging protocols regarding diagnostic, monitoring and the recommended information to be included in the magnetic resonance imaging report will be published in a separate paper. We provide some practical guidelines to promote standardized strategies to be applied in the clinical practice setting of Portuguese healthcare professionals regarding the use of magnetic resonance imaging in multiple sclerosis. We hope that these first Portuguese magnetic resonance imaging guidelines, based in the best available clinical evidence and practices, will serve to optimize multiple sclerosis management and improve multiple sclerosis patient care across Portugal.
Zebrack, Brad; Kayser, Karen; Bybee, Deborah; Padgett, Lynne; Sundstrom, Laura; Jobin, Chad; Oktay, Julianne
2017-07-01
Background: This study examined the extent to which cancer programs demonstrated adherence to their own prescribed screening protocol, and whether adherence to that protocol was associated with medical service utilization. The hypothesis is that higher rates of service utilization are associated with lower rates of adherence to screening protocols. Methods: Oncology social workers at Commission on Cancer-accredited cancer programs reviewed electronic health records (EHRs) in their respective cancer programs during a 2-month period in 2014. Rates of overall adherence to a prescribed distress screening protocol were calculated based on documentation in the EHR that screening adherence and an appropriate clinical response had occurred. We examined documentation of emergency department (ED) use and hospitalization within 2 months after the screening visit. Results: Review of 8,409 EHRs across 55 cancer centers indicated that the overall adherence rate to screening protocols was 62.7%. The highest rates of adherence were observed in Community Cancer Programs (76.3%) and the lowest rates were in NCI-designated Cancer Centers (43.3%). Rates of medical service utilization were significantly higher than expected when overall protocol adherence was lacking. After controlling for patient and institutional characteristics, risk ratios for ED use (0.82) and hospitalization (0.81) suggest that when overall protocol adherence was documented, 18% to 19% fewer patients used these medical services. Conclusions: The observed associations between a mandated psychosocial care protocol and medical service utilization suggest opportunities for operational efficiencies and costs savings. Further investigations of protocol integrity, as well as the clinical care models by which psychosocial care is delivered, are warranted. Copyright © 2017 by the National Comprehensive Cancer Network.
A data acquisition and control system for high-speed gamma-ray tomography
NASA Astrophysics Data System (ADS)
Hjertaker, B. T.; Maad, R.; Schuster, E.; Almås, O. A.; Johansen, G. A.
2008-09-01
A data acquisition and control system (DACS) for high-speed gamma-ray tomography based on the USB (Universal Serial Bus) and Ethernet communication protocols has been designed and implemented. The high-speed gamma-ray tomograph comprises five 500 mCi 241Am gamma-ray sources, each at a principal energy of 59.5 keV, which corresponds to five detector modules, each consisting of 17 CdZnTe detectors. The DACS design is based on Microchip's PIC18F4550 and PIC18F4620 microcontrollers, which facilitates an USB 2.0 interface protocol and an Ethernet (IEEE 802.3) interface protocol, respectively. By implementing the USB- and Ethernet-based DACS, a sufficiently high data acquisition rate is obtained and no dedicated hardware installation is required for the data acquisition computer, assuming that it is already equipped with a standard USB and/or Ethernet port. The API (Application Programming Interface) for the DACS is founded on the National Instrument's LabVIEW® graphical development tool, which provides a simple and robust foundation for further application software developments for the tomograph. The data acquisition interval, i.e. the integration time, of the high-speed gamma-ray tomograph is user selectable and is a function of the statistical measurement accuracy required for the specific application. The bandwidth of the DACS is 85 kBytes s-1 for the USB communication protocol and 28 kBytes s-1 for the Ethernet protocol. When using the iterative least square technique reconstruction algorithm with a 1 ms integration time, the USB-based DACS provides an online image update rate of 38 Hz, i.e. 38 frames per second, whereas 31 Hz for the Ethernet-based DACS. The off-line image update rate (storage to disk) for the USB-based DACS is 278 Hz using a 1 ms integration time. Initial characterization of the high-speed gamma-ray tomograph using the DACS on polypropylene phantoms is presented in the paper.
Lall, Ranjit; Withers, Emma J; Finnegan, Susanne; Underwood, Martin; Hulme, Claire; Sheridan, Ray; Skelton, Dawn A; Martin, Finbarr; Lamb, Sarah E
2016-01-01
Introduction Falls are the leading cause of accident-related mortality in older adults. Injurious falls are associated with functional decline, disability, healthcare utilisation and significant National Health Service (NHS)-related costs. The evidence base for multifactorial or exercise interventions reducing fractures in the general population is weak. This protocol describes a large-scale UK trial investigating the clinical and cost-effectiveness of alternative falls prevention interventions targeted at community dwelling older adults. Methods and analysis A three-arm, pragmatic, cluster randomised controlled trial, conducted within primary care in England, UK. Sixty-three general practices will be randomised to deliver one of three falls prevention interventions: (1) advice only; (2) advice with exercise; or (3) advice with multifactorial falls prevention (MFFP). We aim to recruit over 9000 community-dwelling adults aged 70 and above. Practices randomised to deliver advice will mail out advice booklets. Practices randomised to deliver ‘active’ interventions, either exercise or MFFP, send all trial participants the advice booklet and a screening survey to identify participants with a history of falling or balance problems. Onward referral to ‘active’ intervention will be based on falls risk determined from balance screen. The primary outcome is peripheral fracture; secondary outcomes include number with at least one fracture, falls, mortality, quality of life and health service resource use at 18 months, captured using self-report and routine healthcare activity data. Ethics and dissemination The study protocol has approval from the National Research Ethics Service (REC reference 10/H0401/36; Protocol V.3.1, 21/May/2013). User groups and patient representatives were consulted to inform trial design. Results will be reported at conferences and in peer-reviewed publications. A patient-friendly summary of trial findings will be published on the prevention of falls injury trial (PreFIT) website. This protocol adheres to the recommended SPIRIT Checklist. Amendments will be reported to relevant regulatory parties. Trial registration number ISRCTN 71002650; Pre-results. PMID:26781504
Bruce, Julie; Lall, Ranjit; Withers, Emma J; Finnegan, Susanne; Underwood, Martin; Hulme, Claire; Sheridan, Ray; Skelton, Dawn A; Martin, Finbarr; Lamb, Sarah E
2016-01-18
Falls are the leading cause of accident-related mortality in older adults. Injurious falls are associated with functional decline, disability, healthcare utilisation and significant National Health Service (NHS)-related costs. The evidence base for multifactorial or exercise interventions reducing fractures in the general population is weak. This protocol describes a large-scale UK trial investigating the clinical and cost-effectiveness of alternative falls prevention interventions targeted at community dwelling older adults. A three-arm, pragmatic, cluster randomised controlled trial, conducted within primary care in England, UK. Sixty-three general practices will be randomised to deliver one of three falls prevention interventions: (1) advice only; (2) advice with exercise; or (3) advice with multifactorial falls prevention (MFFP). We aim to recruit over 9000 community-dwelling adults aged 70 and above. Practices randomised to deliver advice will mail out advice booklets. Practices randomised to deliver 'active' interventions, either exercise or MFFP, send all trial participants the advice booklet and a screening survey to identify participants with a history of falling or balance problems. Onward referral to 'active' intervention will be based on falls risk determined from balance screen. The primary outcome is peripheral fracture; secondary outcomes include number with at least one fracture, falls, mortality, quality of life and health service resource use at 18 months, captured using self-report and routine healthcare activity data. The study protocol has approval from the National Research Ethics Service (REC reference 10/H0401/36; Protocol V.3.1, 21/May/2013). User groups and patient representatives were consulted to inform trial design. Results will be reported at conferences and in peer-reviewed publications. A patient-friendly summary of trial findings will be published on the prevention of falls injury trial (PreFIT) website. This protocol adheres to the recommended SPIRIT Checklist. Amendments will be reported to relevant regulatory parties. ISRCTN 71002650; Pre-results. Published by the BMJ Publishing Group Limited. For permission to use (where not already granted under a licence) please go to http://www.bmj.com/company/products-services/rights-and-licensing/
Evaluation of Protocol Uniformity Concerning Laparoscopic Cholecystectomy in The Netherlands
Goossens, Richard H. M.; van Eijk, Daan J.; Lange, Johan F.
2008-01-01
Background Iatrogenic bile duct injury remains a current complication of laparoscopic cholecystectomy. One uniform and standardized protocol, based on the “critical view of safety” concept of Strasberg, should reduce the incidence of this complication. Furthermore, owing to the rapid development of minimally invasive surgery, technicians are becoming more frequently involved. To improve communication between the operating team and technicians, standardized actions should also be defined. The aim of this study was to compare existing protocols for laparoscopic cholecystectomy from various Dutch hospitals. Methods Fifteen Dutch hospitals were contacted for evaluation of their protocols for laparoscopic cholecystectomy. All evaluated protocols were divided into six steps and were compared accordingly. Results In total, 13 hospitals responded—5 academic hospitals, 5 teaching hospitals, 3 community hospitals—of which 10 protocols were usable for comparison. Concerning the trocar positions, only minor differences were found. The concept of “critical view of safety” was represented in just one protocol. Furthermore, the order of clipping and cutting the cystic artery and duct differed. Descriptions of instruments and apparatus were also inconsistent. Conclusions Present protocols differ too much to define a universal procedure among surgeons in The Netherlands. The authors propose one (inter)national standardized protocol, including standardized actions. This uniform standardized protocol has to be officially released and recommended by national scientific associations (e.g., the Dutch Society of Surgery) or international societies (e.g., European Association for Endoscopic Surgery and Society of American Gastrointestinal and Endoscopic Surgeons). The aim is to improve patient safety and professional communication, which are necessary for new developments. PMID:18224485
Science-based approach for credible accounting of mitigation in managed forests.
Grassi, Giacomo; Pilli, Roberto; House, Jo; Federici, Sandro; Kurz, Werner A
2018-05-17
The credibility and effectiveness of country climate targets under the Paris Agreement requires that, in all greenhouse gas (GHG) sectors, the accounted mitigation outcomes reflect genuine deviations from the type and magnitude of activities generating emissions in the base year or baseline. This is challenging for the forestry sector, as the future net emissions can change irrespective of actual management activities, because of age-related stand dynamics resulting from past management and natural disturbances. The solution implemented under the Kyoto Protocol (2013-2020) was accounting mitigation as deviation from a projected (forward-looking) "forest reference level", which considered the age-related dynamics but also allowed including the assumed future implementation of approved policies. This caused controversies, as unverifiable counterfactual scenarios with inflated future harvest could lead to credits where no change in management has actually occurred, or conversely, failing to reflect in the accounts a policy-driven increase in net emissions. Instead, here we describe an approach to set reference levels based on the projected continuation of documented historical forest management practice, i.e. reflecting age-related dynamics but not the future impact of policies. We illustrate a possible method to implement this approach at the level of the European Union (EU) using the Carbon Budget Model. Using EU country data, we show that forest sinks between 2013 and 2016 were greater than that assumed in the 2013-2020 EU reference level under the Kyoto Protocol, which would lead to credits of 110-120 Mt CO 2 /year (capped at 70-80 Mt CO 2 /year, equivalent to 1.3% of 1990 EU total emissions). By modelling the continuation of management practice documented historically (2000-2009), we show that these credits are mostly due to the inclusion in the reference levels of policy-assumed harvest increases that never materialized. With our proposed approach, harvest is expected to increase (12% in 2030 at EU-level, relative to 2000-2009), but more slowly than in current forest reference levels, and only because of age-related dynamics, i.e. increased growing stocks in maturing forests. Our science-based approach, compatible with the EU post-2020 climate legislation, helps to ensure that only genuine deviations from the continuation of historically documented forest management practices are accounted toward climate targets, therefore enhancing the consistency and comparability across GHG sectors. It provides flexibility for countries to increase harvest in future reference levels when justified by age-related dynamics. It offers a policy-neutral solution to the polarized debate on forest accounting (especially on bioenergy) and supports the credibility of forest sector mitigation under the Paris Agreement.
Secure Publish-Subscribe Protocols for Heterogeneous Medical Wireless Body Area Networks
Picazo-Sanchez, Pablo; Tapiador, Juan E.; Peris-Lopez, Pedro; Suarez-Tangil, Guillermo
2014-01-01
Security and privacy issues in medical wireless body area networks (WBANs) constitute a major unsolved concern because of the challenges posed by the scarcity of resources in WBAN devices and the usability restrictions imposed by the healthcare domain. In this paper, we describe a WBAN architecture based on the well-known publish-subscribe paradigm. We present two protocols for publishing data and sending commands to a sensor that guarantee confidentiality and fine-grained access control. Both protocols are based on a recently proposed ciphertext policy attribute-based encryption (CP-ABE) scheme that is lightweight enough to be embedded into wearable sensors. We show how sensors can implement lattice-based access control (LBAC) policies using this scheme, which are highly appropriate for the eHealth domain. We report experimental results with a prototype implementation demonstrating the suitability of our proposed solution. PMID:25460814
Multiparty Quantum Secret Sharing of Key Using Practical Faint Laser Pulses
NASA Astrophysics Data System (ADS)
Zhang, Zhan-Jun; Man, Zhong-Xiao
2005-07-01
Based on a bidirectional quantum key distribution protocol [Phys. Rev. A 70 (2004) 012311], we propose a (m-1,m-1)-threshold scheme of m (m >= 3)-party quantum secret sharing of key by using practical faint laser pulses. In our scheme, if all the m-1 sharers collaborate, they can obtain the joint secret key from the message sender. Our scheme is more feasible according to the present-day technology.
A practical overview of how to conduct a systematic review.
Davis, Dilla
2016-11-16
With an increasing focus on evidence-based practice in health care, it is important that nurses understand the principles underlying systematic reviews. Systematic reviews are used in healthcare to present a comprehensive, policy-neutral, transparent and reproducible synthesis of evidence. This article provides a practical overview of the process of undertaking systematic reviews, explaining the rationale for each stage. It provides guidance on the standard methods applicable to every systematic review: writing and registering a protocol; planning a review; searching and selecting studies; data collection; assessing the risk of bias; and interpreting results.
Heudorf, U; Hofmann, H; Kutzke, G; Otto, U; Exner, M
2004-08-01
Guidelines for reprocessing flexible endoscopes have been published in many countries. Compliance to the German guidelines, published in 2002 by the Commission on Hospital Hygiene and Infection Prevention on the Robert Koch Institute is mandatory in all endoscopic units, in hospitals as well as in private practices. Here, a survey of current reprocessing practices in an urban region in Germany is published, covering all hospitals and private practices in this region. In summer 2003, all endoscopic units in Frankfurt/Main, Germany--15 hospitals and 23 private practices -- were visited by members of the public health service, using a checklist based on the recommendations of the German guideline. In these institutions, more than 70 000 endoscopic examinations per year are performed. 87 % (13 /15) of the hospitals and 43 % (10/23) of the practices, reported to conduct more than 1000 procedures per year. Great differences were found in hygienic quality comparing endoscopic units in hospitals and in private practices. In hospitals compliance with the guidelines was satisfactory. Main problems in the practices were: missing facilities for ultrasonic cleaning (74%) and sterilizing (43%), faults in reprocessing the bottle and tube for air/water-channel flushing (26%) which was filled in with water not sterilised (48%), storage of the endoscope with risk of recontamination (48%), missing routine-tests of the endoscopes after reprocessing (44%). Generally, hygienic conditions and procedures were worse in smaller units than in bigger ones. The data from Frankfurt hospitals are satisfactory. In private practices, however, especially in smaller ones, improvements are mandatory. Improvements should cover the quality of structure and process, i.e. specific education of the nurses, availability of ultrasonic cleaners and sterilizators and -- preferably -- automatic dishwashers, as well as implementation of a written protocol for hygiene in endoscopy, based on the German Guidelines.
Variations in incubator temperature and humidity management: a survey of current practice.
Deguines, C; Décima, P; Pelletier, A; Dégrugilliers, L; Ghyselen, L; Tourneux, P
2012-03-01
To describe and assess routine procedures and practices for incubator temperature and humidity management in France in 2009. A questionnaire was sent to all the 186 neonatal care units in France. The questionnaire return rate was 86%. Seventy-five per cent of the units preferred skin servo-control to air temperature control in routine practice. Air temperature control was mainly used for infants with a gestational age of more than 28 weeks and aged over 7 days of life. In general, thermal management decisions did not depend on the infant's age but were based on a protocol applied specifically by each unit. All units humidified the incubator air, but there was a large difference between the lowest and highest reported humidity values (45% and 100% assumed to be a maximal value, respectively). More than 65% of the units used a fixed humidity value, rather than a variable, protocol-derived value. We observed large variations in incubator temperature and humidity management approaches from one neonatal care unit to another. There is a need for more evidence to better inform practice. A task force should be formed to guide clinical practice. © 2011 The Author(s)/Acta Paediatrica © 2011 Foundation Acta Paediatrica.
Protocol for audit of current Filipino practice in rehabilitation of stroke inpatients.
Gonzalez-Suarez, Consuelo B; Dizon, Janine Margarita R; Grimmer, Karen; Estrada, Myrna S; Liao, Lauren Anne S; Malleta, Anne-Rochelle D; Tan, Ma Elena R; Marfil, Vero; Versales, Cristina S; Suarez, Jimah L; So, Kleon C; Uyehara, Edgardo D
2015-01-01
Stroke is one of the leading medical conditions in the Philippines. Over 500,000 Filipinos suffer from stroke annually. Provision of evidence-based medical and rehabilitation management for stroke patients has been a challenge due to existing environmental, social, and local health system issues. Thus, existing western guidelines on stroke rehabilitation were contextualized to draft recommendations relevant to the local Philippine setting. Prior to fully implementing the guidelines, an audit of current practice needs to be undertaken, thus the purpose of this audit protocol. A clinical audit of current practices in stroke rehabilitation in the Philippines will be undertaken. A consensus list of data items to be captured was identified by the audit team during a 2-day meeting in 2012. These items, including patient demographics, type of stroke, time to referral for rehabilitation management, length of hospital stay, and other relevant descriptors of stroke management were included as part of the audit. Hospitals in the Philippines will be recruited to take part in the audit activity. Recruitment will be via the registry of the Philippine Academy of Rehabilitation Medicine, where 90% of physiatrists (medical doctors specialized in rehabilitation medicine) are active members and are affiliated with various hospitals in the Philippines. Data collectors will be identified and trained in the audit process. A pilot audit will be conducted to test the feasibility of the audit protocol, and refinements to the protocol will be undertaken as necessary. The comprehensive audit process will take place for a period of 3 months. Data will be encoded using MS Excel(®). Data will be reported as means and percentages as appropriate. Subgroup analysis will be undertaken to look into differences and variability of stroke patient descriptors and rehabilitation activities. This audit study is an ambitious project, but given the "need" to conduct the audit to identify "gaps" in current practice, and the value it can bring to serve as a platform for implementation of evidence-based stroke management in the Philippines to achieve best patient and health outcomes, the audit team is more than ready to take up the challenge.
ERIC Educational Resources Information Center
Jeffery, Ryan M.; Dickinson, Laura; Ng, Nicholas D.; DeGeorge, Lindsey M.; Nable, Jose V.
2017-01-01
Opioid abuse is a growing and significant public health concern in the United States. Naloxone is an opioid antagonist that can rapidly reverse the respiratory depression associated with opioid toxicity. Georgetown University's collegiate-based emergency medical services (EMS) agency recently adopted a protocol, allowing providers to administer…
Popkirov, Stoyan; Grönheit, Wenke; Wellmer, Jörg
2015-05-01
The early and definitive diagnosis of psychogenic nonepileptic seizures is a common challenge in epileptology practice. Suggestive seizure induction is a valuable tool to aid the differentiation between epileptic and psychogenic nonepileptic seizures, especially when long-term video-EEG monitoring is inconclusive or unavailable. In this retrospective analysis, we compared the diagnostic yield of a classical, placebo-based induction protocol with that of an extended protocol that includes hyperventilation and photic stimulation as means of suggestion while also implementing more open, standardized patient information. We investigated whether the diversification of suggestive seizure induction has an effect on diagnostic yield and whether it preempts the administration of placebo. Data from 52 patients with confirmed psychogenic nonepileptic seizures were analyzed. While suggestive seizure induction using only placebo-based suggestion provoked a typical event in 13 of 20 patients (65%), the extended protocol was positive in 27 of 34 cases (84%); this improvement was not significant (p=0.11). Noninvasive suggestion techniques accounted for 78% of inductions, avoiding placebo administration in a majority of patients. Still, placebo remains an important part of suggestive seizure induction, responsible for 22% (6 out of 27) of successful inductions using our extended protocol. Our study demonstrates that the diversification of suggestive seizure induction is feasible and beneficial for both patients and diagnosticians. Copyright © 2015 Elsevier Inc. All rights reserved.
Loss-tolerant quantum secure positioning with weak laser sources
Lim, Charles Ci Wen; Xu, Feihu; Siopsis, George; ...
2016-09-14
Quantum position verification (QPV) is the art of verifying the geographical location of an untrusted party. It has recently been shown that the widely studied Bennett & Brassard 1984 (BB84) QPV protocol is insecure after the 3 dB loss point assuming local operations and classical communication (LOCC) adversaries. Here in this paper, we propose a time-reversed entanglement swapping QPV protocol (based on measurement-device-independent quantum cryptography) that is highly robust against quantum channel loss. First, assuming ideal qubit sources, we show that the protocol is secure against LOCC adversaries for any quantum channel loss, thereby overcoming the 3 dB loss limit.more » Then, we analyze the security of the protocol in a more practical setting involving weak laser sources and linear optics. Lastly, in this setting, we find that the security only degrades by an additive constant and the protocol is able to verify positions up to 47 dB channel loss.« less
Robustness of quantum key distribution with discrete and continuous variables to channel noise
NASA Astrophysics Data System (ADS)
Lasota, Mikołaj; Filip, Radim; Usenko, Vladyslav C.
2017-06-01
We study the robustness of quantum key distribution protocols using discrete or continuous variables to the channel noise. We introduce the model of such noise based on coupling of the signal to a thermal reservoir, typical for continuous-variable quantum key distribution, to the discrete-variable case. Then we perform a comparison of the bounds on the tolerable channel noise between these two kinds of protocols using the same noise parametrization, in the case of implementation which is perfect otherwise. Obtained results show that continuous-variable protocols can exhibit similar robustness to the channel noise when the transmittance of the channel is relatively high. However, for strong loss discrete-variable protocols are superior and can overcome even the infinite-squeezing continuous-variable protocol while using limited nonclassical resources. The requirement on the probability of a single-photon production which would have to be fulfilled by a practical source of photons in order to demonstrate such superiority is feasible thanks to the recent rapid development in this field.
Wafaisade, A; Wyen, H; Mutschler, M; Lendemans, S; Bouillon, B; Flohe, S; Paffrath, T; Maegele, M; Tjardes, T; Probst, C
2015-12-01
In recent years, the treatment of trauma-associated coagulopathy and bleeding has advanced enormously. The aim of this study was to assess the current practice of coagulation and transfusion management in Germany. From October 2011 until January 2012 we conducted a survey via online-questionnaire that was sent per E-Mail to all members of the German Society for Trauma Surgery. It comprised 12 questions with respect to current treatment of coagulopathy and haemorrhage in trauma patients. The response rate was 145/3006 (5 %). The respondents had following specialties: 77.2 % trauma surgery 15.9 % anesthesiology, 6.9 % others. 64 % of respondents were employed by a Level 1 trauma centre, wheras 17 % worked in a local level 3 centre. The majority (94 %) claimed to treat hypothermia regularly. Only about half of the participants reported to follow a massive transfusion protocol in their institution. The potential components of these protocols were reported in varying rates, being it well-established components (e.g. FFP 78 %; Fibrinogen 75 %) or therapies with poor evidence in multiple trauma (Desmopressin 39 %, rFVIIa 47 %). Calcium was provided by only 48 % of respondents although generally recommended in all guidelines. The current study suggests that in Germany strategies and principles regarding management of trauma-associated coagulopathy are standardized only poorly. Level 1 centres appear to apply a more advanced approach, however to much variability exists with respect to the components of the transfusion protocols. The low response rate indicates that most German trauma surgeons consider coagulation and hemorrhage as "expert-topics" beyond their field of duty.
A General Catalytic Method for Highly Cost- and Atom-Efficient Nucleophilic Substitutions.
Huy, Peter H; Filbrich, Isabel
2018-05-23
A general formamide-catalyzed protocol for the efficient transformation of alcohols into alkyl chlorides, which is promoted by substoichiometric amounts (down to 34 mol %) of inexpensive trichlorotriazine (TCT), is introduced. This is the first example of a TCT-mediated dihydroxychlorination of an OH-containing substrate (e.g., alcohols and carboxylic acids) in which all three chlorine atoms of TCT are transferred to the starting material. The consequently enhanced atom economy facilitates a significantly improved waste balance (E-factors down to 4), cost efficiency, and scalability (>50 g). Furthermore, the current procedure is distinguished by high levels of functional-group compatibility and stereoselectivity, as only weakly acidic cyanuric acid is released as exclusive byproduct. Finally, a one-pot protocol for the preparation of amines, azides, ethers, and sulfides enabled the synthesis of the drug rivastigmine with twofold S N 2 inversion, which demonstrates the high practical value of the presented method. © 2018 Wiley-VCH Verlag GmbH & Co. KGaA, Weinheim.
Predicting implementation from organizational readiness for change: a study protocol
2011-01-01
Background There is widespread interest in measuring organizational readiness to implement evidence-based practices in clinical care. However, there are a number of challenges to validating organizational measures, including inferential bias arising from the halo effect and method bias - two threats to validity that, while well-documented by organizational scholars, are often ignored in health services research. We describe a protocol to comprehensively assess the psychometric properties of a previously developed survey, the Organizational Readiness to Change Assessment. Objectives Our objective is to conduct a comprehensive assessment of the psychometric properties of the Organizational Readiness to Change Assessment incorporating methods specifically to address threats from halo effect and method bias. Methods and Design We will conduct three sets of analyses using longitudinal, secondary data from four partner projects, each testing interventions to improve the implementation of an evidence-based clinical practice. Partner projects field the Organizational Readiness to Change Assessment at baseline (n = 208 respondents; 53 facilities), and prospectively assesses the degree to which the evidence-based practice is implemented. We will conduct predictive and concurrent validities using hierarchical linear modeling and multivariate regression, respectively. For predictive validity, the outcome is the change from baseline to follow-up in the use of the evidence-based practice. We will use intra-class correlations derived from hierarchical linear models to assess inter-rater reliability. Two partner projects will also field measures of job satisfaction for convergent and discriminant validity analyses, and will field Organizational Readiness to Change Assessment measures at follow-up for concurrent validity (n = 158 respondents; 33 facilities). Convergent and discriminant validities will test associations between organizational readiness and different aspects of job satisfaction: satisfaction with leadership, which should be highly correlated with readiness, versus satisfaction with salary, which should be less correlated with readiness. Content validity will be assessed using an expert panel and modified Delphi technique. Discussion We propose a comprehensive protocol for validating a survey instrument for assessing organizational readiness to change that specifically addresses key threats of bias related to halo effect, method bias and questions of construct validity that often go unexplored in research using measures of organizational constructs. PMID:21777479
Traub-Dargatz, Josie L; Weese, J Scott; Rousseau, Joyce D; Dunowska, Magdalena; Morley, Paul S; Dargatz, David A
2006-07-01
Reduction factors (RFs) for bacterial counts on examiners' hands were compared when performing a standardized equine physical examination, followed by the use of one of 3 hand-hygiene protocols (washing with soap, ethanol gel application, and chlorohexidine-ethanol application). The mean RFs were 1.29 log10 and 1.44 log10 at 2 study sites for the alcohol-gel (62% ethyl alcohol active ingredient) protocols and 1.47 log10 and 1.94 log10 at 2 study sites for the chlorhexidine-alcohol (61% ethyl alcohol plus 1% chlorhexidine active ingredients) protocols, respectively. The RFs were significantly different (P < 0.0001) between the hand-washing group and the other 2 treatment groups (the alcohol-gel and the chlorhexidine-alcohol lotion). The use of alcohol-based gels or chlorhexidine-alcohol hand hygiene protocols must still be proven effective in equine practice settings, but in this study, these protocols were equivalent or superior to hand washing for reduction in bacterial load on the hands of people after they perform routine physical examinations.
Traub-Dargatz, Josie L.; Weese, J. Scott; Rousseau, Joyce D.; Dunowska, Magdalena; Morley, Paul S.; Dargatz, David A.
2006-01-01
Abstract Reduction factors (RFs) for bacterial counts on examiners’ hands were compared when performing a standardized equine physical examination, followed by the use of one of 3 hand-hygiene protocols (washing with soap, ethanol gel application, and chlorohexidine-ethanol application). The mean RFs were 1.29 log10 and 1.44 log10 at 2 study sites for the alcohol-gel (62% ethyl alcohol active ingredient) protocols and 1.47 log10 and 1.94 log10 at 2 study sites for the chlorhexidine-alcohol (61% ethyl alcohol plus 1% chlorhexidine active ingredients) protocols, respectively. The RFs were significantly different (P < 0.0001) between the hand-washing group and the other 2 treatment groups (the alcohol-gel and the chlorhexidine-alcohol lotion). The use of alcohol-based gels or chlorhexidine-alcohol hand hygiene protocols must still be proven effective in equine practice settings, but in this study, these protocols were equivalent or superior to hand washing for reduction in bacterial load on the hands of people after they perform routine physical examinations. PMID:16898109
Caffeine and sports performance.
Burke, Louise M
2008-12-01
Athletes are among the groups of people who are interested in the effects of caffeine on endurance and exercise capacity. Although many studies have investigated the effect of caffeine ingestion on exercise, not all are suited to draw conclusions regarding caffeine and sports performance. Characteristics of studies that can better explore the issues of athletes include the use of well-trained subjects, conditions that reflect actual practices in sport, and exercise protocols that simulate real-life events. There is a scarcity of field-based studies and investigations involving elite performers. Researchers are encouraged to use statistical analyses that consider the magnitude of changes, and to establish whether these are meaningful to the outcome of sport. The available literature that follows such guidelines suggests that performance benefits can be seen with moderate amounts (~3 mg.kg-1 body mass) of caffeine. Furthermore, these benefits are likely to occur across a range of sports, including endurance events, stop-and-go events (e.g., team and racquet sports), and sports involving sustained high-intensity activity lasting from 1-60 min (e.g., swimming, rowing, and middle and distance running races). The direct effects on single events involving strength and power, such as lifts, throws, and sprints, are unclear. Further studies are needed to better elucidate the range of protocols (timing and amount of doses) that produce benefits and the range of sports to which these may apply. Individual responses, the politics of sport, and the effects of caffeine on other goals, such as sleep, hydration, and refuelling, also need to be considered.
De Craemer, M; De Decker, E; De Bourdeaudhuij, I; Verloigne, M; Duvinage, K; Koletzko, B; Ibrügger, S; Kreichauf, S; Grammatikaki, E; Moreno, L; Iotova, V; Socha, P; Szott, K; Manios, Y; Cardon, G
2014-08-01
Although sufficient physical activity is beneficial for preschoolers' health, activity levels in most preschoolers are low. As preschoolers spend a considerable amount of time at home and at kindergarten, interventions should target both environments to increase their activity levels. The aim of the current paper was to describe the six different steps of the Intervention Mapping protocol towards the systematic development and implementation of the physical activity component of the ToyBox-intervention. This intervention is a kindergarten-based, family-involved intervention implemented across six European countries. Based on the results of literature reviews and focus groups with parents/caregivers and kindergarten teachers, matrices of change objectives were created. Then, theory-based methods and practical strategies were selected to develop intervention materials at three different levels: (i) individual level (preschoolers); (ii) interpersonal level (parents/caregivers) and (iii) organizational level (teachers). This resulted in a standardized intervention with room for local and cultural adaptations in each participating country. Although the Intervention Mapping protocol is a time-consuming process, using this systematic approach may lead to an increase in intervention effectiveness. The presented matrices of change objectives are useful for future programme planners to develop and implement an intervention based on the Intervention Mapping protocol to increase physical activity levels in preschoolers. © 2014 World Obesity.
MoniQA: a general approach to monitor quality assurance
NASA Astrophysics Data System (ADS)
Jacobs, J.; Deprez, T.; Marchal, G.; Bosmans, H.
2006-03-01
MoniQA ("Monitor Quality Assurance") is a new, non-commercial, independent quality assurance software application developed in our medical physics team. It is a complete Java TM - based modular environment for the evaluation of radiological viewing devices and it thus fits in the global quality assurance network of our (film less) radiology department. The purpose of the software tool is to guide the medical physicist through an acceptance protocol and the radiologist through a constancy check protocol by presentation of the necessary test patterns and by automated data collection. Data are then sent to a central management system for further analysis. At the moment more than 55 patterns have been implemented, which can be grouped in schemes to implement protocols (i.e. AAPMtg18, DIN and EUREF). Some test patterns are dynamically created and 'drawn' on the viewing device with random parameters as is the case in a recently proposed new pattern for constancy testing. The software is installed on 35 diagnostic stations (70 monitors) in a film less radiology department. Learning time was very limited. A constancy check -with the new pattern that assesses luminance decrease, resolution problems and geometric distortion- takes only 2 minutes and 28 seconds per monitor. The modular approach of the software allows the evaluation of new or emerging test patterns. We will report on the software and its usability: practicality of the constancy check tests in our hospital and on the results from acceptance tests of viewing stations for digital mammography.
Lorencatto, Fabiana; Gould, Natalie J; McIntyre, Stephen A; During, Camilla; Bird, Jon; Walwyn, Rebecca; Cicero, Robert; Glidewell, Liz; Hartley, Suzanne; Stanworth, Simon J; Foy, Robbie; Grimshaw, Jeremy M; Michie, Susan; Francis, Jill J
2016-12-12
In England, NHS Blood and Transplant conducts national audits of transfusion and provides feedback to hospitals to promote evidence-based practice. Audits demonstrate 20% of transfusions fall outside guidelines. The AFFINITIE programme (Development & Evaluation of Audit and Feedback INterventions to Increase evidence-based Transfusion practIcE) involves two linked, 2×2 factorial, cluster-randomised trials, each evaluating two theoretically-enhanced audit and feedback interventions to reduce unnecessary blood transfusions in UK hospitals. The first intervention concerns the content/format of feedback reports. The second aims to support hospital transfusion staff to plan their response to feedback and includes a web-based toolkit and telephone support. Interpretation of trials is enhanced by comprehensively assessing intervention fidelity. However, reviews demonstrate fidelity evaluations are often limited, typically only assessing whether interventions were delivered as intended. This protocol presents methods for assessing fidelity across five dimensions proposed by the Behaviour Change Consortium fidelity framework, including intervention designer-, provider- and recipient-levels. (1) Design: Intervention content will be specified in intervention manuals in terms of component behaviour change techniques (BCTs). Treatment differentiation will be examined by comparing BCTs across intervention/standard practice, noting the proportion of unique/convergent BCTs. (2) Training: draft feedback reports and audio-recorded role-play telephone support scenarios will be content analysed to assess intervention providers' competence to deliver manual-specified BCTs. (3) Delivery: intervention materials (feedback reports, toolkit) and audio-recorded telephone support session transcripts will be content analysed to assess actual delivery of manual-specified BCTs during the intervention period. (4) Receipt and (5) enactment: questionnaires, semi-structured interviews based on the Theoretical Domains Framework, and objective web-analytics data (report downloads, toolkit usage patterns) will be analysed to assess hospital transfusion staff exposure to, understanding and enactment of the interventions, and to identify contextual barriers/enablers to implementation. Associations between observed fidelity and trial outcomes (% unnecessary transfusions) will be examined using mediation analyses. If the interventions have acceptable fidelity, then results of the AFFINITIE trials can be attributed to effectiveness, or lack of effectiveness, of the interventions. Hence, this comprehensive assessment of fidelity will be used to interpret trial findings. These methods may inform fidelity assessments in future trials. ISRCTN 15490813 . Registered 11/03/2015.
Cambon, L; Bergman, P; Le Faou, Al; Vincent, I; Le Maitre, B; Pasquereau, A; Arwidson, P; Thomas, D; Alla, F
2017-02-24
A French national smoking cessation service, Tabac Info Service, has been developed to provide an adapted quitline and a web and mobile application involving personalised contacts (eg, questionnaires, advice, activities, messages) to support smoking cessation. This paper presents the study protocol of the evaluation of the application (e-intervention Tabac Info Service (e-TIS)). The primary objective is to assess the efficacy of e-TIS. The secondary objectives are to (1) describe efficacy variations with regard to users' characteristics, (2) analyse mechanisms and contextual conditions of e-TIS efficacy. The study design is a two-arm pragmatic randomised controlled trial including a process evaluation with at least 3000 participants randomised to the intervention or to the control arm (current practices). Inclusion criteria are: aged 18 years or over, current smoker, having completed the online consent forms, possessing a mobile phone with android or apple systems and using mobile applications, wanting to stop smoking sooner or later. The primary outcome is the point prevalence abstinence of 7 days at 6 months later. Data will be analysed in intention to treat (primary) and per protocol analyses. A logistic regression will be carried out to estimate an OR (95% CI) for efficacy. A multivariate multilevel analysis will explore the influence on results of patients' characteristics (sex, age, education and socioprofessional levels, dependency, motivation, quit experiences) and contextual factors, conditions of use, behaviour change techniques. The study protocol was reviewed by the ethical and deontological institutional review board of the French Institute for Public Health Surveillance on 18 April 2016. The findings of this study will allow us to characterise the efficacy of e-TIS and conditions of its efficacy. These findings will be disseminated through peer-reviewed articles. NCT02841683; Pre-results. Published by the BMJ Publishing Group Limited. For permission to use (where not already granted under a licence) please go to http://www.bmj.com/company/products-services/rights-and-licensing/.
E-counseling as an emerging preventive strategy for hypertension.
Nolan, Robert P; Liu, Sam; Payne, Ada Y M
2014-07-01
Lifestyle counseling that includes exercise training, diet modification, and medication adherence is critical to hypertension management. This article summarizes the efficacy of lifestyle counseling interventions in face-to-face, telehealth, and e-counseling settings. It also discusses the therapeutic potential of e-counseling as a preventive strategy for hypertension. The recent proliferation of telehealth and e-counseling programs increases the reach of preventive counseling for patients with cardiovascular disorders. Blood pressure reduction following these interventions is comparable to face-to-face interventions. However, the effectiveness of e-counseling varies depending on the design features of the core protocol. An evidence-based guideline needs to be established that identifies e-counseling components which are independently associated with blood pressure reduction. As the Internet becomes more sophisticated, e-counseling is demonstrating a therapeutic advantage in comparison with other telehealth interventions. Current evidence supports further development of preventive e-counseling programs for hypertension. A pressing challenge for investigators is to specify key evidence-based components of e-counseling that are essential to the core protocol. In order to achieve this goal, it will be necessary to ensure that e-counseling programs are also clinically organized, in order to guide patients through the process of initiating and sustaining therapeutic behavior change.
Merkx, Maarten J M; Schippers, Gerard M; Koeter, Maarten J W; Vuijk, Pieter Jelle; Oudejans, Suzan; de Vries, Carlijn C Q; van den Brink, Wim
2007-03-01
To examine the feasibility of implementing evidence-based guidelines for patient-treatment-matching to levels of care in two Dutch substance abuse treatment centres. Multi-centre observational follow-up study. Two large substance abuse treatment centres (SATCs). All 4394 referrals to the two SATCs in 2003. Baseline patient characteristics needed for treatment allocation according to protocol, treatment allocation according to matching protocol, treatment allocation according to actual level of care (LOC) entered. Comparison of recommended and actual LOC entered. Evaluation of reasons for observed differences between recommended and actual LOC entered. Data needed for treatment allocation according to protocol were available for 2269 (51.6%) patients. Data needed for evaluation of actual LOC entered were available for 1765 (40.2%) patients. Of these patients, 1089 (60.8%) were allocated according to protocol: 48.4% based on the guideline algorithm and 12.4% based on clinically justified deviations from this algorithm. The main reason for deviation was a different appraisal of addiction severity, made by the intake counsellor compared to the protocol. The feasibility of guideline-based treatment allocation is seriously limited due to inadequate data collection of patient characteristics and suboptimal guideline-based treatment allocation. As a consequence, only 24.4% of the patients could be evaluated as being matched properly to the treatment planned. The results indicate several barriers which limit the adequate implementation of patient-treatment-matching guidelines: problems in the infrastructure of data collection and storage and the inertia of intake staff who did not adhere to the guidelines for assessment and matching.
La-CTP: Loop-Aware Routing for Energy-Harvesting Wireless Sensor Networks.
Sun, Guodong; Shang, Xinna; Zuo, Yan
2018-02-02
In emerging energy-harvesting wireless sensor networks (EH-WSN), the sensor nodes can harvest environmental energy to drive their operation, releasing the user's burden in terms of frequent battery replacement, and even enabling perpetual sensing systems. In EH-WSN applications, usually, the node in energy-harvesting or recharging state has to stop working until it completes the energy replenishment. However, such temporary departures of recharging nodes severely impact the packet routing, and one immediate result is the routing loop problem. Controlling loops in connectivity-intermittent EH-WSN in an efficient way is a big challenge in practice, and so far, users still lack of effective and practicable routing protocols with loop handling. Based on the Collection Tree Protocol (CTP) widely used in traditional wireless sensor networks, this paper proposes a loop-aware routing protocol for real-world EH-WSNs, called La-CTP, which involves a new parent updating metric and a proactive, adaptive beaconing scheme to effectively suppress the occurrence of loops and unlock unavoidable loops, respectively. We constructed a 100-node testbed to evaluate La-CTP, and the experimental results showed its efficacy and efficiency.
EEG-Neurofeedback as a Tool to Modulate Cognition and Behavior: A Review Tutorial
Enriquez-Geppert, Stefanie; Huster, René J.; Herrmann, Christoph S.
2017-01-01
Neurofeedback is attracting renewed interest as a method to self-regulate one’s own brain activity to directly alter the underlying neural mechanisms of cognition and behavior. It not only promises new avenues as a method for cognitive enhancement in healthy subjects, but also as a therapeutic tool. In the current article, we present a review tutorial discussing key aspects relevant to the development of electroencephalography (EEG) neurofeedback studies. In addition, the putative mechanisms underlying neurofeedback learning are considered. We highlight both aspects relevant for the practical application of neurofeedback as well as rather theoretical considerations related to the development of new generation protocols. Important characteristics regarding the set-up of a neurofeedback protocol are outlined in a step-by-step way. All these practical and theoretical considerations are illustrated based on a protocol and results of a frontal-midline theta up-regulation training for the improvement of executive functions. Not least, assessment criteria for the validation of neurofeedback studies as well as general guidelines for the evaluation of training efficacy are discussed. PMID:28275344
Interorganizational exchanges as performance markers in a community cancer network.
McKinney, M M; Morrissey, J P; Kaluzny, A D
1993-01-01
OBJECTIVE. This study examines how "strategic partnerships" between community-based consortia of oncologists and hospitals (CCOPs) and clinical cooperative groups emerge, develop, and influence patient accruals (i.e., the number of patients enrolled in clinical trials) over time. DATA SOURCES AND STUDY SETTING. Study analyses are based on 65 pairwise relationships that 38 CCOPs established with eight clinical cooperative groups in September 1983 and maintained through February 1989. Data are drawn from grantee applications and progress reports. STUDY DESIGN. The study examines how different types of CCOP-cooperative group exchange relate to one another and to CCOP patient accruals over six time points. Key independent variables include resource dependence, information exchange (i.e., meeting attendance and committee membership), and protocol exchange (i.e., the number of different protocols used). DATA COLLECTION METHODS. Data extracted from secondary sources were entered in a data base. PRINCIPAL FINDINGS. The number of CCOP physicians and support staff who attend cooperative group meetings during the first two years of a clinical research partnership has a significant influence on meeting attendance and protocol use in later years. Two-thirds or more of the variance in patient accruals at each time point can be explained by the number of different protocols used and the number of CCOP representatives serving on cooperative group committees (or attending cooperative group meetings). CONCLUSIONS. The findings highlight the importance of historical relationships and anticipated resource dependence in shaping initial exchange patterns. They also suggest that strategic partnerships need to emphasize structures and processes that encourage early involvement in collaborative activities and that reward participants for maintaining high levels of interaction. PMID:8407338
DOE Office of Scientific and Technical Information (OSTI.GOV)
Nakayasu, Ernesto S.; Nicora, Carrie D.; Sims, Amy C.
2016-05-03
ABSTRACT Integrative multi-omics analyses can empower more effective investigation and complete understanding of complex biological systems. Despite recent advances in a range of omics analyses, multi-omic measurements of the same sample are still challenging and current methods have not been well evaluated in terms of reproducibility and broad applicability. Here we adapted a solvent-based method, widely applied for extracting lipids and metabolites, to add proteomics to mass spectrometry-based multi-omics measurements. Themetabolite,protein, andlipidextraction (MPLEx) protocol proved to be robust and applicable to a diverse set of sample types, including cell cultures, microbial communities, and tissues. To illustrate the utility of thismore » protocol, an integrative multi-omics analysis was performed using a lung epithelial cell line infected with Middle East respiratory syndrome coronavirus, which showed the impact of this virus on the host glycolytic pathway and also suggested a role for lipids during infection. The MPLEx method is a simple, fast, and robust protocol that can be applied for integrative multi-omic measurements from diverse sample types (e.g., environmental,in vitro, and clinical). IMPORTANCEIn systems biology studies, the integration of multiple omics measurements (i.e., genomics, transcriptomics, proteomics, metabolomics, and lipidomics) has been shown to provide a more complete and informative view of biological pathways. Thus, the prospect of extracting different types of molecules (e.g., DNAs, RNAs, proteins, and metabolites) and performing multiple omics measurements on single samples is very attractive, but such studies are challenging due to the fact that the extraction conditions differ according to the molecule type. Here, we adapted an organic solvent-based extraction method that demonstrated broad applicability and robustness, which enabled comprehensive proteomics, metabolomics, and lipidomics analyses from the same sample.« less
Rouleau, Geneviève; Gagnon, Marie-Pierre; Côté, José; Payne-Gagnon, Julie; Hudson, Emilie; Bouix-Picasso, Julien; Dubois, Carl-Ardy
2017-10-16
Continuing education (CE) is imperative to the future of professional nursing. The use of e-learning by registered nurses for CE is spreading. A review of systematic reviews will be conducted to develop a broad picture of the effects of e-learning in a CE context on nursing care. Systematic qualitative, quantitative and mixed studies reviews published in English, French or Spanish from 1 January 2006 will be included. The outcomes of interest will be extracted and analysed inductively and deductively from the Nursing Care Performance Framework; some themes include nursing resources, nurses' practice environment, processes, professional satisfaction, and nursing sensitive outcomes. Three reviewers will independently screen first the title and abstract of the papers, and then the full texts in order to assess eligibility. Two teams of two reviewers will extract the selected reviews' characteristics and data. The results from various types of reviews will be integrated using a data-based convergent synthesis design. We will conduct a thematic synthesis and transform all quantitative and mixed data into qualitative data. Ethics approval is not required for review of systematic reviews. We will summarise evidence concerning the negative, neutral and positive effects of various forms of e-learning on different aspects of nursing care. If we find gaps in the literature, we will highlight them and suggest ideas for further research. We will also focus on positive effects and present, if possible, the components and characteristics of e-learning interventions that were found to be successful. We will present this protocol and results in international conferences in nursing, medical, and health informatics domains. We will also submit the results of our work for peer-review publication in a journal indexed in the international bibliographic database of biomedical information. © Article author(s) (or their employer(s) unless otherwise stated in the text of the article) 2017. All rights reserved. No commercial use is permitted unless otherwise expressly granted.
Gagnon, Marie-Pierre; Côté, José; Payne-Gagnon, Julie; Hudson, Emilie; Bouix-Picasso, Julien; Dubois, Carl-Ardy
2017-01-01
Introduction Continuing education (CE) is imperative to the future of professional nursing. The use of e-learning by registered nurses for CE is spreading. A review of systematic reviews will be conducted to develop a broad picture of the effects of e-learning in a CE context on nursing care. Methods and analysis Systematic qualitative, quantitative and mixed studies reviews published in English, French or Spanish from 1 January 2006 will be included. The outcomes of interest will be extracted and analysed inductively and deductively from the Nursing Care Performance Framework; some themes include nursing resources, nurses’ practice environment, processes, professional satisfaction, and nursing sensitive outcomes. Three reviewers will independently screen first the title and abstract of the papers, and then the full texts in order to assess eligibility. Two teams of two reviewers will extract the selected reviews’ characteristics and data. The results from various types of reviews will be integrated using a data-based convergent synthesis design. We will conduct a thematic synthesis and transform all quantitative and mixed data into qualitative data. Ethics and dissemination Ethics approval is not required for review of systematic reviews. We will summarise evidence concerning the negative, neutral and positive effects of various forms of e-learning on different aspects of nursing care. If we find gaps in the literature, we will highlight them and suggest ideas for further research. We will also focus on positive effects and present, if possible, the components and characteristics of e-learning interventions that were found to be successful. We will present this protocol and results in international conferences in nursing, medical, and health informatics domains. We will also submit the results of our work for peer-review publication in a journal indexed in the international bibliographic database of biomedical information. PMID:29042394
de Ornelas Maia, Ana Claudia Corrêa; Nardi, Antonio Egidio; Cardoso, Adriana
2015-02-01
The practicing of protocols based on behavioral cognitive therapy (CBT) have been frequently used in the last decades and adapted to better manage the necessities of patients and providers. The goal is to build a treatment that is evidence-based - for that reason the unified protocol for multiple emotional disorders (transdiagnostics) have been utilized to simplify treatment - without losing scientific traits. The main goal of this study is to evaluate the unified protocol in groups of patients with depression and anxiety disorders. In a pool of 48 subjects, divided in two groups, one was submitted to 12 intervention sessions of the unified protocol while the other was solely given medication. MINI, BAI and BDI were the instruments used at the beginning and at the end of treatment. The results were highly significant (p<0.001) in as much as with the improvement of anxiety and depressive disorders as it was in the group which was treated with the unified protocol compared with the group which was only given medication Limitations of this study were the number of sample participants and the non-randomization of subjects in both groups. Group therapy has not been largely implemented though it is deemed very useful for treatments when the unified protocol is used in transdiagnostic patients. Not only does it allow for emotional stabilizing and socialization but it also enables subjects with an altruistic feeling amongst themselves. Copyright © 2014 Elsevier B.V. All rights reserved.
Belenko, Steven; Hiller, Matthew; Visher, Christy; Copenhaver, Michael; O’Connell, Daniel; Burdon, William; Pankow, Jennifer; Clarke, Jennifer; Oser, Carrie
2013-01-01
HIV risk is disproportionately high among incarcerated individuals. Corrections agencies have been slow to implement evidence-based guidelines and interventions for HIV prevention, testing, and treatment. The emerging field of implementation science focuses on organizational interventions to facilitate adoption and implementation of evidence-based practices. A survey of among CJ-DATS correctional agency partners revealed that HIV policies and practices in prevention, detection and medical care varied widely, with some corrections agencies and facilities closely matching national guidelines and/or implementing evidence-based interventions. Others, principally attributed to limited resources, had numerous gaps in delivery of best HIV service practices. A brief overview is provided of a new CJ-DATS cooperative research protocol, informed by the survey findings, to test an organization-level intervention to reduce HIV service delivery gaps in corrections. PMID:24078624
Paes, Thaís; Machado, Felipe Vilaça Cavallari; Cavalheri, Vinícius; Pitta, Fabio; Hernandes, Nidia Aparecida
2017-07-01
People with chronic obstructive pulmonary disease (COPD) present symptoms such as dyspnea and fatigue, which hinder their performance in activities of daily living (ADL). A few multitask protocols have been developed to assess ADL performance in this population, although measurement properties of such protocols were not yet systematically reviewed. Areas covered: Studies were included if an assessment of the ability to perform ADL was conducted in people with COPD using a (objective) performance-based protocol. The search was conducted in the following databases: Pubmed, EMBASE, Cochrane Library, PEDro, CINAHL and LILACS. Furthermore, hand searches were conducted. Expert commentary: Up to this moment, only three protocols had measurement properties described: the Glittre ADL Test, the Monitored Functional Task Evaluation and the Londrina ADL Protocol were shown to be valid and reliable whereas only the Glittre ADL Test was shown to be responsive to change after pulmonary rehabilitation. These protocols can be used in laboratory settings and clinical practice to evaluate ADL performance in people with COPD, although there is need for more in-depth information on their validity, reliability and especially responsiveness due to the growing interest in the accurate assessment of ADL performance in this population.