Sample records for e-ebppevidence-based practice protocol

  1. Developing an evidence-based practice protocol: implications for midwifery practice.

    PubMed

    Carr, K C

    2000-01-01

    Evidence-based practice is defined and its importance to midwifery practice is presented. Guidelines are provided for the development of an evidence-based practice protocol. These include: identifying the clinical question, obtaining the evidence, evaluating the validity and importance of the evidence, synthesizing the evidence and applying it to the development of a protocol or clinical algorithm, and, finally, developing an evaluation plan or measurement strategy to see if the new protocol is effective.

  2. MR efficiency using automated MRI-desktop eProtocol

    NASA Astrophysics Data System (ADS)

    Gao, Fei; Xu, Yanzhe; Panda, Anshuman; Zhang, Min; Hanson, James; Su, Congzhe; Wu, Teresa; Pavlicek, William; James, Judy R.

    2017-03-01

    MRI protocols are instruction sheets that radiology technologists use in routine clinical practice for guidance (e.g., slice position, acquisition parameters etc.). In Mayo Clinic Arizona (MCA), there are over 900 MR protocols (ranging across neuro, body, cardiac, breast etc.) which makes maintaining and updating the protocol instructions a labor intensive effort. The task is even more challenging given different vendors (Siemens, GE etc.). This is a universal problem faced by all the hospitals and/or medical research institutions. To increase the efficiency of the MR practice, we designed and implemented a web-based platform (eProtocol) to automate the management of MRI protocols. It is built upon a database that automatically extracts protocol information from DICOM compliant images and provides a user-friendly interface to the technologists to create, edit and update the protocols. Advanced operations such as protocol migrations from scanner to scanner and capability to upload Multimedia content were also implemented. To the best of our knowledge, eProtocol is the first MR protocol automated management tool used clinically. It is expected that this platform will significantly improve the radiology operations efficiency including better image quality and exam consistency, fewer repeat examinations and less acquisition errors. These protocols instructions will be readily available to the technologists during scans. In addition, this web-based platform can be extended to other imaging modalities such as CT, Mammography, and Interventional Radiology and different vendors for imaging protocol management.

  3. Practical quantum private query of blocks based on unbalanced-state Bennett-Brassard-1984 quantum-key-distribution protocol

    NASA Astrophysics Data System (ADS)

    Wei, Chun-Yan; Gao, Fei; Wen, Qiao-Yan; Wang, Tian-Yin

    2014-12-01

    Until now, the only kind of practical quantum private query (QPQ), quantum-key-distribution (QKD)-based QPQ, focuses on the retrieval of a single bit. In fact, meaningful message is generally composed of multiple adjacent bits (i.e., a multi-bit block). To obtain a message from database, the user Alice has to query l times to get each ai. In this condition, the server Bob could gain Alice's privacy once he obtains the address she queried in any of the l queries, since each ai contributes to the message Alice retrieves. Apparently, the longer the retrieved message is, the worse the user privacy becomes. To solve this problem, via an unbalanced-state technique and based on a variant of multi-level BB84 protocol, we present a protocol for QPQ of blocks, which allows the user to retrieve a multi-bit block from database in one query. Our protocol is somewhat like the high-dimension version of the first QKD-based QPQ protocol proposed by Jacobi et al., but some nontrivial modifications are necessary.

  4. Practical quantum private query of blocks based on unbalanced-state Bennett-Brassard-1984 quantum-key-distribution protocol

    PubMed Central

    Wei, Chun-Yan; Gao, Fei; Wen, Qiao-Yan; Wang, Tian-Yin

    2014-01-01

    Until now, the only kind of practical quantum private query (QPQ), quantum-key-distribution (QKD)-based QPQ, focuses on the retrieval of a single bit. In fact, meaningful message is generally composed of multiple adjacent bits (i.e., a multi-bit block). To obtain a message from database, the user Alice has to query l times to get each ai. In this condition, the server Bob could gain Alice's privacy once he obtains the address she queried in any of the l queries, since each ai contributes to the message Alice retrieves. Apparently, the longer the retrieved message is, the worse the user privacy becomes. To solve this problem, via an unbalanced-state technique and based on a variant of multi-level BB84 protocol, we present a protocol for QPQ of blocks, which allows the user to retrieve a multi-bit block from database in one query. Our protocol is somewhat like the high-dimension version of the first QKD-based QPQ protocol proposed by Jacobi et al., but some nontrivial modifications are necessary. PMID:25518810

  5. A Third-Party E-Payment Protocol Based on Quantum Group Blind Signature

    NASA Astrophysics Data System (ADS)

    Zhang, Jian-Zhong; Yang, Yuan-Yuan; Xie, Shu-Cui

    2017-09-01

    A third-party E-payment protocol based on quantum group blind signature is proposed in this paper. Our E-payment protocol could protect user's anonymity as the traditional E-payment systems do, and also have unconditional security which the classical E-payment systems can not provide. To achieve that, quantum key distribution, one-time pad and quantum group blind signature are adopted in our scheme. Furthermore, if there were a dispute, the manager Trent can identify who tells a lie.

  6. Practical quantum private query of blocks based on unbalanced-state Bennett-Brassard-1984 quantum-key-distribution protocol.

    PubMed

    Wei, Chun-Yan; Gao, Fei; Wen, Qiao-Yan; Wang, Tian-Yin

    2014-12-18

    Until now, the only kind of practical quantum private query (QPQ), quantum-key-distribution (QKD)-based QPQ, focuses on the retrieval of a single bit. In fact, meaningful message is generally composed of multiple adjacent bits (i.e., a multi-bit block). To obtain a message a1a2···al from database, the user Alice has to query l times to get each ai. In this condition, the server Bob could gain Alice's privacy once he obtains the address she queried in any of the l queries, since each a(i) contributes to the message Alice retrieves. Apparently, the longer the retrieved message is, the worse the user privacy becomes. To solve this problem, via an unbalanced-state technique and based on a variant of multi-level BB84 protocol, we present a protocol for QPQ of blocks, which allows the user to retrieve a multi-bit block from database in one query. Our protocol is somewhat like the high-dimension version of the first QKD-based QPQ protocol proposed by Jacobi et al., but some nontrivial modifications are necessary.

  7. Cryptanalysis of an inter-bank E-payment protocol based on quantum proxy blind signature

    NASA Astrophysics Data System (ADS)

    Cai, Xiao-Qiu; Wei, Chun-Yan

    2013-04-01

    We analyze the security of an inter-bank E-payment protocol based on quantum proxy blind signature, and find that there is a security leak in the quantum channels of this protocol, which gives a chance for an outside opponent to launch a special denial-of-service attack. Furthermore, we show that the dishonest merchant can succeed to change the purchase information of the customer in this protocol.

  8. SU-E-I-68: Practical Considerations On Implementation of the Image Gently Pediatric CT Protocols

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Zhang, J; Adams, C; Lumby, C

    Purpose: One limitation associated with the Image Gently pediatric CT protocols is practical implementation of the recommended manual techniques. Inconsistency as a result of different practice is a possibility among technologist. An additional concern is the added risk of data error that would result in over or underexposure. The Automatic Exposure Control (AEC) features automatically reduce radiation for children. However, they do not work efficiently for the patients of very small size and relative large size. This study aims to implement the Image Gently pediatric CT protocols in the practical setting while maintaining the use of AEC features for pediatricmore » patients of varying size. Methods: Anthropomorphological abdomen phantoms were scanned in a CT scanner using the Image Gently pediatric protocols, the AEC technique with a fixed adult baseline, and automatic protocols with various baselines. The baselines were adjusted corresponding to patient age, weight and posterioranterior thickness to match the Image Gently pediatric CT manual techniques. CTDIvol was recorded for each examination. Image noise was measured and recorded for image quality comparison. Clinical images were evaluated by pediatric radiologists. Results: By adjusting vendor default baselines used in the automatic techniques, radiation dose and image quality can match those of the Image Gently manual techniques. In practice, this can be achieved by dividing pediatric patients into three major groups for technologist reference: infant, small child, and large child. Further division can be done but will increase the number of CT protocols. For each group, AEC can efficiently adjust acquisition techniques for children. This implementation significantly overcomes the limitation of the Image Gently manual techniques. Conclusion: Considering the effectiveness in clinical practice, Image Gently Pediatric CT protocols can be implemented in accordance with AEC techniques, with adjusted baselines

  9. E-Learning and Evidence Based Practice in Schools

    ERIC Educational Resources Information Center

    Quong, Terrence

    2016-01-01

    JCTIC has used open source software to develop a unique school online environment that has made evidence based practice viable in their school. In this paper the proposition is made that eLearning enables evidence based practice which in turn leads to improved student outcomes. Much has been written about evidence based practice in schools, but…

  10. A Trusted Third-Party E-Payment Protocol Based on Quantum Blind Signature Without Entanglement

    NASA Astrophysics Data System (ADS)

    Guo, Xi; Zhang, Jian-Zhong; Xie, Shu-Cui

    2018-06-01

    In this paper, we present a trusted third-party e-payment protocol which is designed based on quantum blind signature without entanglement. The security and verifiability of our scheme are guaranteed by using single-particle unitary operation, quantum key distribution (QKD) protocol and one-time pad. Furthermore, once there is a dispute among the participants, it can be solved with the assistance of the third-party platform which is reliant.

  11. A Third-Party E-payment Protocol Based on Quantum Multi-proxy Blind Signature

    NASA Astrophysics Data System (ADS)

    Niu, Xu-Feng; Zhang, Jian-Zhong; Xie, Shu-Cui; Chen, Bu-Qing

    2018-05-01

    A third-party E-payment protocol is presented in this paper. It is based on quantum multi-proxy blind signature. Adopting the techniques of quantum key distribution, one-time pad and quantum multi-proxy blind signature, our third-party E-payment system could protect user's anonymity as the traditional E-payment systems do, and also have unconditional security which the classical E-payment systems can not provide. Furthermore, compared with the existing quantum E-payment systems, the proposed system could support the E-payment which using the third-party platforms.

  12. Practical Use of the Extended No Action Level (eNAL) Correction Protocol for Breast Cancer Patients With Implanted Surgical Clips

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Penninkhof, Joan, E-mail: j.penninkhof@erasmusmc.nl; Quint, Sandra; Baaijens, Margreet

    Purpose: To describe the practical use of the extended No Action Level (eNAL) setup correction protocol for breast cancer patients with surgical clips and evaluate its impact on the setup accuracy of both tumor bed and whole breast during simultaneously integrated boost treatments. Methods and Materials: For 80 patients, two orthogonal planar kilovoltage images and one megavoltage image (for the mediolateral beam) were acquired per fraction throughout the radiotherapy course. For setup correction, the eNAL protocol was applied, based on registration of surgical clips in the lumpectomy cavity. Differences with respect to application of a No Action Level (NAL) protocolmore » or no protocol were quantified for tumor bed and whole breast. The correlation between clip migration during the fractionated treatment and either the method of surgery or the time elapsed from last surgery was investigated. Results: The distance of the clips to their center of mass (COM), averaged over all clips and patients, was reduced by 0.9 {+-} 1.2 mm (mean {+-} 1 SD). Clip migration was similar between the group of patients starting treatment within 100 days after surgery (median, 53 days) and the group starting afterward (median, 163 days) (p = 0.20). Clip migration after conventional breast surgery (closing the breast superficially) or after lumpectomy with partial breast reconstructive techniques (sutured cavity). was not significantly different either (p = 0.22). Application of eNAL on clips resulted in residual systematic errors for the clips' COM of less than 1 mm in each direction, whereas the setup of the breast was within about 2 mm of accuracy. Conclusions: Surgical clips can be safely used for high-accuracy position verification and correction. Given compensation for time trends in the clips' COM throughout the treatment course, eNAL resulted in better setup accuracies for both tumor bed and whole breast than NAL.« less

  13. Protocol-based care: the standardisation of decision-making?

    PubMed

    Rycroft-Malone, Jo; Fontenla, Marina; Seers, Kate; Bick, Debra

    2009-05-01

    To explore how protocol-based care affects clinical decision-making. In the context of evidence-based practice, protocol-based care is a mechanism for facilitating the standardisation of care and streamlining decision-making through rationalising the information with which to make judgements and ultimately decisions. However, whether protocol-based care does, in the reality of practice, standardise decision-making is unknown. This paper reports on a study that explored the impact of protocol-based care on nurses' decision-making. Theoretically informed by realistic evaluation and the promoting action on research implementation in health services framework, a case study design using ethnographic methods was used. Two sites were purposively sampled; a diabetic and endocrine unit and a cardiac medical unit. Within each site, data collection included observation, postobservation semi-structured interviews with staff and patients, field notes, feedback sessions and document review. Data were inductively and thematically analysed. Decisions made by nurses in both sites were varied according to many different and interacting factors. While several standardised care approaches were available for use, in reality, a variety of information sources informed decision-making. The primary approach to knowledge exchange and acquisition was person-to-person; decision-making was a social activity. Rarely were standardised care approaches obviously referred to; nurses described following a mental flowchart, not necessarily linked to a particular guideline or protocol. When standardised care approaches were used, it was reported that they were used flexibly and particularised. While the logic of protocol-based care is algorithmic, in the reality of clinical practice, other sources of information supported nurses' decision-making process. This has significant implications for the political goal of standardisation. The successful implementation and judicious use of tools such as

  14. Quantum key distribution protocol based on contextuality monogamy

    NASA Astrophysics Data System (ADS)

    Singh, Jaskaran; Bharti, Kishor; Arvind

    2017-06-01

    The security of quantum key distribution (QKD) protocols hinges upon features of physical systems that are uniquely quantum in nature. We explore the role of quantumness, as qualified by quantum contextuality, in a QKD scheme. A QKD protocol based on the Klyachko-Can-Binicioğlu-Shumovsky (KCBS) contextuality scenario using a three-level quantum system is presented. We explicitly show the unconditional security of the protocol by a generalized contextuality monogamy relationship based on the no-disturbance principle. This protocol provides a new framework for QKD which has conceptual and practical advantages over other protocols.

  15. Diagnosis Protocol of Stomach Distemperament for Clinical Practice in Iranian Traditional Medicine: A Narrative Review

    PubMed Central

    ALIZADEH, Mahdi; KHADEM, Ebrahim; ALIASL, Jale

    2017-01-01

    Background: In Iranian traditional medicine (ITM) stomach is the important organ in the body. Its disorders can affect other organs such as liver, heart and also can cause depression. Stomach distemperaments can cause some disorders. The purpose of this study was to provide a diagnostic method of stomach distemperament for clinical practice. Methods: In this study authoritative ITM books such as Canon of Avicenna, Zakhirah-E-Kharazm Shahi by Hakim Esmail Jorjani, Kamel al-Sina’ah al-Tibbiyah by Ali ibn al-‘Abbas al-Majusi were assessed and symptoms and signs of stomach distemperament were collected. Results: Stomach has some normal temperament. The imbalance in temperament and humor can cause distemperments. There are 12 types of stomach distemperament and based on symptoms and signs a primary protocol is designed for diagnosis of stomach distemperament. Conclusion: There is no available guideline for gastric distemperamet diagnosis protocol. As a result, the presented protocol should be considered for use in clinical practice. PMID:28845397

  16. An in silico method to identify computer-based protocols worthy of clinical study: An insulin infusion protocol use case

    PubMed Central

    Wong, Anthony F; Pielmeier, Ulrike; Haug, Peter J; Andreassen, Steen

    2016-01-01

    Objective Develop an efficient non-clinical method for identifying promising computer-based protocols for clinical study. An in silico comparison can provide information that informs the decision to proceed to a clinical trial. The authors compared two existing computer-based insulin infusion protocols: eProtocol-insulin from Utah, USA, and Glucosafe from Denmark. Materials and Methods The authors used eProtocol-insulin to manage intensive care unit (ICU) hyperglycemia with intravenous (IV) insulin from 2004 to 2010. Recommendations accepted by the bedside clinicians directly link the subsequent blood glucose values to eProtocol-insulin recommendations and provide a unique clinical database. The authors retrospectively compared in silico 18 984 eProtocol-insulin continuous IV insulin infusion rate recommendations from 408 ICU patients with those of Glucosafe, the candidate computer-based protocol. The subsequent blood glucose measurement value (low, on target, high) was used to identify if the insulin recommendation was too high, on target, or too low. Results Glucosafe consistently provided more favorable continuous IV insulin infusion rate recommendations than eProtocol-insulin for on target (64% of comparisons), low (80% of comparisons), or high (70% of comparisons) blood glucose. Aggregated eProtocol-insulin and Glucosafe continuous IV insulin infusion rates were clinically similar though statistically significantly different (Wilcoxon signed rank test P = .01). In contrast, when stratified by low, on target, or high subsequent blood glucose measurement, insulin infusion rates from eProtocol-insulin and Glucosafe were statistically significantly different (Wilcoxon signed rank test, P < .001), and clinically different. Discussion This in silico comparison appears to be an efficient nonclinical method for identifying promising computer-based protocols. Conclusion Preclinical in silico comparison analytical framework allows rapid and inexpensive

  17. An eCK-Secure Authenticated Key Exchange Protocol without Random Oracles

    NASA Astrophysics Data System (ADS)

    Moriyama, Daisuke; Okamoto, Tatsuaki

    This paper presents a (PKI-based) two-pass authenticated key exchange (AKE) protocol that is secure in the extended Canetti-Krawczyk (eCK) security model. The security of the proposed protocol is proven without random oracles (under three assumptions), and relies on no implementation techniques such as a trick by LaMacchia, Lauter and Mityagin (so-called the NAXOS trick). Since an AKE protocol that is eCK-secure under a NAXOS-like implementation trick will be no more eCK-secure if some realistic information leakage occurs through side-channel attacks, it has been an important open problem how to realize an eCK-secure AKE protocol without using the NAXOS tricks (and without random oracles).

  18. A web-based multidomain lifestyle intervention with connected devices for older adults: research protocol of the eMIND pilot randomized controlled trial.

    PubMed

    Pothier, Kristell; Soriano, G; Lussier, M; Naudin, A; Costa, N; Guyonnet, S; Piau, A; Ousset, P J; Nourhashemi, F; Vellas, B; de Souto Barreto, P

    2018-01-24

    Multidomain interventions composed of nutritional counseling, exercise and cognitive trainings have shown encouraging results as effective preventive strategies delaying age-related declines. However, these interventions are time- and resource-consuming. The use of Information and Communication Technologies (ICT) might facilitate the translation from research into real-world practice and reach a massive number of people. This article describes the protocol of the eMIND study, a randomized controlled trial (RCT) using a web-based multidomain intervention for older adults. One hundred and twenty older adults (≥ 65 years), with a spontaneous memory complaint, will be randomly assigned to a six-month web-based multidomain (nutritional counseling, physical and cognitive trainings) intervention group with a connected accelerometer (number of steps, energy expenditure), or to a control group with access to general information on healthy aging plus the accelerometer, but no access to the multidomain intervention. The main outcome is the feasibility/acceptability of the web-based intervention. Secondary clinical outcomes include: cognitive functions, physical performance, nutritional status and cost-effectiveness. We expect a high amount of adherers (ie, > 75% compliance to the protocol) to reflect the feasibility. Acceptability, assessed through interviews, should allow us to understand motivators and barriers to this ICT intervention. We also expect to provide data on its effects on various clinical outcomes and efficiency. The eMIND study will provide crucial information to help developing a future and larger web-based multidomain lifestyle RCT, which should facilitate the translation of this ICT intervention from the research world into real-life clinical practice for the healthcare of older adults.

  19. Development of a waste management protocol based on assessment of knowledge and practice of healthcare personnel in surgical departments.

    PubMed

    Mostafa, Gehan M A; Shazly, Mona M; Sherief, Wafaa I

    2009-01-01

    , and housekeepers have unsatisfactory knowledge and inadequate practice related to health care waste management. The knowledge among nurses is positively affected by attendance of training programs. Based on the findings, a protocol for healthcare waste management was developed and validated. It is recommended to implement the developed waste management protocol for the surgical departments in the designed hospital, with establishment of waste management audits.

  20. A Generalized Model of E-trading for GSR Fair Exchange Protocol

    NASA Astrophysics Data System (ADS)

    Konar, Debajyoti; Mazumdar, Chandan

    In this paper we propose a generalized model of E-trading for the development of GSR Fair Exchange Protocols. Based on the model, a method is narrated to implement E-trading protocols that ensure fairness in true sense without using an additional trusted third party for which either party has to pay. The model provides the scope to include the correctness of the product, money atomicity and customer's anonymity properties within E-trading protocol. We conclude this paper by indicating the area of applicability for our model.

  1. Colon cleansing protocol in children: research conditions vs. clinical practice.

    PubMed

    Elitsur, Yoram; Balfaqih, Yaslam; Preston, Deborah

    2018-04-01

     Colon preparation rates are the limiting factor for a successful diagnostic colonoscopy in children. Different colon cleansing protocols have been published for use in children. Unfortunately, the applicability of those published research protocols has not been formally evaluated in routine clinical practice. We investigated the success rate of our previously published colon cleansing protocol as utilized in our clinical practice.  This was a retrospective study. In the clinical practice, the colon cleansing protocol included PEG-3350 at a dose of 2 g/kg/day plus Dulcolax (Bisacodyl, Boehringer Ingelheim, TX USA) 5 mg/day for 2 days. Adequate colon preparation was graded between 1 - 5, as previously described, and grade ≥ 4.0 was considered an adequate preparation. Patients were instructed to complete a questionnaire that included PEG-3350 dose, number of stools per day, consistency of each stool, and side effects (vomiting, abdominal pain). Clinical and endoscopic results were compared between the protocol under research conditions and routine practice.  The success rate of the colon preparation in our clinical practice was similar to the results observed under our research protocol (75 % vs. 73.6 %). Moreover, the total number of stools, stool consistency, and the intubation rate of the terminal ileum were also similar. We concluded, that in our experience, the colon cleansing protocol used under research conditions was effective and appropriate for use in routine clinical practice.  We recommend testing each new protocol under the routine conditions of clinical practice to confirm its applicability for general practitioners.

  2. Practical private database queries based on a quantum-key-distribution protocol

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Jakobi, Markus; Humboldt-Universitaet zu Berlin, D-10117 Berlin; Simon, Christoph

    2011-02-15

    Private queries allow a user, Alice, to learn an element of a database held by a provider, Bob, without revealing which element she is interested in, while limiting her information about the other elements. We propose to implement private queries based on a quantum-key-distribution protocol, with changes only in the classical postprocessing of the key. This approach makes our scheme both easy to implement and loss tolerant. While unconditionally secure private queries are known to be impossible, we argue that an interesting degree of security can be achieved by relying on fundamental physical principles instead of unverifiable security assumptions inmore » order to protect both the user and the database. We think that the scope exists for such practical private queries to become another remarkable application of quantum information in the footsteps of quantum key distribution.« less

  3. Protocols for pressure ulcer prevention: are they evidence-based?

    PubMed

    Chaves, Lidice M; Grypdonck, Mieke H F; Defloor, Tom

    2010-03-01

    This study is a report of a study to determine the quality of protocols for pressure ulcer prevention in home care in the Netherlands. If pressure ulcer prevention protocols are evidence-based and practitioners use them correctly in practice, this will result a reduction in pressure ulcers. Very little is known about the evidence-based content and quality of the pressure ulcer prevention protocols. In 2008, current pressure ulcer prevention protocols from 24 home-care agencies in the Netherlands were evaluated. A checklist developed and validated by two pressure ulcer prevention experts was used to assess the quality of the protocols, and weighted and unweighted quality scores were computed and analysed using descriptive statistics. The 24 pressure ulcer prevention protocols had a mean weighted quality score of 63.38 points out of a maximum of 100 (sd 5). The importance of observing the skin at the pressure points at least once a day was emphasized in 75% of the protocols. Only 42% correctly warned against the use of materials that were 'less effective or that could potentially cause harm'. Pressure ulcer prevention commands a reasonable amount of attention in home care, but the incidence of pressure ulcers and lack of a consistent, standardized document for use in actual practice indicate a need for systematic implementation of national pressure ulcer prevention standards in the Netherlands to ensure adherence to the established protocols.

  4. A Guide to Writing a Qualitative Systematic Review Protocol to Enhance Evidence-Based Practice in Nursing and Health Care.

    PubMed

    Butler, Ashleigh; Hall, Helen; Copnell, Beverley

    2016-06-01

    The qualitative systematic review is a rapidly developing area of nursing research. In order to present trustworthy, high-quality recommendations, such reviews should be based on a review protocol to minimize bias and enhance transparency and reproducibility. Although there are a number of resources available to guide researchers in developing a quantitative review protocol, very few resources exist for qualitative reviews. To guide researchers through the process of developing a qualitative systematic review protocol, using an example review question. The key elements required in a systematic review protocol are discussed, with a focus on application to qualitative reviews: Development of a research question; formulation of key search terms and strategies; designing a multistage review process; critical appraisal of qualitative literature; development of data extraction techniques; and data synthesis. The paper highlights important considerations during the protocol development process, and uses a previously developed review question as a working example. This paper will assist novice researchers in developing a qualitative systematic review protocol. By providing a worked example of a protocol, the paper encourages the development of review protocols, enhancing the trustworthiness and value of the completed qualitative systematic review findings. Qualitative systematic reviews should be based on well planned, peer reviewed protocols to enhance the trustworthiness of results and thus their usefulness in clinical practice. Protocols should outline, in detail, the processes which will be used to undertake the review, including key search terms, inclusion and exclusion criteria, and the methods used for critical appraisal, data extraction and data analysis to facilitate transparency of the review process. Additionally, journals should encourage and support the publication of review protocols, and should require reference to a protocol prior to publication of the

  5. Compliance with AAPM Practice Guideline 1.a: CT Protocol Management and Review — from the perspective of a university hospital

    PubMed Central

    Bour, Robert K.; Pozniak, Myron; Ranallo, Frank N.

    2015-01-01

    The purpose of this paper is to describe our experience with the AAPM Medical Physics Practice Guideline 1.a: “CT Protocol Management and Review Practice Guideline”. Specifically, we will share how our institution's quality management system addresses the suggestions within the AAPM practice report. We feel this paper is needed as it was beyond the scope of the AAPM practice guideline to provide specific details on fulfilling individual guidelines. Our hope is that other institutions will be able to emulate some of our practices and that this article would encourage other types of centers (e.g., community hospitals) to share their methodology for approaching CT protocol optimization and quality control. Our institution had a functioning CT protocol optimization process, albeit informal, since we began using CT. Recently, we made our protocol development and validation process compliant with a number of the ISO 9001:2008 clauses and this required us to formalize the roles of the members of our CT protocol optimization team. We rely heavily on PACS‐based IT solutions for acquiring radiologist feedback on the performance of our CT protocols and the performance of our CT scanners in terms of dose (scanner output) and the function of the automatic tube current modulation. Specific details on our quality management system covering both quality control and ongoing optimization have been provided. The roles of each CT protocol team member have been defined, and the critical role that IT solutions provides for the management of files and the monitoring of CT protocols has been reviewed. In addition, the invaluable role management provides by being a champion for the project has been explained; lack of a project champion will mitigate the efforts of a CT protocol optimization team. Meeting the guidelines set forth in the AAPM practice guideline was not inherently difficult, but did, in our case, require the cooperation of radiologists, technologists, physicists, IT

  6. Connecting Reflective Practice, Dialogic Protocols, and Professional Learning

    ERIC Educational Resources Information Center

    Nehring, James; Laboy, Wilfredo T.; Catarius, Lynn

    2010-01-01

    In recent years, elements of reflective practice have been popularized in state school professional development. As reflective practice has moved into the mainstream, dialogic protocols have been developed by numerous organizations to structure discourse for deep understanding, enhance professional practice and advance organizational learning.…

  7. A realistic evaluation: the case of protocol-based care

    PubMed Central

    2010-01-01

    Background 'Protocol based care' was envisioned by policy makers as a mechanism for delivering on the service improvement agenda in England. Realistic evaluation is an increasingly popular approach, but few published examples exist, particularly in implementation research. To fill this gap, within this paper we describe the application of a realistic evaluation approach to the study of protocol-based care, whilst sharing findings of relevance about standardising care through the use of protocols, guidelines, and pathways. Methods Situated between positivism and relativism, realistic evaluation is concerned with the identification of underlying causal mechanisms, how they work, and under what conditions. Fundamentally it focuses attention on finding out what works, for whom, how, and in what circumstances. Results In this research, we were interested in understanding the relationships between the type and nature of particular approaches to protocol-based care (mechanisms), within different clinical settings (context), and what impacts this resulted in (outcomes). An evidence review using the principles of realist synthesis resulted in a number of propositions, i.e., context, mechanism, and outcome threads (CMOs). These propositions were then 'tested' through multiple case studies, using multiple methods including non-participant observation, interviews, and document analysis through an iterative analysis process. The initial propositions (conjectured CMOs) only partially corresponded to the findings that emerged during analysis. From the iterative analysis process of scrutinising mechanisms, context, and outcomes we were able to draw out some theoretically generalisable features about what works, for whom, how, and what circumstances in relation to the use of standardised care approaches (refined CMOs). Conclusions As one of the first studies to apply realistic evaluation in implementation research, it was a good fit, particularly given the growing emphasis on

  8. Study on Cloud Security Based on Trust Spanning Tree Protocol

    NASA Astrophysics Data System (ADS)

    Lai, Yingxu; Liu, Zenghui; Pan, Qiuyue; Liu, Jing

    2015-09-01

    Attacks executed on Spanning Tree Protocol (STP) expose the weakness of link layer protocols and put the higher layers in jeopardy. Although the problems have been studied for many years and various solutions have been proposed, many security issues remain. To enhance the security and credibility of layer-2 network, we propose a trust-based spanning tree protocol aiming at achieving a higher credibility of LAN switch with a simple and lightweight authentication mechanism. If correctly implemented in each trusted switch, the authentication of trust-based STP can guarantee the credibility of topology information that is announced to other switch in the LAN. To verify the enforcement of the trusted protocol, we present a new trust evaluation method of the STP using a specification-based state model. We implement a prototype of trust-based STP to investigate its practicality. Experiment shows that the trusted protocol can achieve security goals and effectively avoid STP attacks with a lower computation overhead and good convergence performance.

  9. A Low Cost Key Agreement Protocol Based on Binary Tree for EPCglobal Class 1 Generation 2 RFID Protocol

    NASA Astrophysics Data System (ADS)

    Jeng, Albert; Chang, Li-Chung; Chen, Sheng-Hui

    There are many protocols proposed for protecting Radio Frequency Identification (RFID) system privacy and security. A number of these protocols are designed for protecting long-term security of RFID system using symmetric key or public key cryptosystem. Others are designed for protecting user anonymity and privacy. In practice, the use of RFID technology often has a short lifespan, such as commodity check out, supply chain management and so on. Furthermore, we know that designing a long-term security architecture to protect the security and privacy of RFID tags information requires a thorough consideration from many different aspects. However, any security enhancement on RFID technology will jack up its cost which may be detrimental to its widespread deployment. Due to the severe constraints of RFID tag resources (e. g., power source, computing power, communication bandwidth) and open air communication nature of RFID usage, it is a great challenge to secure a typical RFID system. For example, computational heavy public key and symmetric key cryptography algorithms (e. g., RSA and AES) may not be suitable or over-killed to protect RFID security or privacy. These factors motivate us to research an efficient and cost effective solution for RFID security and privacy protection. In this paper, we propose a new effective generic binary tree based key agreement protocol (called BKAP) and its variations, and show how it can be applied to secure the low cost and resource constraint RFID system. This BKAP is not a general purpose key agreement protocol rather it is a special purpose protocol to protect privacy, un-traceability and anonymity in a single RFID closed system domain.

  10. Analysis of practical backoff protocols for contention resolution with multiple servers

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Goldberg, L.A.; MacKenzie, P.D.

    Backoff protocols are probably the most widely used protocols for contention resolution in multiple access channels. In this paper, we analyze the stochastic behavior of backoff protocols for contention resolution among a set of clients and servers, each server being a multiple access channel that deals with contention like an Ethernet channel. We use the standard model in which each client generates requests for a given server according to a Bemoulli distribution with a specified mean. The client-server request rate of a system is the maximum over all client-server pairs (i, j) of the sum of all request rates associatedmore » with either client i or server j. Our main result is that any superlinear polynomial backoff protocol is stable for any multiple-server system with a sub-unit client-server request rate. We confirm the practical relevance of our result by demonstrating experimentally that the average waiting time of requests is very small when such a system is run with reasonably few clients and reasonably small request rates such as those that occur in actual ethernets. Our result is the first proof of stability for any backoff protocol for contention resolution with multiple servers. Our result is also the first proof that any weakly acknowledgment based protocol is stable for contention resolution with multiple servers and such high request rates. Two special cases of our result are of interest. Hastad, Leighton and Rogoff have shown that for a single-server system with a sub-unit client-server request rate any modified superlinear polynomial backoff protocol is stable. These modified backoff protocols are similar to standard backoff protocols but require more random bits to implement. The special case of our result in which there is only one server extends the result of Hastad, Leighton and Rogoff to standard (practical) backoff protocols. Finally, our result applies to dynamic routing in optical networks.« less

  11. TH-E-209-00: Radiation Dose Monitoring and Protocol Management

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    NONE

    Radiation dose monitoring solutions have opened up new opportunities for medical physicists to be more involved in modern clinical radiology practices. In particular, with the help of comprehensive radiation dose data, data-driven protocol management and informed case follow up are now feasible. Significant challenges remain however and the problems faced by medical physicists are highly heterogeneous. Imaging systems from multiple vendors and a wide range of vintages co-exist in the same department and employ data communication protocols that are not fully standardized or implemented making harmonization complex. Many different solutions for radiation dose monitoring have been implemented by imaging facilitiesmore » over the past few years. Such systems are based on commercial software, home-grown IT solutions, manual PACS data dumping, etc., and diverse pathways can be used to bring the data to impact clinical practice. The speakers will share their experiences with creating or tailoring radiation dose monitoring/management systems and procedures over the past few years, which vary significantly in design and scope. Topics to cover: (1) fluoroscopic dose monitoring and high radiation event handling from a large academic hospital; (2) dose monitoring and protocol optimization in pediatric radiology; and (3) development of a home-grown IT solution and dose data analysis framework. Learning Objectives: Describe the scope and range of radiation dose monitoring and protocol management in a modern radiology practice Review examples of data available from a variety of systems and how it managed and conveyed. Reflect on the role of the physicist in radiation dose awareness.« less

  12. Evidence-Based Nonpharmacological Practices to Address Behavioral and Psychological Symptoms of Dementia.

    PubMed

    Scales, Kezia; Zimmerman, Sheryl; Miller, Stephanie J

    2018-01-18

    To draw from systematic and other literature reviews to identify, describe, and critique nonpharmacological practices to address behavioral and psychological symptoms of dementia (BPSDs) and provide evidence-based recommendations for dementia care especially useful for potential adopters. A search of systematic and other literature reviews published from January 2010 through January 2017. Nonpharmacological practices were summarized to describe the overall conceptual basis related to effectiveness, the practice itself, and the size and main conclusions of the evidence base. Each practice was also critically reviewed to determine acceptability, harmful effects, elements of effectiveness, and level of investment required, based on time needed for training/implementation, specialized care provider requirements, and equipment/capital requirements. Nonpharmacological practices to address BPSDs include sensory practices (aromatherapy, massage, multi-sensory stimulation, bright light therapy), psychosocial practices (validation therapy, reminiscence therapy, music therapy, pet therapy, meaningful activities), and structured care protocols (bathing, mouth care). Most practices are acceptable, have no harmful effects, and require minimal to moderate investment. Nonpharmacological practices are person-centered, and their selection can be informed by considering the cause and meaning of the individual's behavioral and psychological symptoms. Family caregivers and paid care providers can implement evidence-based practices in home or residential care settings, although some practices require the development of more specific protocols if they are to become widely used in an efficacious manner. © The Author(s) 2018. Published by Oxford University Press on behalf of The Gerontological Society of America. All rights reserved. For permissions, please e-mail: journals.permissions@oup.com.

  13. Translating evidence-based protocol of wound drain management for total joint arthroplasty into practice: A quasi-experimental study.

    PubMed

    Tsang, Lap Fung; Cheng, Hang Cheong; Ho, Hon Shuen; Hsu, Yung Chak; Chow, Chiu Man; Law, Heung Wah; Fong, Lup Chau; Leung, Lok Ming; Kong, Ivy Ching Yan; Chan, Chi Wai; Sham, Alice So Yuen

    2016-05-01

    Although various drains have long been used in total joint replacement, evidence suggests inconsistent practice exists in the use of drainage systems including intermittently applying suction or free of drainage suction, and variations in the optimal timing for wound drain removal. A comprehensive systematic review of available evidence up to 2013 was conducted in a previous study and a protocol was adapted for clinical application according to the summary of the retrieved information (Tsang, 2015). To determine if the protocol could reduce blood loss and blood transfusion after operation and to develop a record form so as to enhance communication of drainage record amongst surgeons and nurses. A quasi-experimental time-series design was undertaken. In the conventional group, surgeons ordered free drainage if the drain output was more than 300 ml. The time of removal of the drain was based on their professional judgement. In the protocol group the method of drainage was dependant of the drainage output as was the timing of the removal of the drain. A standardized record form was developed to guide operating room and orthopaedic ward nurses to manage the drainage system. The drain was removed significantly earlier in the protocol group. Blood loss rate at the first hour of post-operation was extremely low in the protocol group due to clamping effect. Blood loss in volume during the first three hours in the protocol group was significantly lower than that in the conventional group. Only in 11.1% and 4% of cases was it necessary to clamp at the three and four hour post-operative hours. No clamping was required at the two and eight hour postoperative period. There was no significant difference in blood loss during the removal of the drain and during blood transfusion, which was required for patients upon removal of the drain in the two groups. This is the first clinical study to develop an evidence-based protocol to manage wound drain effectively in Hong Kong. Total

  14. An electronic specimen collection protocol schema (eSCPS). Document architecture for specimen management and the exchange of specimen collection protocols between biobanking information systems.

    PubMed

    Eminaga, O; Semjonow, A; Oezguer, E; Herden, J; Akbarov, I; Tok, A; Engelmann, U; Wille, S

    2014-01-01

    The integrity of collection protocols in biobanking is essential for a high-quality sample preparation process. However, there is not currently a well-defined universal method for integrating collection protocols in the biobanking information system (BIMS). Therefore, an electronic schema of the collection protocol that is based on Extensible Markup Language (XML) is required to maintain the integrity and enable the exchange of collection protocols. The development and implementation of an electronic specimen collection protocol schema (eSCPS) was performed at two institutions (Muenster and Cologne) in three stages. First, we analyzed the infrastructure that was already established at both the biorepository and the hospital information systems of these institutions and determined the requirements for the sufficient preparation of specimens and documentation. Second, we designed an eSCPS according to these requirements. Finally, a prospective study was conducted to implement and evaluate the novel schema in the current BIMS. We designed an eSCPS that provides all of the relevant information about collection protocols. Ten electronic collection protocols were generated using the supplementary Protocol Editor tool, and these protocols were successfully implemented in the existing BIMS. Moreover, an electronic list of collection protocols for the current studies being performed at each institution was included, new collection protocols were added, and the existing protocols were redesigned to be modifiable. The documentation time was significantly reduced after implementing the eSCPS (5 ± 2 min vs. 7 ± 3 min; p = 0.0002). The eSCPS improves the integrity and facilitates the exchange of specimen collection protocols in the existing open-source BIMS.

  15. A Practice-Based Evaluation of Distress Screening Protocol Adherence and Medical Service Utilization.

    PubMed

    Zebrack, Brad; Kayser, Karen; Bybee, Deborah; Padgett, Lynne; Sundstrom, Laura; Jobin, Chad; Oktay, Julianne

    2017-07-01

    Background: This study examined the extent to which cancer programs demonstrated adherence to their own prescribed screening protocol, and whether adherence to that protocol was associated with medical service utilization. The hypothesis is that higher rates of service utilization are associated with lower rates of adherence to screening protocols. Methods: Oncology social workers at Commission on Cancer-accredited cancer programs reviewed electronic health records (EHRs) in their respective cancer programs during a 2-month period in 2014. Rates of overall adherence to a prescribed distress screening protocol were calculated based on documentation in the EHR that screening adherence and an appropriate clinical response had occurred. We examined documentation of emergency department (ED) use and hospitalization within 2 months after the screening visit. Results: Review of 8,409 EHRs across 55 cancer centers indicated that the overall adherence rate to screening protocols was 62.7%. The highest rates of adherence were observed in Community Cancer Programs (76.3%) and the lowest rates were in NCI-designated Cancer Centers (43.3%). Rates of medical service utilization were significantly higher than expected when overall protocol adherence was lacking. After controlling for patient and institutional characteristics, risk ratios for ED use (0.82) and hospitalization (0.81) suggest that when overall protocol adherence was documented, 18% to 19% fewer patients used these medical services. Conclusions: The observed associations between a mandated psychosocial care protocol and medical service utilization suggest opportunities for operational efficiencies and costs savings. Further investigations of protocol integrity, as well as the clinical care models by which psychosocial care is delivered, are warranted. Copyright © 2017 by the National Comprehensive Cancer Network.

  16. Is the flexible GnRH antagonist protocol better suited for fresh eSET cycles?

    PubMed

    Dahdouh, Elias M; Gomes, Francisco L A F; Granger, Louis; Carranza-Mamane, Belina; Faruqi, Faez; Kattygnarath, Tiao-Virirak; St-Michel, Pierre

    2014-10-01

    This study was performed to evaluate the efficacy of the flexible GnRH antagonist protocol in comparison with the long GnRH agonist protocol in elective single embryo transfer (eSET) practice. It was conducted in a publicly funded in vitro fertilization program. We performed a prospective cohort analysis of data from a private infertility clinic from August 2010 to August 2011. Three hundred fourteen women with normal ovarian reserve and undergoing fresh eSET cycles were included. Sixty-four women underwent follicular stimulation using a flexible GnRH antagonist protocol, and 250 underwent stimulation with a standard long mid-luteal GnRH agonist protocol. Implantation rates (35.9% in the GnRH antagonist group and 29.6% in the GnRH agonist group, P = 0.5) and ongoing pregnancy rates (32.8% in the GnRH antagonist group and 28.8% in the GnRH agonist group, P = 0.5) were equivalent in both groups. The duration of stimulation (9.8 ± 2 days vs. 10.7 ± 1.8 days, P < 0.001) and total FSH dose required (2044 vs. 2775 IU, P < 0.001) were lower in the GnRH antagonist group than in the GnRH agonist group. The number of mature oocytes (6.0 vs. 10.0, P < 0. 001) and number of embryos (5.0 vs. 7.0, P < 0.001) were also lower in GnRH antagonist group. However, the number of embryos cryopreserved was similar in both groups (median 2.0, P = 0.3). In women undergoing in vitro fertilization, the flexible GnRH antagonist protocol yields implantation and ongoing pregnancy rates that are similar to the long GnRH agonist protocol, and requires lower doses of gonadotropins and a shorter duration of treatment. The flexible GnRH antagonist protocol appears to be the protocol of choice for an eSET IVF program.

  17. Recasting a traditional laboratory practical as a "Design-your-own protocol" to teach a universal research skill.

    PubMed

    Whitworth, David E

    2016-07-08

    Laboratory-based practical classes are a common feature of life science teaching, during which students learn how to perform experiments and generate/interpret data. Practical classes are typically instructional, concentrating on providing topic- and technique-specific skills, however to produce research-capable graduates it is also important to develop generic practical skills. To provide an opportunity for students to develop the skills needed to create bespoke protocols for experimental benchwork, a traditional practical was repurposed. Students were given a list of available resources and an experimental goal, and directed to create a bench protocol to achieve the aim (measuring the iron in hemoglobin). In a series of teaching events students received feedback from staff, and peers prototyped the protocols, before protocols were finally implemented. Graduates highlighted this exercise as one of the most important of their degrees, primarily because of the clear relevance of the skills acquired to professional practice. The exercise exemplifies a range of pedagogic principles, but arguably its most important innovation is that it repurposed a pre-existing practical. This had the benefits of automatically providing scaffolding to direct the students' thought processes, while retaining the advantages of a "discovery learning" exercise, and allowing facile adoption of the approach across the sector. © 2016 by The International Union of Biochemistry and Molecular Biology, 44(4):377-380, 2016. © 2016 The International Union of Biochemistry and Molecular Biology.

  18. A proportional integral estimator-based clock synchronization protocol for wireless sensor networks.

    PubMed

    Yang, Wenlun; Fu, Minyue

    2017-11-01

    Clock synchronization is an issue of vital importance in applications of WSNs. This paper proposes a proportional integral estimator-based protocol (EBP) to achieve clock synchronization for wireless sensor networks. As each local clock skew gradually drifts, synchronization accuracy will decline over time. Compared with existing consensus-based approaches, the proposed synchronization protocol improves synchronization accuracy under time-varying clock skews. Moreover, by restricting synchronization error of clock skew into a relative small quantity, it could reduce periodic re-synchronization frequencies. At last, a pseudo-synchronous implementation for skew compensation is introduced as synchronous protocol is unrealistic in practice. Numerical simulations are shown to illustrate the performance of the proposed protocol. Copyright © 2017 ISA. Published by Elsevier Ltd. All rights reserved.

  19. TH-E-209-02: Dose Monitoring and Protocol Optimization: The Pediatric Perspective

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    MacDougall, R.

    Radiation dose monitoring solutions have opened up new opportunities for medical physicists to be more involved in modern clinical radiology practices. In particular, with the help of comprehensive radiation dose data, data-driven protocol management and informed case follow up are now feasible. Significant challenges remain however and the problems faced by medical physicists are highly heterogeneous. Imaging systems from multiple vendors and a wide range of vintages co-exist in the same department and employ data communication protocols that are not fully standardized or implemented making harmonization complex. Many different solutions for radiation dose monitoring have been implemented by imaging facilitiesmore » over the past few years. Such systems are based on commercial software, home-grown IT solutions, manual PACS data dumping, etc., and diverse pathways can be used to bring the data to impact clinical practice. The speakers will share their experiences with creating or tailoring radiation dose monitoring/management systems and procedures over the past few years, which vary significantly in design and scope. Topics to cover: (1) fluoroscopic dose monitoring and high radiation event handling from a large academic hospital; (2) dose monitoring and protocol optimization in pediatric radiology; and (3) development of a home-grown IT solution and dose data analysis framework. Learning Objectives: Describe the scope and range of radiation dose monitoring and protocol management in a modern radiology practice Review examples of data available from a variety of systems and how it managed and conveyed. Reflect on the role of the physicist in radiation dose awareness.« less

  20. From workshop to work practice: An exploration of context and facilitation in the development of evidence-based practice.

    PubMed

    Ellis, Isabelle; Howard, Peter; Larson, Ann; Robertson, Jeanette

    2005-01-01

    This article examines the process of translating evidence into practice using a facilitation model developed by the Western Australian Centre for Evidence Based Nursing and Midwifery. Using the conceptual framework Promoting Action on Research Implementation in Health Services (PARIHS), the aims of the study were (1) to explore the relative and combined importance of context and facilitation in the successful implementation of a new evidence-based clinical practice protocol and (2) to examine the establishment of more lasting change to individuals and organizations that resulted in greater incorporation of the principles of evidence-based practice (EBP). A pre-workshop, semi-structured telephone survey with 16 nurse managers in six rural hospitals; a summative evaluation immediately post-workshop with 54 participants; and follow-up, semi-structured interviews with 23 workshop participants. The contexts in each of the participating hospitals were very different; of the six hospitals, only one had not implemented the new protocol. Five had reviewed their practices and brought them in line with the protocol developed at the workshop. The rate of adoption varied considerably from 2 weeks to months. The participants reported being better informed about EBP in general and were positive about their ability to improve their practice and search more efficiently for best practice information. Underlying motivations for protocol development should be included in the PARIHS framework. IMPLICATIONS FOR EDUCATION: Good facilitation appears to be more influential than context in overcoming the barriers to the uptake of EBP.

  1. Implementation of Symptom Protocols for Nurses Providing Telephone‐Based Cancer Symptom Management: A Comparative Case Study

    PubMed Central

    Green, Esther; Ballantyne, Barbara; Tarasuk, Joy; Skrutkowski, Myriam; Carley, Meg; Chapman, Kim; Kuziemsky, Craig; Kolari, Erin; Sabo, Brenda; Saucier, Andréanne; Shaw, Tara; Tardif, Lucie; Truant, Tracy; Cummings, Greta G.; Howell, Doris

    2016-01-01

    ABSTRACT Background The pan‐Canadian Oncology Symptom Triage and Remote Support (COSTaRS) team developed 13 evidence‐informed protocols for symptom management. Aim To build an effective and sustainable approach for implementing the COSTaRS protocols for nurses providing telephone‐based symptom support to cancer patients. Methods A comparative case study was guided by the Knowledge to Action Framework. Three cases were created for three Canadian oncology programs that have nurses providing telephone support. Teams of researchers and knowledge users: (a) assessed barriers and facilitators influencing protocol use, (b) adapted protocols for local use, (c) intervened to address barriers, (d) monitored use, and (e) assessed barriers and facilitators influencing sustained use. Analysis was within and across cases. Results At baseline, >85% nurses rated protocols positively but barriers were identified (64‐80% needed training). Patients and families identified similar barriers and thought protocols would enhance consistency among nurses teaching self‐management. Twenty‐two COSTaRS workshops reached 85% to 97% of targeted nurses (N = 119). Nurses felt more confident with symptom management and using the COSTaRS protocols (p < .01). Protocol adaptations addressed barriers (e.g., health records approval, creating pocket versions, distributing with telephone messages). Chart audits revealed that protocols used were documented for 11% to 47% of patient calls. Sustained use requires organizational alignment and ongoing leadership support. Linking Evidence to Action Protocol uptake was similar to trials that have evaluated tailored interventions to improve professional practice by overcoming identified barriers. Collaborating with knowledge users facilitated interpretation of findings, aided protocol adaptation, and supported implementation. Protocol implementation in nursing requires a tailored approach. A multifaceted intervention approach increased nurses’ use

  2. WE-E-304-00: Implementing SBRT Protocols

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    NONE

    2015-06-15

    SBRT is having a dramatic impact on radiation therapy of early-stage, locally advanced cancers. A number of national protocols have been and are being developed to assess the clinical efficacy of SBRT for various anatomical sites, such as lung and spine. Physics credentialing for participating and implementation of trial protocols involve a broad spectrum of requirements from image guidance, motion management, to planning technology and dosimetric constrains. For radiation facilities that do not have extensive experiences in SBRT treatment and protocol credentialing, these complex processes of credentialing and implementation could be very challenging and, sometimes, may lead to ineffective evenmore » unsuccessful execution of these processes. In this proposal, we will provide comprehensive review of some current SBRT protocols, explain the requirements and their underline rationales, illustrate representative failed and successful experiences, related to SBRT credentialing, and discuss strategies for effective SBRT credentialing and implementation. Learning Objectives: Understand requirements and challenges of SBRT credentailing and implentation Discuss processes and strategies of effective SBRT credentailing Discuss practical considerations, potential pitfalls and solutions of SBRT implentation.« less

  3. Application of theory to enhance audit and feedback interventions to increase the uptake of evidence-based transfusion practice: an intervention development protocol.

    PubMed

    Gould, Natalie J; Lorencatto, Fabiana; Stanworth, Simon J; Michie, Susan; Prior, Maria E; Glidewell, Liz; Grimshaw, Jeremy M; Francis, Jill J

    2014-07-29

    Audits of blood transfusion demonstrate around 20% transfusions are outside national recommendations and guidelines. Audit and feedback is a widely used quality improvement intervention but effects on clinical practice are variable, suggesting potential for enhancement. Behavioural theory, theoretical frameworks of behaviour change and behaviour change techniques provide systematic processes to enhance intervention. This study is part of a larger programme of work to promote the uptake of evidence-based transfusion practice. The objectives of this study are to design two theoretically enhanced audit and feedback interventions; one focused on content and one on delivery, and investigate the feasibility and acceptability. Study A (Content): A coding framework based on current evidence regarding audit and feedback, and behaviour change theory and frameworks will be developed and applied as part of a structured content analysis to specify the key components of existing feedback documents. Prototype feedback documents with enhanced content and also a protocol, describing principles for enhancing feedback content, will be developed. Study B (Delivery): Individual semi-structured interviews with healthcare professionals and observations of team meetings in four hospitals will be used to specify, and identify views about, current audit and feedback practice. Interviews will be based on a topic guide developed using the Theoretical Domains Framework and the Consolidated Framework for Implementation Research. Analysis of transcripts based on these frameworks will form the evidence base for developing a protocol describing an enhanced intervention that focuses on feedback delivery. Study C (Feasibility and Acceptability): Enhanced interventions will be piloted in four hospitals. Semi-structured interviews, questionnaires and observations will be used to assess feasibility and acceptability. This intervention development work reflects the UK Medical Research Council's guidance

  4. Preservice Teachers' Teacher Efficacy Beliefs and Constructivist-Based Teaching Practice

    ERIC Educational Resources Information Center

    Temiz, Tugba; Topcu, Mustafa Sami

    2013-01-01

    The purpose of this paper is to explore the relationship between preservice teachers' (PTs) teacher efficacy beliefs and their constructivist-based teaching practices. Data were gathered through the questionnaire (Teachers' Sense of Efficacy Scale) and the observation protocol (Reformed Teaching Observation Protocol) administered to the…

  5. Clinically Practical Magnetic Resonance Protocol for Improved Specificity in Breast Cancer Diagnosis

    DTIC Science & Technology

    2007-06-01

    Protocol for Improved Specificity in Breast Cancer Diagnosis PRINCIPAL INVESTIGATOR: Luminita Alina Tudorica, Ph.D. CONTRACTING...TITLE AND SUBTITLE 5a. CONTRACT NUMBER Clinically Practical Magnetic Resonance Protocol for Improved Specificity in Breast Cancer Diagnosis 5b... breast cancer study in a clinical setting. This study aims to improve specificity of breast cancer detection by using a combined MRI/MRS protocol. In

  6. Security of two-state and four-state practical quantum bit-commitment protocols

    NASA Astrophysics Data System (ADS)

    Loura, Ricardo; Arsenović, Dušan; Paunković, Nikola; Popović, Duška B.; Prvanović, Slobodan

    2016-12-01

    We study cheating strategies against a practical four-state quantum bit-commitment protocol [A. Danan and L. Vaidman, Quant. Info. Proc. 11, 769 (2012)], 10.1007/s11128-011-0284-4 and its two-state variant [R. Loura et al., Phys. Rev. A 89, 052336 (2014)], 10.1103/PhysRevA.89.052336 when the underlying quantum channels are noisy and the cheating party is constrained to using single-qubit measurements only. We show that simply inferring the transmitted photons' states by using the Breidbart basis, optimal for ambiguous (minimum-error) state discrimination, does not directly produce an optimal cheating strategy for this bit-commitment protocol. We introduce a strategy, based on certain postmeasurement processes and show it to have better chances at cheating than the direct approach. We also study to what extent sending forged geographical coordinates helps a dishonest party in breaking the binding security requirement. Finally, we investigate the impact of imperfect single-photon sources in the protocols. Our study shows that, in terms of the resources used, the four-state protocol is advantageous over the two-state version. The analysis performed can be straightforwardly generalized to any finite-qubit measurement, with the same qualitative results.

  7. Practical quantum key distribution protocol without monitoring signal disturbance.

    PubMed

    Sasaki, Toshihiko; Yamamoto, Yoshihisa; Koashi, Masato

    2014-05-22

    Quantum cryptography exploits the fundamental laws of quantum mechanics to provide a secure way to exchange private information. Such an exchange requires a common random bit sequence, called a key, to be shared secretly between the sender and the receiver. The basic idea behind quantum key distribution (QKD) has widely been understood as the property that any attempt to distinguish encoded quantum states causes a disturbance in the signal. As a result, implementation of a QKD protocol involves an estimation of the experimental parameters influenced by the eavesdropper's intervention, which is achieved by randomly sampling the signal. If the estimation of many parameters with high precision is required, the portion of the signal that is sacrificed increases, thus decreasing the efficiency of the protocol. Here we propose a QKD protocol based on an entirely different principle. The sender encodes a bit sequence onto non-orthogonal quantum states and the receiver randomly dictates how a single bit should be calculated from the sequence. The eavesdropper, who is unable to learn the whole of the sequence, cannot guess the bit value correctly. An achievable rate of secure key distribution is calculated by considering complementary choices between quantum measurements of two conjugate observables. We found that a practical implementation using a laser pulse train achieves a key rate comparable to a decoy-state QKD protocol, an often-used technique for lasers. It also has a better tolerance of bit errors and of finite-sized-key effects. We anticipate that this finding will give new insight into how the probabilistic nature of quantum mechanics can be related to secure communication, and will facilitate the simple and efficient use of conventional lasers for QKD.

  8. A neural networks-based hybrid routing protocol for wireless mesh networks.

    PubMed

    Kojić, Nenad; Reljin, Irini; Reljin, Branimir

    2012-01-01

    The networking infrastructure of wireless mesh networks (WMNs) is decentralized and relatively simple, but they can display reliable functioning performance while having good redundancy. WMNs provide Internet access for fixed and mobile wireless devices. Both in urban and rural areas they provide users with high-bandwidth networks over a specific coverage area. The main problems affecting these networks are changes in network topology and link quality. In order to provide regular functioning, the routing protocol has the main influence in WMN implementations. In this paper we suggest a new routing protocol for WMN, based on good results of a proactive and reactive routing protocol, and for that reason it can be classified as a hybrid routing protocol. The proposed solution should avoid flooding and creating the new routing metric. We suggest the use of artificial logic-i.e., neural networks (NNs). This protocol is based on mobile agent technologies controlled by a Hopfield neural network. In addition to this, our new routing metric is based on multicriteria optimization in order to minimize delay and blocking probability (rejected packets or their retransmission). The routing protocol observes real network parameters and real network environments. As a result of artificial logic intelligence, the proposed routing protocol should maximize usage of network resources and optimize network performance.

  9. A Neural Networks-Based Hybrid Routing Protocol for Wireless Mesh Networks

    PubMed Central

    Kojić, Nenad; Reljin, Irini; Reljin, Branimir

    2012-01-01

    The networking infrastructure of wireless mesh networks (WMNs) is decentralized and relatively simple, but they can display reliable functioning performance while having good redundancy. WMNs provide Internet access for fixed and mobile wireless devices. Both in urban and rural areas they provide users with high-bandwidth networks over a specific coverage area. The main problems affecting these networks are changes in network topology and link quality. In order to provide regular functioning, the routing protocol has the main influence in WMN implementations. In this paper we suggest a new routing protocol for WMN, based on good results of a proactive and reactive routing protocol, and for that reason it can be classified as a hybrid routing protocol. The proposed solution should avoid flooding and creating the new routing metric. We suggest the use of artificial logic—i.e., neural networks (NNs). This protocol is based on mobile agent technologies controlled by a Hopfield neural network. In addition to this, our new routing metric is based on multicriteria optimization in order to minimize delay and blocking probability (rejected packets or their retransmission). The routing protocol observes real network parameters and real network environments. As a result of artificial logic intelligence, the proposed routing protocol should maximize usage of network resources and optimize network performance. PMID:22969360

  10. Conducting Clinically Based Intimate Partner Violence Research: Safety Protocol Recommendations.

    PubMed

    Anderson, Jocelyn C; Glass, Nancy E; Campbell, Jacquelyn C

    Maintaining safety is of utmost importance during research involving participants who have experienced intimate partner violence (IPV). Limited guidance on safety protocols to protect participants is available, particularly information related to technology-based approaches to informed consent, data collection, and contacting participants during the course of a study. The purpose of the article is to provide details on the safety protocol developed and utilized with women receiving care at an urban HIV clinic and who were taking part in an observational study of IPV, mental health symptoms, and substance abuse and their relationship to HIV treatment adherence. The protocol presents the technological strategies to promote safety and allow autonomy in participant decision-making throughout the research process, including Voice over Internet Protocol telephone numbers, and tablet-based eligibility screening and data collection. Protocols for management of participants at risk for suicide and/or intimate partner homicide that included automated high-risk messaging to participants and research staff and facilitated disclosure of risk to clinical staff based on participant preferences are discussed. Use of technology and partnership with clinic staff helped to provide an environment where research regarding IPV could be conducted without undue burden or risk to participants. Utilizing tablet-based survey administration provided multiple practical and safety benefits for participants. Most women who screened into high-risk categories for suicide or intimate partner homicide did not choose to have their results shared with their healthcare providers, indicating the importance of allowing participants control over information sharing whenever possible.

  11. Report on July 2015 Additional Protocol Coordinators Best Practices Workshop

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Gitau, Ernest T.N.; Burbank, Roberta L.; Finch, Valerie A.

    After 10 years of implementation experience, the Office of Nonproliferation and Arms Control (NPAC) within the Department of Energy/National Nuclear Security Administration (DOE/NNSA) conducted the Additional Protocol (AP) Coordinators Best Practices Workshop at Oak Ridge National Laboratory from July 29-30, 2015. The goal of this workshop was to identify implementation best practices, lessons learned, and compliance challenges from the various Additional Protocol Coordinators (APCs) at each laboratory in the DOE/NNSA complex and associated sites. The workshop provided the opportunity for participants to share their insights and establish networks that APCs can utilize to continue to discuss challenges (new and old),more » identify best practices, and enhance communication and coordination for reporting multi-lab research projects during review activities. Workshop participants included DOE/NNSA HQ, laboratory and site APCs, seasoned experts, members of the original implementation outreach team, and Field Element and site security representatives.« less

  12. E-SAP: Efficient-Strong Authentication Protocol for Healthcare Applications Using Wireless Medical Sensor Networks

    PubMed Central

    Kumar, Pardeep; Lee, Sang-Gon; Lee, Hoon-Jae

    2012-01-01

    A wireless medical sensor network (WMSN) can sense humans’ physiological signs without sacrificing patient comfort and transmit patient vital signs to health professionals’ hand-held devices. The patient physiological data are highly sensitive and WMSNs are extremely vulnerable to many attacks. Therefore, it must be ensured that patients’ medical signs are not exposed to unauthorized users. Consequently, strong user authentication is the main concern for the success and large scale deployment of WMSNs. In this regard, this paper presents an efficient, strong authentication protocol, named E-SAP, for healthcare application using WMSNs. The proposed E-SAP includes: (1) a two-factor (i.e., password and smartcard) professional authentication; (2) mutual authentication between the professional and the medical sensor; (3) symmetric encryption/decryption for providing message confidentiality; (4) establishment of a secure session key at the end of authentication; and (5) professionals can change their password. Further, the proposed protocol requires three message exchanges between the professional, medical sensor node and gateway node, and achieves efficiency (i.e., low computation and communication cost). Through the formal analysis, security analysis and performance analysis, we demonstrate that E-SAP is more secure against many practical attacks, and allows a tradeoff between the security and the performance cost for healthcare application using WMSNs. PMID:22438729

  13. E-SAP: efficient-strong authentication protocol for healthcare applications using wireless medical sensor networks.

    PubMed

    Kumar, Pardeep; Lee, Sang-Gon; Lee, Hoon-Jae

    2012-01-01

    A wireless medical sensor network (WMSN) can sense humans' physiological signs without sacrificing patient comfort and transmit patient vital signs to health professionals' hand-held devices. The patient physiological data are highly sensitive and WMSNs are extremely vulnerable to many attacks. Therefore, it must be ensured that patients' medical signs are not exposed to unauthorized users. Consequently, strong user authentication is the main concern for the success and large scale deployment of WMSNs. In this regard, this paper presents an efficient, strong authentication protocol, named E-SAP, for healthcare application using WMSNs. The proposed E-SAP includes: (1) a two-factor (i.e., password and smartcard) professional authentication; (2) mutual authentication between the professional and the medical sensor; (3) symmetric encryption/decryption for providing message confidentiality; (4) establishment of a secure session key at the end of authentication; and (5) professionals can change their password. Further, the proposed protocol requires three message exchanges between the professional, medical sensor node and gateway node, and achieves efficiency (i.e., low computation and communication cost). Through the formal analysis, security analysis and performance analysis, we demonstrate that E-SAP is more secure against many practical attacks, and allows a tradeoff between the security and the performance cost for healthcare application using WMSNs.

  14. How to write a surgical clinical research protocol: literature review and practical guide.

    PubMed

    Rosenthal, Rachel; Schäfer, Juliane; Briel, Matthias; Bucher, Heiner C; Oertli, Daniel; Dell-Kuster, Salome

    2014-02-01

    The study protocol is the core document of every clinical research project. Clinical research in studies involving surgical interventions presents some specific challenges, which need to be accounted for and described in the study protocol. The aim of this review is to provide a practical guide for developing a clinical study protocol for surgical interventions with a focus on methodologic issues. On the basis of an in-depth literature search of methodologic literature and on some cardinal published surgical trials and observational studies, the authors provides a 10-step guide for developing a clinical study protocol in surgery. This practical guide outlines key methodologic issues important when planning an ethically and scientifically sound research project involving surgical interventions, with the ultimate goal of providing high-level evidence relevant for health care decision making in surgery. Copyright © 2014 Elsevier Inc. All rights reserved.

  15. Evidence-based protocol for structural rehabilitation of the spine and posture: review of clinical biomechanics of posture (CBP®) publications

    PubMed Central

    Oakley, Paul A.; Harrison, Donald D.; Harrison, Deed E.; Haas, Jason W.

    2005-01-01

    BACKGROUND Although practice protocols exist for SMT and functional rehabilitation, no practice protocols exist for structural rehabilitation. Traditional chiropractic practice guidelines have been limited to acute and chronic pain treatment, with limited inclusion of functional and exclusion of structural rehabilitation procedures. OBJECTIVE (1) To derive an evidence-based practice protocol for structural rehabilitation from publications on Clinical Biomechanics of Posture (CBP®) methods, and (2) to compare the evidence for Diversified, SMT, and CBP®. METHODS Clinical control trials utilizing CBP® methods and spinal manipulative therapy (SMT) were obtained from searches in Mantis, CINAHL, and Index Medicus. Using data from SMT review articles, evidence for Diversified Technique (as taught in chiropractic colleges), SMT, and CBP® were rated and compared. RESULTS From the evidence from Clinical Control Trials on SMT and CBP®, there is very little evidence support for Diversified (our rating = 18), as taught in chiropractic colleges, for the treatment of pain subjects, while CBP® (our rating = 46) and SMT for neck pain (rating = 58) and low back pain (our rating = 202) have evidence-based support. CONCLUSIONS While CBP® Technique has approximately as much evidence-based support as SMT for neck pain, CBP® has more evidence to support its methods than the Diversified technique taught in chiropractic colleges, but not as much as SMT for low back pain. The evolution of chiropractic specialization has occurred, and doctors providing structural-based chiropractic care require protocol guidelines for patient quality assurance and standardization. A structural rehabilitation protocol was developed based on evidence from CBP® publications. PMID:17549209

  16. Fault-tolerant quantum blind signature protocols against collective noise

    NASA Astrophysics Data System (ADS)

    Zhang, Ming-Hui; Li, Hui-Fang

    2016-10-01

    This work proposes two fault-tolerant quantum blind signature protocols based on the entanglement swapping of logical Bell states, which are robust against two kinds of collective noises: the collective-dephasing noise and the collective-rotation noise, respectively. Both of the quantum blind signature protocols are constructed from four-qubit decoherence-free (DF) states, i.e., logical Bell qubits. The initial message is encoded on the logical Bell qubits with logical unitary operations, which will not destroy the anti-noise trait of the logical Bell qubits. Based on the fundamental property of quantum entanglement swapping, the receiver simply performs two Bell-state measurements (rather than four-qubit joint measurements) on the logical Bell qubits to verify the signature, which makes the protocols more convenient in a practical application. Different from the existing quantum signature protocols, our protocols can offer the high fidelity of quantum communication with the employment of logical qubits. Moreover, we hereinafter prove the security of the protocols against some individual eavesdropping attacks, and we show that our protocols have the characteristics of unforgeability, undeniability and blindness.

  17. MANEMO Routing in Practice: Protocol Selection, Expected Performance, and Experimental Evaluation

    NASA Astrophysics Data System (ADS)

    Tazaki, Hajime; van Meter, Rodney; Wakikawa, Ryuji; Wongsaardsakul, Thirapon; Kanchanasut, Kanchana; Dias de Amorim, Marcelo; Murai, Jun

    Motivated by the deployment of post-disaster MANEMO (MANET for NEMO) composed of mobile routers and stations, we evaluate two candidate routing protocols through network simulation, theoretical performance analysis, and field experiments. The first protocol is the widely adopted Optimized Link State Routing protocol (OLSR) and the second is the combination of the Tree Discovery Protocol (TDP) with Network In Node Advertisement (NINA). To the best of our knowledge, this is the first time that these two protocols are compared in both theoretical and practical terms. We focus on the control overhead generated when mobile routers perform a handover. Our results confirm the correctness and operational robustness of both protocols. More interestingly, although in the general case OLSR leads to better results, TDP/NINA outperforms OLSR both in the case of sparse networks and in highly mobile networks, which correspond to the operation point of a large set of post-disaster scenarios.

  18. From policy to practice: implementing frontline community health services for substance dependence--study protocol.

    PubMed

    Gill, Kathryn J; Campbell, Emily; Gauthier, Gail; Xenocostas, Spyridoula; Charney, Dara; Macaulay, Ann C

    2014-08-20

    Substance abuse is a worldwide public health concern. Extensive scientific research has shown that screening and brief interventions for substance use disorders administered in primary care provide substantial benefit at relatively low cost. Frontline health clinicians are well placed to detect and treat patients with substance use disorders. Despite effectiveness shown in research, there are many factors that impact the implementation of these practices in real-world clinical practice. Recently, the Ministry of Health and Social Services in Quebec, Canada, issued two policy documents aimed at introducing screening and early intervention for substance abuse into frontline healthcare clinics in Quebec. The current research protocol was developed in order to study the process of implementation of evidence-based addiction treatment practices at three primary care clinics in Montreal (Phase 1). In addition, the research protocol was designed to examine the efficacy of overall policy implementation, including barriers and facilitators to addictions program development throughout Quebec (Phase 2). Phase 1 will provide an in-depth case study of knowledge translation and implementation. The study protocol will utilize an integrated knowledge translation strategy to build collaborative mechanisms for knowledge exchange between researchers, addiction specialists, and frontline practitioners (guided by the principles of participatory-action research), and directly examine the process of knowledge uptake and barriers to transfer using both qualitative and quantitative methodologies. Evaluation will involve multiple measures, time points and domains; program uptake and effectiveness will be determined by changes in healthcare service delivery, sustainability and outcomes. In Phase 2, qualitative methods will be utilized to examine the contextual facilitators and barriers that frontline organizations face in implementing services for substance dependence. Phase 2 will provide

  19. Comment on "flexible protocol for quantum private query based on B92 protocol"

    NASA Astrophysics Data System (ADS)

    Chang, Yan; Zhang, Shi-Bin; Zhu, Jing-Min

    2017-03-01

    In a recent paper (Quantum Inf Process 13:805-813, 2014), a flexible quantum private query (QPQ) protocol based on B92 protocol is presented. Here we point out that the B92-based QPQ protocol is insecure in database security when the channel has loss, that is, the user (Alice) will know more records in Bob's database compared with she has bought.

  20. Unlocking ePortfolio Practice: Teaching Beliefs

    ERIC Educational Resources Information Center

    Henscheid, Jean M.; Brown, Gary; Gordon, Aifang; Chen, Helen L.

    2014-01-01

    The Association for Authentic, Experiential, and Evidence-Based Learning (AAEEBL) annual ePortfolio survey focuses on understanding ePortfolio practitioners' teaching beliefs and practices. The action research reported here extends that survey research to a population of emerging educators (i.e., graduate students in education). In addition to…

  1. Protocol for audit of current Filipino practice in rehabilitation of stroke inpatients.

    PubMed

    Gonzalez-Suarez, Consuelo B; Dizon, Janine Margarita R; Grimmer, Karen; Estrada, Myrna S; Liao, Lauren Anne S; Malleta, Anne-Rochelle D; Tan, Ma Elena R; Marfil, Vero; Versales, Cristina S; Suarez, Jimah L; So, Kleon C; Uyehara, Edgardo D

    2015-01-01

    Stroke is one of the leading medical conditions in the Philippines. Over 500,000 Filipinos suffer from stroke annually. Provision of evidence-based medical and rehabilitation management for stroke patients has been a challenge due to existing environmental, social, and local health system issues. Thus, existing western guidelines on stroke rehabilitation were contextualized to draft recommendations relevant to the local Philippine setting. Prior to fully implementing the guidelines, an audit of current practice needs to be undertaken, thus the purpose of this audit protocol. A clinical audit of current practices in stroke rehabilitation in the Philippines will be undertaken. A consensus list of data items to be captured was identified by the audit team during a 2-day meeting in 2012. These items, including patient demographics, type of stroke, time to referral for rehabilitation management, length of hospital stay, and other relevant descriptors of stroke management were included as part of the audit. Hospitals in the Philippines will be recruited to take part in the audit activity. Recruitment will be via the registry of the Philippine Academy of Rehabilitation Medicine, where 90% of physiatrists (medical doctors specialized in rehabilitation medicine) are active members and are affiliated with various hospitals in the Philippines. Data collectors will be identified and trained in the audit process. A pilot audit will be conducted to test the feasibility of the audit protocol, and refinements to the protocol will be undertaken as necessary. The comprehensive audit process will take place for a period of 3 months. Data will be encoded using MS Excel(®). Data will be reported as means and percentages as appropriate. Subgroup analysis will be undertaken to look into differences and variability of stroke patient descriptors and rehabilitation activities. This audit study is an ambitious project, but given the "need" to conduct the audit to identify "gaps" in current

  2. An Enhanced Reservation-Based MAC Protocol for IEEE 802.15.4 Networks

    PubMed Central

    Afonso, José A.; Silva, Helder D.; Macedo, Pedro; Rocha, Luis A.

    2011-01-01

    The IEEE 802.15.4 Medium Access Control (MAC) protocol is an enabling standard for wireless sensor networks. In order to support applications requiring dedicated bandwidth or bounded delay, it provides a reservation-based scheme named Guaranteed Time Slot (GTS). However, the GTS scheme presents some drawbacks, such as inefficient bandwidth utilization and support to a maximum of only seven devices. This paper presents eLPRT (enhanced Low Power Real Time), a new reservation-based MAC protocol that introduces several performance enhancing features in comparison to the GTS scheme. This MAC protocol builds on top of LPRT (Low Power Real Time) and includes various mechanisms designed to increase data transmission reliability against channel errors, improve bandwidth utilization and increase the number of supported devices. A motion capture system based on inertial and magnetic sensors has been used to validate the protocol. The effectiveness of the performance enhancements introduced by each of the new features is demonstrated through the provision of both simulation and experimental results. PMID:22163826

  3. A Generic Communication Protocol for Remote Laboratories: an Implementation on e-lab

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Henriques, Rafael B.; Fernandes, H.; Duarte, Andre S.

    2015-07-01

    The remote laboratories at IST (Instituto Superior Tecnico), e-lab, serve as a valuable tool for education and training based on remote control technologies. Due to the high number and increase of remotely operated experiments a generic protocol was developed to perform the communication between the software driver and the respective experimental setup in an easier and more unified way. The training in these fields of students and personnel can take advantage of such infrastructure with the purpose of deploying new experiments in a faster way. More than 10 experiments using the generic protocol are available on-line in a 24 xmore » 7 way. (authors)« less

  4. The comparison of microdose flare-up and multiple dose antagonist protocols based on hCG day estradiol (E2), progesterone (P) and P/E2 ratio among poor responder patients in ICSI-ET cycles.

    PubMed

    Cicek, M N; Kahyaoglu, I; Kahyaoglu, S

    2015-02-01

    Elevated progesterone levels surpassing exact treshold values impede endometrial receptivity and decrease clinical pregnancy rates in different responder patients during assisted reproductive techniques. A progesterone (P): estradiol (E2) ratio of > 1 on the day of hCG administration has also been suggested to be a manifestation of low ovarian reserve. The clinical significance of P/E2 ratio on the day of hCG administration was investigated among poor responder patients. Based on the ESHRE Bologna consensus criteria related to poor ovarian response diagnosis, 48 poor responder patients were treated with the microdose flare-up regimen and 34 patients were treated with the multiple-dose GnRH antagonist protocol. All patients were destined to perform a ICSI-ET procedure at the end of the stimulation protocols. Progesterone levels and P/E2 ratios have been detected during controlled ovarian hyperstimulation. In the microdose flare-up group; the duration of stimulation, total gonadotropin dose used and hCG day E2 levels were significantly higher than the multiple dose antagonist group. However, the mean hCG day P/E2 rate in the microdose flare-up group was less than that in the multiple-dose antagonist group. The clinical pregnancy rates were non significantly higher in the multiple dose antagonist protocol group than in microdose flare-up group. Impaired endometrial receptivity caused by elevated P levels results with lower pregnancy rates. Regardless of the selected stimulation protocol, poor responder patients are not prone to exhibit high P and E2 secretion. Increased P/E2 ratio of > 1 on hCG day has limited value to predict cycle outcomes in poor responder patients because of ovarian follicle depletion.

  5. How do nurses, midwives and health visitors contribute to protocol-based care? A synthesis of the UK literature.

    PubMed

    Ilott, Irene; Booth, Andrew; Rick, Jo; Patterson, Malcolm

    2010-06-01

    To explore how nurses, midwives and health visitors contribute to the development, implementation and audit of protocol-based care. Protocol-based care refers to the use of documents that set standards for clinical care processes with the intent of reducing unacceptable variations in practice. Documents such as protocols, clinical guidelines and care pathways underpin evidence-based practice throughout the world. An interpretative review using the five-stage systematic literature review process. The data sources were the British Nursing Index, CINAHL, EMBASE, MEDLINE and Web of Science from onset to 2005. The Journal of Integrated Care Pathways was hand searched (1997-June 2006). Thirty three studies about protocol-based care in the United Kingdom were appraised using the Qualitative Assessment and Review Instrument (QARI version 2). The literature was synthesized inductively and deductively, using an official 12-step guide for development as a framework for the deductive synthesis. Most papers were descriptive, offering practitioner knowledge and positive findings about a locally developed and owned protocol-based care. The majority were instigated in response to clinical need or service re-design. Development of protocol-based care was a non-linear, idiosyncratic process, with steps omitted, repeated or completed in a different order. The context and the multiple purposes of protocol-based care influenced the development process. Implementation and sustainability were rarely mentioned, or theorised as a change. The roles and activities of nurses were so understated as to be almost invisible. There were notable gaps in the literature about the resource use costs, the engagement of patients in the decision-making process, leadership and the impact of formalisation and new roles on inter-professional relations. Documents that standardise clinical care are part of the history of nursing as well as contemporary evidence-based care and expanded roles. Considering the

  6. Crafting practice guidelines in the world of evidence-based medicine.

    PubMed

    Chung, Kevin C; Shauver, Melissa J

    2009-10-01

    In the era of exponential increase in the medical literature, physicians and health policy-makers are relying on well-constructed, evidence-based practice guidelines to help ensure that the care given to patients is based on valid, scientific data. The construction of practice guidelines, however, may not always adhere to accepted research protocol. In this article, the authors detail the steps required to produce effective, evidence-based practice guidelines. The seven essential steps in crafting a practice guideline are presented: (1) defining a topic, (2) selecting a work group, (3) performing a literature review, (4) writing the guideline, (5) peer review, (6) making plans for review and revision, and (7) dissemination. Given the importance of practice guidelines in supporting everyday practice, this article strives to provide a practical guide in the development of this key component of evidence-based medicine.

  7. SPP: A data base processor data communications protocol

    NASA Technical Reports Server (NTRS)

    Fishwick, P. A.

    1983-01-01

    The design and implementation of a data communications protocol for the Intel Data Base Processor (DBP) is defined. The protocol is termed SPP (Service Port Protocol) since it enables data transfer between the host computer and the DBP service port. The protocol implementation is extensible in that it is explicitly layered and the protocol functionality is hierarchically organized. Extensive trace and performance capabilities have been supplied with the protocol software to permit optional efficient monitoring of the data transfer between the host and the Intel data base processor. Machine independence was considered to be an important attribute during the design and implementation of SPP. The protocol source is fully commented and is included in Appendix A of this report.

  8. Integration of evidence-based practice in bedside teaching paediatrics supported by e-learning.

    PubMed

    Potomkova, Jarmila; Mihal, Vladimir; Zapletalova, Jirina; Subova, Dana

    2010-03-01

    Bedside teaching with evidence-based practice elements, supported by e-learning activities, can play an important role in modern medical education. Teachers have to incorporate evidence from the medical literature to increase student motivation and interactivity. An integral part of the medical curricula at Palacky University Olomouc (Czech Republic) are real paediatric scenarios supplemented with a review of current literature to enhance evidence-based bedside teaching & learning. Searching for evidence is taught through librarian-guided interactive hands-on sessions and/or web-based tutorials followed by clinical case presentations and feedback. Innovated EBM paediatric clerkship demonstrated students' preferences towards web-based interactive bedside teaching & learning. In two academic years (2007/2008, 2008/2009), learning-focused feedback from 106 and 131 students, resp. was obtained about their attitudes towards evidence-based bedside teaching. The assessment included among others the overall level of instruction, quality of practical evidence-based training, teacher willingness and impact of instruction on increased interest in the specialty. There was some criticism about excessive workload. A parallel survey was carried out on the perceived values of different forms of information skills training (i.e. demonstration, online tutorials, and librarian-guided interactive search sessions) and post-training self-reported level of search skills. The new teaching/learning paediatric portfolio is a challenge for further activities, including effective knowledge translation, continuing medical & professional development of teachers, and didactic, clinically integrated teaching approaches.

  9. Exploring Multi-Level System Factors Facilitating Educator Training and Implementation of Evidence-Based Practices (EBP): A Study Protocol

    ERIC Educational Resources Information Center

    Stahmer, Aubyn C.; Suhrheinrich, Jessica; Schetter, Patricia L.; Hassrick, Elizabeth McGee

    2018-01-01

    This study examines how system-wide (i.e., region, district, and school) mechanisms such as leadership support, training requirements, structure, collaboration, and education affect the use of evidence-based practices (EBPs) in schools and how this affects the outcomes for students with autism spectrum disorder (ASD). Despite growing evidence for…

  10. Region-Based Collision Avoidance Beaconless Geographic Routing Protocol in Wireless Sensor Networks.

    PubMed

    Lee, JeongCheol; Park, HoSung; Kang, SeokYoon; Kim, Ki-Il

    2015-06-05

    Due to the lack of dependency on beacon messages for location exchange, the beaconless geographic routing protocol has attracted considerable attention from the research community. However, existing beaconless geographic routing protocols are likely to generate duplicated data packets when multiple winners in the greedy area are selected. Furthermore, these protocols are designed for a uniform sensor field, so they cannot be directly applied to practical irregular sensor fields with partial voids. To prevent the failure of finding a forwarding node and to remove unnecessary duplication, in this paper, we propose a region-based collision avoidance beaconless geographic routing protocol to increase forwarding opportunities for randomly-deployed sensor networks. By employing different contention priorities into the mutually-communicable nodes and the rest of the nodes in the greedy area, every neighbor node in the greedy area can be used for data forwarding without any packet duplication. Moreover, simulation results are given to demonstrate the increased packet delivery ratio and shorten end-to-end delay, rather than well-referred comparative protocols.

  11. Region-Based Collision Avoidance Beaconless Geographic Routing Protocol in Wireless Sensor Networks

    PubMed Central

    Lee, JeongCheol; Park, HoSung; Kang, SeokYoon; Kim, Ki-Il

    2015-01-01

    Due to the lack of dependency on beacon messages for location exchange, the beaconless geographic routing protocol has attracted considerable attention from the research community. However, existing beaconless geographic routing protocols are likely to generate duplicated data packets when multiple winners in the greedy area are selected. Furthermore, these protocols are designed for a uniform sensor field, so they cannot be directly applied to practical irregular sensor fields with partial voids. To prevent the failure of finding a forwarding node and to remove unnecessary duplication, in this paper, we propose a region-based collision avoidance beaconless geographic routing protocol to increase forwarding opportunities for randomly-deployed sensor networks. By employing different contention priorities into the mutually-communicable nodes and the rest of the nodes in the greedy area, every neighbor node in the greedy area can be used for data forwarding without any packet duplication. Moreover, simulation results are given to demonstrate the increased packet delivery ratio and shorten end-to-end delay, rather than well-referred comparative protocols. PMID:26057037

  12. Improving implementation of evidence-based practice in mental health service delivery: protocol for a cluster randomised quasi-experimental investigation of staff-focused values interventions

    PubMed Central

    2013-01-01

    Background There is growing acceptance that optimal service provision for individuals with severe and recurrent mental illness requires a complementary focus on medical recovery (i.e., symptom management and general functioning) and personal recovery (i.e., having a ‘life worth living’). Despite significant research attention and policy-level support, the translation of this vision of healthcare into changed workplace practice continues to elude. Over the past decade, evidence-based training interventions that seek to enhance the knowledge, attitudes, and skills of staff working in the mental health field have been implemented as a primary redress strategy. However, a large body of multi-disciplinary research indicates disappointing rates of training transfer. There is an absence of empirical research that investigates the importance of worker-motivation in the uptake of desired workplace change initiatives. ‘Autonomy’ is acknowledged as important to human effectiveness and as a correlate of workplace variables like productivity, and wellbeing. To our knowledge, there have been no studies that investigate purposeful and structured use of values-based interventions to facilitate increased autonomy as a means of promoting enhanced implementation of workplace change. Methods This study involves 200 mental health workers across 22 worksites within five community-managed organisations in three Australian states. It involves cluster-randomisation of participants within organisation, by work site, to the experimental (values) condition, or the control (implementation). Both conditions receive two days of training focusing on an evidence-based framework of mental health service delivery. The experimental group receives a third day of values-focused intervention and 12 months of values-focused coaching. Well-validated self-report measures are used to explore variables related to values concordance, autonomy, and self-reported implementation success. Audits of work

  13. A Machine-to-Machine protocol benchmark for eHealth applications - Use case: Respiratory rehabilitation.

    PubMed

    Talaminos-Barroso, Alejandro; Estudillo-Valderrama, Miguel A; Roa, Laura M; Reina-Tosina, Javier; Ortega-Ruiz, Francisco

    2016-06-01

    M2M (Machine-to-Machine) communications represent one of the main pillars of the new paradigm of the Internet of Things (IoT), and is making possible new opportunities for the eHealth business. Nevertheless, the large number of M2M protocols currently available hinders the election of a suitable solution that satisfies the requirements that can demand eHealth applications. In the first place, to develop a tool that provides a benchmarking analysis in order to objectively select among the most relevant M2M protocols for eHealth solutions. In the second place, to validate the tool with a particular use case: the respiratory rehabilitation. A software tool, called Distributed Computing Framework (DFC), has been designed and developed to execute the benchmarking tests and facilitate the deployment in environments with a large number of machines, with independence of the protocol and performance metrics selected. DDS, MQTT, CoAP, JMS, AMQP and XMPP protocols were evaluated considering different specific performance metrics, including CPU usage, memory usage, bandwidth consumption, latency and jitter. The results obtained allowed to validate a case of use: respiratory rehabilitation of chronic obstructive pulmonary disease (COPD) patients in two scenarios with different types of requirement: Home-Based and Ambulatory. The results of the benchmark comparison can guide eHealth developers in the choice of M2M technologies. In this regard, the framework presented is a simple and powerful tool for the deployment of benchmark tests under specific environments and conditions. Copyright © 2016 Elsevier Ireland Ltd. All rights reserved.

  14. Improving practice in community-based settings: a randomized trial of supervision - study protocol.

    PubMed

    Dorsey, Shannon; Pullmann, Michael D; Deblinger, Esther; Berliner, Lucy; Kerns, Suzanne E; Thompson, Kelly; Unützer, Jürgen; Weisz, John R; Garland, Ann F

    2013-08-10

    Evidence-based treatments for child mental health problems are not consistently available in public mental health settings. Expanding availability requires workforce training. However, research has demonstrated that training alone is not sufficient for changing provider behavior, suggesting that ongoing intervention-specific supervision or consultation is required. Supervision is notably under-investigated, particularly as provided in public mental health. The degree to which supervision in this setting includes 'gold standard' supervision elements from efficacy trials (e.g., session review, model fidelity, outcome monitoring, skill-building) is unknown. The current federally-funded investigation leverages the Washington State Trauma-focused Cognitive Behavioral Therapy Initiative to describe usual supervision practices and test the impact of systematic implementation of gold standard supervision strategies on treatment fidelity and clinical outcomes. The study has two phases. We will conduct an initial descriptive study (Phase I) of supervision practices within public mental health in Washington State followed by a randomized controlled trial of gold standard supervision strategies (Phase II), with randomization at the clinician level (i.e., supervisors provide both conditions). Study participants will be 35 supervisors and 130 clinicians in community mental health centers. We will enroll one child per clinician in Phase I (N = 130) and three children per clinician in Phase II (N = 390). We use a multi-level mixed within- and between-subjects longitudinal design. Audio recordings of supervision and therapy sessions will be collected and coded throughout both phases. Child outcome data will be collected at the beginning of treatment and at three and six months into treatment. This study will provide insight into how supervisors can optimally support clinicians delivering evidence-based treatments. Phase I will provide descriptive information, currently

  15. E-novo: an automated workflow for efficient structure-based lead optimization.

    PubMed

    Pearce, Bradley C; Langley, David R; Kang, Jia; Huang, Hongwei; Kulkarni, Amit

    2009-07-01

    An automated E-Novo protocol designed as a structure-based lead optimization tool was prepared through Pipeline Pilot with existing CHARMm components in Discovery Studio. A scaffold core having 3D binding coordinates of interest is generated from a ligand-bound protein structural model. Ligands of interest are generated from the scaffold using an R-group fragmentation/enumeration tool within E-Novo, with their cores aligned. The ligand side chains are conformationally sampled and are subjected to core-constrained protein docking, using a modified CHARMm-based CDOCKER method to generate top poses along with CDOCKER energies. In the final stage of E-Novo, a physics-based binding energy scoring function ranks the top ligand CDOCKER poses using a more accurate Molecular Mechanics-Generalized Born with Surface Area method. Correlation of the calculated ligand binding energies with experimental binding affinities were used to validate protocol performance. Inhibitors of Src tyrosine kinase, CDK2 kinase, beta-secretase, factor Xa, HIV protease, and thrombin were used to test the protocol using published ligand crystal structure data within reasonably defined binding sites. In-house Respiratory Syncytial Virus inhibitor data were used as a more challenging test set using a hand-built binding model. Least squares fits for all data sets suggested reasonable validation of the protocol within the context of observed ligand binding poses. The E-Novo protocol provides a convenient all-in-one structure-based design process for rapid assessment and scoring of lead optimization libraries.

  16. Biometrics based authentication scheme for session initiation protocol.

    PubMed

    Xie, Qi; Tang, Zhixiong

    2016-01-01

    Many two-factor challenge-response based session initiation protocol (SIP) has been proposed, but most of them are vulnerable to smart card stolen attacks and password guessing attacks. In this paper, we propose a novel three-factor SIP authentication scheme using biometrics, password and smart card, and utilize the pi calculus-based formal verification tool ProVerif to prove that the proposed protocol achieves security and authentication. Furthermore, our protocol is highly efficient when compared to other related protocols.

  17. Using Practice-Based Evidence to Improve Supportive Care Practices to Reduce Central Line-Associated Bloodstream Infections in a Pediatric Oncology Unit [Formula: see text].

    PubMed

    Linder, Lauri A; Gerdy, Cheryl; Abouzelof, Rouett; Wilson, Andrew

    Children with cancer are a subset of patients with central lines with distinct risk factors for infection including periods of prolonged neutropenia and compromised mucous membrane integrity. This article relates the implementation of principles of practice-based evidence to identify interventions in addition to best practice maintenance care bundles to reduce central line-associated bloodstream infections involving viridans group streptococci and coagulase-negative staphylococci on an inpatient pediatric oncology unit. Review of individual events combined with review of current clinical practice guided the development of structured protocols emphasizing routine oral care and general supportive cares. Key principles of the protocols emphasized a 1-2-3 mnemonic and included daily bathing, twice daily oral care, and out-of-bed activity 3 times daily. Poisson regression identified a significant main effect for time period for central line-associated bloodstream infection rates involving both viridans group streptococci and coagulase-negative staphylococci. Significant differences were present between the preintervention baseline and implementation of the supportive care protocols. Project outcomes demonstrate the added value of using principles of practice-based evidence to guide the development of interventions to improve clinical care when evidence-based sources are limited.

  18. Standards-Based Wireless Sensor Networking Protocols for Spaceflight Applications

    NASA Technical Reports Server (NTRS)

    Wagner, Raymond S.

    2010-01-01

    Wireless sensor networks (WSNs) have the capacity to revolutionize data gathering in both spaceflight and terrestrial applications. WSNs provide a huge advantage over traditional, wired instrumentation since they do not require wiring trunks to connect sensors to a central hub. This allows for easy sensor installation in hard to reach locations, easy expansion of the number of sensors or sensing modalities, and reduction in both system cost and weight. While this technology offers unprecedented flexibility and adaptability, implementing it in practice is not without its difficulties. Recent advances in standards-based WSN protocols for industrial control applications have come a long way to solving many of the challenges facing practical WSN deployments. In this paper, we will overview two of the more promising candidates - WirelessHART from the HART Communication Foundation and ISA100.11a from the International Society of Automation - and present the architecture for a new standards-based sensor node for networking and applications research.

  19. Instruments for Assessment of Instructional Practices in Standards-Based Teaching

    NASA Astrophysics Data System (ADS)

    Wainwright, Camille L.

    2006-12-01

    This paper describes the development of two forms of an instrument used as a classroom observation protocol, designed to document the impact of reform-based professional development with undergraduate mathematics and science faculty and its impact on the resultant preparation of teachers (PreK 12). A rationale for the development and utilization of this instrument (known as the OTOP, or the Oregon Teacher Observation Protocol) is provided. Constructed upon review of the research on teaching and standards documents in mathematics and science, the protocol formed the basis for data collection in a three-year longitudinal study of teaching practice among early career teachers as well as undergraduate college faculty. In addition, this paper suggests further applications of the observation protocol beyond the original research study purpose. One prominent use for the protocol is in supervisor observations of mathematics and science student teachers.

  20. EVIDENCE-BASED PROTOCOLS

    PubMed Central

    Beissner, Katherine L.; Bach, Eileen; Murtaugh, Christopher M.; Trifilio, MaryGrace; Henderson, Charles R.; Barrón, Yolanda; Trachtenberg, Melissa A.; Reid, M. Carrington

    2017-01-01

    Activity-limiting pain is common among older home care patients and pain management is complicated by the high prevalence of physical frailty and multimorbidity in the home care population. A comparative effectiveness study was undertaken at a large urban home care agency to examine an evidence-based pain self-management program delivered by physical therapists (PTs). This article focuses on PT training, methods implemented to reinforce content after training and to encourage uptake of the program with appropriate patients, and therapists’ fidelity to the program. Seventeen physical therapy teams were included in the cluster randomized controlled trial, with 8 teams (155 PTs) assigned to a control and 9 teams (165 PTs) assigned to a treatment arm. Treatment therapists received interactive training over two sessions, with a follow-up session 6 months later. Additional support was provided via emails, e-learning materials including videos, and a therapist manual. Program fidelity was assessed by examining PT pain documentation in the agency’s electronic health record. PT feedback on the program was obtained via semistructured surveys. There were no between-group differences in the number of PTs documenting program elements with the exception of instruction in the use of imagery, which was documented by a higher percentage of intervention therapists (p = 0.002). PTs felt comfortable teaching the program elements, but cited time as the biggest barrier to implementing the protocol. Possible explanations for study results suggesting limited adherence to the program protocol by intervention-group PTs include the top-down implementation strategy, competing organizational priorities, program complexity, competing patient priorities, and inadequate patient buy-in. Implications for the implementation of complex new programs in the home healthcare setting are discussed. PMID:28157776

  1. Recognising Workplace Learning: The Emerging Practices of e-RPL and e-PR

    ERIC Educational Resources Information Center

    Cameron, Roslyn

    2012-01-01

    Purpose: The use of e-portfolios in recognition of prior learning (RPL) processes in workplace and professional practice contexts has attracted little attention in the literature due to its emergent nature. This study seeks to explore the growing incidence of e-portfolio-based RPL (e-RPL) and professional recognition (e-PR) processes in Australia…

  2. Practical quantum digital signature

    NASA Astrophysics Data System (ADS)

    Yin, Hua-Lei; Fu, Yao; Chen, Zeng-Bing

    2016-03-01

    Guaranteeing nonrepudiation, unforgeability as well as transferability of a signature is one of the most vital safeguards in today's e-commerce era. Based on fundamental laws of quantum physics, quantum digital signature (QDS) aims to provide information-theoretic security for this cryptographic task. However, up to date, the previously proposed QDS protocols are impractical due to various challenging problems and most importantly, the requirement of authenticated (secure) quantum channels between participants. Here, we present the first quantum digital signature protocol that removes the assumption of authenticated quantum channels while remaining secure against the collective attacks. Besides, our QDS protocol can be practically implemented over more than 100 km under current mature technology as used in quantum key distribution.

  3. Classification of pregnancies of unknown location according to four different hCG-based protocols.

    PubMed

    Fistouris, J; Bergh, C; Strandell, A

    2016-10-01

    How do four protocols based on serial human chorionic gonadotropin (hCG) measurements perform when classifying pregnancies of unknown location (PULs) as low or high risk of being an ectopic pregnancy (EP)? The use of cut-offs in hCG level changes published by NICE, and a logistic regression model, M4, correctly classify more PULs as high risk, compared with two other protocols. A logistic regression model, M4, based on the mean of two consecutive hCG values and the hCG ratio (hCG 48 h/hCG 0 h) that classify PULs into low- and high-risk groups for triage purposes, identifies more EPs than a protocol using the cut-offs between a 13% decline and a 66% rise in hCG levels over 48 h. A retrospective comparative study of four different hCG-based protocols classifying PULs as low or high risk of being an EP was performed at a gynaecological emergency unit over 3 years. We identified 915 women with a PUL. Initial transvaginal ultrasonography (TVS) findings categorised 187 of the PULs as probable intrauterine pregnancies (IUPs) and 16 as probable EPs. The rate of change in hCG levels over 48 h was calculated for each patient and subjected to three different hCG threshold intervals and a logistic regression model for outcome prediction. Each PUL was subsequently dichotomised to either low-risk (i.e. failed PUL/IUP) or high-risk (i.e. EP) classification, which allowed us to compare the diagnostic performance. In 'Protocol A', a PUL was classified as low risk if >13% hCG level decline or >66% hCG level rise was achieved; otherwise, the PUL was classified as high risk of being an EP. 'Protocol B' classified a PUL as low or high risk using cut-offs of 35-50% declining hCG levels and of 53% rising hCG levels. Similarly, 'Protocol C' used hCG level cut-offs published by NICE, 50% for declining hCG levels and 63% for rising hCG levels. Finally, if a logistic regression model 'Protocol M4' calculated a ≥5% risk of the PUL being an EP, it was classified as high risk, and otherwise

  4. The Classroom Observation Protocol for Undergraduate STEM (COPUS): a new instrument to characterize university STEM classroom practices.

    PubMed

    Smith, Michelle K; Jones, Francis H M; Gilbert, Sarah L; Wieman, Carl E

    2013-01-01

    Instructors and the teaching practices they employ play a critical role in improving student learning in college science, technology, engineering, and mathematics (STEM) courses. Consequently, there is increasing interest in collecting information on the range and frequency of teaching practices at department-wide and institution-wide scales. To help facilitate this process, we present a new classroom observation protocol known as the Classroom Observation Protocol for Undergraduate STEM or COPUS. This protocol allows STEM faculty, after a short 1.5-hour training period, to reliably characterize how faculty and students are spending their time in the classroom. We present the protocol, discuss how it differs from existing classroom observation protocols, and describe the process by which it was developed and validated. We also discuss how the observation data can be used to guide individual and institutional change.

  5. The Classroom Observation Protocol for Undergraduate STEM (COPUS): A New Instrument to Characterize University STEM Classroom Practices

    PubMed Central

    Smith, Michelle K.; Jones, Francis H. M.; Gilbert, Sarah L.; Wieman, Carl E.

    2013-01-01

    Instructors and the teaching practices they employ play a critical role in improving student learning in college science, technology, engineering, and mathematics (STEM) courses. Consequently, there is increasing interest in collecting information on the range and frequency of teaching practices at department-wide and institution-wide scales. To help facilitate this process, we present a new classroom observation protocol known as the Classroom Observation Protocol for Undergraduate STEM or COPUS. This protocol allows STEM faculty, after a short 1.5-hour training period, to reliably characterize how faculty and students are spending their time in the classroom. We present the protocol, discuss how it differs from existing classroom observation protocols, and describe the process by which it was developed and validated. We also discuss how the observation data can be used to guide individual and institutional change. PMID:24297289

  6. Electronic Voting Protocol Using Identity-Based Cryptography.

    PubMed

    Gallegos-Garcia, Gina; Tapia-Recillas, Horacio

    2015-01-01

    Electronic voting protocols proposed to date meet their properties based on Public Key Cryptography (PKC), which offers high flexibility through key agreement protocols and authentication mechanisms. However, when PKC is used, it is necessary to implement Certification Authority (CA) to provide certificates which bind public keys to entities and enable verification of such public key bindings. Consequently, the components of the protocol increase notably. An alternative is to use Identity-Based Encryption (IBE). With this kind of cryptography, it is possible to have all the benefits offered by PKC, without neither the need of certificates nor all the core components of a Public Key Infrastructure (PKI). Considering the aforementioned, in this paper we propose an electronic voting protocol, which meets the privacy and robustness properties by using bilinear maps.

  7. Electronic Voting Protocol Using Identity-Based Cryptography

    PubMed Central

    Gallegos-Garcia, Gina; Tapia-Recillas, Horacio

    2015-01-01

    Electronic voting protocols proposed to date meet their properties based on Public Key Cryptography (PKC), which offers high flexibility through key agreement protocols and authentication mechanisms. However, when PKC is used, it is necessary to implement Certification Authority (CA) to provide certificates which bind public keys to entities and enable verification of such public key bindings. Consequently, the components of the protocol increase notably. An alternative is to use Identity-Based Encryption (IBE). With this kind of cryptography, it is possible to have all the benefits offered by PKC, without neither the need of certificates nor all the core components of a Public Key Infrastructure (PKI). Considering the aforementioned, in this paper we propose an electronic voting protocol, which meets the privacy and robustness properties by using bilinear maps. PMID:26090515

  8. Where Words Fail, Music Speaks: A Mixed Method Study of an Evidence-Based Music Protocol.

    PubMed

    Daniels, Ruby A; Torres, David; Reeser, Cathy

    2016-01-01

    Despite numerous studies documenting the benefits of music, hospice social workers are often unfamiliar with evidence-based music practices that may improve end of life care. This mixed method study tested an intervention to teach hospice social workers and chaplains (N = 10) an evidence-based music protocol. Participants used the evidence-based practice (EBP) for 30 days, recording 226 journal entries that described observations of 84 patients and their families. There was a significant increase in EBP knowledge (35%). Prompting behavioral and emotional responses, music was described frequently as a catalyst that facilitated deeper dialogue between patients, families, social workers, and chaplains.

  9. Just-in-Time Evidence-Based E-mail “Reminders” in Home Health Care: Impact on Nurse Practices

    PubMed Central

    Murtaugh, Christopher M; Pezzin, Liliana E; McDonald, Margaret V; Feldman, Penny H; Peng, Timothy R

    2005-01-01

    Objective To test the effectiveness of two interventions designed to improve the adoption of evidence-based practices by home health nurses caring for heart failure (HF) patients. Data Sources/Study Setting Information on nurse practices was abstracted from the clinical records of patients admitted between June 2000 and November 2001 to the care of 354 study nurses at a large, urban, nonprofit home care agency. Study Design The study employed a randomized design with nurses assigned to usual care or one of two intervention groups upon identification of an eligible patient. The basic intervention was a one-time e-mail reminder highlighting six HF-specific clinical recommendations. The augmented intervention consisted of the initial e-mail reminder supplemented by provider prompts, patient education material, and clinical nurse specialist outreach. Data Collection At each home health visit provided by a study nurse to an eligible HF patient during the 45-day follow-up period, a structured chart abstraction tool was used to collect information on whether the nurse provided the care practices highlighted in the e-mail reminder. Principal Findings Both the basic and the augmented interventions greatly increased the practice of evidence-based care, according to patient records, in the areas of patient assessment and instructions about HF disease management. While not all results were statistically significant at conventional levels, intervention effects were positive in virtually all cases and effect magnitudes frequently were large. Conclusions The results of this randomized trial strongly support the efficacy of just-in-time evidence-based reminders as a means of changing clinical practice among home health nurses who are geographically dispersed and spend much of their time in the field. PMID:15960694

  10. The Best of Both Worlds: Building on the COPUS and RTOP Observation Protocols to Easily and Reliably Measure Various Levels of Reformed Instructional Practice

    PubMed Central

    Lund, Travis J.; Pilarz, Matthew; Velasco, Jonathan B.; Chakraverty, Devasmita; Rosploch, Kaitlyn; Undersander, Molly; Stains, Marilyne

    2015-01-01

    Researchers, university administrators, and faculty members are increasingly interested in measuring and describing instructional practices provided in science, technology, engineering, and mathematics (STEM) courses at the college level. Specifically, there is keen interest in comparing instructional practices between courses, monitoring changes over time, and mapping observed practices to research-based teaching. While increasingly common observation protocols (Reformed Teaching Observation Protocol [RTOP] and Classroom Observation Protocol in Undergraduate STEM [COPUS]) at the postsecondary level help achieve some of these goals, they also suffer from weaknesses that limit their applicability. In this study, we leverage the strengths of these protocols to provide an easy method that enables the reliable and valid characterization of instructional practices. This method was developed empirically via a cluster analysis using observations of 269 individual class periods, corresponding to 73 different faculty members, 28 different research-intensive institutions, and various STEM disciplines. Ten clusters, called COPUS profiles, emerged from this analysis; they represent the most common types of instructional practices enacted in the classrooms observed for this study. RTOP scores were used to validate the alignment of the 10 COPUS profiles with reformed teaching. Herein, we present a detailed description of the cluster analysis method, the COPUS profiles, and the distribution of the COPUS profiles across various STEM courses at research-intensive universities. PMID:25976654

  11. Educating fellows in practice-based learning and improvement and systems-based practice: The value of quality improvement in clinical practice.

    PubMed

    Carey, William A; Colby, Christopher E

    2013-02-01

    In 1999, the Accreditation Council for Graduate Medical Education identified 6 general competencies in which all residents must receive training. In the decade since these requirements went into effect, practice-based learning and improvement (PBLI) and systems-based practice (SBP) have proven to be the most challenging competencies to teach and assess. Because PBLI and SBP both are related to quality improvement (QI) principles and processes, we developed a QI-based curriculum to teach these competencies to our fellows. This experiential curriculum engaged our fellows in our neonatal intensive care unit's (NICU's) structured QI process. After identifying specific patient outcomes in need of improvement, our fellows applied validated QI methods to develop evidence-based treatment protocols for our neonatal intensive care unit. These projects led to immediate and meaningful improvements in patient care and also afforded our fellows various means by which to demonstrate their competence in PBLI and SBP. Our use of portfolios enabled us to document our fellows' performance in these competencies quite easily and comprehensively. Given the clinical and educational structures common to most intensive care unit-based training programs, we believe that a QI-based curriculum such as ours could be adapted by others to teach and assess PBLI and SBP. Copyright © 2013 Elsevier Inc. All rights reserved.

  12. Towards an improved LAI collection protocol via simulated field-based PAR sensing

    DOE PAGES

    Yao, Wei; Van Leeuwen, Martin; Romanczyk, Paul; ...

    2016-07-14

    In support of NASA’s next-generation spectrometer—the Hyperspectral Infrared Imager (HyspIRI)—we are working towards assessing sub-pixel vegetation structure from imaging spectroscopy data. Of particular interest is Leaf Area Index (LAI), which is an informative, yet notoriously challenging parameter to efficiently measure in situ. While photosynthetically-active radiation (PAR) sensors have been validated for measuring crop LAI, there is limited literature on the efficacy of PAR-based LAI measurement in the forest environment. This study (i) validates PAR-based LAI measurement in forest environments, and (ii) proposes a suitable collection protocol, which balances efficiency with measurement variation, e.g., due to sun flecks and various-sized canopymore » gaps. A synthetic PAR sensor model was developed in the Digital Imaging and Remote Sensing Image Generation (DIRSIG) model and used to validate LAI measurement based on first-principles and explicitly-known leaf geometry. Simulated collection parameters were adjusted to empirically identify optimal collection protocols. Furthermore, these collection protocols were then validated in the field by correlating PAR-based LAI measurement to the normalized difference vegetation index (NDVI) extracted from the “classic” Airborne Visible Infrared Imaging Spectrometer (AVIRIS-C) data (R 2 was 0.61). The results indicate that our proposed collecting protocol is suitable for measuring the LAI of sparse forest (LAI < 3–5 ( m 2/m 2)).« less

  13. Home-based bimanual training based on motor learning principles in children with unilateral cerebral palsy and their parents (the COAD-study): rationale and protocols.

    PubMed

    Schnackers, Marlous; Beckers, Laura; Janssen-Potten, Yvonne; Aarts, Pauline; Rameckers, Eugène; van der Burg, Jan; de Groot, Imelda; Smeets, Rob; Geurts, Sander; Steenbergen, Bert

    2018-04-18

    Home-based training is considered an important intervention in rehabilitation of children with unilateral cerebral palsy. Despite consensus on the value of home-based upper limb training, no evidence-based best practice exists. Promoting compliance of children to adhere to an intensive program while keeping parental stress levels low is an important challenge when designing home-based training programs. Incorporating implicit motor learning principles emerges to be a promising method to resolve this challenge. Here we describe two protocols for home-based bimanual training programs, one based on implicit motor learning principles and one based on explicit motor learning principles, for children with unilateral spastic cerebral palsy aged 2 through 7 years. Children receive goal-oriented, task-specific bimanual training in their home environment from their parents for 3.5 h/week for 12 weeks according to an individualized program. Parents will be intensively coached by a multidisciplinary team, consisting of a pediatric therapist and remedial educationalist. Both programs consist of a preparation phase (goal setting, introductory meetings with coaching professionals, design of individualized program, instruction of parents, home visit) and home-based training phase (training, video-recordings, registrations, and telecoaching and home visits by the coaching team). The programs contrast with respect to the teaching strategy, i.e. how the parents support their child during training. In both programs parents provide their child with instructions and feedback that focus on the activity (i.e. task-oriented) or the result of the activity (i.e. result-oriented). However, in the explicit program parents are in addition instructed to give exact instructions and feedback on the motor performance of the bimanual activities, whereas in the implicit program the use of both hands and the appropriate motor performance of the activity are elicited via manipulation of the

  14. Strong Password-Based Authentication in TLS Using the Three-PartyGroup Diffie-Hellman Protocol

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Abdalla, Michel; Bresson, Emmanuel; Chevassut, Olivier

    2006-08-26

    The Internet has evolved into a very hostile ecosystem where"phishing'' attacks are common practice. This paper shows that thethree-party group Diffie-Hellman key exchange can help protect againstthese attacks. We have developed a suite of password-based cipher suitesfor the Transport Layer Security (TLS) protocol that are not onlyprovably secure but also assumed to be free from patent and licensingrestrictions based on an analysis of relevant patents in thearea.

  15. Developing the skills required for evidence-based practice.

    PubMed

    French, B

    1998-01-01

    The current health care environment requires practitioners with the skills to find and apply the best currently available evidence for effective health care, to contribute to the development of evidence-based practice protocols, and to evaluate the impact of utilizing validated research findings in practice. Current approaches to teaching research are based mainly on gaining skills by participation in the research process. Emphasis on the requirement for rigour in the process of creating new knowledge is assumed to lead to skill in the process of using research information created by others. This article reflects upon the requirements for evidence-based practice, and the degree to which current approaches to teaching research prepare practitioners who are able to find, evaluate and best use currently available research information. The potential for using the principles of systematic review as a teaching and learning strategy for research is explored, and some of the possible strengths and weakness of this approach are highlighted.

  16. e-Learning competency for practice nurses: an evaluation report.

    PubMed

    Heartfield, Marie; Morello, Andrea; Harris, Melanie; Lawn, Sharon; Pols, Vincenza; Stapleton, Carolyn; Battersby, Malcolm

    2013-01-01

    Practice nurses in Australia are now funded to facilitate chronic condition management, including self-management support. Chronic disease management requires an established rapport, support and proactivity between general practitioners, patients and the practice nurses. To achieve this, training in shared decision making is needed. e-Learning supports delivery and achievement of such policy outcomes, service improvements and skill development. However, e-learning effectiveness for health care professionals' is determined by several organisational, economic, pedagogical and individual factors, with positive e-learning experience linked closely to various supports. This paper reinforces previous studies showing nurses' expanding role across general practice teams and reports on some of the challenges of e-learning. Merely providing practice nurses with necessary information via web-based learning systems does not ensure successful learning or progress toward improving health outcomes for patients.

  17. The Utility of Home-Practice in Mindfulness-Based Group Interventions: A Systematic Review.

    PubMed

    Lloyd, Annette; White, Ross; Eames, Catrin; Crane, Rebecca

    2018-01-01

    A growing body of research supports the efficacy of mindfulness-based interventions (MBIs). MBIs consider home-practice as essential to increasing the therapeutic effects of the treatment. To date however, the synthesis of the research conducted on the role of home-practice in controlled MBI studies has been a neglected area. This review aimed to conduct a narrative synthesis of published controlled studies, evaluating mindfulness-based group interventions, which have specifically measured home-practice. Empirical research literature published until June 2016 was searched using five databases. The search strategy focused on mindfulness-based stress reduction (MBSR), mindfulness-based cognitive therapy (MBCT), and home-practice. Included studies met the following criteria: controlled trials, participants 18 years and above, evaluations of MBSR or MBCT, utilised standardised quantitative outcome measures and monitored home-practice using a self-reported measure. Fourteen studies met the criteria and were included in the review. Across all studies, there was heterogeneity in the guidance and resources provided to participants and the approaches used for monitoring home-practice. In addition, the guidance on the length of home-practice was variable across studies, which indicates that research studies and teachers are not adhering to the published protocols. Finally, only seven studies examined the relationship between home-practice and clinical outcomes, of which four found that home-practice predicted improvements on clinical outcome measures. Future research should adopt a standardised approach for monitoring home-practice across MBIs. Additionally, studies should assess whether the amount of home-practice recommended to participants is in line with MBSR/MBCT manualised protocols. Finally, research should utilise experimental methodologies to explicitly explore the relationship between home-practice and clinical outcomes.

  18. Scalable Multicast Protocols for Overlapped Groups in Broker-Based Sensor Networks

    NASA Astrophysics Data System (ADS)

    Kim, Chayoung; Ahn, Jinho

    In sensor networks, there are lots of overlapped multicast groups because of many subscribers, associated with their potentially varying specific interests, querying every event to sensors/publishers. And gossip based communication protocols are promising as one of potential solutions providing scalability in P(Publish)/ S(Subscribe) paradigm in sensor networks. Moreover, despite the importance of both guaranteeing message delivery order and supporting overlapped multicast groups in sensor or P2P networks, there exist little research works on development of gossip-based protocols to satisfy all these requirements. In this paper, we present two versions of causally ordered delivery guaranteeing protocols for overlapped multicast groups. The one is based on sensor-broker as delegates and the other is based on local views and delegates representing subscriber subgroups. In the sensor-broker based protocol, sensor-broker might lead to make overlapped multicast networks organized by subscriber's interests. The message delivery order has been guaranteed consistently and all multicast messages are delivered to overlapped subscribers using gossip based protocols by sensor-broker. Therefore, these features of the sensor-broker based protocol might be significantly scalable rather than those of the protocols by hierarchical membership list of dedicated groups like traditional committee protocols. And the subscriber-delegate based protocol is much stronger rather than fully decentralized protocols guaranteeing causally ordered delivery based on only local views because the message delivery order has been guaranteed consistently by all corresponding members of the groups including delegates. Therefore, this feature of the subscriber-delegate protocol is a hybrid approach improving the inherent scalability of multicast nature by gossip-based technique in all communications.

  19. A randomized trial of protocol-based care for early septic shock.

    PubMed

    Yealy, Donald M; Kellum, John A; Huang, David T; Barnato, Amber E; Weissfeld, Lisa A; Pike, Francis; Terndrup, Thomas; Wang, Henry E; Hou, Peter C; LoVecchio, Frank; Filbin, Michael R; Shapiro, Nathan I; Angus, Derek C

    2014-05-01

    In a single-center study published more than a decade ago involving patients presenting to the emergency department with severe sepsis and septic shock, mortality was markedly lower among those who were treated according to a 6-hour protocol of early goal-directed therapy (EGDT), in which intravenous fluids, vasopressors, inotropes, and blood transfusions were adjusted to reach central hemodynamic targets, than among those receiving usual care. We conducted a trial to determine whether these findings were generalizable and whether all aspects of the protocol were necessary. In 31 emergency departments in the United States, we randomly assigned patients with septic shock to one of three groups for 6 hours of resuscitation: protocol-based EGDT; protocol-based standard therapy that did not require the placement of a central venous catheter, administration of inotropes, or blood transfusions; or usual care. The primary end point was 60-day in-hospital mortality. We tested sequentially whether protocol-based care (EGDT and standard-therapy groups combined) was superior to usual care and whether protocol-based EGDT was superior to protocol-based standard therapy. Secondary outcomes included longer-term mortality and the need for organ support. We enrolled 1341 patients, of whom 439 were randomly assigned to protocol-based EGDT, 446 to protocol-based standard therapy, and 456 to usual care. Resuscitation strategies differed significantly with respect to the monitoring of central venous pressure and oxygen and the use of intravenous fluids, vasopressors, inotropes, and blood transfusions. By 60 days, there were 92 deaths in the protocol-based EGDT group (21.0%), 81 in the protocol-based standard-therapy group (18.2%), and 86 in the usual-care group (18.9%) (relative risk with protocol-based therapy vs. usual care, 1.04; 95% confidence interval [CI], 0.82 to 1.31; P=0.83; relative risk with protocol-based EGDT vs. protocol-based standard therapy, 1.15; 95% CI, 0.88 to 1

  20. WE-E-304-02: Implementing SBRT Protocols: A NRG CIRO Perspective

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Xiao, Y.

    2015-06-15

    SBRT is having a dramatic impact on radiation therapy of early-stage, locally advanced cancers. A number of national protocols have been and are being developed to assess the clinical efficacy of SBRT for various anatomical sites, such as lung and spine. Physics credentialing for participating and implementation of trial protocols involve a broad spectrum of requirements from image guidance, motion management, to planning technology and dosimetric constrains. For radiation facilities that do not have extensive experiences in SBRT treatment and protocol credentialing, these complex processes of credentialing and implementation could be very challenging and, sometimes, may lead to ineffective evenmore » unsuccessful execution of these processes. In this proposal, we will provide comprehensive review of some current SBRT protocols, explain the requirements and their underline rationales, illustrate representative failed and successful experiences, related to SBRT credentialing, and discuss strategies for effective SBRT credentialing and implementation. Learning Objectives: Understand requirements and challenges of SBRT credentailing and implentation Discuss processes and strategies of effective SBRT credentailing Discuss practical considerations, potential pitfalls and solutions of SBRT implentation.« less

  1. A Standardized Shift Handover Protocol: Improving Nurses’ Safe Practice in Intensive Care Units

    PubMed Central

    Malekzadeh, Javad; Mazluom, Seyed Reza; Etezadi, Toktam; Tasseri, Alireza

    2013-01-01

    Introduction: For maintaining the continuity of care and improving the quality of care, effective inter-shift information communication is necessary. Any handover error can endanger patient safety. Despite the importance of shift handover, there is no standard handover protocol in our healthcare settings. Methods: In this one-group pretest-posttest quasi-experimental study conducted in spring and summer of 2011, we recruited a convenience sample of 56 ICU nurses. The Nurses’ Safe Practice Evaluation Checklist was used for data collection. The Content Validity Index and the inter-rater correlation coefficient of the checklist was 0.92 and 89, respectively. We employed the SPSS 11.5 software and the Mc Nemar and paired-samples t test for data analysis. Results: Study findings revealed that nurses’ mean score on the Safe Practice Evaluation Checklist increased significantly from 11.6 (2.7) to 17.0 (1.8) (P < 0.001). Conclusion: using a standard handover protocol for communicating patient’s needs and information improves nurses’ safe practice in the area of basic nursing care. PMID:25276725

  2. Breast reconstruction with tissue expanders: implementation of a standardized best-practices protocol to reduce infection rates.

    PubMed

    Khansa, Ibrahim; Hendrick, Russell G; Shore, Alison; Meyerson, Joseph; Yang, Maelee; Boehmler, James H

    2014-07-01

    Periprosthetic infection remains a frustrating and costly complication of breast reconstruction with tissue expanders. Although some specific steps have been previously shown to reduce periprosthetic infections, no comprehensive protocol addressing all aspects of preoperative, intraoperative, and postoperative patient management has been evaluated in the literature. The authors' goal was to evaluate the effectiveness of their protocol at reducing periprosthetic infections. A comprehensive, best-practices protocol was introduced and implemented in November of 2010. All patients undergoing breast reconstruction using tissue expanders at the authors' institution in the 5 years before the protocol, and in the 2 years after, were analyzed. Three hundred five patients underwent 456 tissue expander reconstructions in the 5 years before the protocol, and 198 patients underwent 313 reconstructions in the 2 years after. Significantly fewer patients developed periprosthetic infection after protocol (11.6 percent versus 18.4 percent; p=0.042), and the number of infected tissue expanders trended toward a decrease (9.3 percent versus 13.2 percent; p=0.097). On multivariate analysis, the protocol significantly reduced the odds of periprosthetic infection (OR, 0.45; p=0.022). Predictors of infection included obesity (OR, 2.01; p=0.045) and preoperative breast size larger than C cup (OR, 2.83; p=0.006). The authors' comprehensive, best-practices protocol allowed them to reduce the odds of tissue expander infections by 55 percent (OR, 0.45; p=0.022). The authors were able to identify several potential areas of improvement that may help them lower the rate of infection further in the future. Therapeutic, III.

  3. Research- and Practice-Based Nutrition Education and Cooking Workshops in Pediatric Oncology: Protocol for Implementation and Development of Curriculum.

    PubMed

    Chaput, Cynthia; Beaulieu-Gagnon, Sabrina; Bélanger, Véronique; Drouin, Simon; Bertout, Laurence; Lafrance, Lucie; Olivier, Cinthia; Robitaille, Marthe; Laverdière, Caroline; Sinnett, Daniel; Marquis, Marie; Marcil, Valérie

    2018-01-09

    Progresses in childhood cancer treatment, diagnosis, and management have resulted in childhood cancer survival rates of over 80%. However, this therapeutic success comes with a heavy price: two-thirds of childhood cancer survivors will be affected by further complications, including cardiovascular and metabolic diseases. Adequate nutrition during cancer treatment is essential to ensure the child's optimal development, improve tolerance to treatments, and can contribute to lower the risk of developing cardiometabolic diseases. Side effects of cancer treatments can negatively impact children's nutritional intake and eating behaviors. Involving the families of childhood cancer patients in educational workshops could be a promising avenue to promote healthy eating during and after cancer treatment. The objectives of this study were to develop, validate, and implement a family-based nutrition education and cooking workshop curriculum in a pediatric oncology setting that addresses the nutritional issues encountered during treatments while promoting the adoption of healthy eating habits for the prevention of long-term cardiometabolic effects. The workshops were developed and validated following an 8-step iterative process, including a review of the literature and consultations with a steering committee. An evaluation tool was also developed. A nonrandomized study protocol was elaborated to implement the workshops and measure their impact. The themes of the 6 research- and practice-based lessons are as follows: meal fortification during cancer treatment, changes in taste during cancer therapy and their impact on children, adapting diet to eating-related side effects of treatments, nutritional support during cancer treatment, Mediterranean diet and health, and planning quick and economic meals. The validation process included consultations with the institution's clinical nutrition professionals. Self-administered post questionnaires were developed according to the content

  4. Evaluating Evidence-Based Practice Knowledge and Beliefs Through the e-Learning EBP Academy.

    PubMed

    Green, Angela; Jeffs, Debra A; Boateng, Beatrice A; Lowe, Gary R; Walden, Marlene

    2017-07-01

    This research examined evidence-based practice (EBP) knowledge and beliefs before and after a 3-month e-learning program was implemented to build EBP capacity at a large children's hospital. Ten clinicians completed the development, implementation, and evaluation of the e-learning education, comprising phase one. Revision and participation by 41 clinicians followed in phase two. Participants in both phases completed the EBP Beliefs and Implementation Scales preintervention, postintervention, and 6 months after postintervention. EBP beliefs and implementation increased immediately and 6 months after postintervention, with statistically significant increases in both phases. Participants in both phases applied knowledge by completing mentor-supported EBP projects. Although EBP beliefs and implementation scores increased and e-learning provided flexibility for clinician participation, challenges arose, resulting in lower-than-expected completion. Subsequent revisions resulted in hybrid education, integrating classroom and e-learning with project mentoring. This funded e-learning research contributes knowledge to the growing specialty of professional development. J Contin Educ Nurs. 2017;48(7):304-311. Copyright 2017, SLACK Incorporated.

  5. A robust ECC based mutual authentication protocol with anonymity for session initiation protocol.

    PubMed

    Mehmood, Zahid; Chen, Gongliang; Li, Jianhua; Li, Linsen; Alzahrani, Bander

    2017-01-01

    Over the past few years, Session Initiation Protocol (SIP) is found as a substantial application-layer protocol for the multimedia services. It is extensively used for managing, altering, terminating and distributing the multimedia sessions. Authentication plays a pivotal role in SIP environment. Currently, Lu et al. presented an authentication protocol for SIP and profess that newly proposed protocol is protected against all the familiar attacks. However, the detailed analysis describes that the Lu et al.'s protocol is exposed against server masquerading attack and user's masquerading attack. Moreover, it also fails to protect the user's identity as well as it possesses incorrect login and authentication phase. In order to establish a suitable and efficient protocol, having ability to overcome all these discrepancies, a robust ECC-based novel mutual authentication mechanism with anonymity for SIP is presented in this manuscript. The improved protocol contains an explicit parameter for user to cope the issues of security and correctness and is found to be more secure and relatively effective to protect the user's privacy, user's masquerading and server masquerading as it is verified through the comprehensive formal and informal security analysis.

  6. E-mentoring in public health nursing practice.

    PubMed

    Miller, Louise C; Devaney, Susan W; Kelly, Glenda L; Kuehn, Alice F

    2008-09-01

    Attrition in the public health nursing work force combined with a lack of faculty to teach public health prompted development of a "long-distance" learning project. Practicing associate degree nurses enrolled in an online course in population-based practice worked with experienced public health nurse "e-mentors." Student-mentor pairs worked through course assignments, shared public health nursing experiences, and problem-solved real-time public health issues. Nursing faculty served as coordinators for student learning and mentor support. Over 3 years, 38 student-mentor pairs participated in the project. Students reported they valued the expertise and guidance of their mentors. Likewise, mentors gained confidence in their practice and abilities to mentor. Issues related to distance learning and e-mentoring centered around use of technology and adequate time to communicate with one another. E-mentoring is a viable strategy to connect nurses to a learning, sharing environment while crossing the barriers of distance, agency isolation, and busy schedules.

  7. Implementing the information prescription protocol in a family medicine practice: a case study*†‡

    PubMed Central

    Carey, Peggy; Haines, Laura; Lampson, Alan P; Pond, Fred

    2010-01-01

    Question: Can an information prescription protocol be successfully integrated into a family medicine practice seeking to enhance patient education and self-management? Setting: Milton Family Practice, an outpatient clinic and resident teaching site of the University of Vermont and Fletcher Allen Health Care, is located in a semirural area fifteen miles from main campus. Objectives: The objectives were to increase physicians' knowledge and use of information prescriptions, sustain integration of information prescription use, and increase physicians' ability to provide patient education information. Methods: Methods used were promotion of the National Library of Medicine's Information Rx, physician instruction, installation of patient and provider workstations, and a collaborative approach to practice integration. Main Results: A post-intervention survey showed increased physician knowledge and use of the Information Rx protocol. Support procedures were integrated at the practice. Conclusions: Sustainable integration of Information Rx in a primary care clinic requires not only promotion and education, but also attention to clinic organization and procedures. PMID:20648257

  8. Improving practice in community-based settings: a randomized trial of supervision – study protocol

    PubMed Central

    2013-01-01

    Background Evidence-based treatments for child mental health problems are not consistently available in public mental health settings. Expanding availability requires workforce training. However, research has demonstrated that training alone is not sufficient for changing provider behavior, suggesting that ongoing intervention-specific supervision or consultation is required. Supervision is notably under-investigated, particularly as provided in public mental health. The degree to which supervision in this setting includes ‘gold standard’ supervision elements from efficacy trials (e.g., session review, model fidelity, outcome monitoring, skill-building) is unknown. The current federally-funded investigation leverages the Washington State Trauma-focused Cognitive Behavioral Therapy Initiative to describe usual supervision practices and test the impact of systematic implementation of gold standard supervision strategies on treatment fidelity and clinical outcomes. Methods/Design The study has two phases. We will conduct an initial descriptive study (Phase I) of supervision practices within public mental health in Washington State followed by a randomized controlled trial of gold standard supervision strategies (Phase II), with randomization at the clinician level (i.e., supervisors provide both conditions). Study participants will be 35 supervisors and 130 clinicians in community mental health centers. We will enroll one child per clinician in Phase I (N = 130) and three children per clinician in Phase II (N = 390). We use a multi-level mixed within- and between-subjects longitudinal design. Audio recordings of supervision and therapy sessions will be collected and coded throughout both phases. Child outcome data will be collected at the beginning of treatment and at three and six months into treatment. Discussion This study will provide insight into how supervisors can optimally support clinicians delivering evidence-based treatments. Phase I will

  9. Supporting Tablet Configuration, Tracking, and Infection Control Practices in Digital Health Interventions: Study Protocol.

    PubMed

    Furberg, Robert D; Ortiz, Alexa M; Zulkiewicz, Brittany A; Hudson, Jordan P; Taylor, Olivia M; Lewis, Megan A

    2016-06-27

    Tablet-based health care interventions have the potential to encourage patient care in a timelier manner, allow physicians convenient access to patient records, and provide an improved method for patient education. However, along with the continued adoption of tablet technologies, there is a concomitant need to develop protocols focusing on the configuration, management, and maintenance of these devices within the health care setting to support the conduct of clinical research. Develop three protocols to support tablet configuration, tablet management, and tablet maintenance. The Configurator software, Tile technology, and current infection control recommendations were employed to develop three distinct protocols for tablet-based digital health interventions. Configurator is a mobile device management software specifically for iPhone operating system (iOS) devices. The capabilities and current applications of Configurator were reviewed and used to develop the protocol to support device configuration. Tile is a tracking tag associated with a free mobile app available for iOS and Android devices. The features associated with Tile were evaluated and used to develop the Tile protocol to support tablet management. Furthermore, current recommendations on preventing health care-related infections were reviewed to develop the infection control protocol to support tablet maintenance. This article provides three protocols: the Configurator protocol, the Tile protocol, and the infection control protocol. These protocols can help to ensure consistent implementation of tablet-based interventions, enhance fidelity when employing tablets for research purposes, and serve as a guide for tablet deployments within clinical settings.

  10. Synthesizing Existing CSMA and TDMA Based MAC Protocols for VANETs

    PubMed Central

    Huang, Jiawei; Li, Qi; Zhong, Shaohua; Liu, Lianhai; Zhong, Ping; Wang, Jianxin; Ye, Jin

    2017-01-01

    Many Carrier Sense Multiple Access (CSMA) and Time Division Multiple Access (TDMA) based medium access control (MAC) protocols for vehicular ad hoc networks (VANETs) have been proposed recently. Contrary to the common perception that they are competitors, we argue that the underlying strategies used in these MAC protocols are complementary. Based on this insight, we design CTMAC, a MAC protocol that synthesizes existing strategies; namely, random accessing channel (used in CSMA-style protocols) and arbitral reserving channel (used in TDMA-based protocols). CTMAC swiftly changes its strategy according to the vehicle density, and its performance is better than the state-of-the-art protocols. We evaluate CTMAC using at-scale simulations. Our results show that CTMAC reduces the channel completion time and increases the network goodput by 45% for a wide range of application workloads and network settings. PMID:28208590

  11. Strategy for Developing Expert-System-Based Internet Protocols (TCP/IP)

    NASA Technical Reports Server (NTRS)

    Ivancic, William D.

    1997-01-01

    The Satellite Networks and Architectures Branch of NASA's Lewis Research is addressing the issue of seamless interoperability of satellite networks with terrestrial networks. One of the major issues is improving reliable transmission protocols such as TCP over long latency and error-prone links. Many tuning parameters are available to enhance the performance of TCP including segment size, timers and window sizes. There are also numerous congestion avoidance algorithms such as slow start, selective retransmission and selective acknowledgment that are utilized to improve performance. This paper provides a strategy to characterize the performance of TCP relative to various parameter settings in a variety of network environments (i.e. LAN, WAN, wireless, satellite, and IP over ATM). This information can then be utilized to develop expert-system-based Internet protocols.

  12. The implementation of biosecurity practices and visitor protocols on non-commercial horse properties in New Zealand.

    PubMed

    Rosanowski, S M; Rogers, C W; Cogger, N; Benschop, J; Stevenson, M A

    2012-11-01

    A survey was conducted to investigate biosecurity practices on non-commercial horse properties, to describe the number of visits by horse professionals and any protocols that visitors were required to follow before interacting with resident horses. Data were collected in November 2009 during a cross-sectional study of non-commercial horse properties, in New Zealand, selected using generalised random-tessellated stratified design and a self-administered postal questionnaire. Data were described and the associations between property-level factors and biosecurity practices were analysed using logistic regression analysis. In total there were 791 respondents from non-commercial horse properties, of which 660 (83%) answer at least one question relating to biosecurity practices. Of the respondents, 95% had at least one biosecurity practice for arriving horses. Only 31% of properties isolated horses for more than four days, and few respondents checked for pyrexia or other clinical signs of infectious disease in new horses. Moving horses from a property was associated with the implementation of biosecurity practices and practices specific to the clinical signs of respiratory disease. Overall, 79% of properties had horse professional's visit, but only 33% of respondents reported biosecurity protocols for these visitors. Most properties had some knowledge about newly arriving horses, but the effectiveness of these practices for biosecurity were questionable, as few practices would stop disease spread to resident horses. Horse professionals are likely candidates for disease spread due to contact with horses, limited visitor protocols and the frequency of visits. The development of a plan to improve biosecurity for endemic and exotic disease is recommended. Copyright © 2012 Elsevier B.V. All rights reserved.

  13. Implementing clinical protocols in oncology: quality gaps and the learning curve phenomenon.

    PubMed

    Kedikoglou, Simos; Syrigos, Konstantinos; Skalkidis, Yannis; Ploiarchopoulou, Fani; Dessypris, Nick; Petridou, Eleni

    2005-08-01

    The quality improvement effort in clinical practice has focused mostly on 'performance quality', i.e. on the development of comprehensive, evidence-based guidelines. This study aimed to assess the 'conformance quality', i.e. the extent to which guidelines once developed are correctly and consistently applied. It also aimed to assess the existence of quality gaps in the treatment of certain patient segments as defined by age or gender and to investigate methods to improve overall conformance quality. A retrospective audit of clinical practice in a well-defined oncology setting was undertaken and the results compared to those obtained from prospectively applying an internally developed clinical protocol in the same setting and using specific tools to increase conformance quality. All indicators showed improvement after the implementation of the protocol that in many cases reached statistical significance, while in the entire cohort advanced age was associated (although not significantly) with sub-optimal delivery of care. A 'learning curve' phenomenon in the implementation of quality initiatives was detected, with all indicators improving substantially in the second part of the prospective study. Clinicians should pay separate attention to the implementation of chosen protocols and employ specific tools to increase conformance quality in patient care.

  14. Policy to implementation: evidence-based practice in community mental health--study protocol.

    PubMed

    Beidas, Rinad S; Aarons, Gregory; Barg, Frances; Evans, Arthur; Hadley, Trevor; Hoagwood, Kimberly; Marcus, Steven; Schoenwald, Sonja; Walsh, Lucia; Mandell, David S

    2013-03-24

    Evidence-based treatments (EBTs) are not widely available in community mental health settings. In response to the call for implementation of evidence-based treatments in the United States, states and counties have mandated behavioral health reform through policies and other initiatives. Evaluations of the impact of these policies on implementation are rare. A systems transformation about to occur in Philadelphia, Pennsylvania, offers an important opportunity to prospectively study implementation in response to a policy mandate. Using a prospective sequential mixed-methods design, with observations at multiple points in time, we will investigate the responses of staff from 30 community mental health clinics to a policy from the Department of Behavioral Health encouraging and incentivizing providers to implement evidence-based treatments to treat youth with mental health problems. Study participants will be 30 executive directors, 30 clinical directors, and 240 therapists. Data will be collected prior to the policy implementation, and then at two and four years following policy implementation. Quantitative data will include measures of intervention implementation and potential moderators of implementation (i.e., organizational- and leader-level variables) and will be collected from executive directors, clinical directors, and therapists. Measures include self-reported therapist fidelity to evidence-based treatment techniques as measured by the Therapist Procedures Checklist-Revised, organizational variables as measured by the Organizational Social Context Measurement System and the Implementation Climate Assessment, leader variables as measured by the Multifactor Leadership Questionnaire, attitudes towards EBTs as measured by the Evidence-Based Practice Attitude Scale, and knowledge of EBTs as measured by the Knowledge of Evidence- Based Services Questionnaire. Qualitative data will include semi-structured interviews with a subset of the sample to assess the

  15. Supporting Tablet Configuration, Tracking, and Infection Control Practices in Digital Health Interventions: Study Protocol

    PubMed Central

    Furberg, Robert D; Zulkiewicz, Brittany A; Hudson, Jordan P; Taylor, Olivia M; Lewis, Megan A

    2016-01-01

    Background Tablet-based health care interventions have the potential to encourage patient care in a timelier manner, allow physicians convenient access to patient records, and provide an improved method for patient education. However, along with the continued adoption of tablet technologies, there is a concomitant need to develop protocols focusing on the configuration, management, and maintenance of these devices within the health care setting to support the conduct of clinical research. Objective Develop three protocols to support tablet configuration, tablet management, and tablet maintenance. Methods The Configurator software, Tile technology, and current infection control recommendations were employed to develop three distinct protocols for tablet-based digital health interventions. Configurator is a mobile device management software specifically for iPhone operating system (iOS) devices. The capabilities and current applications of Configurator were reviewed and used to develop the protocol to support device configuration. Tile is a tracking tag associated with a free mobile app available for iOS and Android devices. The features associated with Tile were evaluated and used to develop the Tile protocol to support tablet management. Furthermore, current recommendations on preventing health care–related infections were reviewed to develop the infection control protocol to support tablet maintenance. Results This article provides three protocols: the Configurator protocol, the Tile protocol, and the infection control protocol. Conclusions These protocols can help to ensure consistent implementation of tablet-based interventions, enhance fidelity when employing tablets for research purposes, and serve as a guide for tablet deployments within clinical settings. PMID:27350013

  16. Effect of various practical warm-up protocols on acute lower-body power.

    PubMed

    Buttifant, David; Hrysomallis, Con

    2015-03-01

    The purpose of this study was to compare the acute effect of box squats with barbell (BBSquat), box squats with elastic resistance bands (BandSquat), and static stretches (SStretch) on external power during a 20-kg weighted jump squat. Twelve male athletes performed each of the 3 warm-up protocols on separate occasions in a randomized order. Weighted jump squat power was assessed using a linear position transducer attached to the bar of a Smith machine. Jump power was measured pre-warm-up and 5 and 10 minutes post-warm-up protocol. The BBSquat protocol involved 3 sets of 3RM, BandSquat involved 3 sets of 3 repetitions using highest resistance elastic bands, and the SStretch protocol comprises two 30-second stretches for muscles of the lower limbs. Jump power significantly increased from pre-warm-up to 5 and 10 minutes post-warm-up for both the BandSquat and BBSquat protocols. There was no statistical difference in power values between BandSquat and BBSquat. Power output significantly decreased from pre-warm-up to 5 and 10 minutes post-warm-up for the SStretch protocol. The BandSquat was just as effective as BBSquat in augmenting acute jump power. The SStretch was detrimental to jump performance. A practical warm-up using relatively inexpensive and portable equipment such as elastic resistance bands was just as effective as a warm-up protocol that requires more substantial and less transportable equipment such as a squat rack and associated free weights. The BandSquat warm-up may be considered more accessible for athletes at various competition levels.

  17. A standard protocol for describing individual-based and agent-based models

    USGS Publications Warehouse

    Grimm, Volker; Berger, Uta; Bastiansen, Finn; Eliassen, Sigrunn; Ginot, Vincent; Giske, Jarl; Goss-Custard, John; Grand, Tamara; Heinz, Simone K.; Huse, Geir; Huth, Andreas; Jepsen, Jane U.; Jorgensen, Christian; Mooij, Wolf M.; Muller, Birgit; Pe'er, Guy; Piou, Cyril; Railsback, Steven F.; Robbins, Andrew M.; Robbins, Martha M.; Rossmanith, Eva; Ruger, Nadja; Strand, Espen; Souissi, Sami; Stillman, Richard A.; Vabo, Rune; Visser, Ute; DeAngelis, Donald L.

    2006-01-01

    Simulation models that describe autonomous individual organisms (individual based models, IBM) or agents (agent-based models, ABM) have become a widely used tool, not only in ecology, but also in many other disciplines dealing with complex systems made up of autonomous entities. However, there is no standard protocol for describing such simulation models, which can make them difficult to understand and to duplicate. This paper presents a proposed standard protocol, ODD, for describing IBMs and ABMs, developed and tested by 28 modellers who cover a wide range of fields within ecology. This protocol consists of three blocks (Overview, Design concepts, and Details), which are subdivided into seven elements: Purpose, State variables and scales, Process overview and scheduling, Design concepts, Initialization, Input, and Submodels. We explain which aspects of a model should be described in each element, and we present an example to illustrate the protocol in use. In addition, 19 examples are available in an Online Appendix. We consider ODD as a first step for establishing a more detailed common format of the description of IBMs and ABMs. Once initiated, the protocol will hopefully evolve as it becomes used by a sufficiently large proportion of modellers.

  18. Collaborating with community-based services to promote evidence-based practice: Process description of a national initiative to improve services for youth with mental health and substance use problems.

    PubMed

    Henderson, Joanna L; Chaim, Gloria; Brownlie, E B

    2017-08-01

    Many youth with significant mental health (MH) and/or substance use (SU) difficulties do not receive specialized services. Collaboration between service providers, researchers, and other stakeholders is essential to improve youth service system capacity to provide evidence-based services to meet the complex array of needs of youth. Facilitators and barriers of implementing evidence-based practice have been identified, but few studies provide examples of the processes of collaboration and implementation for youth MH services. This study explicates the design features and implementation processes of a project to improve screening activities in youth services. These processes supported the building of 16 collaborative networks of service providers from diverse youth-serving sectors (e.g., MH, youth justice, child welfare) in urban, rural, suburban, and remote Canadian communities. These cross-sectoral networks implemented an evidence-based practice (screening youth aged 12-24 years for MH and SU problems using the Global Assessment of Individual Needs-Short Screener [GAIN-SS]) across their services. Materials and resources were provided by a centralized research team. Core project components were standardized and adherence to these components was monitored. Over 800 service providers participated in cross-sectoral networks, capacity-building events, joint data analysis, or interpretation and recommendation sessions. Across the 89 participating agencies, service providers for 84% of participating youth implemented the evidence-based practice accurately in accordance with project protocols, with 98% of positive screens reviewed and addressed according to organizational protocols. Service provider feedback is reported. Facilitators, barriers, and implications of promoting implementation of evidence-based practices across sites and sectors are discussed. (PsycINFO Database Record (c) 2017 APA, all rights reserved).

  19. Standard Operational Protocols in professional nursing practice: use, weaknesses and potentialities.

    PubMed

    Sales, Camila Balsero; Bernardes, Andrea; Gabriel, Carmen Silvia; Brito, Maria de Fátima Paiva; Moura, André Almeida de; Zanetti, Ariane Cristina Barboza

    2018-01-01

    to evaluate the use of Standard Operational Protocols (SOPs) in the professional practice of the nursing team based on the theoretical framework of Donabedian, as well as to identify the weaknesses and potentialities from its implementation. Evaluative research, with quantitative approach performed with nursing professionals working in the Health Units of a city of São Paulo, composed of two stages: document analysis and subsequent application of a questionnaire to nursing professionals. A total of 247 nursing professionals participated and reported changes in the way the interventions were performed. The main weaknesses were the small number of professionals, inadequate physical structure and lack of materials. Among the potentialities were: the standardization of materials and concern of the manager and professional related to patient safety. The reassessment of SOPs is necessary, as well as the adoption of a strategy of permanent education of professionals aiming at improving the quality of care provided.

  20. A native Bayesian classifier based routing protocol for VANETS

    NASA Astrophysics Data System (ADS)

    Bao, Zhenshan; Zhou, Keqin; Zhang, Wenbo; Gong, Xiaolei

    2016-12-01

    Geographic routing protocols are one of the most hot research areas in VANET (Vehicular Ad-hoc Network). However, there are few routing protocols can take both the transmission efficient and the usage of ratio into account. As we have noticed, different messages in VANET may ask different quality of service. So we raised a Native Bayesian Classifier based routing protocol (Naive Bayesian Classifier-Greedy, NBC-Greedy), which can classify and transmit different messages by its emergency degree. As a result, we can balance the transmission efficient and the usage of ratio with this protocol. Based on Matlab simulation, we can draw a conclusion that NBC-Greedy is more efficient and stable than LR-Greedy and GPSR.

  1. Practice-based Research Network Research Good Practices (PRGPs): Summary of Recommendations.

    PubMed

    Dolor, Rowena J; Campbell-Voytal, Kimberly; Daly, Jeanette; Nagykaldi, Zsolt J; O'Beirne, Maeve; Sterling, Pamela; Fagnan, Lyle J; Levy, Barcey; Michaels, LeAnn; Louks, Hannah A; Smith, Paul; Aspy, Cheryl B; Patterson, V Beth; Kano, Miria; Sussman, Andrew L; Williams, Robert; Neale, Anne Victoria

    2015-12-01

    Practice-based research networks (PBRNs) conduct research in community settings, which poses quality control challenges to the integrity of research, such as study implementation and data collection. A foundation for improving research processes within PBRNs is needed to ensure research integrity. Network directors and coordinators from seven U.S.-based PBRNs worked with a professional team facilitator during semiannual in-person meetings and monthly conference calls to produce content for a compendium of recommended research practices specific to the context of PBRNs. Participants were assigned to contribute content congruent with their expertise. Feedback on the draft document was obtained from attendees at the preconference workshop at the annual PBRN meeting in 2013. A revised document was circulated to additional PBRN peers prior to finalization. The PBRN Research Good Practices (PRGPs) document is organized into four chapters: (1) Building PBRN Infrastructure; (2) Study Development and Implementation; (3) Data Management, and (4) Dissemination Policies. Each chapter contains an introduction, detailed procedures for each section, and example resources with information links. The PRGPs is a PBRN-specific resource to facilitate PBRN management and staff training, to promote adherence to study protocols, and to increase validity and generalizability of study findings. © 2015 Wiley Periodicals, Inc.

  2. Effectiveness of a virtual intervention for primary healthcare professionals aimed at improving attitudes towards the empowerment of patients with chronic diseases: study protocol for a cluster randomized controlled trial (e-MPODERA project).

    PubMed

    González-González, Ana Isabel; Orrego, Carola; Perestelo-Perez, Lilisbeth; Bermejo-Caja, Carlos Jesús; Mora, Nuria; Koatz, Débora; Ballester, Marta; Del Pino, Tasmania; Pérez-Ramos, Jeannet; Toledo-Chavarri, Ana; Robles, Noemí; Pérez-Rivas, Francisco Javier; Ramírez-Puerta, Ana Belén; Canellas-Criado, Yolanda; Del Rey-Granado, Yolanda; Muñoz-Balsa, Marcos José; Becerril-Rojas, Beatriz; Rodríguez-Morales, David; Sánchez-Perruca, Luis; Vázquez, José Ramón; Aguirre, Armando

    2017-10-30

    Communities of practice are based on the idea that learning involves a group of people exchanging experiences and knowledge. The e-MPODERA project aims to assess the effectiveness of a virtual community of practice aimed at improving primary healthcare professional attitudes to the empowerment of patients with chronic diseases. This paper describes the protocol for a cluster randomized controlled trial. We will randomly assign 18 primary-care practices per participating region of Spain (Catalonia, Madrid and Canary Islands) to a virtual community of practice or to usual training. The primary-care practice will be the randomization unit and the primary healthcare professional will be the unit of analysis. We will need a sample of 270 primary healthcare professionals (general practitioners and nurses) and 1382 patients. We will perform randomization after professionals and patients are selected. We will ask the intervention group to participate for 12 months in a virtual community of practice based on a web 2.0 platform. We will measure the primary outcome using the Patient-Provider Orientation Scale questionnaire administered at baseline and after 12 months. Secondary outcomes will be the sociodemographic characteristics of health professionals, sociodemographic and clinical characteristics of patients, the Patient Activation Measure questionnaire for patient activation and outcomes regarding use of the virtual community of practice. We will calculate a linear mixed-effects regression to estimate the effect of participating in the virtual community of practice. This cluster randomized controlled trial will show whether a virtual intervention for primary healthcare professionals improves attitudes to the empowerment of patients with chronic diseases. ClicalTrials.gov, NCT02757781 . Registered on 25 April 2016. Protocol Version. PI15.01 22 January 2016.

  3. A model based security testing method for protocol implementation.

    PubMed

    Fu, Yu Long; Xin, Xiao Long

    2014-01-01

    The security of protocol implementation is important and hard to be verified. Since the penetration testing is usually based on the experience of the security tester and the specific protocol specifications, a formal and automatic verification method is always required. In this paper, we propose an extended model of IOLTS to describe the legal roles and intruders of security protocol implementations, and then combine them together to generate the suitable test cases to verify the security of protocol implementation.

  4. Evidence-based care of older people with suspected cognitive impairment in general practice: protocol for the IRIS cluster randomised trial.

    PubMed

    McKenzie, Joanne E; French, Simon D; O'Connor, Denise A; Mortimer, Duncan S; Browning, Colette J; Russell, Grant M; Grimshaw, Jeremy M; Eccles, Martin P; Francis, Jill J; Michie, Susan; Murphy, Kerry; Kossenas, Fiona; Green, Sally E

    2013-08-19

    Dementia is a common and complex condition. Evidence-based guidelines for the management of people with dementia in general practice exist; however, detection, diagnosis and disclosure of dementia have been identified as potential evidence-practice gaps. Interventions to implement guidelines into practice have had varying success. The use of theory in designing implementation interventions has been limited, but is advocated because of its potential to yield more effective interventions and aid understanding of factors modifying the magnitude of intervention effects across trials. This protocol describes methods of a randomised trial that tests a theory-informed implementation intervention that, if effective, may provide benefits for patients with dementia and their carers. This trial aims to estimate the effectiveness of a theory-informed intervention to increase GPs' (in Victoria, Australia) adherence to a clinical guideline for the detection, diagnosis, and management of dementia in general practice, compared with providing GPs with a printed copy of the guideline. Primary objectives include testing if the intervention is effective in increasing the percentage of patients with suspected cognitive impairment who receive care consistent with two key guideline recommendations: receipt of a i) formal cognitive assessment, and ii) depression assessment using a validated scale (primary outcomes for the trial). The design is a parallel cluster randomised trial, with clusters being general practices. We aim to recruit 60 practices per group. Practices will be randomised to the intervention and control groups using restricted randomisation. Patients meeting the inclusion criteria, and GPs' detection and diagnosis behaviours directed toward these patients, will be identified and measured via an electronic search of the medical records nine months after the start of the intervention. Practitioners in the control group will receive a printed copy of the guideline. In

  5. Testing use of payers to facilitate evidence-based practice adoption: protocol for a cluster-randomized trial

    PubMed Central

    2013-01-01

    Background More effective methods are needed to implement evidence-based findings into practice. The Advancing Recovery Framework offers a multi-level approach to evidence-based practice implementation by aligning purchasing and regulatory policies at the payer level with organizational change strategies at the organizational level. Methods The Advancing Recovery Buprenorphine Implementation Study is a cluster-randomized controlled trial designed to increase use of the evidence-based practice buprenorphine medication to treat opiate addiction. Ohio Alcohol, Drug Addiction, and Mental Health Services Boards (ADAMHS), who are payers, and their addiction treatment organizations were recruited for a trial to assess the effects of payer and treatment organization changes (using the Advancing Recovery Framework) versus treatment organization changes alone on the use of buprenorphine. A matched-pair randomization, based on county characteristics, was applied, resulting in seven county ADAMHS boards and twenty-five treatment organizations in each arm. Opioid dependent patients are nested within cluster (treatment organization), and treatment organization clusters are nested within ADAMHS county board. The primary outcome is the percentage of individuals with an opioid dependence diagnosis who use buprenorphine during the 24-month intervention period and the 12-month sustainability period. The trial is currently in the baseline data collection stage. Discussion Although addiction treatment providers are under increasing pressure to implement evidence-based practices that have been proven to improve patient outcomes, adoption of these practices lags, compared to other areas of healthcare. Reasons frequently cited for the slow adoption of EBPs in addiction treatment include, regulatory issues, staff, or client resistance and lack of resources. Yet the way addiction treatment is funded, the payer’s role—has not received a lot of attention in research on EBP adoption. This

  6. The best of both worlds: Building on the COPUS and RTOP observation protocols to easily and reliably measure various levels of reformed instructional practice.

    PubMed

    Lund, Travis J; Pilarz, Matthew; Velasco, Jonathan B; Chakraverty, Devasmita; Rosploch, Kaitlyn; Undersander, Molly; Stains, Marilyne

    2015-01-01

    Researchers, university administrators, and faculty members are increasingly interested in measuring and describing instructional practices provided in science, technology, engineering, and mathematics (STEM) courses at the college level. Specifically, there is keen interest in comparing instructional practices between courses, monitoring changes over time, and mapping observed practices to research-based teaching. While increasingly common observation protocols (Reformed Teaching Observation Protocol [RTOP] and Classroom Observation Protocol in Undergraduate STEM [COPUS]) at the postsecondary level help achieve some of these goals, they also suffer from weaknesses that limit their applicability. In this study, we leverage the strengths of these protocols to provide an easy method that enables the reliable and valid characterization of instructional practices. This method was developed empirically via a cluster analysis using observations of 269 individual class periods, corresponding to 73 different faculty members, 28 different research-intensive institutions, and various STEM disciplines. Ten clusters, called COPUS profiles, emerged from this analysis; they represent the most common types of instructional practices enacted in the classrooms observed for this study. RTOP scores were used to validate the alignment of the 10 COPUS profiles with reformed teaching. Herein, we present a detailed description of the cluster analysis method, the COPUS profiles, and the distribution of the COPUS profiles across various STEM courses at research-intensive universities. © 2015 T. J. Lund et al. CBE—Life Sciences Education © 2015 The American Society for Cell Biology. This article is distributed by The American Society for Cell Biology under license from the author(s). It is available to the public under an Attribution–Noncommercial–Share Alike 3.0 Unported Creative Commons License (http://creativecommons.org/licenses/by-nc-sa/3.0).

  7. Exploring multi-level system factors facilitating educator training and implementation of evidence-based practices (EBP): a study protocol.

    PubMed

    Stahmer, Aubyn C; Suhrheinrich, Jessica; Schetter, Patricia L; McGee Hassrick, Elizabeth

    2018-01-08

    This study examines how system-wide (i.e., region, district, and school) mechanisms such as leadership support, training requirements, structure, collaboration, and education affect the use of evidence-based practices (EBPs) in schools and how this affects the outcomes for students with autism spectrum disorder (ASD). Despite growing evidence for the positive effects of EBPs for ASD, these practices are not consistently or effectively used in schools. Although special education programs are mandated to use EBPs, there are very few evidence-based methods for selecting, implementing, and sustaining EBPs. Research focuses primarily on teacher training, without attention to contextual factors (e.g., implementation climate, attitudes toward EBPs, resource allocation, and social networks) that may impact outcomes. Using an implementation science framework, this project will prospectively examine relations between system-wide factors and teachers' use of EBPs and student education outcomes. Survey data will be collected from approximately 85 regional special education directors, 170 regional program specialists, 265 district special education directors, 265 behavior specialists, 925 school principals, 3538 special education teachers, and 2700 paraprofessionals. Administrative data for the students with ASD served by participating teachers will be examined. A total of 79 regional-, district-, and school-level personnel will also participate in social network interviews. Mixed methods, including surveys, administrative data, and observational checklists, will be used to gather in-depth information about system-wide malleable factors that relate to positive teacher implementation of EBPs and student outcomes. Multi-level modeling will be used to assess system-wide malleable factors related to EBP implementation which will be linked to the trainer, teacher, and student outcomes and examined based on moderators (e.g., district size, Special Education Local Plan Area structure

  8. An XML-Based Protocol for Distributed Event Services

    NASA Technical Reports Server (NTRS)

    Smith, Warren; Gunter, Dan; Quesnel, Darcy; Biegel, Bryan (Technical Monitor)

    2001-01-01

    A recent trend in distributed computing is the construction of high-performance distributed systems called computational grids. One difficulty we have encountered is that there is no standard format for the representation of performance information and no standard protocol for transmitting this information. This limits the types of performance analysis that can be undertaken in complex distributed systems. To address this problem, we present an XML-based protocol for transmitting performance events in distributed systems and evaluate the performance of this protocol.

  9. A Model Based Security Testing Method for Protocol Implementation

    PubMed Central

    Fu, Yu Long; Xin, Xiao Long

    2014-01-01

    The security of protocol implementation is important and hard to be verified. Since the penetration testing is usually based on the experience of the security tester and the specific protocol specifications, a formal and automatic verification method is always required. In this paper, we propose an extended model of IOLTS to describe the legal roles and intruders of security protocol implementations, and then combine them together to generate the suitable test cases to verify the security of protocol implementation. PMID:25105163

  10. A GIS-based protocol for the simulation and evaluation of realistic 3-D thinning scenarios in recreational forest management.

    PubMed

    Lin, Chinsu; Thomson, Gavin; Hung, Shih-Hsiang; Lin, Yu-Dung

    2012-12-30

    This study introduces a GIS-based protocol for the simulation and evaluation of thinning treatments in recreational forest management. The protocol was implemented in a research study based on an area of recreational forest in Alishan National Scenic Area, Taiwan. Ground survey data were mapped to a GIS database, to create a precise, yet flexible, GIS-based digital forest. The digital forest model was used to generate 18 different thinning scenario images and one image of the existing unthinned forest. A questionnaire was completed by 456 participants while simultaneously viewing the scenario images. The questionnaire was used to determine the scenic beauty preferences of the respondents. Statistical analysis of the data revealed that the respondents preferred low density, upper-storey thinning treatments and a dispersed retention pattern of the remaining trees. High density upper-storey treatments evoked a strongly negative reaction in the observers. The experiment demonstrated that the proposed protocol is suitable for selecting an appropriate thinning strategy for recreational forest and that the protocol has practical value in recreational forest management. Copyright © 2012 Elsevier Ltd. All rights reserved.

  11. Maintenance of Certification Part 4 Credit and recruitment for practice-based research.

    PubMed

    Gorzkowski, Julie A; Klein, Jonathan D; Harris, Donna L; Kaseeska, Kristen R; Whitmore Shaefer, Regina M; Bocian, Alison B; Davis, James B; Gotlieb, Edward M; Wasserman, Richard C

    2014-10-01

    Competing priorities in pediatric practice have created challenges for practice-based research. To increase recruitment success, researchers must design studies that provide added value to participants. This study evaluates recruitment of pediatricians into a study, before and after the development and addition of a quality improvement (QI) curriculum approved for American Board of Pediatrics Maintenance of Certification (MOC) Part 4 Credit as an enrollment incentive. Researchers implemented multiple outreach methods to enroll pediatric practices over 28 months. Field note review revealed that many physicians declined enrollment, stating that they prioritized MOC Part 4 projects over research studies. A QI curriculum meeting standards for MOC Part 4 Credit was developed and added to the study protocol as an enrollment incentive. Enrollment rates and characteristics of practitioners enrolled pre- and post-MOC were compared. Pre-MOC enrollment contributed 48% of practices in 22 months; post-MOC enrollment contributed 49% of practices in 6 months. An average of 3.5 practices enrolled per month pre-MOC, compared with 13.1 per month post-MOC (P < .001). Clinicians in pre- and post-MOC groups were similar in age, gender, race, and time spent on patient care; practices enrolled post-MOC were more likely to be located in federally designated Medically Underserved Areas than those enrolled pre-MOC (28.6% vs 12%, P = .03). Addition of MOC Part 4 Credit increased recruitment success and increased enrollment of pediatricians working in underserved areas. Including QI initiatives meeting MOC Part 4 criteria in practice-based research protocols may enhance participation and aid in recruiting diverse practice and patient populations. Copyright © 2014 by the American Academy of Pediatrics.

  12. The effectiveness of internet-based e-learning on clinician behavior and patient outcomes: a systematic review protocol.

    PubMed

    Sinclair, Peter; Kable, Ashley; Levett-Jones, Tracy

    2015-01-01

    The objective of this systematic review is to identify, appraise and synthesize the best available evidence for the effectiveness of internet-based e-learning programs on health care professional behavior and patient outcomes. Technological innovation has not only impacted social change in recent years but has been the prime driver of educational transformation.The newest consumers of post-secondary education, the so-called 'digital natives', have come to expect education to be delivered in a way that offers increased usability and convenience. Health care professionals (HCPs) in the clinical setting, particularly those in rural and remote communities, are no different. Today's health workforce has a professional responsibility to maintain competency in practice through achieving a minimum number of hours of continuing professional development. Consequently, HCPs seeking professional development opportunities are reliant on sourcing these independently according to individual learning needs. However, difficulties exist in some health professionals' access to ongoing professional development opportunities, particularly those with limited access face-to-face educationdue to geographical isolation or for those not enrolled in a formal program of study.These issues challenge traditional methods of teaching delivery; electronic learning (e-learning) is at the nexus of overcoming these challenges.The term e-learning originated in the mid-1990s as the internet began to gather momentum.Electronic learning can be broadly defined as any type of educational media that is delivered in an electronic form.Terms such as computer-assisted learning, online learning, web-based learning and e-learning are often used synonymously but all reflect knowledge transfer via an electronic device. This broad definition allows for a gamut of multimedia to be used for the purpose of constructing and assessing knowledge. Multimedia typically used in e-learning range from the now archaic Compact

  13. Treatment algorithms and protocolized care.

    PubMed

    Morris, Alan H

    2003-06-01

    Excess information in complex ICU environments exceeds human decision-making limits and likely contributes to unnecessary variation in clinical care, increasing the likelihood of clinical errors. I reviewed recent critical care clinical trials searching for information about the impact of protocol use on clinically pertinent outcomes. Several recently published clinical trials illustrate the importance of distinguishing efficacy and effectiveness trials. One of these trials illustrates the danger of conducting effectiveness trials before the efficacy of an intervention is established. The trials also illustrate the importance of distinguishing guidelines and inadequately explicit protocols from adequately explicit protocols. Only adequately explicit protocols contain enough detail to lead different clinicians to the same decision when faced with the same clinical scenario. Differences between guidelines and protocols are important. Guidelines lack detail and provide general guidance that requires clinicians to fill in many gaps. Computerized or paper-based protocols are detailed and, when used for complex clinical ICU problems, can generate patient-specific, evidence-based therapy instructions that can be carried out by different clinicians with almost no interclinician variability. Individualization of patient therapy can be preserved by these protocols when they are driven by individual patient data. Explicit decision-support tools (eg, guidelines and protocols) have favorable effects on clinician and patient outcomes and can reduce the variation in clinical practice. Guidelines and protocols that aid ICU decision makers should be more widely distributed.

  14. Agents Based e-Commerce and Securing Exchanged Information

    NASA Astrophysics Data System (ADS)

    Al-Jaljouli, Raja; Abawajy, Jemal

    Mobile agents have been implemented in e-Commerce to search and filter information of interest from electronic markets. When the information is very sensitive and critical, it is important to develop a novel security protocol that can efficiently protect the information from malicious tampering as well as unauthorized disclosure or at least detect any malicious act of intruders. In this chapter, we describe robust security techniques that ensure a sound security of information gathered throughout agent’s itinerary against various security attacks, as well as truncation attacks. A sound security protocol is described, which implements the various security techniques that would jointly prevent or at least detect any malicious act of intruders. We reason about the soundness of the protocol usingSymbolic Trace Analyzer (STA), a formal verification tool that is based on symbolic techniques. We analyze the protocol in key configurations and show that it is free of flaws. We also show that the protocol fulfils the various security requirements of exchanged information in MAS, including data-integrity, data-confidentiality, data-authenticity, origin confidentiality and data non-repudiability.

  15. COLORECTAL CANCER PREVENTION BY AN OPTIMIZED COLONOSCOPY PROTOCOL IN ROUTINE PRACTICE

    PubMed Central

    Xirasagar, Sudha; Li, Yi-Jhen; Hurley, Thomas G.; Tsai, Meng Han; Hardin, James W.; Hurley, Deborah M.; Hebert, James R.; de Groen, Piet C.

    2014-01-01

    We conducted a retrospective cohort study to investigate the colorectal cancer (CRC) incidence and mortality prevention achievable in clinical practice with an optimized colonoscopy protocol targeting near-complete polyp clearance. The protocol consisted of: a) telephonic reinforcement of bowel preparation instructions; b) active inspection for polyps throughout insertion and circumferential withdrawal; and, c) timely updating of the protocol and documentation to incorporate the latest guidelines. Of 17,312 patients provided screening colonoscopies by 59 endoscopists in South Carolina, USA from 09/2001 through 12/2008, 997 were excluded using accepted exclusion criteria. Data on 16,315 patients were merged with the South Carolina Central Cancer Registry and Vital Records Registry data from 01/1996 – 12/2009 to identify incident CRC cases and deaths, incident lung cancers and brain cancer deaths (comparison control cancers). The standardized incidence ratios (SIR) and standardized mortality ratios (SMR) relative to South Carolina and US SEER-18 population rates were calculated. Over 78,375 person-years of observation, 18 patients developed CRC vs. 104.11 expected for an SIR of 0.17, or 83% CRC protection, the rates being 68% and 91%, respectively among the adenoma- and adenoma-free subgroups (all p<0.001). Restricting the cohort to ensure minimum 5-year follow-up (mean follow-up 6.58 years) did not change the results. The CRC mortality reduction was 89% (p<0.001; 4 CRC deaths vs. 35.95 expected). The lung cancer SIR was 0.96 (p=0.67), and brain cancer SMR was 0.92 (p=0.35). Over 80% reduction in CRC incidence and mortality is achievable in routine practice by implementing key colonoscopy principles targeting near-complete polyp clearance. PMID:25242510

  16. Bedside, classroom and bench: collaborative strategies to generate evidence-based knowledge for nursing practice.

    PubMed

    Weaver, Charlotte A; Warren, Judith J; Delaney, Connie

    2005-12-01

    The rise of evidence-base practice (EBP) as a standard for care delivery is rapidly emerging as a global phenomenon that is transcending political, economic and geographic boundaries. Evidence-based nursing (EBN) addresses the growing body of nursing knowledge supported by different levels of evidence for best practices in nursing care. Across all health care, including nursing, we face the challenge of how to most effectively close the gap between what is known and what is practiced. There is extensive literature on the barriers and difficulties of translating research findings into practical application. While the literature refers to this challenge as the "Bench to Bedside" lag, this paper presents three collaborative strategies that aim to minimize this gap. The Bedside strategy proposes to use the data generated from care delivery and captured in the massive data repositories of electronic health record (EHR) systems as empirical evidence that can be analysed to discover and then inform best practice. In the Classroom strategy, we present a description for how evidence-based nursing knowledge is taught in a baccalaureate nursing program. And finally, the Bench strategy describes applied informatics in converting paper-based EBN protocols into the workflow of clinical information systems. Protocols are translated into reference and executable knowledge with the goal of placing the latest scientific knowledge at the fingertips of front line clinicians. In all three strategies, information technology (IT) is presented as the underlying tool that makes this rapid translation of nursing knowledge into practice and education feasible.

  17. Beliefs, Knowledge, Implementation, and Integration of Evidence-Based Practice Among Primary Health Care Providers: Protocol for a Scoping Review.

    PubMed

    Pereira, Filipa; Salvi, Mireille; Verloo, Henk

    2017-08-01

    The adoption of evidence-based practice (EBP) is promoted because it is widely recognized for improving the quality and safety of health care for patients, and reducing avoidable costs. Providers of primary care face numerous challenges to ensuring the effectiveness of their daily practices. Primary health care is defined as: the entry level into a health care services system, providing a first point of contact for all new needs and problems; patient-focused (not disease-oriented) care over time; care for all but the most uncommon or unusual conditions; and coordination or integration of care, regardless of where or by whom that care is delivered. Primary health care is the principal means by which to approach the main goal of any health care services system: optimization of health status. This review aims to scope publications examining beliefs, knowledge, implementation, and integration of EBPs among primary health care providers (HCPs). We will conduct a systematic scoping review of published articles in the following electronic databases, from their start dates until March 31, 2017: Medical Literature Analysis and Retrieval System Online (MEDLINE) via PubMed (from 1946), Embase (from 1947), Cumulative Index to Nursing and Allied Health Literature (CINAHL; from 1937), the Cochrane Central Register of Controlled Trials (CENTRAL; from 1992), PsycINFO (from 1806), Web of Science (from 1900), Joanna Briggs Institute (JBI) database (from 1998), Database of Abstracts of Reviews of Effects (DARE; from 1996), Trip medical database (from 1997), and relevant professional scientific journals (from their start dates). We will use the predefined search terms of, "evidence-based practice" and, "primary health care" combined with other terms, such as, "beliefs", "knowledge", "implementation", and "integration". We will also conduct a hand search of the bibliographies of all relevant articles and a search for unpublished studies using Google Scholar, ProQuest, Mednar, and World

  18. An Enhanced Biometric Based Authentication with Key-Agreement Protocol for Multi-Server Architecture Based on Elliptic Curve Cryptography.

    PubMed

    Reddy, Alavalapati Goutham; Das, Ashok Kumar; Odelu, Vanga; Yoo, Kee-Young

    2016-01-01

    Biometric based authentication protocols for multi-server architectures have gained momentum in recent times due to advancements in wireless technologies and associated constraints. Lu et al. recently proposed a robust biometric based authentication with key agreement protocol for a multi-server environment using smart cards. They claimed that their protocol is efficient and resistant to prominent security attacks. The careful investigation of this paper proves that Lu et al.'s protocol does not provide user anonymity, perfect forward secrecy and is susceptible to server and user impersonation attacks, man-in-middle attacks and clock synchronization problems. In addition, this paper proposes an enhanced biometric based authentication with key-agreement protocol for multi-server architecture based on elliptic curve cryptography using smartcards. We proved that the proposed protocol achieves mutual authentication using Burrows-Abadi-Needham (BAN) logic. The formal security of the proposed protocol is verified using the AVISPA (Automated Validation of Internet Security Protocols and Applications) tool to show that our protocol can withstand active and passive attacks. The formal and informal security analyses and performance analysis demonstrates that the proposed protocol is robust and efficient compared to Lu et al.'s protocol and existing similar protocols.

  19. Practical Quantum Private Database Queries Based on Passive Round-Robin Differential Phase-shift Quantum Key Distribution.

    PubMed

    Li, Jian; Yang, Yu-Guang; Chen, Xiu-Bo; Zhou, Yi-Hua; Shi, Wei-Min

    2016-08-19

    A novel quantum private database query protocol is proposed, based on passive round-robin differential phase-shift quantum key distribution. Compared with previous quantum private database query protocols, the present protocol has the following unique merits: (i) the user Alice can obtain one and only one key bit so that both the efficiency and security of the present protocol can be ensured, and (ii) it does not require to change the length difference of the two arms in a Mach-Zehnder interferometer and just chooses two pulses passively to interfere with so that it is much simpler and more practical. The present protocol is also proved to be secure in terms of the user security and database security.

  20. Quality of Mobile Phone and Tablet Mobile Apps for Speech Sound Disorders: Protocol for an Evidence-Based Appraisal.

    PubMed

    Furlong, Lisa M; Morris, Meg E; Erickson, Shane; Serry, Tanya A

    2016-11-29

    Although mobile apps are readily available for speech sound disorders (SSD), their validity has not been systematically evaluated. This evidence-based appraisal will critically review and synthesize current evidence on available therapy apps for use by children with SSD. The main aims are to (1) identify the types of apps currently available for Android and iOS mobile phones and tablets, and (2) to critique their design features and content using a structured quality appraisal tool. This protocol paper presents and justifies the methods used for a systematic review of mobile apps that provide intervention for use by children with SSD. The primary outcomes of interest are (1) engagement, (2) functionality, (3) aesthetics, (4) information quality, (5) subjective quality, and (6) perceived impact. Quality will be assessed by 2 certified practicing speech-language pathologists using a structured quality appraisal tool. Two app stores will be searched from the 2 largest operating platforms, Android and iOS. Systematic methods of knowledge synthesis shall include searching the app stores using a defined procedure, data extraction, and quality analysis. This search strategy shall enable us to determine how many SSD apps are available for Android and for iOS compatible mobile phones and tablets. It shall also identify the regions of the world responsible for the apps' development, the content and the quality of offerings. Recommendations will be made for speech-language pathologists seeking to use mobile apps in their clinical practice. This protocol provides a structured process for locating apps and appraising the quality, as the basis for evaluating their use in speech pathology for children in English-speaking nations. ©Lisa M Furlong, Meg E Morris, Shane Erickson, Tanya A Serry. Originally published in JMIR Research Protocols (http://www.researchprotocols.org), 29.11.2016.

  1. RSA-Based Password-Authenticated Key Exchange, Revisited

    NASA Astrophysics Data System (ADS)

    Shin, Seonghan; Kobara, Kazukuni; Imai, Hideki

    The RSA-based Password-Authenticated Key Exchange (PAKE) protocols have been proposed to realize both mutual authentication and generation of secure session keys where a client is sharing his/her password only with a server and the latter should generate its RSA public/private key pair (e, n), (d, n) every time due to the lack of PKI (Public-Key Infrastructures). One of the ways to avoid a special kind of off-line (so called e-residue) attacks in the RSA-based PAKE protocols is to deploy a challenge/response method by which a client verifies the relative primality of e and φ(n) interactively with a server. However, this kind of RSA-based PAKE protocols did not give any proof of the underlying challenge/response method and therefore could not specify the exact complexity of their protocols since there exists another security parameter, needed in the challenge/response method. In this paper, we first present an RSA-based PAKE (RSA-PAKE) protocol that can deploy two different challenge/response methods (denoted by Challenge/Response Method1 and Challenge/Response Method2). The main contributions of this work include: (1) Based on the number theory, we prove that the Challenge/Response Method1 and the Challenge/Response Method2 are secure against e-residue attacks for any odd prime e (2) With the security parameter for the on-line attacks, we show that the RSA-PAKE protocol is provably secure in the random oracle model where all of the off-line attacks are not more efficient than on-line dictionary attacks; and (3) By considering the Hamming weight of e and its complexity in the. RSA-PAKE protocol, we search for primes to be recommended for a practical use. We also compare the RSA-PAKE protocol with the previous ones mainly in terms of computation and communication complexities.

  2. Watermarking protocols for authentication and ownership protection based on timestamps and holograms

    NASA Astrophysics Data System (ADS)

    Dittmann, Jana; Steinebach, Martin; Croce Ferri, Lucilla

    2002-04-01

    Digital watermarking has become an accepted technology for enabling multimedia protection schemes. One problem here is the security of these schemes. Without a suitable framework, watermarks can be replaced and manipulated. We discuss different protocols providing security against rightful ownership attacks and other fraud attempts. We compare the characteristics of existing protocols for different media like direct embedding or seed based and required attributes of the watermarking technology like robustness or payload. We introduce two new media independent protocol schemes for rightful ownership authentication. With the first scheme we ensure security of digital watermarks used for ownership protection with a combination of two watermarks: first watermark of the copyright holder and a second watermark from a Trusted Third Party (TTP). It is based on hologram embedding and the watermark consists of e.g. a company logo. As an example we use digital images and specify the properties of the embedded additional security information. We identify components necessary for the security protocol like timestamp, PKI and cryptographic algorithms. The second scheme is used for authentication. It is designed for invertible watermarking applications which require high data integrity. We combine digital signature schemes and digital watermarking to provide a public verifiable integrity. The original data can only be reproduced with a secret key. Both approaches provide solutions for copyright and authentication watermarking and are introduced for image data but can be easily adopted for video and audio data as well.

  3. In silico toxicology protocols.

    PubMed

    Myatt, Glenn J; Ahlberg, Ernst; Akahori, Yumi; Allen, David; Amberg, Alexander; Anger, Lennart T; Aptula, Aynur; Auerbach, Scott; Beilke, Lisa; Bellion, Phillip; Benigni, Romualdo; Bercu, Joel; Booth, Ewan D; Bower, Dave; Brigo, Alessandro; Burden, Natalie; Cammerer, Zoryana; Cronin, Mark T D; Cross, Kevin P; Custer, Laura; Dettwiler, Magdalena; Dobo, Krista; Ford, Kevin A; Fortin, Marie C; Gad-McDonald, Samantha E; Gellatly, Nichola; Gervais, Véronique; Glover, Kyle P; Glowienke, Susanne; Van Gompel, Jacky; Gutsell, Steve; Hardy, Barry; Harvey, James S; Hillegass, Jedd; Honma, Masamitsu; Hsieh, Jui-Hua; Hsu, Chia-Wen; Hughes, Kathy; Johnson, Candice; Jolly, Robert; Jones, David; Kemper, Ray; Kenyon, Michelle O; Kim, Marlene T; Kruhlak, Naomi L; Kulkarni, Sunil A; Kümmerer, Klaus; Leavitt, Penny; Majer, Bernhard; Masten, Scott; Miller, Scott; Moser, Janet; Mumtaz, Moiz; Muster, Wolfgang; Neilson, Louise; Oprea, Tudor I; Patlewicz, Grace; Paulino, Alexandre; Lo Piparo, Elena; Powley, Mark; Quigley, Donald P; Reddy, M Vijayaraj; Richarz, Andrea-Nicole; Ruiz, Patricia; Schilter, Benoit; Serafimova, Rositsa; Simpson, Wendy; Stavitskaya, Lidiya; Stidl, Reinhard; Suarez-Rodriguez, Diana; Szabo, David T; Teasdale, Andrew; Trejo-Martin, Alejandra; Valentin, Jean-Pierre; Vuorinen, Anna; Wall, Brian A; Watts, Pete; White, Angela T; Wichard, Joerg; Witt, Kristine L; Woolley, Adam; Woolley, David; Zwickl, Craig; Hasselgren, Catrin

    2018-07-01

    The present publication surveys several applications of in silico (i.e., computational) toxicology approaches across different industries and institutions. It highlights the need to develop standardized protocols when conducting toxicity-related predictions. This contribution articulates the information needed for protocols to support in silico predictions for major toxicological endpoints of concern (e.g., genetic toxicity, carcinogenicity, acute toxicity, reproductive toxicity, developmental toxicity) across several industries and regulatory bodies. Such novel in silico toxicology (IST) protocols, when fully developed and implemented, will ensure in silico toxicological assessments are performed and evaluated in a consistent, reproducible, and well-documented manner across industries and regulatory bodies to support wider uptake and acceptance of the approaches. The development of IST protocols is an initiative developed through a collaboration among an international consortium to reflect the state-of-the-art in in silico toxicology for hazard identification and characterization. A general outline for describing the development of such protocols is included and it is based on in silico predictions and/or available experimental data for a defined series of relevant toxicological effects or mechanisms. The publication presents a novel approach for determining the reliability of in silico predictions alongside experimental data. In addition, we discuss how to determine the level of confidence in the assessment based on the relevance and reliability of the information. Copyright © 2018 The Authors. Published by Elsevier Inc. All rights reserved.

  4. The use of participant-observation protocol in an industrial engineering research.

    PubMed

    Silveira e Silva, Renato da; Sznelwar, Laerte Idal; D'Afonseca e Silva, Victor

    2012-01-01

    Based on literature, this article aims to present the "participant-observation' research protocol, and its practical application in the industrial engineering field, more specifically within the area of design development, and in the case shown by this article, of interiors' design. The main target is to identify the concept of the method, i.e., from its characteristics to structure a general sense about the subject, so that the protocol can be used in different areas of knowledge, especially those ones which are committed with the scientific research involving the expertise from researchers, and subjective feelings and opinions of the users of an engineering product, and how this knowledge can be benefic for product design, contributing since the earliest stage of design.

  5. An Enhanced Biometric Based Authentication with Key-Agreement Protocol for Multi-Server Architecture Based on Elliptic Curve Cryptography

    PubMed Central

    Reddy, Alavalapati Goutham; Das, Ashok Kumar; Odelu, Vanga; Yoo, Kee-Young

    2016-01-01

    Biometric based authentication protocols for multi-server architectures have gained momentum in recent times due to advancements in wireless technologies and associated constraints. Lu et al. recently proposed a robust biometric based authentication with key agreement protocol for a multi-server environment using smart cards. They claimed that their protocol is efficient and resistant to prominent security attacks. The careful investigation of this paper proves that Lu et al.’s protocol does not provide user anonymity, perfect forward secrecy and is susceptible to server and user impersonation attacks, man-in-middle attacks and clock synchronization problems. In addition, this paper proposes an enhanced biometric based authentication with key-agreement protocol for multi-server architecture based on elliptic curve cryptography using smartcards. We proved that the proposed protocol achieves mutual authentication using Burrows-Abadi-Needham (BAN) logic. The formal security of the proposed protocol is verified using the AVISPA (Automated Validation of Internet Security Protocols and Applications) tool to show that our protocol can withstand active and passive attacks. The formal and informal security analyses and performance analysis demonstrates that the proposed protocol is robust and efficient compared to Lu et al.’s protocol and existing similar protocols. PMID:27163786

  6. Policy to implementation: evidence-based practice in community mental health – study protocol

    PubMed Central

    2013-01-01

    Background Evidence-based treatments (EBTs) are not widely available in community mental health settings. In response to the call for implementation of evidence-based treatments in the United States, states and counties have mandated behavioral health reform through policies and other initiatives. Evaluations of the impact of these policies on implementation are rare. A systems transformation about to occur in Philadelphia, Pennsylvania, offers an important opportunity to prospectively study implementation in response to a policy mandate. Methods/design Using a prospective sequential mixed-methods design, with observations at multiple points in time, we will investigate the responses of staff from 30 community mental health clinics to a policy from the Department of Behavioral Health encouraging and incentivizing providers to implement evidence-based treatments to treat youth with mental health problems. Study participants will be 30 executive directors, 30 clinical directors, and 240 therapists. Data will be collected prior to the policy implementation, and then at two and four years following policy implementation. Quantitative data will include measures of intervention implementation and potential moderators of implementation (i.e., organizational- and leader-level variables) and will be collected from executive directors, clinical directors, and therapists. Measures include self-reported therapist fidelity to evidence-based treatment techniques as measured by the Therapist Procedures Checklist-Revised, organizational variables as measured by the Organizational Social Context Measurement System and the Implementation Climate Assessment, leader variables as measured by the Multifactor Leadership Questionnaire, attitudes towards EBTs as measured by the Evidence-Based Practice Attitude Scale, and knowledge of EBTs as measured by the Knowledge of Evidence- Based Services Questionnaire. Qualitative data will include semi-structured interviews with a subset of the

  7. A Source Anonymity-Based Lightweight Secure AODV Protocol for Fog-Based MANET

    PubMed Central

    Fang, Weidong; Zhang, Wuxiong; Xiao, Jinchao; Yang, Yang; Chen, Wei

    2017-01-01

    Fog-based MANET (Mobile Ad hoc networks) is a novel paradigm of a mobile ad hoc network with the advantages of both mobility and fog computing. Meanwhile, as traditional routing protocol, ad hoc on-demand distance vector (AODV) routing protocol has been applied widely in fog-based MANET. Currently, how to improve the transmission performance and enhance security are the two major aspects in AODV’s research field. However, the researches on joint energy efficiency and security seem to be seldom considered. In this paper, we propose a source anonymity-based lightweight secure AODV (SAL-SAODV) routing protocol to meet the above requirements. In SAL-SAODV protocol, source anonymous and secure transmitting schemes are proposed and applied. The scheme involves the following three parts: the source anonymity algorithm is employed to achieve the source node, without being tracked and located; the improved secure scheme based on the polynomial of CRC-4 is applied to substitute the RSA digital signature of SAODV and guarantee the data integrity, in addition to reducing the computation and energy consumption; the random delayed transmitting scheme (RDTM) is implemented to separate the check code and transmitted data, and achieve tamper-proof results. The simulation results show that the comprehensive performance of the proposed SAL-SAODV is a trade-off of the transmission performance, energy efficiency, and security, and better than AODV and SAODV. PMID:28629142

  8. A Source Anonymity-Based Lightweight Secure AODV Protocol for Fog-Based MANET.

    PubMed

    Fang, Weidong; Zhang, Wuxiong; Xiao, Jinchao; Yang, Yang; Chen, Wei

    2017-06-17

    Fog-based MANET (Mobile Ad hoc networks) is a novel paradigm of a mobile ad hoc network with the advantages of both mobility and fog computing. Meanwhile, as traditional routing protocol, ad hoc on-demand distance vector (AODV) routing protocol has been applied widely in fog-based MANET. Currently, how to improve the transmission performance and enhance security are the two major aspects in AODV's research field. However, the researches on joint energy efficiency and security seem to be seldom considered. In this paper, we propose a source anonymity-based lightweight secure AODV (SAL-SAODV) routing protocol to meet the above requirements. In SAL-SAODV protocol, source anonymous and secure transmitting schemes are proposed and applied. The scheme involves the following three parts: the source anonymity algorithm is employed to achieve the source node, without being tracked and located; the improved secure scheme based on the polynomial of CRC-4 is applied to substitute the RSA digital signature of SAODV and guarantee the data integrity, in addition to reducing the computation and energy consumption; the random delayed transmitting scheme (RDTM) is implemented to separate the check code and transmitted data, and achieve tamper-proof results. The simulation results show that the comprehensive performance of the proposed SAL-SAODV is a trade-off of the transmission performance, energy efficiency, and security, and better than AODV and SAODV.

  9. EON: a component-based approach to automation of protocol-directed therapy.

    PubMed Central

    Musen, M A; Tu, S W; Das, A K; Shahar, Y

    1996-01-01

    Provision of automated support for planning protocol-directed therapy requires a computer program to take as input clinical data stored in an electronic patient-record system and to generate as output recommendations for therapeutic interventions and laboratory testing that are defined by applicable protocols. This paper presents a synthesis of research carried out at Stanford University to model the therapy-planning task and to demonstrate a component-based architecture for building protocol-based decision-support systems. We have constructed general-purpose software components that (1) interpret abstract protocol specifications to construct appropriate patient-specific treatment plans; (2) infer from time-stamped patient data higher-level, interval-based, abstract concepts; (3) perform time-oriented queries on a time-oriented patient database; and (4) allow acquisition and maintenance of protocol knowledge in a manner that facilitates efficient processing both by humans and by computers. We have implemented these components in a computer system known as EON. Each of the components has been developed, evaluated, and reported independently. We have evaluated the integration of the components as a composite architecture by implementing T-HELPER, a computer-based patient-record system that uses EON to offer advice regarding the management of patients who are following clinical trial protocols for AIDS or HIV infection. A test of the reuse of the software components in a different clinical domain demonstrated rapid development of a prototype application to support protocol-based care of patients who have breast cancer. PMID:8930854

  10. Automating individualized coaching and authentic role-play practice for brief intervention training.

    PubMed

    Hayes-Roth, B; Saker, R; Amano, K

    2010-01-01

    Brief intervention helps to reduce alcohol abuse, but there is a need for accessible, cost-effective training of clinicians. This study evaluated STAR Workshop , a web-based training system that automates efficacious techniques for individualized coaching and authentic role-play practice. We compared STAR Workshop to a web-based, self-guided e-book and a no-treatment control, for training the Engage for Change (E4C) brief intervention protocol. Subjects were medical and nursing students. Brief written skill probes tested subjects' performance of individual protocol steps, in different clinical scenarios, at three test times: pre-training, post-training, and post-delay (two weeks). Subjects also did live phone interviews with a standardized patient, post-delay. STAR subjects performed significantly better than both other groups. They showed significantly greater improvement from pre-training probes to post-training and post-delay probes. They scored significantly higher on post-delay phone interviews. STAR Workshop appears to be an accessible, cost-effective approach for training students to use the E4C protocol for brief intervention in alcohol abuse. It may also be useful for training other clinical interviewing protocols.

  11. Use of Intervention Mapping to Enhance Health Care Professional Practice: A Systematic Review.

    PubMed

    Durks, Desire; Fernandez-Llimos, Fernando; Hossain, Lutfun N; Franco-Trigo, Lucia; Benrimoj, Shalom I; Sabater-Hernández, Daniel

    2017-08-01

    Intervention Mapping is a planning protocol for developing behavior change interventions, the first three steps of which are intended to establish the foundations and rationales of such interventions. This systematic review aimed to identify programs that used Intervention Mapping to plan changes in health care professional practice. Specifically, it provides an analysis of the information provided by the programs in the first three steps of the protocol to determine their foundations and rationales of change. A literature search was undertaken in PubMed, Scopus, SciELO, and DOAJ using "Intervention Mapping" as keyword. Key information was gathered, including theories used, determinants of practice, research methodologies, theory-based methods, and practical applications. Seventeen programs aimed at changing a range of health care practices were included. The social cognitive theory and the theory of planned behavior were the most frequently used frameworks in driving change within health care practices. Programs used a large variety of research methodologies to identify determinants of practice. Specific theory-based methods (e.g., modelling and active learning) and practical applications (e.g., health care professional training and facilitation) were reported to inform the development of practice change interventions and programs. In practice, Intervention Mapping delineates a three-step systematic, theory- and evidence-driven process for establishing the theoretical foundations and rationales underpinning change in health care professional practice. The use of Intervention Mapping can provide health care planners with useful guidelines for the theoretical development of practice change interventions and programs.

  12. ProtocolNavigator: emulation-based software for the design, documentation and reproduction biological experiments.

    PubMed

    Khan, Imtiaz A; Fraser, Adam; Bray, Mark-Anthony; Smith, Paul J; White, Nick S; Carpenter, Anne E; Errington, Rachel J

    2014-12-01

    Experimental reproducibility is fundamental to the progress of science. Irreproducible research decreases the efficiency of basic biological research and drug discovery and impedes experimental data reuse. A major contributing factor to irreproducibility is difficulty in interpreting complex experimental methodologies and designs from written text and in assessing variations among different experiments. Current bioinformatics initiatives either are focused on computational research reproducibility (i.e. data analysis) or laboratory information management systems. Here, we present a software tool, ProtocolNavigator, which addresses the largely overlooked challenges of interpretation and assessment. It provides a biologist-friendly open-source emulation-based tool for designing, documenting and reproducing biological experiments. ProtocolNavigator was implemented in Python 2.7, using the wx module to build the graphical user interface. It is a platform-independent software and freely available from http://protocolnavigator.org/index.html under the GPL v2 license. © The Author 2014. Published by Oxford University Press. All rights reserved. For Permissions, please e-mail: journals.permissions@oup.com.

  13. Practical Quantum Private Database Queries Based on Passive Round-Robin Differential Phase-shift Quantum Key Distribution

    PubMed Central

    Li, Jian; Yang, Yu-Guang; Chen, Xiu-Bo; Zhou, Yi-Hua; Shi, Wei-Min

    2016-01-01

    A novel quantum private database query protocol is proposed, based on passive round-robin differential phase-shift quantum key distribution. Compared with previous quantum private database query protocols, the present protocol has the following unique merits: (i) the user Alice can obtain one and only one key bit so that both the efficiency and security of the present protocol can be ensured, and (ii) it does not require to change the length difference of the two arms in a Mach-Zehnder interferometer and just chooses two pulses passively to interfere with so that it is much simpler and more practical. The present protocol is also proved to be secure in terms of the user security and database security. PMID:27539654

  14. Uptake of a web-based oncology protocol system: how do cancer clinicians use eviQ cancer treatments online?

    PubMed Central

    2013-01-01

    Background The use of computerized systems to support evidence-based practice is commonplace in contemporary medicine. Despite the prolific use of electronic support systems there has been relatively little research on the uptake of web-based systems in the oncology setting. Our objective was to examine the uptake of a web-based oncology protocol system (http://www.eviq.org.au) by Australian cancer clinicians. Methods We used web-logfiles and Google Analytics to examine the characteristics of eviQ registrants from October 2009-December 2011 and patterns of use by cancer clinicians during a typical month. Results As of December 2011, there were 16,037 registrants; 85% of whom were Australian health care professionals. During a typical month 87% of webhits occurred in standard clinical hours (08:00 to 18:00 weekdays). Raw webhits were proportional to the size of clinician groups: nurses (47% of Australian registrants), followed by doctors (20%), and pharmacists (14%). However, pharmacists had up to three times the webhit rate of other clinical groups. Clinicians spent five times longer viewing chemotherapy protocol pages than other content and the protocols viewed reflect the most common cancers: lung, breast and colorectal. Conclusions Our results demonstrate eviQ is used by a range of health professionals involved in cancer treatment at the point-of-care. Continued monitoring of electronic decision support systems is vital to understanding how they are used in clinical practice and their impact on processes of care and patient outcomes. PMID:23497080

  15. E-cigarette use in pregnancy: a human rights-based approach to policy and practice.

    PubMed

    van der Eijk, Yvette; Petersen, Anne Berit; Bialous, Stella A

    2017-11-01

    The health risks associated with e-cigarette use in pregnancy are mostly unknown. Guidelines by the World Health Organization and national health agencies warn women against using e-cigarettes in pregnancy; however, in the UK, a recent multiagency guideline takes a different approach by not discouraging e-cigarette use in pregnancy. Furthermore, e-Voke ™ , an e-cigarette, has been approved for use in pregnancy in the UK. We analyze United Nations human rights treaties to examine how they might inform best practice recommendations for e-cigarette use in pregnancy. These treaties oblige Parties to adopt policies that protect children's and women's right to health, appropriate pregnancy services, and health education. We argue that clinical practice guidelines related to use of e-cigarettes in pregnancy should consider both evidence and human rights principles, and ensure that healthcare providers and patients are given clear, accurate messages about the known and potential risks associated with e-cigarette use in pregnancy. © 2017 Nordic Federation of Societies of Obstetrics and Gynecology, Acta Obstetricia et Gynecologica Scandinavica.

  16. Improving preterm infant outcomes: implementing an evidence-based oral feeding advancement protocol in the neonatal intensive care unit.

    PubMed

    Kish, Mary Z

    2014-10-01

    The ability of a preterm infant to exclusively oral feed is a necessary standard for discharge readiness from the neonatal intensive care unit (NICU). Many of the interventions related to oral feeding advancement currently employed for preterm infants in the NICU are based on individual nursing observations and judgment. Studies involving standardized feeding protocols for oral feeding advancement have been shown to decrease variability in feeding practices, facilitate shortened transition times from gavage to oral feedings, improve bottle feeding performance, and significantly decrease the length of stay (LOS) in the NICU. This project critically evaluated the implementation of an oral feeding advancement protocol in a 74-bed level III NICU in an attempt to standardize the process of advancing oral feedings in medically stable preterm infants. A comprehensive review of the literature identified key features for successful oral feeding in preterm infants. Strong levels of evidence suggested an association between both nonnutritive sucking (NNS) opportunities and standardized feeding advancement protocols with successful oral feeding in preterm infants. These findings prompted a pilot practice change using a feeding advancement protocol and consisted of NNS and standardized oral feeding advancement opportunities. Time to exclusive oral feedings and LOS were compared pre- and postprotocol implementation during more than a 2-month evaluation period. Infants using NNS and the standardized oral feeding advancement protocol had an observed reduction in time to exclusive oral feedings and LOS, although statistical significance was not achieved.

  17. Measuring Reform Practices in Science and Mathematics Classrooms: The Reformed Teaching Observation Protocol.

    ERIC Educational Resources Information Center

    Sawada, Daiyo; Piburn, Michael D.; Judson, Eugene; Turley, Jeff; Falconer, Kathleen; Benford, Russell; Bloom, Irene

    2002-01-01

    Describes the Reformed Teaching Observation Protocol (RTOP), a 25-item classroom observation protocol that is standards-based, inquiry-oriented, and student-centered. Provides the definition for reform and the basis for evaluation of the Arizona Collaborative for Excellence in the Preparation of Teachers (ACEPT). Concludes that reform, as defined…

  18. Two-dimensional distributed-phase-reference protocol for quantum key distribution

    NASA Astrophysics Data System (ADS)

    Bacco, Davide; Christensen, Jesper Bjerge; Castaneda, Mario A. Usuga; Ding, Yunhong; Forchhammer, Søren; Rottwitt, Karsten; Oxenløwe, Leif Katsuo

    2016-12-01

    Quantum key distribution (QKD) and quantum communication enable the secure exchange of information between remote parties. Currently, the distributed-phase-reference (DPR) protocols, which are based on weak coherent pulses, are among the most practical solutions for long-range QKD. During the last 10 years, long-distance fiber-based DPR systems have been successfully demonstrated, although fundamental obstacles such as intrinsic channel losses limit their performance. Here, we introduce the first two-dimensional DPR-QKD protocol in which information is encoded in the time and phase of weak coherent pulses. The ability of extracting two bits of information per detection event, enables a higher secret key rate in specific realistic network scenarios. Moreover, despite the use of more dimensions, the proposed protocol remains simple, practical, and fully integrable.

  19. Two-dimensional distributed-phase-reference protocol for quantum key distribution.

    PubMed

    Bacco, Davide; Christensen, Jesper Bjerge; Castaneda, Mario A Usuga; Ding, Yunhong; Forchhammer, Søren; Rottwitt, Karsten; Oxenløwe, Leif Katsuo

    2016-12-22

    Quantum key distribution (QKD) and quantum communication enable the secure exchange of information between remote parties. Currently, the distributed-phase-reference (DPR) protocols, which are based on weak coherent pulses, are among the most practical solutions for long-range QKD. During the last 10 years, long-distance fiber-based DPR systems have been successfully demonstrated, although fundamental obstacles such as intrinsic channel losses limit their performance. Here, we introduce the first two-dimensional DPR-QKD protocol in which information is encoded in the time and phase of weak coherent pulses. The ability of extracting two bits of information per detection event, enables a higher secret key rate in specific realistic network scenarios. Moreover, despite the use of more dimensions, the proposed protocol remains simple, practical, and fully integrable.

  20. Two-dimensional distributed-phase-reference protocol for quantum key distribution

    PubMed Central

    Bacco, Davide; Christensen, Jesper Bjerge; Castaneda, Mario A. Usuga; Ding, Yunhong; Forchhammer, Søren; Rottwitt, Karsten; Oxenløwe, Leif Katsuo

    2016-01-01

    Quantum key distribution (QKD) and quantum communication enable the secure exchange of information between remote parties. Currently, the distributed-phase-reference (DPR) protocols, which are based on weak coherent pulses, are among the most practical solutions for long-range QKD. During the last 10 years, long-distance fiber-based DPR systems have been successfully demonstrated, although fundamental obstacles such as intrinsic channel losses limit their performance. Here, we introduce the first two-dimensional DPR-QKD protocol in which information is encoded in the time and phase of weak coherent pulses. The ability of extracting two bits of information per detection event, enables a higher secret key rate in specific realistic network scenarios. Moreover, despite the use of more dimensions, the proposed protocol remains simple, practical, and fully integrable. PMID:28004821

  1. Efficiency and security problems of anonymous key agreement protocol based on chaotic maps

    NASA Astrophysics Data System (ADS)

    Yoon, Eun-Jun

    2012-07-01

    In 2011, Niu-Wang proposed an anonymous key agreement protocol based on chaotic maps in [Niu Y, Wang X. An anonymous key agreement protocol based on chaotic maps. Commun Nonlinear Sci Simulat 2011;16(4):1986-92]. Niu-Wang's protocol not only achieves session key agreement between a server and a user, but also allows the user to anonymously interact with the server. Nevertheless, this paper points out that Niu-Wang's protocol has the following efficiency and security problems: (1) The protocol has computational efficiency problem when a trusted third party decrypts the user sending message. (2) The protocol is vulnerable to Denial of Service (DoS) attack based on illegal message modification by an attacker.

  2. Redesigning a large school-based clinical trial in response to changes in community practice.

    PubMed

    Gerald, Lynn B; Gerald, Joe K; McClure, Leslie A; Harrington, Kathy; Erwin, Sue; Bailey, William C

    2011-06-01

    Asthma exacerbations are seasonal with the greatest risk in elementary-age students occurring shortly after returning to school following summer break. Recent research suggests that this seasonality in children is primarily related to viral respiratory tract infections. Regular hand washing is the most effective method to prevent the spread of viral respiratory infections; unfortunately, achieving hand washing recommendations in schools is difficult. Therefore, we designed a study to evaluate the effect of hand sanitizer use in elementary schools on exacerbations among children with asthma. To describe the process of redesigning the trial in response to changes in the safety profile of the hand sanitizer as well as changes in hand hygiene practice in the schools. The original trial was a randomized, longitudinal, subject-blinded, placebo-controlled, community-based crossover trial. The primary aim was to evaluate the incremental effectiveness of hand sanitizer use in addition to usual hand hygiene practices to decrease asthma exacerbations in elementary-age children. Three events occurred that required major modifications to the original study protocol: (1) safety concerns arose regarding the hand sanitizer's active ingredient; (2) no substitute placebo hand sanitizer was available; and (3) community preferences changed regarding hand hygiene practices in the schools. The revised protocol is a randomized, longitudinal, community-based crossover trial. The primary aim is to evaluate the incremental effectiveness of a two-step hand hygiene process (hand hygiene education plus institutionally provided alcohol-based hand sanitizer) versus usual care to decrease asthma exacerbations. Enrollment was completed in May 2009 with 527 students from 30 schools. The intervention began in August 2009 and will continue through May 2011. Study results should be available at the end of 2011. The changed design does not allow us to directly measure the effectiveness of hand

  3. A mixed methods protocol for developing and testing implementation strategies for evidence-based obesity prevention in childcare: a cluster randomized hybrid type III trial.

    PubMed

    Swindle, Taren; Johnson, Susan L; Whiteside-Mansell, Leanne; Curran, Geoffrey M

    2017-07-18

    Despite the potential to reach at-risk children in childcare, there is a significant gap between current practices and evidence-based obesity prevention in this setting. There are few investigations of the impact of implementation strategies on the uptake of evidence-based practices (EBPs) for obesity prevention and nutrition promotion. This study protocol describes a three-phase approach to developing and testing implementation strategies to support uptake of EBPs for obesity prevention practices in childcare (i.e., key components of the WISE intervention). Informed by the i-PARIHS framework, we will use a stakeholder-driven evidence-based quality improvement (EBQI) process to apply information gathered in qualitative interviews on barriers and facilitators to practice to inform the design of implementation strategies. Then, a Hybrid Type III cluster randomized trial will compare a basic implementation strategy (i.e., intervention as usual) with an enhanced implementation strategy informed by stakeholders. All Head Start centers (N = 12) within one agency in an urban area in a southern state in the USA will be randomized to receive the basic or enhanced implementation with approximately 20 classrooms per group (40 educators, 400 children per group). The educators involved in the study, the data collectors, and the biostastician will be blinded to the study condition. The basic and enhanced implementation strategies will be compared on outcomes specified by the RE-AIM model (e.g., Reach to families, Effectiveness of impact on child diet and health indicators, Adoption commitment of agency, Implementation fidelity and acceptability, and Maintenance after 6 months). Principles of formative evaluation will be used throughout the hybrid trial. This study will test a stakeholder-driven approach to improve implementation, fidelity, and maintenance of EBPs for obesity prevention in childcare. Further, this study provides an example of a systematic process to develop

  4. Reducing Tobacco Use among Youth: Community-Based Approaches. A Guideline for Prevention Practitioners. Prevention Enhancement Protocols System (PEPS) Series.

    ERIC Educational Resources Information Center

    Birch & Davis Associates, Inc., Silver Spring, MD.

    A substantial knowledge base exists on reduction of tobacco use by youth. Effective prevention in this area can have major health and economic benefits. Information from research and prevention practice, organized by means of the Prevention Enhancement Protocols System (PEPS), is provided in the form of guidelines and recommendations for planning…

  5. Efficient model checking of network authentication protocol based on SPIN

    NASA Astrophysics Data System (ADS)

    Tan, Zhi-hua; Zhang, Da-fang; Miao, Li; Zhao, Dan

    2013-03-01

    Model checking is a very useful technique for verifying the network authentication protocols. In order to improve the efficiency of modeling and verification on the protocols with the model checking technology, this paper first proposes a universal formalization description method of the protocol. Combined with the model checker SPIN, the method can expediently verify the properties of the protocol. By some modeling simplified strategies, this paper can model several protocols efficiently, and reduce the states space of the model. Compared with the previous literature, this paper achieves higher degree of automation, and better efficiency of verification. Finally based on the method described in the paper, we model and verify the Privacy and Key Management (PKM) authentication protocol. The experimental results show that the method of model checking is effective, which is useful for the other authentication protocols.

  6. Developing family planning nurse practitioner protocols.

    PubMed

    Hawkins, J W; Roberto, D

    1984-01-01

    This article focuses on the process of development of protocols for family planning nurse practitioners. A rationale for the use of protocols, a definition of the types and examples, and the pros and cons of practice with protocols are presented. A how-to description for the development process follows, including methods and a suggested tool for critique and evaluation. The aim of the article is to assist nurse practitioners in developing protocols for their practice.

  7. Packet-Based Protocol Efficiency for Aeronautical and Satellite Communications

    NASA Technical Reports Server (NTRS)

    Carek, David A.

    2005-01-01

    This paper examines the relation between bit error ratios and the effective link efficiency when transporting data with a packet-based protocol. Relations are developed to quantify the impact of a protocol s packet size and header size relative to the bit error ratio of the underlying link. These relations are examined in the context of radio transmissions that exhibit variable error conditions, such as those used in satellite, aeronautical, and other wireless networks. A comparison of two packet sizing methodologies is presented. From these relations, the true ability of a link to deliver user data, or information, is determined. Relations are developed to calculate the optimal protocol packet size forgiven link error characteristics. These relations could be useful in future research for developing an adaptive protocol layer. They can also be used for sizing protocols in the design of static links, where bit error ratios have small variability.

  8. Exploring the Relationship between Beginning Science Teachers' Practices, Institutional Constraints, and Adult Development

    NASA Astrophysics Data System (ADS)

    Wilcox, Jesse Lee

    This year-long study explored how ten teachers--five first year, five second year--acclimated to their new school environment after leaving a master's level university science teacher preparation program known for being highly effective. Furthermore, this study sought to explore if a relationship existed between teachers' understanding and implementation of research-based science teaching practices, the barriers to enacting these practices--known as institutional constraints, and the constructive-developmental theory which explores meaning-making systems known as orders of consciousness. As a naturalistic inquiry mixed methods study, data were collected using both qualitative (e.g., semi-structured interviews, field notes) as well as quantitative methods (e.g., observation protocols, subject/object protocol). These data sources were used to construct participant summaries and a cross-case analysis. The findings from provide evidence that teachers' orders of consciousness might help to explain why understanding research-based science teaching practices are maintained by some new teachers and not others. Additionally, this study found the orders of consciousness of teachers relates to the perceptions of institutional constraints as well as how a teacher chooses to navigate those constraints. Finally, the extent to which teachers implement research-based science teaching practices is related to orders of consciousness. While many studies have focused on what meaning teachers make, this study highlights the importance of considering how teachers make meaning.

  9. Systems consultation: protocol for a novel implementation strategy designed to promote evidence-based practice in primary care.

    PubMed

    Quanbeck, Andrew; Brown, Randall T; E Zgierska, Aleksandra; A Johnson, Roberta; Robinson, James M; Jacobson, Nora

    2016-01-27

    Adoption of evidence-based practices takes place at a glacial place in healthcare. This research will pilot test an innovative implementation strategy - systems consultation -intended to speed the adoption of evidence-based practice in primary care. The strategy is based on tenets of systems engineering and has been extensively tested in addiction treatment. Three innovations have been included in the strategy - translation of a clinical practice guideline into a checklist-based implementation guide, the use of physician peer coaches ('systems consultants') to help clinics implement the guide, and a focus on reducing variation in practices across prescribers and clinics. The implementation strategy will be applied to improving opioid prescribing practices in primary care, which may help ultimately mitigate the increasing prevalence of opioid abuse and addiction. The pilot test will compare four intervention clinics to four control clinics in a matched-pairs design. A leading clinical guideline for opioid prescribing has been translated into a checklist-based implementation guide in a systematic process that involved experts who wrote the guideline in consultation with implementation experts and primary care physicians. Two physicians with expertise in family and addiction medicine are serving as the systems consultants. Each systems consultant will guide two intervention clinics, using two site visits and follow-up communication by phone and email, to implement the translated guideline. Mixed methods will be used to test the feasibility, acceptability, and preliminary effectiveness of the implementation strategy in an evaluation that meets standards for 'fully developed use' of the RE-AIM framework (Reach, Effectiveness, Adoption, Implementation, Maintenance). The clinic will be the primary unit of analysis. The systems consultation implementation strategy is intended to generalize to the adoption of other clinical guidelines. This pilot test is intended to prepare

  10. [Problematizing the multidisciplinary residency in oncology: a practical teaching protocol from the perspective of nurse residents].

    PubMed

    Melo, Myllena Cândida de; Queluci, Gisella de Carvalho; Gouvêa, Mônica Villela

    2014-08-01

    To investigate practical teaching of nurse residents in a multidisciplinary residency in oncology. A qualitative descriptive study grounded in the problematization methodology and its steps, represented by the Maguerez Arch. Data were analyzed using content analysis. Potentiating and limiting elements of the residency guided the design of a practical teaching protocol from the perspective of residents, structured in three stages: Welcoming and ambience; Nursing care for problem situations; and, Evaluation process. Systematization of practical teaching promoted the autonomy of individuals and the approximation of teaching to reality, making residency less strenuous, stressful and distressing.

  11. Enhancing user privacy in SARG04-based private database query protocols

    NASA Astrophysics Data System (ADS)

    Yu, Fang; Qiu, Daowen; Situ, Haozhen; Wang, Xiaoming; Long, Shun

    2015-11-01

    The well-known SARG04 protocol can be used in a private query application to generate an oblivious key. By usage of the key, the user can retrieve one out of N items from a database without revealing which one he/she is interested in. However, the existing SARG04-based private query protocols are vulnerable to the attacks of faked data from the database since in its canonical form, the SARG04 protocol lacks means for one party to defend attacks from the other. While such attacks can cause significant loss of user privacy, a variant of the SARG04 protocol is proposed in this paper with new mechanisms designed to help the user protect its privacy in private query applications. In the protocol, it is the user who starts the session with the database, trying to learn from it bits of a raw key in an oblivious way. An honesty test is used to detect a cheating database who had transmitted faked data. The whole private query protocol has O( N) communication complexity for conveying at least N encrypted items. Compared with the existing SARG04-based protocols, it is efficient in communication for per-bit learning.

  12. Voice over Internet protocol for the orthodontic practice: a sensible switch from plain old telephone service.

    PubMed

    Mupparapu, Muralidhar

    2008-03-01

    Voice over Internet protocol (VoIP) is a revolutionary new technology that is causing a stir in the telecommunications industry and threatening the existence of traditional telephone service providers. Based on a simple method of converting analog audio signals into digital data before being transmitted over the Internet, VoIP has gained immense popularity among consumers. The technology is now regarded as an alternative to traditional telephone service for the orthodontic office. When the economics are considered, it is cost-effective, especially for a busy orthodontic practice where the call volumes both in and out are always high. VoIP has the potential to reduce costs, break the barriers between local vs long-distance calling, and make life easier for the office staff. However, deploying VoIP requires a cautious and thought-out process. Users should fully understand the risks and benefits before switching from the public switched telephone network. VoIP customers and service providers are vulnerable to many of the same impersonation-based attacks by those who attempt toll fraud, and identity and information theft. In this article, VoIP is introduced to orthodontic practitioners, who might be unfamiliar with this technology. Internet protocol based private branch exchange systems that are currently marketed as open-source technologies are also reviewed. Additionally, VoIP is compared with the traditional public switched telephone network technology and evaluated for its potential applications in an orthodontic office for both increased efficiency and cost savings.

  13. Knowledge, attitudes, beliefs and behaviour intentions for three bowel management practices in intensive care: effects of a targeted protocol implementation for nursing and medical staff.

    PubMed

    Knowles, Serena; Lam, Lawrence T; McInnes, Elizabeth; Elliott, Doug; Hardy, Jennifer; Middleton, Sandy

    2015-01-01

    Bowel management protocols have the potential to minimize complications for critically ill patients. Targeted implementation can increase the uptake of protocols by clinicians into practice. The theory of planned behaviour offers a framework in which to investigate clinicians' intention to perform the behaviour of interest. This study aimed to evaluate the effect of implementing a bowel management protocol on intensive care nursing and medical staffs' knowledge, attitude, subjective norms, perceived behavioural control, behaviour intentions, role perceptions and past behaviours in relation to three bowel management practices. A descriptive before and after survey using a self-administered questionnaire sent to nursing and medical staff working within three intensive care units before and after implementation of our bowel management protocol (pre: May - June 2008; post: Feb - May 2009). Participants had significantly higher knowledge scores post-implementation of our protocol (pre mean score 17.6; post mean score 19.3; p = 0.004). Post-implementation there was a significant increase in: self-reported past behaviour (pre mean score 5.38; post mean score 7.11; p = 0.002) and subjective norms scores (pre mean score 3.62; post mean score 4.18; p = 0.016) for bowel assessment; and behaviour intention (pre mean score 5.22; post mean score 5.65; p = 0.048) for administration of enema. This evaluation, informed by the theory of planned behaviour, has provided useful insights into factors that influence clinician intentions to perform evidence-based bowel management practices in intensive care. Addressing factors such as knowledge, attitudes and beliefs can assist in targeting implementation strategies to positively affect clinician behaviour change. Despite an increase in clinicians' knowledge scores, our implementation strategy did not, however, significantly change clinician behaviour intentions for all three bowel management practices. Further research is

  14. Pharmaceutical care for patients with COPD in Belgium and views on protocol implementation.

    PubMed

    Tommelein, Eline; Tollenaere, Kathleen; Mehuys, Els; Boussery, Koen

    2014-08-01

    A protocol-based pharmaceutical care program (the PHARMACOP-protocol) focusing on patient counselling during prescription filling has shown to be effective in patients with chronic obstructive pulmonary disease (COPD). However, implementation of this protocol in daily practice has not yet been studied. To describe current implementation level of the items included in the PHARMACOP-protocol in Belgian community pharmacies and to evaluate pharmacists' perspectives on the implementation of this protocol in daily practice. A cross-sectional study was conducted from April to June 2012, in randomly selected community pharmacies in Flanders. Pharmacists were questionned using structured interviews. 125 pharmacies were contacted and 80 managing pharmacists (64 %) participated. In >70 % of pharmacies, 4/7 protocol items for first prescriptions and 3/5 protocol items for follow-up prescriptions were already routinely implemented. For first and follow-up prescriptions, respectively 39 (49 %) and 34 pharmacists (43 %) stated they would need to spend at least 5 min extra to offer optimal patient counselling. Most mentioned barriers preventing protocol implementation included lack of time (80 %), no integration in pharmacy software (61 %) and too much administrative burden (58 %). Approximately 50 % of the PHARMACOP-protocol items are currently routinely provided in Belgian community pharmacies. Nearly all interviewed pharmacists are willing to implement the protocol fully or partially in daily practice.

  15. Advertisement-Based Energy Efficient Medium Access Protocols for Wireless Sensor Networks

    NASA Astrophysics Data System (ADS)

    Ray, Surjya Sarathi

    . Simulations show that the optimized ADV-MAC provides substantial energy gains (50% to 70% less than other MAC protocols for WSNs such as T-MAC and S-MAC for the scenarios investigated) while faring as well as T-MAC in terms of packet delivery ratio and latency. Although ADV-MAC provides substantial energy gains over S-MAC and T-MAC, it is not optimal in terms of energy savings because contention is done twice -- once in the Advertisement Period and once in the Data Period. In the next part of my research, the second contention in the Data Period is eliminated and the advantages of contention-based and TDMA-based protocols are combined to form Advertisement based Time-division Multiple Access (ATMA), a distributed TDMA-based MAC protocol for WSNs. ATMA utilizes the bursty nature of the traffic to prevent energy waste through advertisements and reservations for data slots. Extensive simulations and qualitative analysis show that with bursty traffic, ATMA outperforms contention-based protocols (S-MAC, T-MAC and ADV-MAC), a TDMA based protocol (TRAMA) and hybrid protocols (Z-MAC and IEEE 802.15.4). ATMA provides energy reductions of up to 80%, while providing the best packet delivery ratio (close to 100%) and latency among all the investigated protocols. Simulations alone cannot reflect many of the challenges faced by real implementations of MAC protocols, such as clock-drift, synchronization, imperfect physical layers, and irregular interference from other transmissions. Such issues may cripple a protocol that otherwise performs very well in software simulations. Hence, to validate my research, I conclude with a hardware implementation of the ATMA protocol on SORA (Software Radio), developed by Microsoft Research Asia. SORA is a reprogrammable Software Defined Radio (SDR) platform that satisfies the throughput and timing requirements of modern wireless protocols while utilizing the rich general purpose PC development environment. Experimental results obtained from the hardware

  16. Dynamics behind the scale up of evidence-based obesity prevention: protocol for a multi-site case study of an electronic implementation monitoring system in health promotion practice.

    PubMed

    Conte, Kathleen P; Groen, Sisse; Loblay, Victoria; Green, Amanda; Milat, Andrew; Persson, Lina; Innes-Hughes, Christine; Mitchell, Jo; Thackway, Sarah; Williams, Mandy; Hawe, Penelope

    2017-12-06

    The effectiveness of many interventions to promote health and prevent disease has been well established. The imperative has therefore shifted from amassing evidence about efficacy to scale-up to maximise population-level health gains. Electronic implementation monitoring, or 'e-monitoring', systems have been designed to assist and track the delivery of preventive policies and programs. However, there is little evidence on whether e-monitoring systems improve the dissemination, adoption, and ongoing delivery of evidence-based preventive programs. Also, given considerable difficulties with e-monitoring systems in the clinical sector, scholars have called for a more sophisticated re-examination of e-monitoring's role in enhancing implementation. In the state of New South Wales (NSW), Australia, the Population Health Information Management System (PHIMS) was created to support the dissemination of obesity prevention programs to 6000 childcare centres and elementary schools across all 15 local health districts. We have established a three-way university-policymaker-practice research partnership to investigate the impact of PHIMS on practice, how PHIMS is used, and how achievement of key performance indicators of program adoption may be associated with local contextual factors. Our methods encompass ethnographic observation, key informant interviews and participatory workshops for data interpretation at a state and local level. We use an on-line social network analysis of the collaborative relationships across local health district health promotion teams to explore the relationship between PHIMS use and the organisational structure of practice. Insights will be sensitised by institutional theory, practice theory and complex adaptive system thinking, among other theories which make sense of socio-technical action. Our working hypothesis is that the science of getting evidence-based programs into practice rests on an in-depth understanding of the role they play in the on

  17. Study protocol for a pragmatic randomised controlled trial evaluating efficacy of a smoking cessation e-‘Tabac Info Service’: ee-TIS trial

    PubMed Central

    Cambon, L; Bergman, P; Le Faou, Al; Vincent, I; Le Maitre, B; Pasquereau, A; Arwidson, P; Thomas, D; Alla, F

    2017-01-01

    Introduction A French national smoking cessation service, Tabac Info Service, has been developed to provide an adapted quitline and a web and mobile application involving personalised contacts (eg, questionnaires, advice, activities, messages) to support smoking cessation. This paper presents the study protocol of the evaluation of the application (e-intervention Tabac Info Service (e-TIS)). The primary objective is to assess the efficacy of e-TIS. The secondary objectives are to (1) describe efficacy variations with regard to users' characteristics, (2) analyse mechanisms and contextual conditions of e-TIS efficacy. Methods and analyses The study design is a two-arm pragmatic randomised controlled trial including a process evaluation with at least 3000 participants randomised to the intervention or to the control arm (current practices). Inclusion criteria are: aged 18 years or over, current smoker, having completed the online consent forms, possessing a mobile phone with android or apple systems and using mobile applications, wanting to stop smoking sooner or later. The primary outcome is the point prevalence abstinence of 7 days at 6 months later. Data will be analysed in intention to treat (primary) and per protocol analyses. A logistic regression will be carried out to estimate an OR (95% CI) for efficacy. A multivariate multilevel analysis will explore the influence on results of patients' characteristics (sex, age, education and socioprofessional levels, dependency, motivation, quit experiences) and contextual factors, conditions of use, behaviour change techniques. Ethics and dissemination The study protocol was reviewed by the ethical and deontological institutional review board of the French Institute for Public Health Surveillance on 18 April 2016. The findings of this study will allow us to characterise the efficacy of e-TIS and conditions of its efficacy. These findings will be disseminated through peer-reviewed articles. Trial registration

  18. A novel wavelength availability advertisement based ASON routing protocol implementation

    NASA Astrophysics Data System (ADS)

    Li, Jian; Liu, Juan; Zhang, Jie; Gu, Wanyi

    2005-11-01

    A novel wavelength availability advertisement based ASON routing protocol implementation is proposed in this paper which is derived from Open Shortest Path First protocol (OSPF) version 2. It can be applied to ASON network with a single control domain and can be easily extended to support routing in the multi-domain scenarios. Two new types of link state advertisement (LSA) are suggested for disseminating wavelength availability and network topology information. The OSPF mechanisms are inherited to ensure that the routing messages are delivered more reliably and converged more quickly while with fewer overheads. The topology auto discovery is realized through LSA flooding interacting with auto neighbor discovery using Link Management Protocol. The new LSA formats are given and how the link state database (LSD) is comprised is described. The new data structures proposed include topology resource list, adjacency list and route table. Then we analyze the differences of ASON in link state exchange, routing information flooding procedure, flushing procedure and new resources participating, i.e. new links or nodes join in an existing ASON. The link or node failure and recovery effect and how to deal with them are settled as well. In order to adopt different Routing and Wavelength Assignment (RWA) algorithms, a standard and efficient interface is designed. After extensive simulation we give the numerical analysis and come to the following conclusions: wavelength availability information flooding Convergence Time is about 30 milliseconds and it is not affected by RWA algorithms and the call traffic load; routing Protocol Average Overhead rises linearly with the increase of traffic load; Average Connection Setup Time decreases with the increase of traffic load because of the decrease of Average Routing Distance of the successfully lightpaths; Wavelength availability advertisement can greatly promote the blocking performance of ASON in relatively low traffic load; ASON

  19. From skin biopsy to neurons through a pluripotent intermediate under Good Manufacturing Practice protocols.

    PubMed

    Karumbayaram, Saravanan; Lee, Peiyee; Azghadi, Soheila F; Cooper, Aaron R; Patterson, Michaela; Kohn, Donald B; Pyle, April; Clark, Amander; Byrne, James; Zack, Jerome A; Plath, Kathrin; Lowry, William E

    2012-01-01

    The clinical application of human-induced pluripotent stem cells (hiPSCs) requires not only the production of Good Manufacturing Practice-grade (GMP-grade) hiPSCs but also the derivation of specified cell types for transplantation under GMP conditions. Previous reports have suggested that hiPSCs can be produced in the absence of animal-derived reagents (xenobiotics) to ease the transition to production under GMP standards. However, to facilitate the use of hiPSCs in cell-based therapeutics, their progeny should be produced not only in the absence of xenobiotics but also under GMP conditions requiring extensive standardization of protocols, documentation, and reproducibility of methods and product. Here, we present a successful framework to produce GMP-grade derivatives of hiPSCs that are free of xenobiotic exposure from the collection of patient fibroblasts, through reprogramming, maintenance of hiPSCs, identification of reprogramming vector integration sites (nrLAM-PCR), and finally specification and terminal differentiation of clinically relevant cells. Furthermore, we developed a primary set of Standard Operating Procedures for the GMP-grade derivation and differentiation of these cells as a resource to facilitate widespread adoption of these practices.

  20. Optimized protocol for quantitative multiple reaction monitoring-based proteomic analysis of formalin-fixed, paraffin embedded tissues

    PubMed Central

    Kennedy, Jacob J.; Whiteaker, Jeffrey R.; Schoenherr, Regine M.; Yan, Ping; Allison, Kimberly; Shipley, Melissa; Lerch, Melissa; Hoofnagle, Andrew N.; Baird, Geoffrey Stuart; Paulovich, Amanda G.

    2016-01-01

    Despite a clinical, economic, and regulatory imperative to develop companion diagnostics, precious few new biomarkers have been successfully translated into clinical use, due in part to inadequate protein assay technologies to support large-scale testing of hundreds of candidate biomarkers in formalin-fixed paraffin embedded (FFPE) tissues. While the feasibility of using targeted, multiple reaction monitoring-mass spectrometry (MRM-MS) for quantitative analyses of FFPE tissues has been demonstrated, protocols have not been systematically optimized for robust quantification across a large number of analytes, nor has the performance of peptide immuno-MRM been evaluated. To address this gap, we used a test battery approach coupled to MRM-MS with the addition of stable isotope labeled standard peptides (targeting 512 analytes) to quantitatively evaluate the performance of three extraction protocols in combination with three trypsin digestion protocols (i.e. 9 processes). A process based on RapiGest buffer extraction and urea-based digestion was identified to enable similar quantitation results from FFPE and frozen tissues. Using the optimized protocols for MRM-based analysis of FFPE tissues, median precision was 11.4% (across 249 analytes). There was excellent correlation between measurements made on matched FFPE and frozen tissues, both for direct MRM analysis (R2 = 0.94) and immuno-MRM (R2 = 0.89). The optimized process enables highly reproducible, multiplex, standardizable, quantitative MRM in archival tissue specimens. PMID:27462933

  1. Development of a virtual lab for practical eLearning in eHealth.

    PubMed

    Herzog, Juliane; Forjan, Mathias; Sauermann, Stefan; Mense, Alexander; Urbauer, Philipp

    2015-01-01

    In recent years an ongoing development in educational offers for professionals working in the field of eHealth has been observed. This education is increasingly offered in the form of eLearning courses. Furthermore, it can be seen that simulations are a valuable part to support the knowledge transfer. Based on the knowledge profiles defined for eHealth courses a virtual lab should be developed. For this purpose, a subset of skills and a use case is determined. After searching and evaluating appropriate simulating and testing tools six tools were chosen to implement the use case practically. Within an UML use case diagram the interaction between the tools and the user is represented. Initially tests have shown good results of the tools' feasibility. After an extensive testing phase the tools should be integrated in the eHealth eLearning courses.

  2. A lightweight neighbor-info-based routing protocol for no-base-station taxi-call system.

    PubMed

    Zhu, Xudong; Wang, Jinhang; Chen, Yunchao

    2014-01-01

    Since the quick topology change and short connection duration, the VANET has had unstable routing and wireless signal quality. This paper proposes a kind of lightweight routing protocol-LNIB for call system without base station, which is applicable to the urban taxis. LNIB maintains and predicts neighbor information dynamically, thus finding the reliable path between the source and the target. This paper describes the protocol in detail and evaluates the performance of this protocol by simulating under different nodes density and speed. The result of evaluation shows that the performance of LNIB is better than AODV which is a classic protocol in taxi-call scene.

  3. Web-based computer-tailoring for practice nurses aimed to improve smoking cessation guideline adherence: A study protocol for a randomized controlled effectiveness trial.

    PubMed

    de Ruijter, D; Smit, E S; de Vries, H; Hoving, C

    2016-05-01

    Dutch practice nurses sub-optimally adhere to evidence-based smoking cessation guidelines. Web-based computer-tailoring could be effective in improving their guideline adherence. Therefore, this paper aims to describe the development of a web-based computer-tailored program and the design of a randomized controlled trial testing its (cost-)effectiveness. Theoretically grounded in the I-Change Model and Self-Determination Theory, and based on the results of a qualitative needs assessment among practice nurses, a web-based computer-tailored program was developed including three modules with tailored advice, an online forum, modules with up-to-date information about smoking cessation, Frequently Asked Questions (FAQs) and project information, and a counseling checklist. The program's effects are assessed by comparing an intervention group (access to all modules) with a control group (access to FAQs, project information and counseling checklist only). Smoking cessation guideline adherence and behavioral predictors (i.e. intention, knowledge, attitude, self-efficacy, social influence, action and coping planning) are measured at baseline and at 6- and 12-month follow-up. Additionally, the program's indirect effects on smokers' quit rates and the number of quit attempts are assessed after 6 and 12months. This paper describes the development of a web-based computer-tailored adherence support program for practice nurses and the study design of a randomized controlled trial testing its (cost-)effectiveness. This program potentially contributes to improving the quality of smoking cessation care in Dutch general practices. If proven effective, the program could be adapted for use by other healthcare professionals, increasing the public health benefits of improved smoking cessation counseling for smokers. Copyright © 2016 Elsevier Inc. All rights reserved.

  4. A Weak Value Based QKD Protocol Robust Against Detector Attacks

    NASA Astrophysics Data System (ADS)

    Troupe, James

    2015-03-01

    We propose a variation of the BB84 quantum key distribution protocol that utilizes the properties of weak values to insure the validity of the quantum bit error rate estimates used to detect an eavesdropper. The protocol is shown theoretically to be secure against recently demonstrated attacks utilizing detector blinding and control and should also be robust against all detector based hacking. Importantly, the new protocol promises to achieve this additional security without negatively impacting the secure key generation rate as compared to that originally promised by the standard BB84 scheme. Implementation of the weak measurements needed by the protocol should be very feasible using standard quantum optical techniques.

  5. Application of evidence-based dentistry: from research to clinical periodontal practice.

    PubMed

    Kwok, Vivien; Caton, Jack G; Polson, Alan M; Hunter, Paul G

    2012-06-01

    Dentists need to make daily decisions regarding patient care, and these decisions should essentially be scientifically sound. Evidence-based dentistry is meant to empower clinicians to provide the most contemporary treatment. The benefits of applying the evidence-based method in clinical practice include application of the most updated treatment and stronger reasoning to justify the treatment. A vast amount of information is readily accessible with today's digital technology, and a standardized search protocol can be developed to ensure that a literature search is valid, specific and repeatable. It involves developing a preset question (population, intervention, comparison and outcome; PICO) and search protocol. It is usually used academically to perform commissioned reviews, but it can also be applied to answer simple clinical queries. The scientific evidence thus obtained can then be considered along with patient preferences and values, clinical patient circumstances and the practitioner's experience and judgment in order to make the treatment decision. This paper describes how clinicians can incorporate evidence-based methods into patient care and presents a clinical example to illustrate the process. © 2012 John Wiley & Sons A/S.

  6. In-Person Versus eHealth Mindfulness-Based Intervention for Adolescents With Chronic Illness: Protocol for a Randomized Controlled Trial

    PubMed Central

    Kaufman, Miriam; Malboeuf-Hurtubise, Catherine; Kohut, Sara Ahola; Viner, Christine; Locke, Jake; Vo, Dzung X

    2017-01-01

    Background Eight-week mindfulness-based interventions (MBIs) have a beneficial impact on mental health and well-being in adolescents with chronic health conditions. Usually delivered in person in a group setting, these programs are difficult to access for teens with disabilities or who do not have in-person MBIs available in their communities. Objective This paper outlines the rationale, development, and design of a randomized controlled trial comparing the effects of an MBI delivered in person or via eHealth in adolescents with a chronic illness. Quantitative outcomes will include mindfulness skills acquisition (primary outcome), effects of the MBI on self-reported mood, anxiety, self-esteem, illness perception, and physiological stress (via salivary cortisol), and qualitative outcomes will include individual practice, participant appreciation, and adaptation of the MBI for eHealth. Methods This is a randomized noninferiority mixed methods study comparing 2 MBI arms: in-person and eHealth. Participants are eligible to participate if they are aged 13 to 18 years, have a diagnosis of chronic medical condition, live close enough to the recruitment hospital to participate in the in-person arm of the study, and are currently followed by a health care provider. Each participant will receive an adapted 8-week MBI delivered either in person at a tertiary pediatric hospital or via a secure audio-visual platform allowing group interactions in real time. Groups will be facilitated by 2 experienced mindfulness providers. Quantitative and qualitative data will be collected through standardized research questionnaires administered via a secure, youth-friendly online platform and through semistructured interviews, participant log books, facilitator log books, and salivary cortisol analysis. Qualitative data will be analyzed using a grounded theory model. Results Data collection is currently underway. Data analysis, manuscript writing, and additional publications are expected to

  7. Living better with dementia: strengths-based social work practice and dementia care.

    PubMed

    McGovern, Justine

    2015-01-01

    This article first argues that quality of life is possible despite the onset of dementia in late life. It also demonstrates how core concepts of social work practice, such as family systems theory, the strengths perspective, and use of self, can be applied to practice with dementia-affected persons. In addition, it provides practical suggestions for supporting care partners in nurturing "we-ness", focusing on what remains rather than was is lost, and remaining authentic. When strengths-based social work practice is integrated into dementia care protocols, wellbeing can increase. As a result, the more than 40 million persons worldwide who are affected by dementia do not have to resign themselves to the despair, devastation and inevitable demise of quality of life that dominate perception of the illness.

  8. A Scenario-Based Protocol Checker for Public-Key Authentication Scheme

    NASA Astrophysics Data System (ADS)

    Saito, Takamichi

    Security protocol provides communication security for the internet. One of the important features of it is authentication with key exchange. Its correctness is a requirement of the whole of the communication security. In this paper, we introduce three attack models realized as their attack scenarios, and provide an authentication-protocol checker for applying three attack-scenarios based on the models. We also utilize it to check two popular security protocols: Secure SHell (SSH) and Secure Socket Layer/Transport Layer Security (SSL/TLS).

  9. The Verification-based Analysis of Reliable Multicast Protocol

    NASA Technical Reports Server (NTRS)

    Wu, Yunqing

    1996-01-01

    Reliable Multicast Protocol (RMP) is a communication protocol that provides an atomic, totally ordered, reliable multicast service on top of unreliable IP Multicasting. In this paper, we develop formal models for R.W using existing automatic verification systems, and perform verification-based analysis on the formal RMP specifications. We also use the formal models of RW specifications to generate a test suite for conformance testing of the RMP implementation. Throughout the process of RMP development, we follow an iterative, interactive approach that emphasizes concurrent and parallel progress between the implementation and verification processes. Through this approach, we incorporate formal techniques into our development process, promote a common understanding for the protocol, increase the reliability of our software, and maintain high fidelity between the specifications of RMP and its implementation.

  10. Performance and analysis of MAC protocols based on application

    NASA Astrophysics Data System (ADS)

    Yadav, Ravi; Daniel, A. K.

    2018-04-01

    Wireless Sensor Network is one of the rapid emerging technology in recent decades. It covers large application area as civilian and military. Wireless Sensor Network primary consists of sensor nodes having low-power, low cost and multifunctional activities to collaborates and communicates via wireless medium. The deployment of sensor nodes are adhoc in nature, so sensor nodes are auto organize themselves in such a way to communicate with each other. The characteristics make more challenging areas on WSNs. This paper gives overview about characteristics of WSNs, Architecture and Contention Based MAC protocol. The paper present analysis of various protocol based on performance.

  11. Redesigning a large school-based clinical trial in response to changes in community practice

    PubMed Central

    Gerald, Lynn B; Gerald, Joe K; McClure, Leslie A; Harrington, Kathy; Erwin, Sue; Bailey, William C

    2011-01-01

    Background Asthma exacerbations are seasonal with the greatest risk in elementary-age students occurring shortly after returning to school following summer break. Recent research suggests that this seasonality in children is primarily related to viral respiratory tract infections. Regular hand washing is the most effective method to prevent the spread of viral respiratory infections; unfortunately, achieving hand washing recommendations in schools is difficult. Therefore, we designed a study to evaluate the effect of hand sanitizer use in elementary schools on exacerbations among children with asthma. Purpose To describe the process of redesigning the trial in response to changes in the safety profile of the hand sanitizer as well as changes in hand hygiene practice in the schools. Methods The original trial was a randomized, longitudinal, subject-blinded, placebo-controlled, community-based crossover trial. The primary aim was to evaluate the incremental effectiveness of hand sanitizer use in addition to usual hand hygiene practices to decrease asthma exacerbations in elementary-age children. Three events occurred that required major modifications to the original study protocol: (1) safety concerns arose regarding the hand sanitizer’s active ingredient; (2) no substitute placebo hand sanitizer was available; and (3) community preferences changed regarding hand hygiene practices in the schools. Results The revised protocol is a randomized, longitudinal, community-based crossover trial. The primary aim is to evaluate the incremental effectiveness of a two-step hand hygiene process (hand hygiene education plus institutionally provided alcohol-based hand sanitizer) versus usual care to decrease asthma exacerbations. Enrollment was completed in May 2009 with 527 students from 30 schools. The intervention began in August 2009 and will continue through May 2011. Study results should be available at the end of 2011. Limitations The changed design does not allow us to

  12. Interactive eLearning - a safe place to practice.

    PubMed

    Einarson, Elisabeth; Moen, Anne; Kolberg, Ragnhild; Flingtorp, Gry; Linnerud, Eva

    2009-01-01

    Interactive web-based learning environment offers refreshing opportunities to create innovative solutions to explore and exploit informatics support on-the-job training. We report from a study where a hospital is created a interactive eLearning resource. The modules are creating a safe place to practice - to be used for introduction to the work and preparation for certification or re-certification of competencies.

  13. Security of modified Ping-Pong protocol in noisy and lossy channel

    PubMed Central

    Han, Yun-Guang; Yin, Zhen-Qiang; Li, Hong-Wei; Chen, Wei; Wang, Shuang; Guo, Guang-Can; Han, Zheng-Fu

    2014-01-01

    The “Ping-Pong” (PP) protocol is a two-way quantum key protocol based on entanglement. In this protocol, Bob prepares one maximally entangled pair of qubits, and sends one qubit to Alice. Then, Alice performs some necessary operations on this qubit and sends it back to Bob. Although this protocol was proposed in 2002, its security in the noisy and lossy channel has not been proven. In this report, we add a simple and experimentally feasible modification to the original PP protocol, and prove the security of this modified PP protocol against collective attacks when the noisy and lossy channel is taken into account. Simulation results show that our protocol is practical. PMID:24816899

  14. Security of modified Ping-Pong protocol in noisy and lossy channel.

    PubMed

    Han, Yun-Guang; Yin, Zhen-Qiang; Li, Hong-Wei; Chen, Wei; Wang, Shuang; Guo, Guang-Can; Han, Zheng-Fu

    2014-05-12

    The "Ping-Pong" (PP) protocol is a two-way quantum key protocol based on entanglement. In this protocol, Bob prepares one maximally entangled pair of qubits, and sends one qubit to Alice. Then, Alice performs some necessary operations on this qubit and sends it back to Bob. Although this protocol was proposed in 2002, its security in the noisy and lossy channel has not been proven. In this report, we add a simple and experimentally feasible modification to the original PP protocol, and prove the security of this modified PP protocol against collective attacks when the noisy and lossy channel is taken into account. Simulation results show that our protocol is practical.

  15. Research- and Practice-Based Nutrition Education and Cooking Workshops in Pediatric Oncology: Protocol for Implementation and Development of Curriculum

    PubMed Central

    Chaput, Cynthia; Beaulieu-Gagnon, Sabrina; Bélanger, Véronique; Drouin, Simon; Bertout, Laurence; Lafrance, Lucie; Olivier, Cinthia; Robitaille, Marthe; Laverdière, Caroline; Sinnett, Daniel; Marquis, Marie

    2018-01-01

    Background Progresses in childhood cancer treatment, diagnosis, and management have resulted in childhood cancer survival rates of over 80%. However, this therapeutic success comes with a heavy price: two-thirds of childhood cancer survivors will be affected by further complications, including cardiovascular and metabolic diseases. Adequate nutrition during cancer treatment is essential to ensure the child’s optimal development, improve tolerance to treatments, and can contribute to lower the risk of developing cardiometabolic diseases. Side effects of cancer treatments can negatively impact children’s nutritional intake and eating behaviors. Involving the families of childhood cancer patients in educational workshops could be a promising avenue to promote healthy eating during and after cancer treatment. Objective The objectives of this study were to develop, validate, and implement a family-based nutrition education and cooking workshop curriculum in a pediatric oncology setting that addresses the nutritional issues encountered during treatments while promoting the adoption of healthy eating habits for the prevention of long-term cardiometabolic effects. Methods The workshops were developed and validated following an 8-step iterative process, including a review of the literature and consultations with a steering committee. An evaluation tool was also developed. A nonrandomized study protocol was elaborated to implement the workshops and measure their impact. The themes of the 6 research- and practice-based lessons are as follows: meal fortification during cancer treatment, changes in taste during cancer therapy and their impact on children, adapting diet to eating-related side effects of treatments, nutritional support during cancer treatment, Mediterranean diet and health, and planning quick and economic meals. The validation process included consultations with the institution’s clinical nutrition professionals. Self-administered post questionnaires were

  16. Investigation into Practical Implementations of a Zero Knowledge Protocol.

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Marleau, Peter; Krentz-Wee, Rebecca E.

    In recent years, the concept of Zero Knowledge Protocols (ZKP) as a useful approach to nuclear warhead verification has become increasingly popular. Several implementations of ZKP have been proposed, driving technology development toward proof of concept demonstrations. Whereas proposed implementations seem to fall within the general class of template-based techniques, all physical implementations of ZKPs proposed to date have a complication: once the instrumentation is prepared, it is no longer authenticatable; the instrument physically contains sensitive information. In this work we explore three different concepts that may offer more authenticatable and practical ZKP implementations and evaluate the sensitive information thatmore » may be at risk when doing so: sharing a subset of detector counts in a preloaded image (with spatial information removed), real-time image subtraction, and a new concept, CONfirmation using a Fast-neutron Imaging Detector with Anti-image NULL-positive Time Encoding (CONFIDANTE). CONFIDANTE promises to offer an almost ideal implementation of ZKP: a positive result is indicated by a constant rate at all times enabling the monitoring party the possibility of full access to the instrument before, during, and after confirmation. A prototype of CONFIDANTE was designed, built, and its performance evaluated in a series of measurements of several objects including a set of plutonium dioxide Hemispheres. Very encouraging results proving feasibility are presented. 1 Rebecca is currently a graduate student in Nuclear Engineering at UC Berkeley« less

  17. Management of Energy Consumption on Cluster Based Routing Protocol for MANET

    NASA Astrophysics Data System (ADS)

    Hosseini-Seno, Seyed-Amin; Wan, Tat-Chee; Budiarto, Rahmat; Yamada, Masashi

    The usage of light-weight mobile devices is increasing rapidly, leading to demand for more telecommunication services. Consequently, mobile ad hoc networks and their applications have become feasible with the proliferation of light-weight mobile devices. Many protocols have been developed to handle service discovery and routing in ad hoc networks. However, the majority of them did not consider one critical aspect of this type of network, which is the limited of available energy in each node. Cluster Based Routing Protocol (CBRP) is a robust/scalable routing protocol for Mobile Ad hoc Networks (MANETs) and superior to existing protocols such as Ad hoc On-demand Distance Vector (AODV) in terms of throughput and overhead. Therefore, based on this strength, methods to increase the efficiency of energy usage are incorporated into CBRP in this work. In order to increase the stability (in term of life-time) of the network and to decrease the energy consumption of inter-cluster gateway nodes, an Enhanced Gateway Cluster Based Routing Protocol (EGCBRP) is proposed. Three methods have been introduced by EGCBRP as enhancements to the CBRP: improving the election of cluster Heads (CHs) in CBRP which is based on the maximum available energy level, implementing load balancing for inter-cluster traffic using multiple gateways, and implementing sleep state for gateway nodes to further save the energy. Furthermore, we propose an Energy Efficient Cluster Based Routing Protocol (EECBRP) which extends the EGCBRP sleep state concept into all idle member nodes, excluding the active nodes in all clusters. The experiment results show that the EGCBRP decreases the overall energy consumption of the gateway nodes up to 10% and the EECBRP reduces the energy consumption of the member nodes up to 60%, both of which in turn contribute to stabilizing the network.

  18. Use of Complementary Health Practices in a Church-Based African American Cohort.

    PubMed

    Escoto, Kamisha Hamilton; Milbury, Kathrin; Nguyen, Nga; Cho, Dalnim; Roberson, Crystal; Wetter, David; McNeill, Lorna H

    2018-06-08

    Few studies have examined the use of complementary health practices (e.g., mind/body practices and dietary supplements) among African Americans, particularly those who identify as being spiritual and/or religious. Furthermore, research on the health and health behavior profiles of such complementary health users is scant. The purpose of this study was to explore the use of complementary health practices and their lifestyle and health indicator correlates in a large, church-based African American population. Cross-sectional analysis of 1467 African American adults drawn from a church-based cohort study. Participants reported use of complementary health practices, lifestyle behaviors (e.g., diet and smoking status), and health indicators (e.g., physical health and medical problems). Multiple logistic regressions were conducted to examine associations between lifestyle variables, health indicators, and use of complementary health practices. Outcomes included prevalence of mind/body practices (e.g., meditation and Reiki) and dietary supplements (multivitamins) along with health indicator and lifestyle correlates of use. Use of complementary health practices was high; 40% reported using any mind/body practice and 50% reported using dietary supplements. Poorer physical health was associated with use of mind/body practices, while likelihood of meeting fruit and vegetable recommendations was significantly associated with dietary supplement use. Complementary health practices were used heavily in a church-based sample of African American adults. Poorer physical health was associated with use of complementary health practices, yet users also displayed health conscious behaviors. Given the high engagement in complementary health practices, it may be prudent to consider adapting complementary health approaches for use in wellness interventions targeting African Americans in faith-based settings.

  19. Multiparty quantum key agreement protocol based on locally indistinguishable orthogonal product states

    NASA Astrophysics Data System (ADS)

    Jiang, Dong-Huan; Xu, Guang-Bao

    2018-07-01

    Based on locally indistinguishable orthogonal product states, we propose a novel multiparty quantum key agreement (QKA) protocol. In this protocol, the private key information of each party is encoded as some orthogonal product states that cannot be perfectly distinguished by local operations and classical communications. To ensure the security of the protocol with small amount of decoy particles, the different particles of each product state are transmitted separately. This protocol not only can make each participant fairly negotiate a shared key, but also can avoid information leakage in the maximum extent. We give a detailed security proof of this protocol. From comparison result with the existing QKA protocols, we can know that the new protocol is more efficient.

  20. Comparison of prostaglandin- and progesterone-based protocols for timed artificial insemination in sheep.

    PubMed

    Olivera-Muzante, J; Fierro, S; López, V; Gil, J

    2011-04-15

    The objective was to compare the reproductive performance of a new PGF(2α)-based timed artificial insemination (TAI) protocol in sheep (Synchrovine®: two doses of PGF(2α), 7 d apart) to a traditional progesterone-eCG (P4-eCG) protocol, considering the effects of seminal state, AI-times, and AI-pathway. Three experiments involving 1297 multiparous Australian Merino ewes were done during the physiologic breeding season (location 32 °S-57 °W). Reproductive performance was assessed as non-return rate to service 21 d after AI (NRR21d), based on detection with androgenized wethers, as well as Fertility (pregnant/inseminated ewes), Prolificacy (fetuses/pregnant ewe), and Fecundity (fetuses/inseminated ewe), which were based on transabdominal ultrasonography 50 d after TAI. In Experiment 1, Synchrovine® treated ewes TAI cervically with fresh semen at 42, 48, or 54 h had similar NRR21d (0.51, 0.46, 0.57), Fertility (0.27, 0.31, 0.26), and Fecundity (0.29, 0.32, 0.27), all of which were lower (P < 0.05) than in a control P4-eCG group inseminated at 54 h (0.61, 0.48, 0.52, NRR21d, Fertility and Fecundity respectively). In Experiment 2, using chilled semen and cervical TAI, Synchrovine® treated ewes inseminated at 42 h yielded lower (P < 0.05) NRR21d, Fertility and Fecundity (0.28, 0.06, 0.06) compared to 48 (0.43, 0.24, 0.24) and 54 h (0.44, 0.22, 0.23). In Experiment 3 with chilled semen, Synchrovine® treated ewes TAI into the cervix at 51 or 57 h were similar in NRR21d (0.16 vs 0.20), Fertility (0.12 vs 0.14), and Fecundity (0.12 vs 0.15), respectively; but lower (P < 0.05) than P4-eCG treated ewes TAI at 54 h (0.34, 0.28, and 0.33 for NRR21d, Fertility and Fecundity respectively). Synchrovine® treated ewes intrauterine TAI at 51 or 57 h yielded similar NRR21d (0.51 vs 0.58), Fertility (0.43 vs 0.51), and Fecundity (0.45 vs 0.56) respectively, but lower (P < 0.05) results compared to P4-eCG treated ewes (0.75, 0.71, and 0.88 for NRR21d, Fertility and Fecundity

  1. Toward Synthesis, Analysis, and Certification of Security Protocols

    NASA Technical Reports Server (NTRS)

    Schumann, Johann

    2004-01-01

    Implemented security protocols are basically pieces of software which are used to (a) authenticate the other communication partners, (b) establish a secure communication channel between them (using insecure communication media), and (c) transfer data between the communication partners in such a way that these data only available to the desired receiver, but not to anyone else. Such an implementation usually consists of the following components: the protocol-engine, which controls in which sequence the messages of the protocol are sent over the network, and which controls the assembly/disassembly and processing (e.g., decryption) of the data. the cryptographic routines to actually encrypt or decrypt the data (using given keys), and t,he interface to the operating system and to the application. For a correct working of such a security protocol, all of these components must work flawlessly. Many formal-methods based techniques for the analysis of a security protocols have been developed. They range from using specific logics (e.g.: BAN-logic [4], or higher order logics [12] to model checking [2] approaches. In each approach, the analysis tries to prove that no (or at least not a modeled intruder) can get access to secret data. Otherwise, a scenario illustrating the &tack may be produced. Despite the seeming simplicity of security protocols ("only" a few messages are sent between the protocol partners in order to ensure a secure communication), many flaws have been detected. Unfortunately, even a perfect protocol engine does not guarantee flawless working of a security protocol, as incidents show. Many break-ins and security vulnerabilities are caused by exploiting errors in the implementation of the protocol engine or the underlying operating system. Attacks using buffer-overflows are a very common class of such attacks. Errors in the implementation of exception or error handling can open up additional vulnerabilities. For example, on a website with a log-in screen

  2. Use of a web-based image reporting and tracking system for assessing abdominal imaging examination quality issues in a single practice.

    PubMed

    Rosenkrantz, Andrew B; Johnson, Evan; Sanger, Joseph J

    2015-10-01

    This article presents our local experience in the implementation of a real-time web-based system for reporting and tracking quality issues relating to abdominal imaging examinations. This system allows radiologists to electronically submit examination quality issues during clinical readouts. The submitted information is e-mailed to a designate for the given modality for further follow-up; the designate may subsequently enter text describing their response or action taken, which is e-mailed back to the radiologist. Review of 558 entries over a 6-year period demonstrated documentation of a broad range of examination quality issues, including specific issues relating to protocol deviation, post-processing errors, positioning errors, artifacts, and IT concerns. The most common issues varied among US, CT, MRI, radiography, and fluoroscopy. In addition, the most common issues resulting in a patient recall for repeat imaging (generally related to protocol deviation in MRI and US) were identified. In addition to submitting quality problems, radiologists also commonly used the tool to provide recognition of a well-performed examination. An electronic log of actions taken in response to radiologists' submissions indicated that both positive and negative feedback were commonly communicated to the performing technologist. Information generated using the tool can be used to guide subsequent quality improvement initiatives within a practice, including continued protocol standardization as well as education of technologists in the optimization of abdominal imaging examinations.

  3. Study protocol for a pragmatic randomised controlled trial evaluating efficacy of a smoking cessation e-'Tabac Info Service': ee-TIS trial.

    PubMed

    Cambon, L; Bergman, P; Le Faou, Al; Vincent, I; Le Maitre, B; Pasquereau, A; Arwidson, P; Thomas, D; Alla, F

    2017-02-24

    A French national smoking cessation service, Tabac Info Service, has been developed to provide an adapted quitline and a web and mobile application involving personalised contacts (eg, questionnaires, advice, activities, messages) to support smoking cessation. This paper presents the study protocol of the evaluation of the application (e-intervention Tabac Info Service (e-TIS)). The primary objective is to assess the efficacy of e-TIS. The secondary objectives are to (1) describe efficacy variations with regard to users' characteristics, (2) analyse mechanisms and contextual conditions of e-TIS efficacy. The study design is a two-arm pragmatic randomised controlled trial including a process evaluation with at least 3000 participants randomised to the intervention or to the control arm (current practices). Inclusion criteria are: aged 18 years or over, current smoker, having completed the online consent forms, possessing a mobile phone with android or apple systems and using mobile applications, wanting to stop smoking sooner or later. The primary outcome is the point prevalence abstinence of 7 days at 6 months later. Data will be analysed in intention to treat (primary) and per protocol analyses. A logistic regression will be carried out to estimate an OR (95% CI) for efficacy. A multivariate multilevel analysis will explore the influence on results of patients' characteristics (sex, age, education and socioprofessional levels, dependency, motivation, quit experiences) and contextual factors, conditions of use, behaviour change techniques. The study protocol was reviewed by the ethical and deontological institutional review board of the French Institute for Public Health Surveillance on 18 April 2016. The findings of this study will allow us to characterise the efficacy of e-TIS and conditions of its efficacy. These findings will be disseminated through peer-reviewed articles. NCT02841683; Pre-results. Published by the BMJ Publishing Group Limited. For

  4. Web-Based Intelligent E-Learning Systems: Technologies and Applications

    ERIC Educational Resources Information Center

    Ma, Zongmin

    2006-01-01

    Collecting and presenting the latest research and development results from the leading researchers in the field of e-learning systems, Web-Based Intelligent E-Learning Systems: Technologies and Applications provides a single record of current research and practical applications in Web-based intelligent e-learning systems. This book includes major…

  5. Prakriti-based research: Good reporting practices.

    PubMed

    Bhalerao, Supriya; Patwardhan, Kishor

    2016-03-01

    The recent advances in the fields of genomics, personalized medicine, and Ayurveda have motivated many researchers to look at the relationship between Prakriti (phenotype-based Ayurveda constitution) and various objective biological parameters. As a result, a number of studies reporting such a relationship have made their way into mainstream scholarly journals. However, when it comes to the protocols that these workers follow to identify one's Prakriti, there are several issues that are yet to be resolved. In this communication, we propose a few reporting practices that such workers are required to be encouraged to follow, while submitting their work on Prakriti to scholarly journals. We have arranged this proposal under the following domains that may serve as a preliminary checklist in this context: The textual references, validation process, assessment of characters, scoring pattern, weightage assignment, criterion for expressing the final Prakriti type, and a need to publish the complete Prakriti-determination tool. We advocate that only if the workers in the field adhere to these good reporting practices, one will be able to draw meaningful, generalizable, and applicable interpretations out of such studies. We also suggest that the editors of relevant scholarly journals may recommend these reporting practices while considering such reports for publication. Copyright © 2016 Transdisciplinary University, Bangalore and World Ayurveda Foundation. Published by Elsevier B.V. All rights reserved.

  6. Experimental eavesdropping attack against Ekert's protocol based on Wigner's inequality

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Bovino, F. A.; Colla, A. M.; Castagnoli, G.

    2003-09-01

    We experimentally implemented an eavesdropping attack against the Ekert protocol for quantum key distribution based on the Wigner inequality. We demonstrate a serious lack of security of this protocol when the eavesdropper gains total control of the source. In addition we tested a modified Wigner inequality which should guarantee a secure quantum key distribution.

  7. DT&E Forum for Best Practices and Lessons Learned

    DTIC Science & Technology

    2013-05-01

    E A N A L Y S E S IDA Paper P-4975 DT&E Forum for Best Practices and Lessons Learned L. B. Scheiber, Project Leader...and accessing from the DT&E Forum website. A. Collection of Lessons Learned and Best Practices We began the effort by reviewing approximately 30...Forum’s Home Page 1. Searching for BPLL Documents The DT&E Forum website contains DT&E Best Practice and Lessons Learned (BPLL) documents along with the

  8. Protocols for the dosimetry of high-energy photon and electron beams: a comparison of the IAEA TRS-398 and previous international Codes of Practice

    NASA Astrophysics Data System (ADS)

    Andreo, Pedro; Saiful Huq, M.; Westermark, Mathias; Song, Haijun; Tilikidis, Aris; DeWerd, Larry; Shortt, Ken

    2002-09-01

    A new international Code of Practice for radiotherapy dosimetry co-sponsored by several international organizations has been published by the IAEA, TRS-398. It is based on standards of absorbed dose to water, whereas previous protocols (TRS-381 and TRS-277) were based on air kerma standards. To estimate the changes in beam calibration caused by the introduction of TRS-398, a detailed experimental comparison of the dose determination in reference conditions in high-energy photon and electron beams has been made using the different IAEA protocols. A summary of the formulation and reference conditions in the various Codes of Practice, as well as of their basic data, is presented first. Accurate measurements have been made in 25 photon and electron beams from 10 clinical accelerators using 12 different cylindrical and plane-parallel chambers, and dose ratios under different conditions of TRS-398 to the other protocols determined. A strict step-by-step checklist was followed by the two participating clinical institutions to ascertain that the resulting calculations agreed within tenths of a per cent. The maximum differences found between TRS-398 and the previous Codes of Practice TRS-277 (2nd edn) and TRS-381 are of the order of 1.5-2.0%. TRS-398 yields absorbed doses larger than the previous protocols, around 1.0% for photons (TRS-277) and for electrons (TRS-381 and TRS-277) when plane-parallel chambers are cross-calibrated. For the Markus chamber, results show a very large variation, although a fortuitous cancellation of the old stopping powers with the ND,w/NK ratios makes the overall discrepancy between TRS-398 and TRS-277 in this case smaller than for well-guarded plane-parallel chambers. Chambers of the Roos-type with a 60Co ND,w calibration yield the maximum discrepancy in absorbed dose, which varies between 1.0% and 1.5% for TRS-381 and between 1.5% and 2.0% for TRS-277. Photon beam calibrations using directly measured or calculated TPR20,10 from a percentage

  9. A Brokering Protocol for Agent-Based Grid Resource Discovery

    NASA Astrophysics Data System (ADS)

    Kang, Jaeyong; Sim, Kwang Mong

    Resource discovery is one of the basic and key aspects in grid resource management, which aims at searching for the suitable resources for satisfying the requirement of users' applications. This paper introduces an agent-based brokering protocol which connects users and providers in grid environments. In particular, it focuses on addressing the problem of connecting users and providers. A connection algorithm that matches advertisements of users and requests from providers based on pre-specified multiple criteria is devised and implemented. The connection algorithm mainly consists of four stages: selection, evaluation, filtering, and recommendation. A series of experiments that were carried out in executing the protocol, and favorable results were obtained.

  10. Evidence-Based Language Practice

    ERIC Educational Resources Information Center

    Pollock, Eric J.

    2005-01-01

    The purpose of this paper was to examine evidence-based procedures in medicine and to demonstrate that the same protocols can be used in English language instruction. In the evidence-based methodology, studies are divided into those that address specific language problems. Integrated studies are presented as a systematic overview, meta-analysis,…

  11. Protocol Support for a New Satellite-Based Airspace Communication Network

    NASA Technical Reports Server (NTRS)

    Shang, Yadong; Hadjitheodosiou, Michael; Baras, John

    2004-01-01

    We recommend suitable transport protocols for an aeronautical network supporting Internet and data services via satellite. We study the characteristics of an aeronautical satellite hybrid network and focus on the problems that cause dramatically degraded performance of the Transport Protocol. We discuss various extensions to standard TCP that alleviate some of these performance problems. Through simulation, we identify those TCP implementations that can be expected to perform well. Based on the observation that it is difficult for an end-to-end solution to solve these problems effectively, we propose a new TCP-splitting protocol, termed Aeronautical Transport Control Protocol (AeroTCP). The main idea of this protocol is to use a fixed window for flow control and one duplicated acknowledgement (ACK) for fast recovery. Our simulation results show that AeroTCP can maintain higher utilization for the satellite link than end-to-end TCP, especially in high BER environment.

  12. Understanding clinical work practices for cross-boundary decision support in e-health.

    PubMed

    Tawfik, Hissam; Anya, Obinna; Nagar, Atulya K

    2012-07-01

    One of the major concerns of research in integrated healthcare information systems is to enable decision support among clinicians across boundaries of organizations and regional workgroups. A necessary precursor, however, is to facilitate the construction of appropriate awareness of local clinical practices, including a clinician's actual cognitive capabilities, peculiar workplace circumstances, and specific patient-centered needs based on real-world clinical contexts across work settings. In this paper, a user-centered study aimed to investigate clinical practices across three different geographical areas-the U.K., the UAE and Nigeria-is presented. The findings indicate that differences in clinical practices among clinicians are associated with differences in local work contexts across work settings, but are moderated by adherence to best practice guidelines and the need for patient-centered care. The study further reveals that an awareness especially of the ontological, stereotypical, and situated practices plays a crucial role in adapting knowledge for cross-boundary decision support. The paper then outlines a set of design guidelines for the development of enterprise information systems for e-health. Based on the guidelines, the paper proposes the conceptual design of CaDHealth, a practice-centered framework for making sense of clinical practices across work settings for effective cross-boundary e-health decision support.

  13. Development of pig welfare assessment protocol integrating animal-, environment-, and management-based measures.

    PubMed

    Renggaman, Anriansyah; Choi, Hong L; Sudiarto, Sartika Ia; Alasaarela, Laura; Nam, Ok S

    2015-01-01

    Due to increased interest in animal welfare, there is now a need for a comprehensive assessment protocol to be used in intensive pig farming systems. There are two current welfare assessment protocols for pigs: Welfare Quality® Assessment Protocols (applicable in the Europe Union), that mostly focuses on animal-based measures, and the Swine Welfare Assurance Program (applicable in the United States), that mostly focuses on management- and environment-based measures. In certain cases, however, animal-based measures might not be adequate for properly assessing pig welfare status. Similarly, welfare assessment that relies only on environment- and management-based measures might not represent the actual welfare status of pigs. Therefore, the objective of this paper was to develop a new welfare protocol by integrating animal-, environment-, and management-based measures. The background for selection of certain welfare criteria and modification of the scoring systems from existing welfare assessment protocols are described. The developed pig welfare assessment protocol consists of 17 criteria that are related to four main principles of welfare (good feeding, good housing, good health, and appropriate behavior). Good feeding, good housing, and good health were assessed using a 3-point scale: 0 (good welfare), 1 (moderate welfare), and 2 (poor welfare). In certain cases, only a 2-point scale was used: 0 (certain condition is present) or 2 (certain condition is absent). Appropriate behavior was assessed by scan sampling of positive and negative social behaviors based on qualitative behavior assessment and human-animal relationship tests. Modification of the body condition score into a 3-point scale revealed pigs with a moderate body condition (score 1). Moreover, additional criteria such as feed quality confirmed that farms had moderate (score 1) or poor feed quality (score 2), especially those farms located in a high relative humidity region. The developed protocol can be

  14. eLearning Hands-On: Blending Interactive eLearning with Practical Engineering Laboratory

    ERIC Educational Resources Information Center

    Kiravu, Cheddi; Yanev, Kamen M.; Tunde, Moses O.; Jeffrey, Anna M.; Schoenian, Dirk; Renner, Ansel

    2016-01-01

    Purpose: Integrating laboratory work into interactive engineering eLearning contents augments theory with practice while simultaneously ameliorating the apparent theory-practice gap in traditional eLearning. The purpose of this paper is to assess and recommend media that currently fulfil this desirable dual pedagogical goal.…

  15. In-memory interconnect protocol configuration registers

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Cheng, Kevin Y.; Roberts, David A.

    Systems, apparatuses, and methods for moving the interconnect protocol configuration registers into the main memory space of a node. The region of memory used for storing the interconnect protocol configuration registers may also be made cacheable to reduce the latency of accesses to the interconnect protocol configuration registers. Interconnect protocol configuration registers which are used during a startup routine may be prefetched into the host's cache to make the startup routine more efficient. The interconnect protocol configuration registers for various interconnect protocols may include one or more of device capability tables, memory-side statistics (e.g., to support two-level memory data mappingmore » decisions), advanced memory and interconnect features such as repair resources and routing tables, prefetching hints, error correcting code (ECC) bits, lists of device capabilities, set and store base address, capability, device ID, status, configuration, capabilities, and other settings.« less

  16. The Effects of Practice-Based Training on Graduate Teaching Assistants' Classroom Practices.

    PubMed

    Becker, Erin A; Easlon, Erin J; Potter, Sarah C; Guzman-Alvarez, Alberto; Spear, Jensen M; Facciotti, Marc T; Igo, Michele M; Singer, Mitchell; Pagliarulo, Christopher

    2017-01-01

    Evidence-based teaching is a highly complex skill, requiring repeated cycles of deliberate practice and feedback to master. Despite existing well-characterized frameworks for practice-based training in K-12 teacher education, the major principles of these frameworks have not yet been transferred to instructor development in higher educational contexts, including training of graduate teaching assistants (GTAs). We sought to determine whether a practice-based training program could help GTAs learn and use evidence-based teaching methods in their classrooms. We implemented a weekly training program for introductory biology GTAs that included structured drills of techniques selected to enhance student practice, logic development, and accountability and reduce apprehension. These elements were selected based on their previous characterization as dimensions of active learning. GTAs received regular performance feedback based on classroom observations. To quantify use of target techniques and levels of student participation, we collected and coded 160 h of video footage. We investigated the relationship between frequency of GTA implementation of target techniques and student exam scores; however, we observed no significant relationship. Although GTAs adopted and used many of the target techniques with high frequency, techniques that enforced student participation were not stably adopted, and their use was unresponsive to formal feedback. We also found that techniques discussed in training, but not practiced, were not used at quantifiable frequencies, further supporting the importance of practice-based training for influencing instructional practices. © 2017 E. A. Becker et al. CBE—Life Sciences Education © 2017 The American Society for Cell Biology. This article is distributed by The American Society for Cell Biology under license from the author(s). It is available to the public under an Attribution–Noncommercial–Share Alike 3.0 Unported Creative Commons License

  17. Adaptive low-power listening MAC protocol based on transmission rates.

    PubMed

    Hwang, Kwang-il; Yi, Gangman

    2014-01-01

    Even though existing low-power listening (LPL) protocols have enabled ultra-low-power operation in wireless sensor networks (WSN), they do not address trade-off between energy and delay, since they focused only on energy aspect. However, in recent years, a growing interest in various WSN applications is requiring new design factors, such as minimum delay and higher reliability, as well as energy efficiency. Therefore, in this paper we propose a novel sensor multiple access control (MAC) protocol, transmission rate based adaptive low-power listening MAC protocol (TRA-MAC), which is a kind of preamble-based LPL but is capable of controlling preamble sensing cycle adaptively to transmission rates. Through experiments, it is demonstrated that TRA-MAC enables LPL cycle (LC) and preamble transmission length to adapt dynamically to varying transmission rates, compensating trade-off between energy and response time.

  18. Insecurity of position-based quantum-cryptography protocols against entanglement attacks

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Lau, Hoi-Kwan; Lo, Hoi-Kwong

    2011-01-15

    Recently, position-based quantum cryptography has been claimed to be unconditionally secure. On the contrary, here we show that the existing proposals for position-based quantum cryptography are, in fact, insecure if entanglement is shared among two adversaries. Specifically, we demonstrate how the adversaries can incorporate ideas of quantum teleportation and quantum secret sharing to compromise the security with certainty. The common flaw to all current protocols is that the Pauli operators always map a codeword to a codeword (up to an irrelevant overall phase). We propose a modified scheme lacking this property in which the same cheating strategy used to underminemore » the previous protocols can succeed with a rate of at most 85%. We prove the modified protocol is secure when the shared quantum resource between the adversaries is a two- or three-level system.« less

  19. DCBRP: a deterministic chain-based routing protocol for wireless sensor networks.

    PubMed

    Marhoon, Haydar Abdulameer; Mahmuddin, M; Nor, Shahrudin Awang

    2016-01-01

    Wireless sensor networks (WSNs) are a promising area for both researchers and industry because of their various applications The sensor node expends the majority of its energy on communication with other nodes. Therefore, the routing protocol plays an important role in delivering network data while minimizing energy consumption as much as possible. The chain-based routing approach is superior to other approaches. However, chain-based routing protocols still expend substantial energy in the Chain Head (CH) node. In addition, these protocols also have the bottleneck issues. A novel routing protocol which is Deterministic Chain-Based Routing Protocol (DCBRP). DCBRP consists of three mechanisms: Backbone Construction Mechanism, Chain Head Selection (CHS), and the Next Hop Connection Mechanism. The CHS mechanism is presented in detail, and it is evaluated through comparison with the CCM and TSCP using an ns-3 simulator. It show that DCBRP outperforms both CCM and TSCP in terms of end-to-end delay by 19.3 and 65%, respectively, CH energy consumption by 18.3 and 23.0%, respectively, overall energy consumption by 23.7 and 31.4%, respectively, network lifetime by 22 and 38%, respectively, and the energy*delay metric by 44.85 and 77.54%, respectively. DCBRP can be used in any deterministic node deployment applications, such as smart cities or smart agriculture, to reduce energy depletion and prolong the lifetimes of WSNs.

  20. Practical quantum retrieval games

    NASA Astrophysics Data System (ADS)

    Arrazola, Juan Miguel; Karasamanis, Markos; Lütkenhaus, Norbert

    2016-06-01

    Complex cryptographic protocols are often constructed from simpler building blocks. In order to advance quantum cryptography, it is important to study practical building blocks that can be used to develop new protocols. An example is quantum retrieval games (QRGs), which have broad applicability and have already been used to construct quantum money schemes. In this work, we introduce a general construction of quantum retrieval games based on the hidden matching problem and show how they can be implemented in practice using available technology. More precisely, we provide a general method to construct (1-out-of-k ) QRGs, proving that their cheating probabilities decrease exponentially in k . In particular, we define QRGs based on coherent states of light, which can be implemented even in the presence of experimental imperfections. Our results constitute a tool in the arsenal of the practical quantum cryptographer.

  1. Is Reading Instruction Evidence-Based? Analyzing Teaching Practices Using T-Patterns.

    PubMed

    Suárez, Natalia; Sánchez, Carmen R; Jiménez, Juan E; Anguera, M Teresa

    2018-01-01

    The main goal of this study was to analyze whether primary teachers use evidence-based reading instruction for primary-grade readers. The study sample consisted of six teachers whose teaching was recorded. The observation instrument used was developed ad hoc for this study. The recording instrument used was Match Vision Studio. The data analysis was performed using SAS, GT version 2.0 E, and THEME. The results indicated that the teaching practices used most frequently and for the longest duration were: feedback (i.e., correcting the student when reading); fluency (i.e., individual and group reading, both out loud and silently, with and without intonation); literal or inference comprehension exercises (i.e., summarizing, asking questions); and use of educational resources (i.e., stories, songs, poems). Later, we conducted analyses of T-Patterns that showed the sequence of instruction in detail. We can conclude that <50% of the teaching practices used by the majority of teachers were based on the recommendations of the National Reading Panel (NRP). Only one teacher followed best practices. The same was the case for instructional time spent on the five essential components of reading, with the exception of teacher E., who dedicated 70.31% of class time implementing best practices. Teaching practices (i.e., learners' activities) designed and implemented to exercise and master alphabetic knowledge and phonological awareness skills were used less frequently in the classroom.

  2. Cases on Global E-Learning Practices: Successes and Pitfalls

    ERIC Educational Resources Information Center

    Sharma, Ramesh C., Ed.; Mishra, Sanjaya, Ed.

    2007-01-01

    "Cases on Global E-Learning Practices: Successes and Pitfalls" looks into global practices of e-learning, examining the successes and failures of e-learning professionals. It provides a judicious mix of practical experiences and research in the form of case studies. Written by experts from all over the globe, this book shows how to…

  3. Diffusion of Evidence-based Intensive Care Unit Organizational Practices. A State-Wide Analysis.

    PubMed

    Kohn, Rachel; Madden, Vanessa; Kahn, Jeremy M; Asch, David A; Barnato, Amber E; Halpern, Scott D; Kerlin, Meeta Prasad

    2017-02-01

    Several intensive care unit (ICU) organizational practices have been associated with improved patient outcomes. However, the uptake of these evidence-based practices is unknown. To assess diffusion of ICU organizational practices across the state of Pennsylvania. We conducted two web-based, cross-sectional surveys of ICU organizational practices in Pennsylvania acute care hospitals, in 2005 (chief nursing officer respondents) and 2014 (ICU nurse manager respondents). Of 223 eligible respondents, nurse managers from 136 (61%) medical, surgical, mixed medical-surgical, cardiac, and specialty ICUs in 98 hospitals completed the 2014 survey, compared with 124 of 164 (76%) chief nursing officers in the 2005 survey. In 2014, daytime physician staffing models varied widely, with 23 of 136 (17%) using closed models and 33 (24%) offering no intensivist staffing. Nighttime intensivist staffing was used in 37 (27%) ICUs, 38 (28%) used nonintensivist attending staffing, and 24 (18%) had no nighttime attending physicians. Daily multidisciplinary rounds occurred in 93 (68%) ICUs. Regular participants included clinical pharmacists in 68 of 93 (73%) ICUs, respiratory therapists in 62 (67%), and advanced practitioners in 37 (39%). Patients and family members participated in rounds in 36 (39%) ICUs. Clinical protocols or checklists for mechanically ventilated patients were available in 128 of 133 (96%) ICUs, low tidal volume ventilation for acute respiratory distress syndrome in 54 of 132 (41%) ICUs, prone positioning for severe acute respiratory distress syndrome in 37 of 134 (28%) ICUs, and family meetings in 19 of 134 (14%) ICUs. Among 61 ICUs that responded to both surveys, there was a significant increase in the proportion of ICUs using nighttime in-ICU attending physicians (23 [38%] in 2005 vs. 30 [49%] in 2014; P = 0.006). The diffusion of evidence-based ICU organizational practices has been variable across the state of Pennsylvania. Only half of Pennsylvania ICUs have

  4. A Practical Protocol for Situating Evidence-Based Mental Health Programs and Practices within School-Wide Positive Behavioral Interventions and Supports

    ERIC Educational Resources Information Center

    Runge, Timothy J.; Knoster, Timothy P.; Moerer, Deanna; Breinich, Todd; Palmiero, James

    2017-01-01

    Schools have limited experience and little guidance to identify and install evidence-based and promising programs and practices/interventions (EBPs) within advanced tiers of School-Wide Positive Behavioral Intervention and Supports (SWPBIS). One form of guidance is the Hexagon Tool which can be used to ensure a match between the EBP and student…

  5. Taking the Politics Out of Satellite and Space-Based Communications Protocols

    NASA Technical Reports Server (NTRS)

    Ivancic, William D.

    2006-01-01

    After many years of studies, experimentation, and deployment, large amounts of misinformation and misconceptions remain regarding applicability of various communications protocols for use in satellite and space-based networks. This paper attempts to remove much of the politics, misconceptions, and misinformation that have plagued spacebased communications protocol development and deployment. This paper provides a common vocabulary for communications; a general discussion of the requirements for various communication environments; an evaluation of tradeoffs between circuit and packet-switching technologies, and the pros and cons of various link, network, transport, application, and security protocols. Included is the applicability of protocol enhancing proxies to NASA, Department of Defense (DOD), and commercial space communication systems.

  6. Maintaining Perioperative Normothermia: Sustaining an Evidence-Based Practice Improvement Project.

    PubMed

    Levin, Rona F; Wright, Fay; Pecoraro, Kathleen; Kopec, Wendy

    2016-02-01

    Unintentional perioperative hypothermia has been shown to cause serious patient complications and, thus, to increase health care costs. In 2009, an evidence-based practice improvement project produced a significant decrease in unintentional perioperative hypothermia in colorectal surgical patients through monitoring of OR ambient room temperature. Project leaders engaged all interdisciplinary stakeholders in the original project, which facilitated the sustainability of the intervention method. An important aspect of sustainability is ongoing monitoring and evaluation of a new intervention method. Therefore, continued evaluation of outcomes of the protocol developed in 2009 was scheduled at specific time points after the initial small test of change with colorectal patients. This article focuses on how attention to sustainability factors during implementation of an improvement project led to the sustainability of a protocol for monitoring OR ambient room temperature with all types of surgical patients five years after the initial project. Copyright © 2016 AORN, Inc. Published by Elsevier Inc. All rights reserved.

  7. A survey on the taxonomy of cluster-based routing protocols for homogeneous wireless sensor networks.

    PubMed

    Naeimi, Soroush; Ghafghazi, Hamidreza; Chow, Chee-Onn; Ishii, Hiroshi

    2012-01-01

    The past few years have witnessed increased interest among researchers in cluster-based protocols for homogeneous networks because of their better scalability and higher energy efficiency than other routing protocols. Given the limited capabilities of sensor nodes in terms of energy resources, processing and communication range, the cluster-based protocols should be compatible with these constraints in either the setup state or steady data transmission state. With focus on these constraints, we classify routing protocols according to their objectives and methods towards addressing the shortcomings of clustering process on each stage of cluster head selection, cluster formation, data aggregation and data communication. We summarize the techniques and methods used in these categories, while the weakness and strength of each protocol is pointed out in details. Furthermore, taxonomy of the protocols in each phase is given to provide a deeper understanding of current clustering approaches. Ultimately based on the existing research, a summary of the issues and solutions of the attributes and characteristics of clustering approaches and some open research areas in cluster-based routing protocols that can be further pursued are provided.

  8. A New QKD Protocol Based upon Authentication by EPR Entanglement State

    NASA Astrophysics Data System (ADS)

    Abushgra, Abdulbast A.

    Cryptographic world has faced multiple challenges that are included in encoding and decoding transmitting information into a secure communication channel. Quantum cryptography may be another generation of the cryptography world, which is based on the law of physics. After decades of using the classical cryptography, there is an essential need to move a step forward through the most trusted systems, especially enormous amount of data flows through billions of communicating channels (e.g. The internet), and keeping this transmitting information away from eavesdropping is obligatory. Moreover, quantum cryptography has proved its standing against many weaknesses in the classical cryptography. One of these weaknesses is the ability to copy any type of information using a passive attack without an interruption, which is impossible in the quantum system. Theoretically, several quantum observables are utilized to diagnose an action of one particle. These observables are included in measuring mass, movement, speed, etc. The polarization of one photon occurs normally and randomly in the space. Any interruption that happens during sending of a light will cause a deconstruction of the light polarization. Therefore, particles' movement in a three-dimensional space is supported by Non-Cloning theory that makes eavesdroppers unable to interrupt a communication system. In case an eavesdropper tried to interrupt a photon, the photon will be destroyed after passing the photon into a quantum detector or any measurement device. In the last decades, many Quantum Key Distribution (QKD) protocols have been created to initiate a secret key during encoding and decoding transmitted data operations. Some of these protocols were proven un-secure based on the quantum attacks that were released early. Even though the power of physics is still active and the Non-Cloning theory is unbroken, some QKD protocols failed during the security measurements. The main reason of the failure is based on the

  9. Calibration and data collection protocols for reliable lattice parameter values in electron pair distribution function (ePDF) studies

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Abeykoon, A. M. Milinda; Hu, Hefei; Wu, Lijun

    2015-02-01

    We explore and describe different protocols for calibrating electron pair distribution function (ePDF) measurements for quantitative studies on nano-materials. We find the most accurate approach to determine the camera-length is to use a standard calibration sample of Au nanoparticles from National Institute of Standards and Technology. Different protocols for data collection are also explored, as are possible operational errors, to find the best approaches for accurate data collection for quantitative ePDF studies.

  10. Randomised controlled trial of a web-based programme in sustaining best practice alcohol management practices at community sports clubs: a study protocol

    PubMed Central

    McFadyen, Tameka; Kingsland, Melanie; Tindall, Jennifer; Rowland, Bosco; Sherker, Shauna; Gillham, Karen; Heaton, Rachael; Clinton-McHarg, Tara; Lecathelinais, Christophe; Brooke, Daisy; Wiggers, John

    2018-01-01

    Introduction Community-based interventions have been found to effectively increase the implementation of alcohol management practices and reduce excessive alcohol use and alcohol-related harm at sports clubs. However, once implementation support ceases there may be a reduction in such intervention effects. Thus, ongoing contribution to improving the health of the community is diminished; sustaining practice implementation is a key determinant to address this. One possible solution to the strategic and logistical challenges of sustainability involves the use of the web. The primary aim of this study is to assess the effectiveness of a web-based programme in sustaining the implementation of alcohol management practices by community football clubs. The secondary aim is to assess the effectiveness of the programme in preventing excessive alcohol consumption and alcohol-related harm among members of community football clubs. Methods and analysis The study will employ a repeat randomised controlled trial design and be conducted in regional and metropolitan areas within two states of Australia. Community level football clubs who are currently accredited with an existing alcohol management programme (‘Good Sports’) and implementing at least 10 of the 13 core alcohol management practices (eg, not serving alcohol to <18-year-olds) required by the programme will be recruited and randomised to either a web-based sustainability programme or a ‘minimal contact’ programme. The primary outcome measures are the proportion of football clubs implementing ≥10 of the 13 required alcohol management practices and the mean number of those practices being implemented at 3-year follow-up. Secondary outcomes include: the proportion of club members who report risky drinking at their club, the Alcohol Use Disorder Identification Test (AUDIT) score and mean AUDIT score of club members. Outcome data will be collected via observation at the club during a 1-day visit to a home game

  11. Developing an Anti-Xa-Based Anticoagulation Protocol for Patients with Percutaneous Ventricular Assist Devices.

    PubMed

    Sieg, Adam; Mardis, B Andrew; Mardis, Caitlin R; Huber, Michelle R; New, James P; Meadows, Holly B; Cook, Jennifer L; Toole, J Matthew; Uber, Walter E

    2015-01-01

    Because of the complexities associated with anticoagulation in temporary percutaneous ventricular assist device (pVAD) recipients, a lack of standardization exists in their management. This retrospective analysis evaluates current anticoagulation practices at a single center with the aim of identifying an optimal anticoagulation strategy and protocol. Patients were divided into two cohorts based on pVAD implanted (CentriMag (Thoratec; Pleasanton, CA) / TandemHeart (CardiacAssist; Pittsburgh, PA) or Impella (Abiomed, Danvers, MA)), with each group individually analyzed for bleeding and thrombotic complications. Patients in the CentriMag/TandemHeart cohort were subdivided based on the anticoagulation monitoring strategy (activated partial thromboplastin time (aPTT) or antifactor Xa unfractionated heparin (anti-Xa) values). In the CentriMag/TandemHeart cohort, there were five patients with anticoagulation titrated based on anti-Xa values; one patient developed a device thrombosis and a major bleed, whereas another patient experienced major bleeding. Eight patients received an Impella pVAD. Seven total major bleeds in three patients and no thrombotic events were detected. Based on distinct differences between the devices, anti-Xa values, and outcomes, two protocols were created to guide anticoagulation adjustments. However, anticoagulation in patients who require pVAD support is complex with constantly evolving anticoagulation goals. The ideal level of anticoagulation should be individually determined using several coagulation laboratory parameters in concert with hemodynamic changes in the patient's clinical status, the device, and the device cannulation.

  12. Multiprofissional electronic protocol in ophtalmology with enfasis in strabismus.

    PubMed

    Ribeiro, Christie Graf; Moreira, Ana Tereza Ramos; Pinto, José Simão DE Paula; Malafaia, Osvaldo

    2016-01-01

    to create and validate an electronic database in ophthalmology focused on strabismus, to computerize this database in the form of a systematic data collection software named Electronic Protocol, and to incorporate this protocol into the Integrated System of Electronic Protocols (SINPE(c)). this is a descriptive study, with the methodology divided into three phases: (1) development of a theoretical ophthalmologic database with emphasis on strabismus; (2) computerization of this theoretical ophthalmologic database using SINPE(c) and (3) interpretation of the information with demonstration of results to validate the protocol. We inputed data from the charts of fifty patients with known strabismus through the Electronic Protocol for testing and validation. the new electronic protocol was able to store information regarding patient history, physical examination, laboratory exams, imaging results, diagnosis and treatment of patients with ophthalmologic diseases, with emphasis on strabismus. We included 2,141 items in this master protocol and created 20 new specific electronic protocols for strabismus, each with its own specifics. Validation was achieved through correlation and corroboration of the symptoms and confirmed diagnoses of the fifty included patients with the diagnostic criteria for the twenty new strabismus protocols. a new, validated electronic database focusing on ophthalmology, with emphasis on strabismus, was successfully created through the standardized collection of information, and computerization of the database using proprietary software. This protocol is ready for deployment to facilitate data collection, sorting and application for practitioners and researchers in numerous specialties. criar uma base eletrônica de dados em oftalmologia com ênfase em estrabismo através da coleta padronizada de informações. Informatizar esta base sob a forma de software para a coleta sistemática de dados chamado "Protocolo Eletrônico" e incorporar este

  13. Cheating and Anti-Cheating in Gossip-Based Protocol: An Experimental Investigation

    NASA Astrophysics Data System (ADS)

    Xiao, Xin; Shi, Yuanchun; Tang, Yun; Zhang, Nan

    During recent years, there has been a rapid growth in deployment of gossip-based protocol in many multicast applications. In a typical gossip-based protocol, each node acts as dual roles of receiver and sender, independently exchanging data with its neighbors to facilitate scalability and resilience. However, most of previous work in this literature seldom considered cheating issue of end users, which is also very important in face of the fact that the mutual cooperation inherently determines overall system performance. In this paper, we investigate the dishonest behaviors in decentralized gossip-based protocol through extensive experimental study. Our original contributions come in two-fold: In the first part of cheating study, we analytically discuss two typical cheating strategies, that is, intentionally increasing subscription requests and untruthfully calculating forwarding probability, and further evaluate their negative impacts. The results indicate that more attention should be paid to defending cheating behaviors in gossip-based protocol. In the second part of anti-cheating study, we propose a receiver-driven measurement mechanism, which evaluates individual forwarding traffic from the perspective of receivers and thus identifies cheating nodes with high incoming/outgoing ratio. Furthermore, we extend our mechanism by introducing reliable factor to further improve its accuracy. The experiments under various conditions show that it performs quite well in case of serious cheating and achieves considerable performance in other cases.

  14. Is Reading Instruction Evidence-Based? Analyzing Teaching Practices Using T-Patterns

    PubMed Central

    Suárez, Natalia; Sánchez, Carmen R.; Jiménez, Juan E.; Anguera, M. Teresa

    2018-01-01

    The main goal of this study was to analyze whether primary teachers use evidence-based reading instruction for primary-grade readers. The study sample consisted of six teachers whose teaching was recorded. The observation instrument used was developed ad hoc for this study. The recording instrument used was Match Vision Studio. The data analysis was performed using SAS, GT version 2.0 E, and THEME. The results indicated that the teaching practices used most frequently and for the longest duration were: feedback (i.e., correcting the student when reading); fluency (i.e., individual and group reading, both out loud and silently, with and without intonation); literal or inference comprehension exercises (i.e., summarizing, asking questions); and use of educational resources (i.e., stories, songs, poems). Later, we conducted analyses of T-Patterns that showed the sequence of instruction in detail. We can conclude that <50% of the teaching practices used by the majority of teachers were based on the recommendations of the National Reading Panel (NRP). Only one teacher followed best practices. The same was the case for instructional time spent on the five essential components of reading, with the exception of teacher E., who dedicated 70.31% of class time implementing best practices. Teaching practices (i.e., learners' activities) designed and implemented to exercise and master alphabetic knowledge and phonological awareness skills were used less frequently in the classroom. PMID:29449818

  15. A resident conference for systems-based practice and practice-based learning.

    PubMed

    Sultana, Carmen J; Baxter, Jason K

    2011-02-01

    Improving patient safety and quality of care is part of systems-based practice and practice-based learning for residents. We expanded our obstetrics and gynecology department's regularly scheduled morbidity and mortality conferences to teach quality assurance concepts based on patient care on obstetrics and gynecology fourth-year resident rotations. Obstetrics and gynecology fourth-year residents on one of the two rotations each presented and analyzed a systems-based problem they encountered during patient care. They used an online learning module and proposed solutions, many of which were effectively implemented. Over 5 years, case presentations from 33 conferences were available with problems identified in emergency preparedness, coordination of care, scheduling and supervision, communication, medical practice, documentation, and lack of equipment or facilities. Twenty-two of the suggested solutions were partially or totally implemented. Barriers to implementation were identified. In conclusion, a conference presentation by fourth-year residents can identify patient safety problems, aid in their resolution, and suggest changes to patient care while teaching the principles of systems-based practice and practice-based learning.

  16. Security of the arbitrated quantum signature protocols revisited

    NASA Astrophysics Data System (ADS)

    Kejia, Zhang; Dan, Li; Qi, Su

    2014-01-01

    Recently, much attention has been paid to the study of arbitrated quantum signature (AQS). Among these studies, the cryptanalysis of some AQS protocols and a series of improved ideas have been proposed. Compared with the previous analysis, we present a security criterion, which can judge whether an AQS protocol is able to prevent the receiver (i.e. one participant in the signature protocol) from forging a legal signature. According to our results, it can be seen that most AQS protocols which are based on the Zeng and Keitel (ZK) model are susceptible to a forgery attack. Furthermore, we present an improved idea of the ZK protocol. Finally, some supplement discussions and several interesting topics are provided.

  17. Protocol vulnerability detection based on network traffic analysis and binary reverse engineering.

    PubMed

    Wen, Shameng; Meng, Qingkun; Feng, Chao; Tang, Chaojing

    2017-01-01

    Network protocol vulnerability detection plays an important role in many domains, including protocol security analysis, application security, and network intrusion detection. In this study, by analyzing the general fuzzing method of network protocols, we propose a novel approach that combines network traffic analysis with the binary reverse engineering method. For network traffic analysis, the block-based protocol description language is introduced to construct test scripts, while the binary reverse engineering method employs the genetic algorithm with a fitness function designed to focus on code coverage. This combination leads to a substantial improvement in fuzz testing for network protocols. We build a prototype system and use it to test several real-world network protocol implementations. The experimental results show that the proposed approach detects vulnerabilities more efficiently and effectively than general fuzzing methods such as SPIKE.

  18. Provably-Secure (Chinese Government) SM2 and Simplified SM2 Key Exchange Protocols

    PubMed Central

    Nam, Junghyun; Kim, Moonseong

    2014-01-01

    We revisit the SM2 protocol, which is widely used in Chinese commercial applications and by Chinese government agencies. Although it is by now standard practice for protocol designers to provide security proofs in widely accepted security models in order to assure protocol implementers of their security properties, the SM2 protocol does not have a proof of security. In this paper, we prove the security of the SM2 protocol in the widely accepted indistinguishability-based Bellare-Rogaway model under the elliptic curve discrete logarithm problem (ECDLP) assumption. We also present a simplified and more efficient version of the SM2 protocol with an accompanying security proof. PMID:25276863

  19. A methodological protocol for selecting and quantifying low-value prescribing practices in routinely collected data: an Australian case study.

    PubMed

    Brett, Jonathan; Elshaug, Adam G; Bhatia, R Sacha; Chalmers, Kelsey; Badgery-Parker, Tim; Pearson, Sallie-Anne

    2017-05-03

    Growing imperatives for safety, quality and responsible resource allocation have prompted renewed efforts to identify and quantify harmful or wasteful (low-value) medical practices such as test ordering, procedures and prescribing. Quantifying these practices at a population level using routinely collected health data allows us to understand the scale of low-value medical practices, measure practice change following specific interventions and prioritise policy decisions. To date, almost all research examining health care through the low-value lens has focused on medical services (tests and procedures) rather than on prescribing. The protocol described herein outlines a program of research funded by Australia's National Health and Medical Research Council to select and quantify low-value prescribing practices within Australian routinely collected health data. We start by describing our process for identifying and cataloguing international low-value prescribing practices. We then outline our approach to translate these prescribing practices into indicators that can be applied to Australian routinely collected health data. Next, we detail methods of using Australian health data to quantify these prescribing practices (e.g. prevalence of low-value prescribing and related costs) and their downstream health consequences. We have approval from the necessary Australian state and commonwealth human research ethics and data access committees to undertake this work. The lack of systematic and transparent approaches to quantification of low-value practices in routinely collected data has been noted in recent reviews. Here, we present a methodology applied in the Australian context with the aim of demonstrating principles that can be applied across jurisdictions in order to harmonise international efforts to measure low-value prescribing. The outcomes of this research will be submitted to international peer-reviewed journals. Results will also be presented at national and

  20. MO-E-18A-01: Imaging: Best Practices In Pediatric Imaging

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Willis, C; Strauss, K; MacDougall, R

    This imaging educational program will focus on solutions to common pediatric imaging challenges. The speakers will present collective knowledge on best practices in pediatric imaging from their experience at dedicated children's hospitals. Areas of focus will include general radiography, the use of manual and automatic dose management in computed tomography, and enterprise-wide radiation dose management in the pediatric practice. The educational program will begin with a discussion of the complexities of exposure factor control in pediatric projection radiography. Following this introduction will be two lectures addressing the challenges of computed tomography (CT) protocol optimization in the pediatric population. The firstmore » will address manual CT protocol design in order to establish a managed radiation dose for any pediatric exam on any CT scanner. The second CT lecture will focus on the intricacies of automatic dose modulation in pediatric imaging with an emphasis on getting reliable results in algorithmbased technique selection. The fourth and final lecture will address the key elements needed to developing a comprehensive radiation dose management program for the pediatric environment with particular attention paid to new regulations and obligations of practicing medical physicists. Learning Objectives: To understand how general radiographic techniques can be optimized using exposure indices in order to improve pediatric radiography. To learn how to establish diagnostic dose reference levels for pediatric patients as a function of the type of examination, patient size, and individual design characteristics of the CT scanner. To learn how to predict the patient's radiation dose prior to the exam and manually adjust technique factors if necessary to match the patient's dose to the department's established dose reference levels. To learn how to utilize manufacturer-provided automatic dose modulation technology to consistently achieve patient doses within

  1. Distance-Based and Low Energy Adaptive Clustering Protocol for Wireless Sensor Networks

    PubMed Central

    Gani, Abdullah; Anisi, Mohammad Hossein; Ab Hamid, Siti Hafizah; Akhunzada, Adnan; Khan, Muhammad Khurram

    2016-01-01

    A wireless sensor network (WSN) comprises small sensor nodes with limited energy capabilities. The power constraints of WSNs necessitate efficient energy utilization to extend the overall network lifetime of these networks. We propose a distance-based and low-energy adaptive clustering (DISCPLN) protocol to streamline the green issue of efficient energy utilization in WSNs. We also enhance our proposed protocol into the multi-hop-DISCPLN protocol to increase the lifetime of the network in terms of high throughput with minimum delay time and packet loss. We also propose the mobile-DISCPLN protocol to maintain the stability of the network. The modelling and comparison of these protocols with their corresponding benchmarks exhibit promising results. PMID:27658194

  2. Healthcare professionals' behavior, skills, knowledge and attitudes on evidence-based health practice: a protocol of cross-sectional study.

    PubMed

    Mariano, Arielly Souza; Souza, Nathan Mendes; Cavaco, Afonso; Lopes, Luciane Cruz

    2018-06-04

    In Brazil, as in most countries nowadays, there is a pursuit for healthcare quality improvement and sustainability in public and private systems. Healthcare professionals' perceptions, knowledge and attitudes determine evidence-based practice (EBP), which remain uncertain among Brazilian practitioners. A standardised national instrument whose wide use will identify gaps and flaws in establishing an EBP could contribute to an effective resources allocation from health professionals willing to use an EBP. To present a study protocol on the development and validation of an instrument to measure Brazilian healthcare professionals' behaviour, skills, self-efficacy, knowledge and attitudes towards EBP. This is a validation study with Brazilian healthcare professionals to develop a valid and reliable questionnaire, including selection of domains and formulation of questions. Construct and content validity will be assess by a panel of experts, with data collection and analysis following a Delphi-like methodology. Further, a pilot survey will be accomplished with a representative sample of different healthcare professionals from all main Brazilian regions. An exploratory factor analysis and a confirmatory factor analysis will be conducted afterwards. The ratio of χ 2 and df (χ 2 /df), comparative fit index, goodness of fit index and root mean square error of approximation will be used for assessing the model fit. In addition, the reliability of the instrument will be estimated by test-retest reproducibility and Cronbach's alpha coefficient (α). This study has received ethical approval from the Pharmaceutical Sciences Faculty of the São Paulo State University (1.425.808). The use among a wide national sample is expected to promote an extensive view of evidence-based decision-making, identifying the knowledge gaps in this area. Study findings will be circulated to healthcare professionals and scientists in the field through the publication in peer-reviewed journals and

  3. A Protocol Layer Trust-Based Intrusion Detection Scheme for Wireless Sensor Networks

    PubMed Central

    Wang, Jian; Jiang, Shuai; Fapojuwo, Abraham O.

    2017-01-01

    This article proposes a protocol layer trust-based intrusion detection scheme for wireless sensor networks. Unlike existing work, the trust value of a sensor node is evaluated according to the deviations of key parameters at each protocol layer considering the attacks initiated at different protocol layers will inevitably have impacts on the parameters of the corresponding protocol layers. For simplicity, the paper mainly considers three aspects of trustworthiness, namely physical layer trust, media access control layer trust and network layer trust. The per-layer trust metrics are then combined to determine the overall trust metric of a sensor node. The performance of the proposed intrusion detection mechanism is then analyzed using the t-distribution to derive analytical results of false positive and false negative probabilities. Numerical analytical results, validated by simulation results, are presented in different attack scenarios. It is shown that the proposed protocol layer trust-based intrusion detection scheme outperforms a state-of-the-art scheme in terms of detection probability and false probability, demonstrating its usefulness for detecting cross-layer attacks. PMID:28555023

  4. A Protocol Layer Trust-Based Intrusion Detection Scheme for Wireless Sensor Networks.

    PubMed

    Wang, Jian; Jiang, Shuai; Fapojuwo, Abraham O

    2017-05-27

    This article proposes a protocol layer trust-based intrusion detection scheme for wireless sensor networks. Unlike existing work, the trust value of a sensor node is evaluated according to the deviations of key parameters at each protocol layer considering the attacks initiated at different protocol layers will inevitably have impacts on the parameters of the corresponding protocol layers. For simplicity, the paper mainly considers three aspects of trustworthiness, namely physical layer trust, media access control layer trust and network layer trust. The per-layer trust metrics are then combined to determine the overall trust metric of a sensor node. The performance of the proposed intrusion detection mechanism is then analyzed using the t-distribution to derive analytical results of false positive and false negative probabilities. Numerical analytical results, validated by simulation results, are presented in different attack scenarios. It is shown that the proposed protocol layer trust-based intrusion detection scheme outperforms a state-of-the-art scheme in terms of detection probability and false probability, demonstrating its usefulness for detecting cross-layer attacks.

  5. A Survey on the Taxonomy of Cluster-Based Routing Protocols for Homogeneous Wireless Sensor Networks

    PubMed Central

    Naeimi, Soroush; Ghafghazi, Hamidreza; Chow, Chee-Onn; Ishii, Hiroshi

    2012-01-01

    The past few years have witnessed increased interest among researchers in cluster-based protocols for homogeneous networks because of their better scalability and higher energy efficiency than other routing protocols. Given the limited capabilities of sensor nodes in terms of energy resources, processing and communication range, the cluster-based protocols should be compatible with these constraints in either the setup state or steady data transmission state. With focus on these constraints, we classify routing protocols according to their objectives and methods towards addressing the shortcomings of clustering process on each stage of cluster head selection, cluster formation, data aggregation and data communication. We summarize the techniques and methods used in these categories, while the weakness and strength of each protocol is pointed out in details. Furthermore, taxonomy of the protocols in each phase is given to provide a deeper understanding of current clustering approaches. Ultimately based on the existing research, a summary of the issues and solutions of the attributes and characteristics of clustering approaches and some open research areas in cluster-based routing protocols that can be further pursued are provided. PMID:22969350

  6. A Concurrent Multiple Negotiation Protocol Based on Colored Petri Nets.

    PubMed

    Niu, Lei; Ren, Fenghui; Zhang, Minjie; Bai, Quan

    2017-11-01

    Concurrent multiple negotiation (CMN) provides a mechanism for an agent to simultaneously conduct more than one negotiation. There may exist different interdependency relationships among these negotiations and these interdependency relationships can impact the outcomes of these negotiations. The outcomes of these concurrent negotiations contribute together for the agent to achieve an overall negotiation goal. Handling a CMN while considering interdependency relationships among multiple negotiations is a challenging research problem. This paper: 1) comprehensively highlights research problems of negotiations at concurrent negotiation level; 2) provides a graph-based CMN model with consideration of the interdependency relationships; and 3) proposes a colored Petri net-based negotiation protocol for conducting CMNs. With the proposed protocol, a CMN can be efficiently and concurrently processed and negotiation agreements can be efficiently achieved. Experimental results indicate the effectiveness and efficiency of the proposed protocol in terms of the negotiation success rate, the negotiation time and the negotiation outcome.

  7. Development of Research-Based Protocol Aligned to Predict High Levels of Teaching Quality

    ERIC Educational Resources Information Center

    Schumacher, Gary; Grigsby, Bettye; Vesey, Winona

    2011-01-01

    This study proposes a research-based teacher selection protocol. The protocol is intended to offer school district hiring authorities a tool to identify teacher candidates with the behaviors expected to predict effective teaching. It is hypothesized that a particular series of research-based interview questions focusing on teaching behaviors in…

  8. Cost-Effective Encryption-Based Autonomous Routing Protocol for Efficient and Secure Wireless Sensor Networks.

    PubMed

    Saleem, Kashif; Derhab, Abdelouahid; Orgun, Mehmet A; Al-Muhtadi, Jalal; Rodrigues, Joel J P C; Khalil, Mohammed Sayim; Ali Ahmed, Adel

    2016-03-31

    The deployment of intelligent remote surveillance systems depends on wireless sensor networks (WSNs) composed of various miniature resource-constrained wireless sensor nodes. The development of routing protocols for WSNs is a major challenge because of their severe resource constraints, ad hoc topology and dynamic nature. Among those proposed routing protocols, the biology-inspired self-organized secure autonomous routing protocol (BIOSARP) involves an artificial immune system (AIS) that requires a certain amount of time to build up knowledge of neighboring nodes. The AIS algorithm uses this knowledge to distinguish between self and non-self neighboring nodes. The knowledge-building phase is a critical period in the WSN lifespan and requires active security measures. This paper proposes an enhanced BIOSARP (E-BIOSARP) that incorporates a random key encryption mechanism in a cost-effective manner to provide active security measures in WSNs. A detailed description of E-BIOSARP is presented, followed by an extensive security and performance analysis to demonstrate its efficiency. A scenario with E-BIOSARP is implemented in network simulator 2 (ns-2) and is populated with malicious nodes for analysis. Furthermore, E-BIOSARP is compared with state-of-the-art secure routing protocols in terms of processing time, delivery ratio, energy consumption, and packet overhead. The findings show that the proposed mechanism can efficiently protect WSNs from selective forwarding, brute-force or exhaustive key search, spoofing, eavesdropping, replaying or altering of routing information, cloning, acknowledgment spoofing, HELLO flood attacks, and Sybil attacks.

  9. Cost-Effective Encryption-Based Autonomous Routing Protocol for Efficient and Secure Wireless Sensor Networks

    PubMed Central

    Saleem, Kashif; Derhab, Abdelouahid; Orgun, Mehmet A.; Al-Muhtadi, Jalal; Rodrigues, Joel J. P. C.; Khalil, Mohammed Sayim; Ali Ahmed, Adel

    2016-01-01

    The deployment of intelligent remote surveillance systems depends on wireless sensor networks (WSNs) composed of various miniature resource-constrained wireless sensor nodes. The development of routing protocols for WSNs is a major challenge because of their severe resource constraints, ad hoc topology and dynamic nature. Among those proposed routing protocols, the biology-inspired self-organized secure autonomous routing protocol (BIOSARP) involves an artificial immune system (AIS) that requires a certain amount of time to build up knowledge of neighboring nodes. The AIS algorithm uses this knowledge to distinguish between self and non-self neighboring nodes. The knowledge-building phase is a critical period in the WSN lifespan and requires active security measures. This paper proposes an enhanced BIOSARP (E-BIOSARP) that incorporates a random key encryption mechanism in a cost-effective manner to provide active security measures in WSNs. A detailed description of E-BIOSARP is presented, followed by an extensive security and performance analysis to demonstrate its efficiency. A scenario with E-BIOSARP is implemented in network simulator 2 (ns-2) and is populated with malicious nodes for analysis. Furthermore, E-BIOSARP is compared with state-of-the-art secure routing protocols in terms of processing time, delivery ratio, energy consumption, and packet overhead. The findings show that the proposed mechanism can efficiently protect WSNs from selective forwarding, brute-force or exhaustive key search, spoofing, eavesdropping, replaying or altering of routing information, cloning, acknowledgment spoofing, HELLO flood attacks, and Sybil attacks. PMID:27043572

  10. Obstacles to Successful Implementation of eHealth Applications into Clinical Practice.

    PubMed

    Voogt, Marianne P; Opmeer, Brent C; Kastelein, Arnoud W; Jaspers, Monique W M; Peute, Linda W

    2018-01-01

    eHealth can improve healthcare worldwide, and scientific research should provide evidence on the efficacy, safety and added value of such interventions. For successful implementation of eHealth interventions into clinical practice, barriers need to be anticipated. We identified seven barriers by interviewing health professionals in the Dutch healthcare system. These barriers covered three topics: financing, human factors and organizational factors. This paper discusses their potential impact on eHealth uptake. Bridging the gap between studies to assess effective eHealth interventions and their value-based implementation in healthcare is much needed.

  11. Practical quantum private query with better performance in resisting joint-measurement attack

    NASA Astrophysics Data System (ADS)

    Wei, Chun-Yan; Wang, Tian-Yin; Gao, Fei

    2016-04-01

    As a kind of practical protocol, quantum-key-distribution (QKD)-based quantum private queries (QPQs) have drawn lots of attention. However, joint-measurement (JM) attack poses a noticeable threat to the database security in such protocols. That is, by JM attack a malicious user can illegally elicit many more items from the database than the average amount an honest one can obtain. Taking Jacobi et al.'s protocol as an example, by JM attack a malicious user can obtain as many as 500 bits, instead of the expected 2.44 bits, from a 104-bit database in one query. It is a noticeable security flaw in theory, and would also arise in application with the development of quantum memories. To solve this problem, we propose a QPQ protocol based on a two-way QKD scheme, which behaves much better in resisting JM attack. Concretely, the user Alice cannot get more database items by conducting JM attack on the qubits because she has to send them back to Bob (the database holder) before knowing which of them should be jointly measured. Furthermore, JM attack by both Alice and Bob would be detected with certain probability, which is quite different from previous protocols. Moreover, our protocol retains the good characters of QKD-based QPQs, e.g., it is loss tolerant and robust against quantum memory attack.

  12. Motor-based intervention protocols in treatment of childhood apraxia of speech (CAS)

    PubMed Central

    Maas, Edwin; Gildersleeve-Neumann, Christina; Jakielski, Kathy J.; Stoeckel, Ruth

    2014-01-01

    This paper reviews current trends in treatment for childhood apraxia of speech (CAS), with a particular emphasis on motor-based intervention protocols. The paper first briefly discusses how CAS fits into the typology of speech sound disorders, followed by a discussion of the potential relevance of principles derived from the motor learning literature for CAS treatment. Next, different motor-based treatment protocols are reviewed, along with their evidence base. The paper concludes with a summary and discussion of future research needs. PMID:25313348

  13. A two-hop based adaptive routing protocol for real-time wireless sensor networks.

    PubMed

    Rachamalla, Sandhya; Kancherla, Anitha Sheela

    2016-01-01

    One of the most important and challenging issues in wireless sensor networks (WSNs) is to optimally manage the limited energy of nodes without degrading the routing efficiency. In this paper, we propose an energy-efficient adaptive routing mechanism for WSNs, which saves energy of nodes by removing the much delayed packets without degrading the real-time performance of the used routing protocol. It uses the adaptive transmission power algorithm which is based on the attenuation of the wireless link to improve the energy efficiency. The proposed routing mechanism can be associated with any geographic routing protocol and its performance is evaluated by integrating with the well known two-hop based real-time routing protocol, PATH and the resulting protocol is energy-efficient adaptive routing protocol (EE-ARP). The EE-ARP performs well in terms of energy consumption, deadline miss ratio, packet drop and end-to-end delay.

  14. eMedOffice: a web-based collaborative serious game for teaching optimal design of a medical practice.

    PubMed

    Hannig, Andreas; Kuth, Nicole; Özman, Monika; Jonas, Stephan; Spreckelsen, Cord

    2012-10-31

    Preparing medical students for the takeover or the start-up of a medical practice is an important challenge in Germany today. Therefore, this paper presents a computer-aided serious game (eMedOffice) developed and currently in use at the RWTH Aachen University Medical School. The game is part of the attempt to teach medical students the organizational and conceptual basics of the medical practice of a general practitioner in a problem-based learning environment. This paper introduces methods and concepts used to develop the serious game and describes the results of an evaluation of the game's application in curricular courses at the Medical School. Results of the conducted evaluation gave evidence of a positive learning effect of the serious game. Educational supervisors observed strong collaboration among the players inspired by the competitive gaming aspects. In addition, an increase in willingness to learn and the exploration of new self-invented ideas were observed and valuable proposals for further prospective enhancements were elicited. A statistical analysis of the results of an evaluation provided a clear indication of the positive learning effect of the game. A usability questionnaire survey revealed a very good overall score of 4.07 (5=best, 1=worst). We consider web-based, collaborative serious games to be a promising means of improving medical education. The insights gained by the implementation of eMedOffice will promote the future development of more effective serious games for integration into curricular courses of the RWTH Aachen University Medical School.

  15. eMedOffice: A web-based collaborative serious game for teaching optimal design of a medical practice

    PubMed Central

    2012-01-01

    Background Preparing medical students for the takeover or the start-up of a medical practice is an important challenge in Germany today. Therefore, this paper presents a computer-aided serious game (eMedOffice) developed and currently in use at the RWTH Aachen University Medical School. The game is part of the attempt to teach medical students the organizational and conceptual basics of the medical practice of a general practitioner in a problem-based learning environment. This paper introduces methods and concepts used to develop the serious game and describes the results of an evaluation of the game's application in curricular courses at the Medical School. Results Results of the conducted evaluation gave evidence of a positive learning effect of the serious game. Educational supervisors observed strong collaboration among the players inspired by the competitive gaming aspects. In addition, an increase in willingness to learn and the exploration of new self-invented ideas were observed and valuable proposals for further prospective enhancements were elicited. A statistical analysis of the results of an evaluation provided a clear indication of the positive learning effect of the game. A usability questionnaire survey revealed a very good overall score of 4.07 (5=best, 1=worst). Conclusions We consider web-based, collaborative serious games to be a promising means of improving medical education. The insights gained by the implementation of eMedOffice will promote the future development of more effective serious games for integration into curricular courses of the RWTH Aachen University Medical School. PMID:23110606

  16. Pediatric First Aid Practices in Ghana: A Population-Based Survey.

    PubMed

    Gyedu, Adam; Mock, Charles; Nakua, Emmanuel; Otupiri, Easmon; Donkor, Peter; Ebel, Beth E

    2015-08-01

    Children in low- and middle-income countries (LMIC) often receive care outside the formal medical sector. Improving pre-hospital first aid has proven to be highly cost-effective in lowering trauma mortality. Few studies in LMIC have examined home first aid practices for injured children. We conducted a representative population-based survey of 200 caregivers of children under 18 years of age, representing 6520 households. Caregivers were interviewed about their first aid practices and care-seeking behaviors when a child sustained an injury at home. Injuries of interest included burns, lacerations, fractures and choking. Reported practices were characterized as recommended, low-risk, and potentially harmful. For common injuries, 75-96% of caregivers reported employing a recommended practice (e.g., running cool water over a burn injury). However, for these same injuries, 13-61% of caregivers also identified potentially harmful management strategies (e.g., applying sand to a laceration). Choking had the highest proportion (96%) of recommended first aid practice: (e.g., hitting the child's back) and the lowest percent (13%) of potentially harmful practices (e.g., attempting manual removal). Fractures had the lowest percent (75%) of recommended practices (e.g., immediately bringing the child to a health facility). Burns had the highest percent (61%) of potentially harmful practices (e.g., applying kerosene). While most caregivers were aware of helpful first aid practices to administer for a child injury, many parents also described potentially harmful practices or delays in seeking medical attention. As parents are the de facto first responders to childhood injury, there are opportunities to strengthen pre-hospital care for children in LMICs.

  17. A Network Coding Based Routing Protocol for Underwater Sensor Networks

    PubMed Central

    Wu, Huayang; Chen, Min; Guan, Xin

    2012-01-01

    Due to the particularities of the underwater environment, some negative factors will seriously interfere with data transmission rates, reliability of data communication, communication range, and network throughput and energy consumption of underwater sensor networks (UWSNs). Thus, full consideration of node energy savings, while maintaining a quick, correct and effective data transmission, extending the network life cycle are essential when routing protocols for underwater sensor networks are studied. In this paper, we have proposed a novel routing algorithm for UWSNs. To increase energy consumption efficiency and extend network lifetime, we propose a time-slot based routing algorithm (TSR).We designed a probability balanced mechanism and applied it to TSR. The theory of network coding is introduced to TSBR to meet the requirement of further reducing node energy consumption and extending network lifetime. Hence, time-slot based balanced network coding (TSBNC) comes into being. We evaluated the proposed time-slot based balancing routing algorithm and compared it with other classical underwater routing protocols. The simulation results show that the proposed protocol can reduce the probability of node conflicts, shorten the process of routing construction, balance energy consumption of each node and effectively prolong the network lifetime. PMID:22666045

  18. A network coding based routing protocol for underwater sensor networks.

    PubMed

    Wu, Huayang; Chen, Min; Guan, Xin

    2012-01-01

    Due to the particularities of the underwater environment, some negative factors will seriously interfere with data transmission rates, reliability of data communication, communication range, and network throughput and energy consumption of underwater sensor networks (UWSNs). Thus, full consideration of node energy savings, while maintaining a quick, correct and effective data transmission, extending the network life cycle are essential when routing protocols for underwater sensor networks are studied. In this paper, we have proposed a novel routing algorithm for UWSNs. To increase energy consumption efficiency and extend network lifetime, we propose a time-slot based routing algorithm (TSR).We designed a probability balanced mechanism and applied it to TSR. The theory of network coding is introduced to TSBR to meet the requirement of further reducing node energy consumption and extending network lifetime. Hence, time-slot based balanced network coding (TSBNC) comes into being. We evaluated the proposed time-slot based balancing routing algorithm and compared it with other classical underwater routing protocols. The simulation results show that the proposed protocol can reduce the probability of node conflicts, shorten the process of routing construction, balance energy consumption of each node and effectively prolong the network lifetime.

  19. O How Wondrous Is E-Mail!

    ERIC Educational Resources Information Center

    Buchanan, Larry

    1998-01-01

    Addresses the use of e-mail for communication and collaborative projects in schools. Discusses the effectiveness of an e-mail system based on a UNIX host; problems with POP (post office protocol) client programs; and the new Internet Mail Access Protocol (IMAP) which addresses most of the shortcomings of the POP protocol while keeping advantages…

  20. Using an intervention mapping approach to develop a discharge protocol for intensive care patients.

    PubMed

    van Mol, Margo; Nijkamp, Marjan; Markham, Christine; Ista, Erwin

    2017-12-19

    Admission into an intensive care unit (ICU) may result in long-term physical, cognitive, and emotional consequences for patients and their relatives. The care of the critically ill patient does not end upon ICU discharge; therefore, integrated and ongoing care during and after transition to the follow-up ward is pivotal. This study described the development of an intervention that responds to this need. Intervention Mapping (IM), a six-step theory- and evidence-based approach, was used to guide intervention development. The first step, a problem analysis, comprised a literature review, six semi-structured telephone interviews with former ICU-patients and their relatives, and seven qualitative roundtable meetings for all eligible nurses (i.e., 135 specialized and 105 general ward nurses). Performance and change objectives were formulated in step two. In step three, theory-based methods and practical applications were selected and directed at the desired behaviors and the identified barriers. Step four designed a revised discharge protocol taking into account existing interventions. Adoption, implementation and evaluation of the new discharge protocol (IM steps five and six) are in progress and were not included in this study. Four former ICU patients and two relatives underlined the importance of the need for effective discharge information and supportive written material. They also reported a lack of knowledge regarding the consequences of ICU admission. 42 ICU and 19 general ward nurses identified benefits and barriers regarding discharge procedures using three vignettes framed by literature. Some discrepancies were found. For example, ICU nurses were skeptical about the impact of writing a lay summary despite extensive evidence of the known benefits for the patients. ICU nurses anticipated having insufficient skills, not knowing the patient well enough, and fearing legal consequences of their writings. The intervention was designed to target the knowledge

  1. An Identity Based Key Exchange Protocol in Cloud Computing

    NASA Astrophysics Data System (ADS)

    Molli, Venkateswara Rao; Tiwary, Omkar Nath

    2012-10-01

    Workflow systems often use delegation to enhance the flexibility of authorization; delegation transfers privileges among users across different administrative domains and facilitates information sharing. We present an independently verifiable delegation mechanism, where a delegation credential can be verified without the participation of domain administrators. This protocol, called role-based cascaded delegation (RBCD), supports simple and efficient cross-domain delegation of authority. RBCD enables a role member to create delegations based on the dynamic needs of collaboration; in the meantime, a delegation chain canbe verified by anyone without the participation of role administrators. We also propose the Measurable Risk Adaptive decentralized Role-based Delegation framework to address this problem. Describe an efficient realization of RBCD by using aggregate signatures, where the authentication information for an arbitrarily long role-based delegation chain is captured by one short signature of constant size. RBCD enables a role member to create delegations based on the need of collaboration; in the meantime anyone can verify a delegation chain without the participation of role administrators. The protocol is general and can be realized by any signature scheme. We have described a specific realization with a hierarchical certificate-based encryption scheme that gives delegation compact credentials.

  2. CogChamps - a model of implementing evidence-based care in hospitals: study protocol.

    PubMed

    Travers, Catherine; Graham, Frederick; Henderson, Amanda; Beattie, Elizabeth

    2017-03-14

    most effective aspects of the intervention. This paper describes the study protocol for the implementation of multi-component evidence-based non-pharmacological practices designed to improve the care of older hospital patients with CI. Findings will inform subsequent initiatives directed towards enhancing the capacity of the nursing workforce to implement best practices for providing high quality care for this growing patient population throughout their acute care hospital stay.

  3. The feasibility of universal DLP-to-risk conversion coefficients for body CT protocols

    NASA Astrophysics Data System (ADS)

    Li, Xiang; Samei, Ehsan; Segars, W. Paul; Paulson, Erik K.; Frush, Donald P.

    2011-03-01

    The effective dose associated with computed tomography (CT) examinations is often estimated from dose-length product (DLP) using scanner-independent conversion coefficients. Such conversion coefficients are available for a small number of examinations, each covering an entire region of the body (e.g., head, neck, chest, abdomen and/or pelvis). Similar conversion coefficients, however, do not exist for examinations that cover a single organ or a sub-region of the body, as in the case of a multi-phase liver examination. In this study, we extended the DLP-to-effective dose conversion coefficient (k factor) to a wide range of body CT protocols and derived the corresponding DLP-to-cancer risk conversion coefficient (q factor). An extended cardiactorso (XCAT) computational model was used, which represented a reference adult male patient. A range of body CT protocols used in clinical practice were categorized based on anatomical regions examined into 10 protocol classes. A validated Monte Carlo program was used to estimate the organ dose associated with each protocol class. Assuming the reference model to be 20 years old, effective dose and risk index (an index of the total risk for cancer incidence) were then calculated and normalized by DLP to obtain the k and q factors. The k and q factors varied across protocol classes; the coefficients of variation were 28% and 9%, respectively. The small variation exhibited by the q factor suggested the feasibility of universal q factors for a wide range of body CT protocols.

  4. Coexistence of WiFi and WiMAX systems based on PS-request protocols.

    PubMed

    Kim, Jongwoo; Park, Suwon; Rhee, Seung Hyong; Choi, Yong-Hoon; Chung, Young-uk; Hwang, Ho Young

    2011-01-01

    We introduce both the coexistence zone within the WiMAX frame structure and a PS-Request protocol for the coexistence of WiFi and WiMAX systems sharing a frequency band. Because we know that the PS-Request protocol has drawbacks, we propose a revised PS-Request protocol to improve the performance. Two PS-Request protocols are based on the time division operation (TDO) of WiFi system and WiMAX system to avoid the mutual interference, and use the vestigial power management (PwrMgt) bit within the Frame Control field of the frames transmitted by a WiFi AP. The performance of the revised PS-Request protocol is evaluated by computer simulation, and compared to those of the cases without a coexistence protocol and to the original PS-Request protocol.

  5. Communication protocol in chassis detecting wireless transmission system based on WiFi

    USDA-ARS?s Scientific Manuscript database

    In chassis detecting wireless transmission system, the wireless network communication protocol plays a key role in the information exchange and synchronization between the host and chassis PDA. This paper presents a wireless network transmission protocol based on TCP/IP which makes the rules of info...

  6. Spray-on-skin cells in burns: a common practice with no agreed protocol.

    PubMed

    Allouni, Ammar; Papini, Remo; Lewis, Darren

    2013-11-01

    Cultured epithelial autograft (CEA) has been used for skin coverage after burn wound excision since 1981. It is used in burn units and centres throughout the U.K.; however, there appears to be no agreed standards of practice. We aimed to investigate the experience and current practice with its usage in the management of acute burn injury. An online survey was sent to twenty-five burns consultants in the U.K., who are members of the British Burn Association. We received 14 responses. Rarely have the responders agreed to the same practice in most of the questions. Different choices were given by responders with regards the indications for cell culture, techniques used, primary and secondary dressings used, first wound review timing, and measures used to evaluate outcomes. In the current economic environment, the NHS needs to rationalize services on the basis of cost effectiveness. CEA is an expensive procedure that requires an adequately sterile laboratory, special equipments and highly experienced dedicated staff. When dealing with expensive management options, it is important to have an agreed protocol that can form the standard that can be referred to when auditing practices and results to improve burn management and patients' care. Crown Copyright © 2013. Published by Elsevier Ltd. All rights reserved.

  7. A JAVA-based multimedia tool for clinical practice guidelines.

    PubMed

    Maojo, V; Herrero, C; Valenzuela, F; Crespo, J; Lazaro, P; Pazos, A

    1997-01-01

    We have developed a specific language for the representation of Clinical Practice Guidelines (CPGs) and Windows C++ and platform independent JAVA applications for multimedia presentation and edition of electronically stored CPGs. This approach facilitates translation of guidelines and protocols from paper to computer-based flowchart representations. Users can navigate through the algorithm with a friendly user interface and access related multimedia information within the context of each clinical problem. CPGs can be stored in a computer server and distributed over the World Wide Web, facilitating dissemination, local adaptation, and use as a reference element in medical care. We have chosen the Agency for Health Care and Policy Research's heart failure guideline to demonstrate the capabilities of our tool.

  8. Quantum-key-distribution protocol with pseudorandom bases

    NASA Astrophysics Data System (ADS)

    Trushechkin, A. S.; Tregubov, P. A.; Kiktenko, E. O.; Kurochkin, Y. V.; Fedorov, A. K.

    2018-01-01

    Quantum key distribution (QKD) offers a way for establishing information-theoretical secure communications. An important part of QKD technology is a high-quality random number generator for the quantum-state preparation and for post-processing procedures. In this work, we consider a class of prepare-and-measure QKD protocols, utilizing additional pseudorandomness in the preparation of quantum states. We study one of such protocols and analyze its security against the intercept-resend attack. We demonstrate that, for single-photon sources, the considered protocol gives better secret key rates than the BB84 and the asymmetric BB84 protocols. However, the protocol strongly requires single-photon sources.

  9. Intermittent kangaroo mother care: a NICU protocol.

    PubMed

    Davanzo, Riccardo; Brovedani, Pierpaolo; Travan, Laura; Kennedy, Jacqueline; Crocetta, Anna; Sanesi, Cecilia; Strajn, Tamara; De Cunto, Angela

    2013-08-01

    The practice of kangaroo mother care (KMC) is steadily increasing in high-tech settings due to its proven benefits for both infants and parents. In spite of that, clear guidelines about how to implement this method of care are lacking, and as a consequence, some restrictions are applied in many neonatal intensive care units (NICUs), preventing its practice. Based on recommendations from the Expert Group of the International Network on Kangaroo Mother Care, we developed a hospital protocol in the neonatal unit of the Institute for Maternal and Child Health in Trieste, Italy, a level 3 unit, aimed to facilitate and promote KMC implementation in high-tech settings. Our guideline is therefore proposed, based both on current scientific literature and on practical considerations and experience. Future adjustments and improvements would be considered based on increasing clinical KMC use and further knowledge.

  10. Social work practice in the digital age: therapeutic e-mail as a direct practice methodology.

    PubMed

    Mattison, Marian

    2012-07-01

    The author addresses the risks and benefits of incorporating therapeutic e-mail communication into clinical social work practice. Consumer demand for online clinical services is growing faster than the professional response. E-mail, when used as an adjunct to traditional meetings with clients, offers distinct advantages and risks. Benefits include the potential to reach clients in geographically remote and underserved communities, enhancing and extending the therapeutic relationship and improving treatment outcomes. Risks include threats to client confidentiality and privacy, liability coverage for practitioners, licensing jurisdiction, and the lack of competency standards for delivering e-mail interventions. Currently, the social work profession does not have adequate instructive guidelines and best-practice standards for using e-mail as a direct practice methodology. Practitioners need (formal) academic training in the techniques connected to e-mail exchanges with clients. The author describes the ethical and legal risks for practitioners using therapeutic e-mail with clients and identifies recommendations for establishing best-practice standards.

  11. Preventing disease through opportunistic, rapid engagement by primary care teams using behaviour change counselling (PRE-EMPT): protocol for a general practice-based cluster randomised trial.

    PubMed

    Spanou, Clio; Simpson, Sharon A; Hood, Kerry; Edwards, Adrian; Cohen, David; Rollnick, Stephen; Carter, Ben; McCambridge, Jim; Moore, Laurence; Randell, Elizabeth; Pickles, Timothy; Smith, Christine; Lane, Claire; Wood, Fiona; Thornton, Hazel; Butler, Chris C

    2010-09-21

    Smoking, excessive alcohol consumption, lack of exercise and an unhealthy diet are the key modifiable factors contributing to premature morbidity and mortality in the developed world. Brief interventions in health care consultations can be effective in changing single health behaviours. General Practice holds considerable potential for primary prevention through modifying patients' multiple risk behaviours, but feasible, acceptable and effective interventions are poorly developed, and uptake by practitioners is low. Through a process of theoretical development, modeling and exploratory trials, we have developed an intervention called Behaviour Change Counselling (BCC) derived from Motivational Interviewing (MI). This paper describes the protocol for an evaluation of a training intervention (the Talking Lifestyles Programme) which will enable practitioners to routinely use BCC during consultations for the above four risk behaviours. This cluster randomised controlled efficacy trial (RCT) will evaluate the outcomes and costs of this training intervention for General Practitioners (GPs) and nurses. Training methods will include: a practice-based seminar, online self-directed learning, and reflecting on video recorded and simulated consultations. The intervention will be evaluated in 29 practices in Wales, UK; two clinicians will take part (one GP and one nurse) from each practice. In intervention practices both clinicians will receive training. The aim is to recruit 2000 patients into the study with an expected 30% drop out. The primary outcome will be the proportion of patients making changes in one or more of the four behaviours at three months. Results will be compared for patients seeing clinicians trained in BCC with patients seeing non-BCC trained clinicians. Economic and process evaluations will also be conducted. Opportunistic engagement by health professionals potentially represents a cost effective medical intervention. This study integrates an existing

  12. Preventing disease through opportunistic, rapid engagement by primary care teams using behaviour change counselling (PRE-EMPT): protocol for a general practice-based cluster randomised trial

    PubMed Central

    2010-01-01

    Background Smoking, excessive alcohol consumption, lack of exercise and an unhealthy diet are the key modifiable factors contributing to premature morbidity and mortality in the developed world. Brief interventions in health care consultations can be effective in changing single health behaviours. General Practice holds considerable potential for primary prevention through modifying patients' multiple risk behaviours, but feasible, acceptable and effective interventions are poorly developed, and uptake by practitioners is low. Through a process of theoretical development, modeling and exploratory trials, we have developed an intervention called Behaviour Change Counselling (BCC) derived from Motivational Interviewing (MI). This paper describes the protocol for an evaluation of a training intervention (the Talking Lifestyles Programme) which will enable practitioners to routinely use BCC during consultations for the above four risk behaviours. Methods/Design This cluster randomised controlled efficacy trial (RCT) will evaluate the outcomes and costs of this training intervention for General Practitioners (GPs) and nurses. Training methods will include: a practice-based seminar, online self-directed learning, and reflecting on video recorded and simulated consultations. The intervention will be evaluated in 29 practices in Wales, UK; two clinicians will take part (one GP and one nurse) from each practice. In intervention practices both clinicians will receive training. The aim is to recruit 2000 patients into the study with an expected 30% drop out. The primary outcome will be the proportion of patients making changes in one or more of the four behaviours at three months. Results will be compared for patients seeing clinicians trained in BCC with patients seeing non-BCC trained clinicians. Economic and process evaluations will also be conducted. Discussion Opportunistic engagement by health professionals potentially represents a cost effective medical intervention

  13. An Adaptive OFDMA-Based MAC Protocol for Underwater Acoustic Wireless Sensor Networks

    PubMed Central

    Khalil, Issa M.; Gadallah, Yasser; Hayajneh, Mohammad; Khreishah, Abdallah

    2012-01-01

    Underwater acoustic wireless sensor networks (UAWSNs) have many applications across various civilian and military domains. However, they suffer from the limited available bandwidth of acoustic signals and harsh underwater conditions. In this work, we present an Orthogonal Frequency Division Multiple Access (OFDMA)-based Media Access Control (MAC) protocol that is configurable to suit the operating requirements of the underwater sensor network. The protocol has three modes of operation, namely random, equal opportunity and energy-conscious modes of operation. Our MAC design approach exploits the multi-path characteristics of a fading acoustic channel to convert it into parallel independent acoustic sub-channels that undergo flat fading. Communication between node pairs within the network is done using subsets of these sub-channels, depending on the configurations of the active mode of operation. Thus, the available limited bandwidth gets fully utilized while completely avoiding interference. We derive the mathematical model for optimal power loading and subcarrier selection, which is used as basis for all modes of operation of the protocol. We also conduct many simulation experiments to evaluate and compare our protocol with other Code Division Multiple Access (CDMA)-based MAC protocols. PMID:23012517

  14. An adaptive OFDMA-based MAC protocol for underwater acoustic wireless sensor networks.

    PubMed

    Khalil, Issa M; Gadallah, Yasser; Hayajneh, Mohammad; Khreishah, Abdallah

    2012-01-01

    Underwater acoustic wireless sensor networks (UAWSNs) have many applications across various civilian and military domains. However, they suffer from the limited available bandwidth of acoustic signals and harsh underwater conditions. In this work, we present an Orthogonal Frequency Division Multiple Access (OFDMA)-based Media Access Control (MAC) protocol that is configurable to suit the operating requirements of the underwater sensor network. The protocol has three modes of operation, namely random, equal opportunity and energy-conscious modes of operation. Our MAC design approach exploits the multi-path characteristics of a fading acoustic channel to convert it into parallel independent acoustic sub-channels that undergo flat fading. Communication between node pairs within the network is done using subsets of these sub-channels, depending on the configurations of the active mode of operation. Thus, the available limited bandwidth gets fully utilized while completely avoiding interference. We derive the mathematical model for optimal power loading and subcarrier selection, which is used as basis for all modes of operation of the protocol. We also conduct many simulation experiments to evaluate and compare our protocol with other Code Division Multiple Access (CDMA)-based MAC protocols.

  15. Legal aspects of therapist-driven protocols. Do therapist-driven protocols place therapists in a legally compromising position?

    PubMed

    Meehan, M J

    1996-03-01

    The recent introduction of therapist-driven protocols has given the appearance of restricting the professional judgment of respiratory therapists with decision-tree robotics while contemporaneously catapulting them into the practice of medicine. This is happening in the midst of a spiraling litigation climate. This article examines the legal aspects--from malpractice to licensure--of this exciting new practice known as therapist-driven respiratory protocols.

  16. Publication trends of study protocols in rehabilitation.

    PubMed

    Jesus, Tiago S; Colquhoun, Heather L

    2017-09-04

    Growing evidence points for the need to publish study protocols in the health field. To observe whether the growing interest in publishing study protocols in the broader health field has been translated into increased publications of rehabilitation study protocols. Observational study using publication data and its indexation in PubMed. Not applicable. Not applicable. PubMed was searched with appropriate combinations of Medical Subject Headings up to December 2014. The effective presence of study protocols was manually screened. Regression models analyzed the yearly growth of publications. Two-sample Z-tests analyzed whether the proportion of Systematic Reviews (SRs) and Randomized Controlled Trials (RCTs) among study protocols differed from that of the same designs for the broader rehabilitation research. Up to December 2014, 746 publications of rehabilitation study protocols were identified, with an exponential growth since 2005 (r2=0.981; p<0.001). RCT protocols were the most common among rehabilitation study protocols (83%), while RCTs were significantly more prevalent among study protocols than among the broader rehabilitation research (83% vs. 35.8%; p<0.001). For SRs, the picture was reversed: significantly less common among study protocols (2.8% vs. 9.3%; p<0.001). Funding was more often reported by rehabilitation study protocols than the broader rehabilitation research (90% vs. 53.1%; p<0.001). Rehabilitation journals published a significantly lower share of rehabilitation study protocols than they did for the broader rehabilitation research (1.8% vs.16.7%; p<0.001). Identifying the reasons for these discrepancies and reverting unwarranted disparities (e.g. low rate of publication for rehabilitation SR protocols) are likely new avenues for rehabilitation research and its publication. SRs, particularly those aggregating RCT results, are considered the best standard of evidence to guide rehabilitation clinical practice; however, that standard can be improved

  17. Rationale for the Diabetic Retinopathy Clinical Research Network Treatment Protocol for Center-involved Diabetic Macular Edema

    PubMed Central

    Aiello, Lloyd Paul; Beck, Roy W; Bressler, Neil M.; Browning, David J.; Chalam, KV; Davis, Matthew; Ferris, Frederick L; Glassman, Adam; Maturi, Raj; Stockdale, Cynthia R.; Topping, Trexler

    2011-01-01

    Objective Describe the underlying principles used to develop a web-based algorithm that incorporated intravitreal anti-vascular endothelial growth factor (anti-VEGF) treatment for diabetic macular edema (DME) in a Diabetic Retinopathy Clinical Research Network (DRCR.net) randomized clinical trial. Design Discussion of treatment protocol for DME. Participants Subjects with vision loss from DME involving the center of the macula. Methods The DRCR.net created an algorithm incorporating anti-VEGF injections in a comparative effectiveness randomized clinical trial evaluating intravitreal ranibizumab with prompt or deferred (≥24 weeks) focal/grid laser in eyes with vision loss from center-involved DME. Results confirmed that intravitreal ranibizumab with prompt or deferred laser provides superior visual acuity outcomes, compared with prompt laser alone through at least 2 years. Duplication of this algorithm may not be practical for clinical practice. In order to share their opinion on how ophthalmologists might emulate the study protocol, participating DRCR.net investigators developed guidelines based on the algorithm's underlying rationale. Main Outcome Measures Clinical guidelines based on a DRCR.net protocol. Results The treatment protocol required real time feedback from a web-based data entry system for intravitreal injections, focal/grid laser, and follow-up intervals. Guidance from this system indicated whether treatment was required or given at investigator discretion and when follow-up should be scheduled. Clinical treatment guidelines, based on the underlying clinical rationale of the DRCR.net protocol, include repeating treatment monthly as long as there is improvement in edema compared with the previous month, or until the retina is no longer thickened. If thickening recurs or worsens after discontinuing treatment, treatment is resumed. Conclusions Duplication of the approach used in the DRCR.net randomized clinical trial to treat DME involving the center

  18. The Effect of a Collaborative Mentoring Program on Beginning Science Teachers' Inquiry-based Teaching Practice

    NASA Astrophysics Data System (ADS)

    Nam, Jeonghee; Seung, Eulsun; Go, MunSuk

    2013-03-01

    This study investigated how a collaborative mentoring program influenced beginning science teachers' inquiry-based teaching and their reflection on practice. The one-year program consisted of five one-on-one mentoring meetings, weekly science education seminars, weekly mentoring group discussions, and self-evaluation activities. The participants were three beginning science teachers and three mentors at the middle school level (7-9th grades) in an urban area of South Korea. For each beginning teacher, five lessons were evaluated in terms of lesson design/implementation, procedural knowledge, and classroom culture by using the Reformed Teaching Observation Protocol. Five aspects of the beginning teachers' reflections were identified. This study showed that a collaborative mentoring program focusing on inquiry-based science teaching encouraged the beginning teachers to reflect on their own perceptions and teaching practice in terms of inquiry-based science teaching, which led to changes in their teaching practice. This study also highlighted the importance of collaborative interactions between the mentors and the beginning teachers during the mentoring process.

  19. Vehicle Density Based Forwarding Protocol for Safety Message Broadcast in VANET

    PubMed Central

    Huang, Jiawei; Wang, Jianxin

    2014-01-01

    In vehicular ad hoc networks (VANETs), the medium access control (MAC) protocol is of great importance to provide time-critical safety applications. Contemporary multihop broadcast protocols in VANETs usually choose the farthest node in broadcast range as the forwarder to reduce the number of forwarding hops. However, in this paper, we demonstrate that the farthest forwarder may experience large contention delay in case of high vehicle density. We propose an IEEE 802.11-based multihop broadcast protocol VDF to address the issue of emergency message dissemination. To achieve the tradeoff between contention delay and forwarding hops, VDF adaptably chooses the forwarder according to the vehicle density. Simulation results show that, due to its ability to decrease the transmission collisions, the proposed protocol can provide significantly lower broadcast delay. PMID:25121125

  20. A hash based mutual RFID tag authentication protocol in telecare medicine information system.

    PubMed

    Srivastava, Keerti; Awasthi, Amit K; Kaul, Sonam D; Mittal, R C

    2015-01-01

    Radio Frequency Identification (RFID) is a technology which has multidimensional applications to reduce the complexity of today life. Everywhere, like access control, transportation, real-time inventory, asset management and automated payment systems etc., RFID has its enormous use. Recently, this technology is opening its wings in healthcare environments, where potential applications include patient monitoring, object traceability and drug administration systems etc. In this paper, we propose a secure RFID-based protocol for the medical sector. This protocol is based on hash operation with synchronized secret. The protocol is safe against active and passive attacks such as forgery, traceability, replay and de-synchronization attack.

  1. Protocols for Image Processing based Underwater Inspection of Infrastructure Elements

    NASA Astrophysics Data System (ADS)

    O'Byrne, Michael; Ghosh, Bidisha; Schoefs, Franck; Pakrashi, Vikram

    2015-07-01

    Image processing can be an important tool for inspecting underwater infrastructure elements like bridge piers and pile wharves. Underwater inspection often relies on visual descriptions of divers who are not necessarily trained in specifics of structural degradation and the information may often be vague, prone to error or open to significant variation of interpretation. Underwater vehicles, on the other hand can be quite expensive to deal with for such inspections. Additionally, there is now significant encouragement globally towards the deployment of more offshore renewable wind turbines and wave devices and the requirement for underwater inspection can be expected to increase significantly in the coming years. While the merit of image processing based assessment of the condition of underwater structures is understood to a certain degree, there is no existing protocol on such image based methods. This paper discusses and describes an image processing protocol for underwater inspection of structures. A stereo imaging image processing method is considered in this regard and protocols are suggested for image storage, imaging, diving, and inspection. A combined underwater imaging protocol is finally presented which can be used for a variety of situations within a range of image scenes and environmental conditions affecting the imaging conditions. An example of detecting marine growth is presented of a structure in Cork Harbour, Ireland.

  2. Student Responses to an ICT-Based E-Assessment Application for the Teaching Practicum/Teaching Practice MODULE

    ERIC Educational Resources Information Center

    Davids, M. Noor

    2017-01-01

    Situated within the context of Initial Teacher Education (ITE) in South Africa, this study introduces the notion of an interactive Teaching Practicum E- Assessment application: e-assessment application for the teaching practicum/Teaching Practice module to replace the current model of assessment. At present students enrolled for an Initial Teacher…

  3. A Comprehensive Protocol for Improving the Description of Saprolegniales (Oomycota): Two Practical Examples (Saprolegnia aenigmatica sp. nov. and Saprolegnia racemosa sp. nov.).

    PubMed

    Sandoval-Sierra, Jose Vladimir; Diéguez-Uribeondo, Javier

    2015-01-01

    The description, identification and classification of organisms are the pillar in biodiversity and evolutionary studies. The fungal-like organism Saprolegnia contains important animal pathogens. However, its taxonomy is weak, making it difficult to perform further studies. This problem mainly arises from the unavailability of suitable holotypes. We propose a standardized protocol for describing Saprolegnia spp. that includes good cultural practices and proper holotype preservation. In order to illustrate this new proposal, we describe two species, Saprolegnia aenigmatica sp. nov. and Saprolegnia racemosa sp. nov., based on the recently described molecular operational taxonomic units (MOTUs), phylogenetic relationships, and the analyses of morphological features. We show that they belong to two different MOTUs that are grouped into two sister clades. Morphologically, we find that S. racemosa exhibits a species-specific character, i.e., aggrupation of oogonia in racemes, while S. aenigmatica does not have any specific characters. Analyses of a combined set of characters, i.e., length and breadth of sporangia, length/breadth ratio (l/b) of oogonia, cyst and oospore diameter, and the number of oospores per oogomium, allow distinguishing these two species. To improve Saprolegnia taxonomy, we propose to incorporate into the protologue: (i) several isolates of the new species; (ii) the rDNA sequences to compare them to data-bases of Saprolegnia sequences of reference; (iii) a phylogenetic analysis to check relationships with other species; (iv) to preserve holotypes in absolute ethanol and to include lyophilized material from holotype; and (v) the ex-type as a pure culture from single-spore isolates stored in at least two different collections.

  4. Streetlight Control System Based on Wireless Communication over DALI Protocol

    PubMed Central

    Bellido-Outeiriño, Francisco José; Quiles-Latorre, Francisco Javier; Moreno-Moreno, Carlos Diego; Flores-Arias, José María; Moreno-García, Isabel; Ortiz-López, Manuel

    2016-01-01

    Public lighting represents a large part of the energy consumption of towns and cities. Efficient management of public lighting can entail significant energy savings. This work presents a smart system for managing public lighting networks based on wireless communication and the DALI protocol. Wireless communication entails significant economic savings, as there is no need to install new wiring and visual impacts and damage to the facades of historical buildings in city centers are avoided. The DALI protocol uses bidirectional communication with the ballast, which allows its status to be controlled and monitored at all times. The novelty of this work is that it tackles all aspects related to the management of public lighting: a standard protocol, DALI, was selected to control the ballast, a wireless node based on the IEEE 802.15.4 standard with a DALI interface was designed, a network layer that considers the topology of the lighting network has been developed, and lastly, some user-friendly applications for the control and maintenance of the system by the technical crews of the different towns and cities have been developed. PMID:27128923

  5. On the Temporal Stability of Analyte Recognition with an E-Nose Based on a Metal Oxide Sensor Array in Practical Applications.

    PubMed

    Kiselev, Ilia; Sysoev, Victor; Kaikov, Igor; Koronczi, Ilona; Adil Akai Tegin, Ruslan; Smanalieva, Jamila; Sommer, Martin; Ilicali, Coskan; Hauptmannl, Michael

    2018-02-11

    The paper deals with a functional instability of electronic nose (e-nose) units which significantly limits their real-life applications. Here we demonstrate how to approach this issue with example of an e-nose based on a metal oxide sensor array developed at the Karlsruhe Institute of Technology (Germany). We consider the instability of e-nose operation at different time scales ranging from minutes to many years. To test the e-nose we employ open-air and headspace sampling of analyte odors. The multivariate recognition algorithm to process the multisensor array signals is based on the linear discriminant analysis method. Accounting for the received results, we argue that the stability of device operation is mostly affected by accidental changes in the ambient air composition. To overcome instabilities, we introduce the add-training procedure which is found to successfully manage both the temporal changes of ambient and the drift of multisensor array properties, even long-term. The method can be easily implemented in practical applications of e-noses and improve prospects for device marketing.

  6. On the Temporal Stability of Analyte Recognition with an E-Nose Based on a Metal Oxide Sensor Array in Practical Applications

    PubMed Central

    Kaikov, Igor; Koronczi, Ilona; Adil Akai Tegin, Ruslan; Smanalieva, Jamila; Sommer, Martin; Ilicali, Coskan; Hauptmannl, Michael

    2018-01-01

    The paper deals with a functional instability of electronic nose (e-nose) units which significantly limits their real-life applications. Here we demonstrate how to approach this issue with example of an e-nose based on a metal oxide sensor array developed at the Karlsruhe Institute of Technology (Germany). We consider the instability of e-nose operation at different time scales ranging from minutes to many years. To test the e-nose we employ open-air and headspace sampling of analyte odors. The multivariate recognition algorithm to process the multisensor array signals is based on the linear discriminant analysis method. Accounting for the received results, we argue that the stability of device operation is mostly affected by accidental changes in the ambient air composition. To overcome instabilities, we introduce the add-training procedure which is found to successfully manage both the temporal changes of ambient and the drift of multisensor array properties, even long-term. The method can be easily implemented in practical applications of e-noses and improve prospects for device marketing. PMID:29439468

  7. Two new Controlled not Gate Based Quantum Secret Sharing Protocols without Entanglement Attenuation

    NASA Astrophysics Data System (ADS)

    Zhu, Zhen-Chao; Hu, Ai-Qun; Fu, An-Min

    2016-05-01

    In this paper, we propose two new controlled not gate based quantum secret sharing protocols. In these two protocols, each photon only travels once, which guarantees the agents located in long distance can be able to derive the dealer's secret without suffering entanglement attenuation problem. The protocols are secure against trojan horse attack, intercept-resend attack, entangle-measure attack and entanglement-swapping attack. The theoretical efficiency for qubits of these two protocols can approach 100 %, except those used for eavesdropping checking, all entangled states can be used for final secret sharing.

  8. A Public-Key Based Authentication and Key Establishment Protocol Coupled with a Client Puzzle.

    ERIC Educational Resources Information Center

    Lee, M. C.; Fung, Chun-Kan

    2003-01-01

    Discusses network denial-of-service attacks which have become a security threat to the Internet community and suggests the need for reliable authentication protocols in client-server applications. Presents a public-key based authentication and key establishment protocol coupled with a client puzzle protocol and validates it through formal logic…

  9. Moving Triadic Gaze Intervention Into Practice: Measuring Clinician Attitude and Implementation Fidelity

    PubMed Central

    Olswang, Lesley B.; Greenslade, Kathryn; Pinder, Gay Lloyd; Dowden, Patricia; Madden, Jodi

    2017-01-01

    Purpose This research investigated a first step in implementing the dynamic assessment (DA) component of Triadic Gaze Intervention (Olswang, Feuerstein, Pinder, & Dowden, 2013; Olswang et al., 2014), an evidence-based protocol for teaching early signals of communication to young children with physical disabilities. Clinician attitudes about adopting external evidence into practice and implementation fidelity in DA protocol delivery were examined following training. Method Seven early intervention clinicians from multiple disciplines were trained to deliver the four essential elements of the DA protocol: (a) provide communication opportunity, (b) recognize child's potentially communicative signal, (c) shape child's signal toward triadic gaze, and (d) reinforce with play. Clinician attitude regarding adopting evidence into practice was measured at baseline and follow-up, with the Evidence-Based Practice Attitude Scale (Aarons, 2004). Implementation fidelity in delivering the protocol was measured for adherence (accuracy) and competence (quality) during trial implementation. Results Clinicians' attitudes about trying new evidence that at first was perceived as incongruent with their practice improved over the course of the research. Clinicians demonstrated strong adherence to the DA protocol; however, competence varied across clinicians and appeared related to child performance. Conclusions The results provided insight into moving Triadic Gaze Intervention into practice and yielded valuable information regarding the implementation process, with implications for future research. PMID:28525577

  10. Recruiting primary care practices for practice-based research: a case study of a group-randomized study (TRANSLATE CKD) recruitment process.

    PubMed

    Loskutova, Natalia Y; Smail, Craig; Ajayi, Kemi; Pace, Wilson D; Fox, Chester H

    2018-01-16

    We assessed the challenging process of recruiting primary care practices in a practice-based research study. In this descriptive case study of recruitment data collected for a large practice-based study (TRANSLATE CKD), 48 single or multiple-site health care organizations in the USA with a total of 114 practices were invited to participate. We collected quantitative and qualitative measures of recruitment process and outcomes for the first 25 practices recruited. Information about 13 additional practices is not provided due to staff transitions and limited data collection resources. Initial outreach was made to 114 practices (from 48 organizations, 41% small); 52 (45%) practices responded with interest. Practices enrolled in the study (n = 25) represented 22% of the total outreach number, or 48% of those initially interested. Average time to enroll was 71 calendar days (range 11-107). There was no difference in the number of days practices remained under recruitment, based on enrolled versus not enrolled (44.8 ± 30.4 versus 46.8 ± 25.4 days, P = 0.86) or by the organization size, i.e. large versus small (defined by having ≤4 distinct practices; 52 ± 23.6 versus 43.6 ± 27.8 days; P = 0.46). The most common recruitment barriers were administrative, e.g. lack of perceived direct organizational benefit, and were more prominent among large organizations. Despite the general belief that the research topic, invitation method, and interest in research may facilitate practice recruitment, our results suggest that most of the recruitment challenges represent managerial challenges. Future research projects may need to consider relevant methodologies from businesses administration and marketing fields. © The Author 2017. Published by Oxford University Press. All rights reserved. For permissions, please e-mail: journals.permissions@oup.com.

  11. An energy-aware routing protocol for query-based applications in wireless sensor networks.

    PubMed

    Ahvar, Ehsan; Ahvar, Shohreh; Lee, Gyu Myoung; Crespi, Noel

    2014-01-01

    Wireless sensor network (WSN) typically has energy consumption restriction. Designing energy-aware routing protocol can significantly reduce energy consumption in WSNs. Energy-aware routing protocols can be classified into two categories, energy savers and energy balancers. Energy saving protocols are used to minimize the overall energy consumed by a WSN, while energy balancing protocols attempt to efficiently distribute the consumption of energy throughout the network. In general terms, energy saving protocols are not necessarily good at balancing energy consumption and energy balancing protocols are not always good at reducing energy consumption. In this paper, we propose an energy-aware routing protocol (ERP) for query-based applications in WSNs, which offers a good trade-off between traditional energy balancing and energy saving objectives and supports a soft real time packet delivery. This is achieved by means of fuzzy sets and learning automata techniques along with zonal broadcasting to decrease total energy consumption.

  12. The covert channel over HTTP protocol

    NASA Astrophysics Data System (ADS)

    Graniszewski, Waldemar; Krupski, Jacek; Szczypiorski, Krzysztof

    2016-09-01

    The paper presents a new steganographic method - the covert channel is created over HTTP protocol header, i.e. trailer field. HTTP protocol is one of the most frequently used in the Internet. The popularity of the Web servers and network traffic from, and to them, is one of the requirements for undetectable message exchange. To study this kind of the information hiding technique an application in Javascript language based on the Node.js framework was written. The results of the experiment that was performed to send a message in the covert channel are also presented.

  13. Helping Pre-Service Mathematics Teachers Connect Theory and Practice: Using Reading, Writing, and Observation Protocols to Structure Field Experiences

    ERIC Educational Resources Information Center

    Cross, Stephanie Behm; Bayazit, Nermin Tosmur

    2014-01-01

    The authors designed the project described her in order to address their students' expressed frustrations at the perceived disconnect between theory and practice. The project combined course readings, journaling, collaboratively created observation protocols, and classroom observation into a semester-long iterative assignment. The students' work…

  14. Residual energy level based clustering routing protocol for wireless sensor networks

    NASA Astrophysics Data System (ADS)

    Yuan, Xu; Zhong, Fangming; Chen, Zhikui; Yang, Deli

    2015-12-01

    The wireless sensor networks, which nodes prone to premature death, with unbalanced energy consumption and a short life time, influenced the promotion and application of this technology in internet of things in agriculture. This paper proposes a clustering routing protocol based on the residual energy level (RELCP). RELCP includes three stages: the selection of cluster head, establishment of cluster and data transmission. RELCP considers the remaining energy level and distance to base station, while election of cluster head nodes and data transmitting. Simulation results demonstrate that the protocol can efficiently balance the energy dissipation of all nodes, and prolong the network lifetime.

  15. Can E-Learning Change Work Practices?

    ERIC Educational Resources Information Center

    Noesgaard, Signe Schack

    2016-01-01

    Stand-alone e-learning is unlikely to change work practices. This claim contrasts with a comprehensive body of research arguing that e-learning is at least as effective as face-to-face instruction in improving work performance. Such a comparison is, however, problematic. On the one hand, it relies on the premise that face-to-face instruction is…

  16. Goal-setting protocol in adherence to exercise by Italian adults.

    PubMed

    Annesi, James J

    2002-04-01

    A goal-setting protocol, based on research in goal setting and performance and personal construct theory, was tested for its effect on adherence to a new exercise program. The Goal-setting group (n = 50) had significantly less dropout (30%) than the control group (n = 50) (74%). The Goal-setting group also had significantly better attendance (p<.0001). Suggestions for increasing confidence in findings through further research and practical implications of using the protocol to improve exercise maintenance across settings were discussed.

  17. A Protocol for Advanced Psychometric Assessment of Surveys

    PubMed Central

    Squires, Janet E.; Hayduk, Leslie; Hutchinson, Alison M.; Cranley, Lisa A.; Gierl, Mark; Cummings, Greta G.; Norton, Peter G.; Estabrooks, Carole A.

    2013-01-01

    Background and Purpose. In this paper, we present a protocol for advanced psychometric assessments of surveys based on the Standards for Educational and Psychological Testing. We use the Alberta Context Tool (ACT) as an exemplar survey to which this protocol can be applied. Methods. Data mapping, acceptability, reliability, and validity are addressed. Acceptability is assessed with missing data frequencies and the time required to complete the survey. Reliability is assessed with internal consistency coefficients and information functions. A unitary approach to validity consisting of accumulating evidence based on instrument content, response processes, internal structure, and relations to other variables is taken. We also address assessing performance of survey data when aggregated to higher levels (e.g., nursing unit). Discussion. In this paper we present a protocol for advanced psychometric assessment of survey data using the Alberta Context Tool (ACT) as an exemplar survey; application of the protocol to the ACT survey is underway. Psychometric assessment of any survey is essential to obtaining reliable and valid research findings. This protocol can be adapted for use with any nursing survey. PMID:23401759

  18. A multi-institutional study of the perceived barriers and facilitators to implementing evidence-based practice.

    PubMed

    Duncombe, Daphne C

    2018-03-01

    To examine perceived barriers and facilitators to implementing evidence-based practice among nurses working in psychiatric, geriatric, hospital and community settings in The Bahamas. It is evident from previous studies that a number of factors exist which either obstruct or promote the utilisation of research evidence in nursing practice. Identifying these factors is vital to the successful uptake of evidence-based practice in nursing. Descriptive, comparative study. Data were collected using self-administered questionnaires. A stratified random sample (n = 100) of registered nurses participated; 5-point Likert-like scales were used to examine nurses' perceptions of barriers and facilitators of evidence-based practice. Descriptive statistics were used to describe demographic characteristics and to compare responses of nurses. Participants were predominantly female (98.4%), in the 25 to <35 years age group (45.9%). Of nurses surveyed, 72.1% had never tried to implement evidence-based practice previously. The greatest barriers identified were as follows: "Inadequate resources for implementing research findings" (85.2%; n = 52) and "Inadequate training in research methods" (83.6%; n = 51). The top facilitators identified were as follows: "Training in research methods" (88.5%; n = 54) and "Organisational policies and protocols that are evidence-based" (86.9%; n = 53). Nurses generally expressed that they required additional training in research and evidence-based practice concepts. Although some nurses had a desire to implement evidence-based practice to provide quality care and improve patient outcomes, many expressed that they lacked the required resources. The study draws attention to the need for prioritisation of evidence-based practice both at institutional and governmental levels. Successful adoption of evidence-based practice implies combined efforts of nurses, healthcare providers and policymakers. Further research is needed to determine the best

  19. An Efficient Buyer-Seller Watermarking Protocol Based on Chameleon Encryption

    NASA Astrophysics Data System (ADS)

    Poh, Geong Sen; Martin, Keith M.

    Buyer-seller watermarking protocols are designed to deter clients from illegally distributing copies of digital content. This is achieved by allowing a distributor to insert a unique watermark into content in such a way that the distributor does not know the final watermarked copy that is given to the client. This protects both the client and distributor from attempts by one to falsely accuse the other of misuse. Buyer-seller watermarking protocols are normally based on asymmetric cryptographic primitives known as homomorphic encryption schemes. However, the computational and communication overhead of this conventional approach is high. In this paper we propose a different approach, based on the symmetric Chameleon encryption scheme. We show that this leads to significant gains in computational and operational efficiency.

  20. Hyperventilation and photic stimulation are useful additions to a placebo-based suggestive seizure induction protocol in patients with psychogenic nonepileptic seizures.

    PubMed

    Popkirov, Stoyan; Grönheit, Wenke; Wellmer, Jörg

    2015-05-01

    The early and definitive diagnosis of psychogenic nonepileptic seizures is a common challenge in epileptology practice. Suggestive seizure induction is a valuable tool to aid the differentiation between epileptic and psychogenic nonepileptic seizures, especially when long-term video-EEG monitoring is inconclusive or unavailable. In this retrospective analysis, we compared the diagnostic yield of a classical, placebo-based induction protocol with that of an extended protocol that includes hyperventilation and photic stimulation as means of suggestion while also implementing more open, standardized patient information. We investigated whether the diversification of suggestive seizure induction has an effect on diagnostic yield and whether it preempts the administration of placebo. Data from 52 patients with confirmed psychogenic nonepileptic seizures were analyzed. While suggestive seizure induction using only placebo-based suggestion provoked a typical event in 13 of 20 patients (65%), the extended protocol was positive in 27 of 34 cases (84%); this improvement was not significant (p=0.11). Noninvasive suggestion techniques accounted for 78% of inductions, avoiding placebo administration in a majority of patients. Still, placebo remains an important part of suggestive seizure induction, responsible for 22% (6 out of 27) of successful inductions using our extended protocol. Our study demonstrates that the diversification of suggestive seizure induction is feasible and beneficial for both patients and diagnosticians. Copyright © 2015 Elsevier Inc. All rights reserved.

  1. Evaluating Practice-Based Learning.

    PubMed

    Logue, Nancy C

    2017-03-01

    Practice-based learning is an essential aspect of nursing education, and evaluating this form of learning is vital in determining whether students have the competence required to enter nursing practice. However, limited knowledge exists about the influences that shape how competence development is recognized in nursing programs. The purpose of this study was to explore the evaluation of practice-based learning from the students' standpoint. A qualitative design based on institutional ethnography was used to investigate evaluation of practice-based learning with students, preceptors, and faculty in a preceptorship practicum. The findings revealed how work associated with evaluation was organized by coexisting and often disparate influences within a nursing program and the workplaces where learning took place. The implications and recommendations of the inquiry are intended to encourage dialogue and action among stakeholders from education and practice to improve evaluation practices in preparing new members of the nursing profession. [J Nurs Educ. 2017;56(3):131-138.]. Copyright 2017, SLACK Incorporated.

  2. An Energy-Aware Routing Protocol for Query-Based Applications in Wireless Sensor Networks

    PubMed Central

    Crespi, Noel

    2014-01-01

    Wireless sensor network (WSN) typically has energy consumption restriction. Designing energy-aware routing protocol can significantly reduce energy consumption in WSNs. Energy-aware routing protocols can be classified into two categories, energy savers and energy balancers. Energy saving protocols are used to minimize the overall energy consumed by a WSN, while energy balancing protocols attempt to efficiently distribute the consumption of energy throughout the network. In general terms, energy saving protocols are not necessarily good at balancing energy consumption and energy balancing protocols are not always good at reducing energy consumption. In this paper, we propose an energy-aware routing protocol (ERP) for query-based applications in WSNs, which offers a good trade-off between traditional energy balancing and energy saving objectives and supports a soft real time packet delivery. This is achieved by means of fuzzy sets and learning automata techniques along with zonal broadcasting to decrease total energy consumption. PMID:24696640

  3. Efficiency Improvement in a Busy Radiology Practice: Determination of Musculoskeletal Magnetic Resonance Imaging Protocol Using Deep-Learning Convolutional Neural Networks.

    PubMed

    Lee, Young Han

    2018-04-04

    The purposes of this study are to evaluate the feasibility of protocol determination with a convolutional neural networks (CNN) classifier based on short-text classification and to evaluate the agreements by comparing protocols determined by CNN with those determined by musculoskeletal radiologists. Following institutional review board approval, the database of a hospital information system (HIS) was queried for lists of MRI examinations, referring department, patient age, and patient gender. These were exported to a local workstation for analyses: 5258 and 1018 consecutive musculoskeletal MRI examinations were used for the training and test datasets, respectively. The subjects for pre-processing were routine or tumor protocols and the contents were word combinations of the referring department, region, contrast media (or not), gender, and age. The CNN Embedded vector classifier was used with Word2Vec Google news vectors. The test set was tested with each classification model and results were output as routine or tumor protocols. The CNN determinations were evaluated using the receiver operating characteristic (ROC) curves. The accuracies were evaluated by a radiologist-confirmed protocol as the reference protocols. The optimal cut-off values for protocol determination between routine protocols and tumor protocols was 0.5067 with a sensitivity of 92.10%, a specificity of 95.76%, and an area under curve (AUC) of 0.977. The overall accuracy was 94.2% for the ConvNet model. All MRI protocols were correct in the pelvic bone, upper arm, wrist, and lower leg MRIs. Deep-learning-based convolutional neural networks were clinically utilized to determine musculoskeletal MRI protocols. CNN-based text learning and applications could be extended to other radiologic tasks besides image interpretations, improving the work performance of the radiologist.

  4. Variability in donation after cardiac death protocols: a national survey.

    PubMed

    Fugate, Jennifer E; Stadtler, Maria; Rabinstein, Alejandro A; Wijdicks, Eelco F M

    2011-02-27

    As donation after cardiac death practices expand, the number of institutional policies is increasing. We contacted organ procurement organizations throughout the United States and requested protocols in hospitals in their donor service areas. Sixty-four protocols were obtained with representation from 16 different states. The terminology and recommended practices varied substantially. The methods for death determination were not specified in 28 (44%) protocols. Most adhered to a 2- to 5-min observation time between circulatory arrest and organ procurement, but 10 (16%) provided no information. This variability reveals a need to define a uniform standard in donation after cardiac death protocols and death determination practices.

  5. Registered nurses' clinical reasoning in home healthcare clinical practice: A think-aloud study with protocol analysis.

    PubMed

    Johnsen, Hege Mari; Slettebø, Åshild; Fossum, Mariann

    2016-05-01

    The home healthcare context can be unpredictable and complex, and requires registered nurses with a high level of clinical reasoning skills and professional autonomy. Thus, additional knowledge about registered nurses' clinical reasoning performance during patient home care is required. The aim of this study is to describe the cognitive processes and thinking strategies used by recently graduated registered nurses while caring for patients in home healthcare clinical practice. An exploratory qualitative think-aloud design with protocol analysis was used. Home healthcare visits to patients with stroke, diabetes, and chronic obstructive pulmonary disease in seven healthcare districts in southern Norway. A purposeful sample of eight registered nurses with one year of experience. Each nurse was interviewed using the concurrent think-aloud technique in three different patient home healthcare clinical practice visits. A total of 24 home healthcare visits occurred. Follow-up interviews were conducted with each participant. The think-aloud sessions were transcribed and analysed using three-step protocol analysis. Recently graduated registered nurses focused on both general nursing concepts and concepts specific to the domains required and tasks provided in home healthcare services as well as for different patient groups. Additionally, participants used several assertion types, cognitive processes, and thinking strategies. Our results showed that recently graduated registered nurses used both simple and complex cognitive processes involving both inductive and deductive reasoning. However, their reasoning was more reactive than proactive. The results may contribute to nursing practice in terms of developing effective nursing education programmes. Copyright © 2016 Elsevier Ltd. All rights reserved.

  6. Evidence-Based Practice in Psychology

    ERIC Educational Resources Information Center

    American Psychologist, 2006

    2006-01-01

    The evidence-based practice movement has become an important feature of health care systems and health care policy. Within this context, the APA 2005 Presidential Task Force on Evidence-Based Practice defines and discusses evidence-based practice in psychology (EBPP). In an integration of science and practice, the Task Force's report describes…

  7. Cluster based architecture and network maintenance protocol for medical priority aware cognitive radio based hospital.

    PubMed

    Al Mamoon, Ishtiak; Muzahidul Islam, A K M; Baharun, Sabariah; Ahmed, Ashir; Komaki, Shozo

    2016-08-01

    Due to the rapid growth of wireless medical devices in near future, wireless healthcare services may face some inescapable issue such as medical spectrum scarcity, electromagnetic interference (EMI), bandwidth constraint, security and finally medical data communication model. To mitigate these issues, cognitive radio (CR) or opportunistic radio network enabled wireless technology is suitable for the upcoming wireless healthcare system. The up-to-date research on CR based healthcare has exposed some developments on EMI and spectrum problems. However, the investigation recommendation on system design and network model for CR enabled hospital is rare. Thus, this research designs a hierarchy based hybrid network architecture and network maintenance protocols for previously proposed CR hospital system, known as CogMed. In the previous study, the detail architecture of CogMed and its maintenance protocols were not present. The proposed architecture includes clustering concepts for cognitive base stations and non-medical devices. Two cluster head (CH selector equations are formulated based on priority of location, device, mobility rate of devices and number of accessible channels. In order to maintain the integrity of the proposed network model, node joining and node leaving protocols are also proposed. Finally, the simulation results show that the proposed network maintenance time is very low for emergency medical devices (average maintenance period 9.5 ms) and the re-clustering effects for different mobility enabled non-medical devices are also balanced.

  8. Cluster Size Optimization in Sensor Networks with Decentralized Cluster-Based Protocols

    PubMed Central

    Amini, Navid; Vahdatpour, Alireza; Xu, Wenyao; Gerla, Mario; Sarrafzadeh, Majid

    2011-01-01

    Network lifetime and energy-efficiency are viewed as the dominating considerations in designing cluster-based communication protocols for wireless sensor networks. This paper analytically provides the optimal cluster size that minimizes the total energy expenditure in such networks, where all sensors communicate data through their elected cluster heads to the base station in a decentralized fashion. LEACH, LEACH-Coverage, and DBS comprise three cluster-based protocols investigated in this paper that do not require any centralized support from a certain node. The analytical outcomes are given in the form of closed-form expressions for various widely-used network configurations. Extensive simulations on different networks are used to confirm the expectations based on the analytical results. To obtain a thorough understanding of the results, cluster number variability problem is identified and inspected from the energy consumption point of view. PMID:22267882

  9. Barriers and Facilitators to eHealth Use in Daily Practice: Perspectives of Patients and Professionals in Dermatology

    PubMed Central

    Schussler-Raymakers, Florine ML; Frima, Cynthia; Flinterman, Annebeth; Hamminga, Eefje; Arents, Bernd WM; Bruijnzeel-Koomen, Carla AFM; de Bruin-Weller, Marjolein S; van Os-Medendorp, Harmieke

    2017-01-01

    Background The number of eHealth interventions in the management of chronic diseases such as atopic dermatitis (AD) is growing. Despite promising results, the implementation and use of these interventions is limited. Objectives This study aimed to assess opinions of the most important stakeholders influencing the implementation and use of eHealth services in daily dermatology practice. Methods The perspectives of health care professionals and patients towards the implementation and use of eHealth services in daily practice were assessed by using a mixed method design. A cross-sectional survey based on the eHealth implementation toolkit (eHit) was conducted to explore factors influencing the adoption of eHealth interventions offering the possibility of e-consultations, Web-based monitoring, and Web-based self-management training among dermatologists and dermatology nurses. The perspectives of patients with atopic dermatitis (AD) regarding the use of eHealth services were discussed in an online focus group. Results Health care professionals (n=99) and patients (n=9) acknowledged the value of eHealth services and were willing to use these digital tools in daily dermatology practice. Key identified barriers (statements with <50% of the participants scoring totally agree or agree) in the implementation and adoption of eHealth interventions included concerns about the availability (12/99, 12%) and allocation (14/99, 14%) of resources, financial aspects (26/99, 26%), reliability, security, and confidentially of the intervention itself (29/99, 29%), and the lack of education and training (6/99, 6%). Conclusions Health care professionals and patients acknowledge the benefits arising from the implementation and use of eHealth services in daily dermatology practice. However, some important barriers were identified that might be useful in addressing the implementation strategy in order to enhance the implementation success of eHealth interventions in dermatology. PMID:28874336

  10. Evaluating the Process of Generating a Clinical Trial Protocol

    PubMed Central

    Franciosi, Lui G.; Butterfield, Noam N.; MacLeod, Bernard A.

    2002-01-01

    The research protocol is the principal document in the conduct of a clinical trial. Its generation requires knowledge about the research problem, the potential experimental confounders, and the relevant Good Clinical Practices for conducting the trial. However, such information is not always available to authors during the writing process. A checklist of over 80 items has been developed to better understand the considerations made by authors in generating a protocol. It is based on the most cited requirements for designing and implementing the randomised controlled trial. Items are categorised according to the trial's research question, experimental design, statistics, ethics, and standard operating procedures. This quality assessment tool evaluates the extent that a generated protocol deviates from the best-planned clinical trial.

  11. Developing an evidence-based nursing protocol on wound drain management for total joint arthroplasty.

    PubMed

    Tsang, Lap Fung

    2015-05-01

    Although various drains have long been used for many years in total joint replacement, there is a paucity of evidence for the benefit of drain applications. Evidence suggests inconsistent practice in the use of drainage systems, whether intermittently applying suction or free of suction in the application of drainage systems, as well as the optimal timing for wound drain removal. It aimed to perform a systematic review to develop an evidence-based nursing protocol to manage wound drainage following total joint arthroplasty. A comprehensive systematic review of available evidence up to 2013. Searches of the EMBASE, Cochrane library, CINAHL, Medline electronic databases and an internet search by Yahoo and Google engine returned 2840 records, of which 11 met the inclusion criteria for this review. A further two papers were obtained through scanning the reference lists of those articles included from the initial literature search. Different clamping times were retrieved from the literature. A protocol was adapted for clinical application according to the summary of the retrieved information. It is suggested that clamping is performed 1 h after the insertion of suction drains post-operatively in the operating theatre. Wound drains should be clamped for 1 h if blood loss is more than 600 ml in 6 h in first 24 h. Wound drains should be clamped for 1 h if blood loss is more than 800 ml in 8 h thereafter. It is suggested that the drainage reservoir bottle should be mark and findings recorded in line with the principle of drain clamping. This means that the amount of drainage is measured and recorded every 6 h in first 24 h and every 8 h thereafter. It is suggested that wound drains should be remove before 48 h after TJR. If blood loss is less than 50 ml in past 6 h or less than 70 ml in past 8 h, the drain should be remove and the wound site should be monitored closely. This paper has guided nurses to develop an evidence-based protocol to improve patient care on wound drain

  12. Video- or text-based e-learning when teaching clinical procedures? A randomized controlled trial.

    PubMed

    Buch, Steen Vigh; Treschow, Frederik Philip; Svendsen, Jesper Brink; Worm, Bjarne Skjødt

    2014-01-01

    This study investigated the effectiveness of two different levels of e-learning when teaching clinical skills to medical students. Sixty medical students were included and randomized into two comparable groups. The groups were given either a video- or text/picture-based e-learning module and subsequently underwent both theoretical and practical examination. A follow-up test was performed 1 month later. The students in the video group performed better than the illustrated text-based group in the practical examination, both in the primary test (P<0.001) and in the follow-up test (P<0.01). Regarding theoretical knowledge, no differences were found between the groups on the primary test, though the video group performed better on the follow-up test (P=0.04). Video-based e-learning is superior to illustrated text-based e-learning when teaching certain practical clinical skills.

  13. "The mirror" and "the village": a new method for teaching practice-based learning and improvement and systems-based practice.

    PubMed

    Ziegelstein, Roy C; Fiebach, Nicholas H

    2004-01-01

    Practice-based learning and improvement (PBLI) and systems-based practice (SBP) may be conceptually difficult for both residents and faculty. Methods for introducing these concepts are needed if PBLI and SBP are to be incorporated into education and practice. In 2001, PBLI and SBP were introduced at Johns Hopkins Bayview Medical Center in Baltimore, Maryland, using the metaphors "the mirror" and "the village." PBLI was likened to residents' holding up a mirror to document, assess, and improve their practice. Specific tools for residents (e.g., weekly morbidity and mortality morning reports, continuity clinic chart self-audits, and resident learning portfolios) became the mirrors. SBP was introduced through specific training activities (e.g., multidisciplinary patient care rounds, nursing evaluations, and quality assessment-systems improvement exercises) using the metaphor of the village made famous by Hillary Clinton in the phrase: "It takes a village to raise a child." Residents completed a questionnaire in which they rated these initiatives' impact on their training. The majority of residents who participated in specific activities agreed that quality assessment-systems improvement exercises (92.9%), multidisciplinary rounds (92.1%), morbidity and mortality morning reports (86.8%), clinic chart self-audits (76.4%), and nursing evaluations (52.8%) helped to improve their proficiency in specific aspects of PBLI and SBP. Residents' retrospective self-assessments of their PBLI abilities demonstrated significant improvement after the introduction of specific training activities. PBLI and SBP can be introduced effectively in residency training by incorporating specific activities that use the metaphors of the mirror and the village.

  14. Preoperative magnetic resonance imaging protocol for endoscopic cranial base image-guided surgery.

    PubMed

    Grindle, Christopher R; Curry, Joseph M; Kang, Melissa D; Evans, James J; Rosen, Marc R

    2011-01-01

    Despite the increasing utilization of image-guided surgery, no radiology protocols for obtaining magnetic resonance (MR) imaging of adequate quality are available in the current literature. At our institution, more than 300 endonasal cranial base procedures including pituitary, extended pituitary, and other anterior skullbase procedures have been performed in the past 3 years. To facilitate and optimize preoperative evaluation and assessment, there was a need to develop a magnetic resonance protocol. Retrospective Technical Assessment was performed. Through a collaborative effort between the otolaryngology, neurosurgery, and neuroradiology departments at our institution, a skull base MR image-guided (IGS) protocol was developed with several ends in mind. First, it was necessary to generate diagnostic images useful for the more frequently seen pathologies to improve work flow and limit the expense and inefficiency of case specific MR studies. Second, it was necessary to generate sequences useful for IGS, preferably using sequences that best highlight that lesion. Currently, at our institution, all MR images used for IGS are obtained using this protocol as part of preoperative planning. The protocol that has been developed allows for thin cut precontrast and postcontrast axial cuts that can be used to plan intraoperative image guidance. It also obtains a thin cut T2 axial series that can be compiled separately for intraoperative imaging, or may be fused with computed tomographic images for combined modality. The outlined protocol obtains image sequences effective for diagnostic and operative purposes for image-guided surgery using both T1 and T2 sequences. Copyright © 2011 Elsevier Inc. All rights reserved.

  15. Evidence-based clinical practice, [corrected] evidence-based medicine and the Cochrane collaboration.

    PubMed

    Gambrill, E

    1999-03-01

    Encouraging professionals in training and later to consider practice-related research findings when making important clinical decisions is an on-going concern. Evidenced-Based Medicine (EBM) and the Cochrane Collaboration (CC) provide a source of tools and ideas for doing so, as well as a roster of colleagues who share this interest. Evidenced-based medicine involves integrating clinical expertise with the best available external evidence from systematic research as well as considering the values and expectations of patients/clients. Advantage can be taken of educational formats developed in EBM, such as problem-based learning and critical-appraisal workshops in which participants learn how to ask key answerable questions related to important clinical practice questions (e.g., regarding effectiveness, accuracy of assessment measures, prediction, prevention, and quality of clinical practice guidelines) and to access and critically appraise related research. The Cochrane Collaboration is a world-wide network of centers that prepare, maintain, and disseminate high-quality systematic reviews on the efficacy of healthcare. These databases allow access to evidence related to clinical practice decisions. Forging reciprocal working relationships with those involved in EBM reciprocal and the CC should contribute to the pursuit of shared goals such as basing clinical decisions on the best-available evidence and involving clients as informed consumers.

  16. Impersonation attack on a quantum secure direct communication and authentication protocol with improvement

    NASA Astrophysics Data System (ADS)

    Amerimehr, Ali; Hadain Dehkordi, Massoud

    2018-03-01

    We analyze the security of a quantum secure direct communication and authentication protocol based on single photons. We first give an impersonation attack on the protocol. The cryptanalysis shows that there is a gap in the authentication procedure of the protocol so that an opponent can reveal the secret information by an undetectable attempt. We then propose an improvement for the protocol and show it closes the gap by applying a mutual authentication procedure. In the improved protocol single photons are transmitted once in a session, so it is easy to implement as the primary protocol. Furthermore, we use a novel technique for secret order rearrangement of photons by which not only quantum storage is eliminated also a secret key can be reused securely. So the new protocol is applicable in practical approaches like embedded system devices.

  17. Using semantics for representing experimental protocols.

    PubMed

    Giraldo, Olga; García, Alexander; López, Federico; Corcho, Oscar

    2017-11-13

    An experimental protocol is a sequence of tasks and operations executed to perform experimental research in biological and biomedical areas, e.g. biology, genetics, immunology, neurosciences, virology. Protocols often include references to equipment, reagents, descriptions of critical steps, troubleshooting and tips, as well as any other information that researchers deem important for facilitating the reusability of the protocol. Although experimental protocols are central to reproducibility, the descriptions are often cursory. There is the need for a unified framework with respect to the syntactic structure and the semantics for representing experimental protocols. In this paper we present "SMART Protocols ontology", an ontology for representing experimental protocols. Our ontology represents the protocol as a workflow with domain specific knowledge embedded within a document. We also present the S ample I nstrument R eagent O bjective (SIRO) model, which represents the minimal common information shared across experimental protocols. SIRO was conceived in the same realm as the Patient Intervention Comparison Outcome (PICO) model that supports search, retrieval and classification purposes in evidence based medicine. We evaluate our approach against a set of competency questions modeled as SPARQL queries and processed against a set of published and unpublished protocols modeled with the SP Ontology and the SIRO model. Our approach makes it possible to answer queries such as Which protocols use tumor tissue as a sample. Improving reporting structures for experimental protocols requires collective efforts from authors, peer reviewers, editors and funding bodies. The SP Ontology is a contribution towards this goal. We build upon previous experiences and bringing together the view of researchers managing protocols in their laboratory work. Website: https://smartprotocols.github.io/ .

  18. An Individualized, Perception-Based Protocol to Investigate Human Physiological Responses to Cooling

    PubMed Central

    Coolbaugh, Crystal L.; Bush, Emily C.; Galenti, Elizabeth S.; Welch, E. Brian; Towse, Theodore F.

    2018-01-01

    Cold exposure, a known stimulant of the thermogenic effects of brown adipose tissue (BAT), is the most widely used method to study BAT physiology in adult humans. Recently, individualized cooling has been recommended to standardize the physiological cold stress applied across participants, but critical experimental details remain unclear. The purpose of this work was to develop a detailed methodology for an individualized, perception-based protocol to investigate human physiological responses to cooling. Participants were wrapped in two water-circulating blankets and fitted with skin temperature probes to estimate BAT activity and peripheral vasoconstriction. We created a thermoesthesia graphical user interface (tGUI) to continuously record the subject's perception of cooling and shivering status during the cooling protocol. The protocol began with a 15 min thermoneutral phase followed by a series of 10 min cooling phases and concluded when sustained shivering (>1 min duration) occurred. Researchers used perception of cooling feedback (tGUI ratings) to manually adjust and personalize the water temperature at each cooling phase. Blanket water temperatures were recorded continuously during the protocol. Twelve volunteers (ages: 26.2 ± 1.4 years; 25% female) completed a feasibility study to evaluate the proposed protocol. Water temperature, perception of cooling, and shivering varied considerably across participants in response to cooling. Mean clavicle skin temperature, a surrogate measure of BAT activity, decreased (−0.99°C, 95% CI: −1.7 to −0.25°C, P = 0.16) after the cooling protocol, but an increase in supraclavicular skin temperature was observed in 4 participants. A strong positive correlation was also found between thermoesthesia and peripheral vasoconstriction (ρ = 0.84, P < 0.001). The proposed individualized, perception-based protocol therefore has potential to investigate the physiological responses to cold stress applied across populations with

  19. A network monitor for HTTPS protocol based on proxy

    NASA Astrophysics Data System (ADS)

    Liu, Yangxin; Zhang, Lingcui; Zhou, Shuguang; Li, Fenghua

    2016-10-01

    With the explosive growth of harmful Internet information such as pornography, violence, and hate messages, network monitoring is essential. Traditional network monitors is based mainly on bypass monitoring. However, we can't filter network traffic using bypass monitoring. Meanwhile, only few studies focus on the network monitoring for HTTPS protocol. That is because HTTPS data is in the encrypted traffic, which makes it difficult to monitor. This paper proposes a network monitor for HTTPS protocol based on proxy. We adopt OpenSSL to establish TLS secure tunes between clients and servers. Epoll is used to handle a large number of concurrent client connections. We also adopt Knuth- Morris-Pratt string searching algorithm (or KMP algorithm) to speed up the search process. Besides, we modify request packets to reduce the risk of errors and modify response packets to improve security. Experiments show that our proxy can monitor the content of all tested HTTPS websites efficiently with little loss of network performance.

  20. A Hybrid Path-Oriented Code Assignment CDMA-Based MAC Protocol for Underwater Acoustic Sensor Networks

    PubMed Central

    Chen, Huifang; Fan, Guangyu; Xie, Lei; Cui, Jun-Hong

    2013-01-01

    Due to the characteristics of underwater acoustic channel, media access control (MAC) protocols designed for underwater acoustic sensor networks (UWASNs) are quite different from those for terrestrial wireless sensor networks. Moreover, in a sink-oriented network with event information generation in a sensor field and message forwarding to the sink hop-by-hop, the sensors near the sink have to transmit more packets than those far from the sink, and then a funneling effect occurs, which leads to packet congestion, collisions and losses, especially in UWASNs with long propagation delays. An improved CDMA-based MAC protocol, named path-oriented code assignment (POCA) CDMA MAC (POCA-CDMA-MAC), is proposed for UWASNs in this paper. In the proposed MAC protocol, both the round-robin method and CDMA technology are adopted to make the sink receive packets from multiple paths simultaneously. Since the number of paths for information gathering is much less than that of nodes, the length of the spreading code used in the POCA-CDMA-MAC protocol is shorter greatly than that used in the CDMA-based protocols with transmitter-oriented code assignment (TOCA) or receiver-oriented code assignment (ROCA). Simulation results show that the proposed POCA-CDMA-MAC protocol achieves a higher network throughput and a lower end-to-end delay compared to other CDMA-based MAC protocols. PMID:24193100

  1. A hybrid path-oriented code assignment CDMA-based MAC protocol for underwater acoustic sensor networks.

    PubMed

    Chen, Huifang; Fan, Guangyu; Xie, Lei; Cui, Jun-Hong

    2013-11-04

    Due to the characteristics of underwater acoustic channel, media access control (MAC) protocols designed for underwater acoustic sensor networks (UWASNs) are quite different from those for terrestrial wireless sensor networks. Moreover, in a sink-oriented network with event information generation in a sensor field and message forwarding to the sink hop-by-hop, the sensors near the sink have to transmit more packets than those far from the sink, and then a funneling effect occurs, which leads to packet congestion, collisions and losses, especially in UWASNs with long propagation delays. An improved CDMA-based MAC protocol, named path-oriented code assignment (POCA) CDMA MAC (POCA-CDMA-MAC), is proposed for UWASNs in this paper. In the proposed MAC protocol, both the round-robin method and CDMA technology are adopted to make the sink receive packets from multiple paths simultaneously. Since the number of paths for information gathering is much less than that of nodes, the length of the spreading code used in the POCA-CDMA-MAC protocol is shorter greatly than that used in the CDMA-based protocols with transmitter-oriented code assignment (TOCA) or receiver-oriented code assignment (ROCA). Simulation results show that the proposed POCA-CDMA-MAC protocol achieves a higher network throughput and a lower end-to-end delay compared to other CDMA-based MAC protocols.

  2. Fully Integrated Passive UHF RFID Tag for Hash-Based Mutual Authentication Protocol.

    PubMed

    Mikami, Shugo; Watanabe, Dai; Li, Yang; Sakiyama, Kazuo

    2015-01-01

    Passive radio-frequency identification (RFID) tag has been used in many applications. While the RFID market is expected to grow, concerns about security and privacy of the RFID tag should be overcome for the future use. To overcome these issues, privacy-preserving authentication protocols based on cryptographic algorithms have been designed. However, to the best of our knowledge, evaluation of the whole tag, which includes an antenna, an analog front end, and a digital processing block, that runs authentication protocols has not been studied. In this paper, we present an implementation and evaluation of a fully integrated passive UHF RFID tag that runs a privacy-preserving mutual authentication protocol based on a hash function. We design a single chip including the analog front end and the digital processing block. We select a lightweight hash function supporting 80-bit security strength and a standard hash function supporting 128-bit security strength. We show that when the lightweight hash function is used, the tag completes the protocol with a reader-tag distance of 10 cm. Similarly, when the standard hash function is used, the tag completes the protocol with the distance of 8.5 cm. We discuss the impact of the peak power consumption of the tag on the distance of the tag due to the hash function.

  3. Fully Integrated Passive UHF RFID Tag for Hash-Based Mutual Authentication Protocol

    PubMed Central

    Mikami, Shugo; Watanabe, Dai; Li, Yang; Sakiyama, Kazuo

    2015-01-01

    Passive radio-frequency identification (RFID) tag has been used in many applications. While the RFID market is expected to grow, concerns about security and privacy of the RFID tag should be overcome for the future use. To overcome these issues, privacy-preserving authentication protocols based on cryptographic algorithms have been designed. However, to the best of our knowledge, evaluation of the whole tag, which includes an antenna, an analog front end, and a digital processing block, that runs authentication protocols has not been studied. In this paper, we present an implementation and evaluation of a fully integrated passive UHF RFID tag that runs a privacy-preserving mutual authentication protocol based on a hash function. We design a single chip including the analog front end and the digital processing block. We select a lightweight hash function supporting 80-bit security strength and a standard hash function supporting 128-bit security strength. We show that when the lightweight hash function is used, the tag completes the protocol with a reader-tag distance of 10 cm. Similarly, when the standard hash function is used, the tag completes the protocol with the distance of 8.5 cm. We discuss the impact of the peak power consumption of the tag on the distance of the tag due to the hash function. PMID:26491714

  4. The Curriculum and Pedagogic Properties of Practice-Based Experiences: The Case of Midwifery Students

    ERIC Educational Resources Information Center

    Billett, Stephen; Sweet, Linda; Glover, Pauline

    2013-01-01

    This paper outlines curriculum considerations for the ordering, enactment and experiencing of practice-based experiences (e.g. practicums) in tertiary education programs developing occupational specific capacities. Increasingly, these programs are engaging students in practicum experiences (i.e. those in the circumstances of practice). These…

  5. Coping with Pain in the Motivational Context of Values: Comparison between an Acceptance-Based and a Cognitive Control-Based Protocol

    ERIC Educational Resources Information Center

    Paez-Blarrina, Marisa; Luciano, Carmen; Gutierrez-Martinez, Olga; Valdivia, Sonsoles; Rodriguez-Valverde, Miguel; Ortega, Jose

    2008-01-01

    This study compares the effect of an acceptance-based protocol (ACT) and a cognitive control-based (CONT) protocol on three measures of pain coping: tolerance, self-report, and believability. Specific methodological controls were employed to further isolate the role of the value of participating in a pain task, compared to previous investigations…

  6. Demonstration and Certification of Amphibian Ecological Risk Assessment Protocol. Cost and Performance Report (Version 2)

    DTIC Science & Technology

    2009-07-01

    sediment protocol, respectively). The soil protocol evaluates impacts to adult salamanders and the sediment protocol evaluates impacts to larval tadpoles ...the sediment protocol evaluates impacts to larval tadpoles . When selecting appropriate receptors to derive ERA-based remedial goals, amphibians...Sediment tests are conducted with recently hatched tadpoles (i.e., Rana pipiens; Gosner Stages 17-20). Young tadpoles are placed in beakers

  7. Rationale for the diabetic retinopathy clinical research network treatment protocol for center-involved diabetic macular edema.

    PubMed

    Aiello, Lloyd Paul; Beck, Roy W; Bressler, Neil M; Browning, David J; Chalam, K V; Davis, Matthew; Ferris, Frederick L; Glassman, Adam R; Maturi, Raj K; Stockdale, Cynthia R; Topping, Trexler M

    2011-12-01

    To describe the underlying principles used to develop a web-based algorithm that incorporated intravitreal anti-vascular endothelial growth factor (anti-VEGF) treatment for diabetic macular edema (DME) in a Diabetic Retinopathy Clinical Research Network (DRCR.net) randomized clinical trial. Discussion of treatment protocol for DME. Subjects with vision loss resulting from DME involving the center of the macula. The DRCR.net created an algorithm incorporating anti-VEGF injections in a comparative effectiveness randomized clinical trial evaluating intravitreal ranibizumab with prompt or deferred (≥24 weeks) focal/grid laser treatment in eyes with vision loss resulting from center-involved DME. Results confirmed that intravitreal ranibizumab with prompt or deferred laser provides superior visual acuity outcomes compared with prompt laser alone through at least 2 years. Duplication of this algorithm may not be practical for clinical practice. To share their opinion on how ophthalmologists might emulate the study protocol, participating DRCR.net investigators developed guidelines based on the algorithm's underlying rationale. Clinical guidelines based on a DRCR.net protocol. The treatment protocol required real-time feedback from a web-based data entry system for intravitreal injections, focal/grid laser treatment, and follow-up intervals. Guidance from this system indicated whether treatment was required or given at investigator discretion and when follow-up should be scheduled. Clinical treatment guidelines, based on the underlying clinical rationale of the DRCR.net protocol, include repeating treatment monthly as long as there is improvement in edema compared with the previous month or until the retina is no longer thickened. If thickening recurs or worsens after discontinuing treatment, treatment is resumed. Duplication of the approach used in the DRCR.net randomized clinical trial to treat DME involving the center of the macula with intravitreal ranibizumab may

  8. Lightweight UDP Pervasive Protocol in Smart Home Environment Based on Labview

    NASA Astrophysics Data System (ADS)

    Kurniawan, Wijaya; Hannats Hanafi Ichsan, Mochammad; Rizqika Akbar, Sabriansyah; Arwani, Issa

    2017-04-01

    TCP (Transmission Control Protocol) technology in a reliable environment was not a problem, but not in an environment where the entire Smart Home network connected locally. Currently employing pervasive protocols using TCP technology, when data transmission is sent, it would be slower because they have to perform handshaking process in advance and could not broadcast the data. On smart home environment, it does not need large size and complex data transmission between monitoring site and monitoring center required in Smart home strain monitoring system. UDP (User Datagram Protocol) technology is quick and simple on data transmission process. UDP can broadcast messages because the UDP did not require handshaking and with more efficient memory usage. LabVIEW is a programming language software for processing and visualization of data in the field of data acquisition. This paper proposes to examine Pervasive UDP protocol implementations in smart home environment based on LabVIEW. UDP coded in LabVIEW and experiments were performed on a PC and can work properly.

  9. Complexity theory and the "puzzling" competencies: Systems-based Practice And Practice-based Learning explored.

    PubMed

    Gonnering, Russell S

    2010-01-01

    Of all the clinical competencies, the least understood are Systems-Based Practice and Practice-Based Learning and Improvement. With a shift to competency-based education and evaluation across the spectrum of surgical education and practice, a clear understanding of the power and utility of each competency is paramount. Health care operates as a complex adaptive system, with dynamics foreign to many health care professionals and educators. The adaptation and evolution of such a system is related directly to both the individual and the organizational learning of the agents within the system and knowledge management strategies. Far from being "difficult," Systems-Based Practice and Practice-Based Learning form the heart of quality improvement initiatives and future productivity advances in health care. Copyright 2010 Association of Program Directors in Surgery. Published by Elsevier Inc. All rights reserved.

  10. Development of an alcohol withdrawal protocol: CNS collaborative exemplar.

    PubMed

    Phillips, Susan; Haycock, Camille; Boyle, Deborah

    2006-01-01

    The purpose of this process improvement project was to develop an Alcohol Withdrawal Syndrome (AWS) management protocol for acute care. The prevalence of alcohol abuse in our society presents challenges for health professionals, and few nurses have received formal education on the identification and treatment of AWS, which has frequently resulted in ineffective, nonstandardized care. However, nurses practicing in medical-surgical, emergency, trauma, and critical care settings must be astute in the assessment and management of AWS. DESIGN/BACKGROUND/RATIONALE: Following an analysis of existing management protocols, a behavioral health clinical nurse specialist was asked to lead a work team composed of physicians, pharmacists, and nurses to develop a new evidence-based alcohol withdrawal protocol for acute care. By implementing a standardized assessment tool and treatment protocol, clinical nurse specialists empowered nursing staff with strategies to prevent the serious medical complications associated with AWS. FINDINGS/OUTCOMES: The development and integration of a safe and effective treatment protocol to manage AWS was facilitated by collaborative, evidence-based decision making. Clinical experience and specialty expertise were integrated by clinical nurse specialists skilled in group dynamics, problem-solving, and the implementation of change. Improving care of patients in AWS is an exemplar for clinical nurse specialist roles as change agent and patient advocate.

  11. Pharmaceutical trials in general practice: the first 100 protocols. An audit by the clinical research ethics committee of the Royal College of General Practitioners.

    PubMed Central

    Wise, P.; Drury, M.

    1996-01-01

    OBJECTIVE: To assess the outcome of 100 general practice based, multicentre research projects submitted to the ethics committee of the Royal College of General Practitioners by pharmaceutical companies or their agents between 1984 and 1989. DESIGN: Analysis of consecutive submitted protocols for stated objectives, study design, and outcomes; detailed review of committee minutes and correspondence in relation to amendment and approval; assessment of final reports submitted at conclusion of studies. SUBJECTS: 82 finally approved protocols, embracing 34,523 proposed trial subjects and 1195 proposed general practice investigators. MAIN OUTCOME MEASURES: Success at enrolling subjects and investigators; commencement and completion data; validity of final report's assessment of efficacy, safety, tolerability, and acceptability; and method of use and dissemination of findings. RESULTS: 18 studies were not approved and 45 had to be amended. Randomised controlled trials comprised 46 of the original submissions. Remuneration considerations, inadequate information or consent sheets, pregnancy safety, the need to discontinue existing therapy, and suboptimal scientific content were major reasons for rejecting studies or asking for amendments. Of the 82 approved studies 8 were not started. Shortfalls of investigators (of 39%) and trial subjects (of 37%) and an overall 23% withdrawal rate were responsible for a significant incidence of inconclusive results. Within the six year follow up interval, only 19 of the studies had been formally published. CONCLUSIONS: This audit identified substantial ethical concerns in the process of approving multicentre general practice pharmaceutical research. PMID:8939118

  12. Laboratory Medicine Best Practice Guideline: Vitamins A, E and the Carotenoids in Blood

    PubMed Central

    Greaves, Ronda F; Woollard, Gerald A; Hoad, Kirsten E; Walmsley, Trevor A; Johnson, Lambro A; Briscoe, Scott; Koetsier, Sabrina; Harrower, Tamantha; Gill, Janice P

    2014-01-01

    Despite apparent method similarities between laboratories there appear to be confounding factors inhibiting uniform reporting and standardisation of vitamin assays. The Australasian Association of Clinical Biochemists (AACB) Vitamins Working Party, in conjunction with The Royal College of Pathologists of Australasia Quality Assurance Programs, has formulated a guideline to improve performance, reproducibility and accuracy of fat-soluble vitamin results. The aim of the guideline is to identify critical pre-analytical, analytical and post-analytical components of the analysis of vitamins A, E and carotenoids in blood to promote best practice and harmonisation. This best practice guideline has been developed with reference to the Centers for Disease Control and Prevention (CDC) “Laboratory Medicine Best Practices: Developing an Evidence-Based Review and Evaluation Process”. The CDC document cites an evaluation framework for generating best practice recommendations that are specific to laboratory medicine. These 50 recommendations proposed herein, were generated from a comprehensive literature search and the extensive combined experience of the AACB Vitamins Working Party members. They were formulated based on comparison between an impact assessment rating and strength of evidence and were classified as either: (1) strongly recommend, (2) recommend, (3) no recommendation for or against, or (4) recommend against. These best practice recommendations represent the consensus views, in association with peer reviewed evidence of the AACB Vitamins Working Party, towards best practice for the collection, analysis and interpretation of vitamins A, E and carotenoids in blood. PMID:25210208

  13. Latino Parent Home-Based Practices that Bolster Student Academic Persistence

    ERIC Educational Resources Information Center

    Mena, Jasmine A.

    2011-01-01

    Home-based parental involvement practices (i.e., educational encouragement, monitoring, and support) and their impact on students' academic persistence were investigated with a sample of 137, ninth-grade Latino students in a northeast high school. Structural Equation Modeling results indicate that the relationship between home-based parental…

  14. Team Science Approach to Developing Consensus on Research Good Practices for Practice-Based Research Networks: A Case Study.

    PubMed

    Campbell-Voytal, Kimberly; Daly, Jeanette M; Nagykaldi, Zsolt J; Aspy, Cheryl B; Dolor, Rowena J; Fagnan, Lyle J; Levy, Barcey T; Palac, Hannah L; Michaels, LeAnn; Patterson, V Beth; Kano, Miria; Smith, Paul D; Sussman, Andrew L; Williams, Robert; Sterling, Pamela; O'Beirne, Maeve; Neale, Anne Victoria

    2015-12-01

    Using peer learning strategies, seven experienced PBRNs working in collaborative teams articulated procedures for PBRN Research Good Practices (PRGPs). The PRGPs is a PBRN-specific resource to facilitate PBRN management and staff training, to promote adherence to study protocols, and to increase validity and generalizability of study findings. This paper describes the team science processes which culminated in the PRGPs. Skilled facilitators used team science strategies and methods from the Technology of Participation (ToP®), and the Consensus Workshop Method to support teams to codify diverse research expertise in practice-based research. The participatory nature of "sense-making" moved through identifiable stages. Lessons learned include (1) team input into the scope of the final outcome proved vital to project relevance; (2) PBRNs with diverse domains of research expertise contributed broad knowledge on each topic; and (3) ToP® structured facilitation techniques were critical for establishing trust and clarifying the "sense-making" process. © 2015 Wiley Periodicals, Inc.

  15. Supporting Implementation of Evidence-Based Practices through Practice-Based Coaching

    ERIC Educational Resources Information Center

    Snyder, Patricia A; Hemmeter, Mary Louise; Fox, Lise

    2015-01-01

    In active implementation science frameworks, coaching has been described as an important competency "driver" to ensure evidence-based practices are implemented as intended. Empirical evidence also has identified coaching as a promising job-embedded professional development strategy to support implementation of quality teaching practices.…

  16. A protocol for preparing, characterizing and using three RNA-specific, live cell imaging probes: E36, E144 and F22.

    PubMed

    Li, Qian; Chang, Young-Tae

    2006-01-01

    This protocol outlines a methodology for the preparation and characterization of three RNA-specific fluorescent probes (E36, E144 and F22) and their use in live cell imaging. It describes a detailed procedure for their chemical synthesis and purification; serial product characterization and quality control tests, including measurements of their fluorescence properties in solution, measurement of RNA specificity and analysis of cellular toxicity; and live cell staining and counterstaining with Hoechst or DAPI. Preparation and application of these RNA imaging probes takes 1 week.

  17. Chaotic maps and biometrics-based anonymous three-party authenticated key exchange protocol without using passwords

    NASA Astrophysics Data System (ADS)

    Xie, Qi; Hu, Bin; Chen, Ke-Fei; Liu, Wen-Hao; Tan, Xiao

    2015-11-01

    In three-party password authenticated key exchange (AKE) protocol, since two users use their passwords to establish a secure session key over an insecure communication channel with the help of the trusted server, such a protocol may suffer the password guessing attacks and the server has to maintain the password table. To eliminate the shortages of password-based AKE protocol, very recently, according to chaotic maps, Lee et al. [2015 Nonlinear Dyn. 79 2485] proposed a first three-party-authenticated key exchange scheme without using passwords, and claimed its security by providing a well-organized BAN logic test. Unfortunately, their protocol cannot resist impersonation attack, which is demonstrated in the present paper. To overcome their security weakness, by using chaotic maps, we propose a biometrics-based anonymous three-party AKE protocol with the same advantages. Further, we use the pi calculus-based formal verification tool ProVerif to show that our AKE protocol achieves authentication, security and anonymity, and an acceptable efficiency. Project supported by the Natural Science Foundation of Zhejiang Province, China (Grant No. LZ12F02005), the Major State Basic Research Development Program of China (Grant No. 2013CB834205), and the National Natural Science Foundation of China (Grant No. 61070153).

  18. Electronic Clinical Trial Protocol Distribution via the World-Wide Web

    PubMed Central

    Afrin, Lawrence B.; Kuppuswamy, Valarmathi; Slater, Barbara; Stuart, Robert K.

    1997-01-01

    Clinical trials today typically are inefficient, paper-based operations. Poor community physician awareness of available trials and difficult referral mechanisms also contribute to poor accrual. The Physicians Research Network (PRN) web was developed for more efficient trial protocol distribution and eligibility inquiries. The Medical University of South Carolina's Hollings Cancer Center trials program and two community oncology practices served as a testbed. In 581 man-hours over 18 months, 147 protocols were loaded into PRN. The trials program eliminated all protocol hardcopies except the masters, reduced photocopier use 59%, and saved 1.0 full-time equivalents (FTE), but 1.0 FTE was needed to manage PRN. There were no known security breaches, downtime, or content-related problems. Therefore, PRN is a paperless, user-preferred, reliable, secure method for distributing protocols and reducing distribution errors and delays because only a single copy of each protocol is maintained. Furthermore, PRN is being extended to serve other aspects of trial operations. PMID:8988471

  19. A Lightweight Protocol for Secure Video Streaming.

    PubMed

    Venčkauskas, Algimantas; Morkevicius, Nerijus; Bagdonas, Kazimieras; Damaševičius, Robertas; Maskeliūnas, Rytis

    2018-05-14

    The Internet of Things (IoT) introduces many new challenges which cannot be solved using traditional cloud and host computing models. A new architecture known as fog computing is emerging to address these technological and security gaps. Traditional security paradigms focused on providing perimeter-based protections and client/server point to point protocols (e.g., Transport Layer Security (TLS)) are no longer the best choices for addressing new security challenges in fog computing end devices, where energy and computational resources are limited. In this paper, we present a lightweight secure streaming protocol for the fog computing "Fog Node-End Device" layer. This protocol is lightweight, connectionless, supports broadcast and multicast operations, and is able to provide data source authentication, data integrity, and confidentiality. The protocol is based on simple and energy efficient cryptographic methods, such as Hash Message Authentication Codes (HMAC) and symmetrical ciphers, and uses modified User Datagram Protocol (UDP) packets to embed authentication data into streaming data. Data redundancy could be added to improve reliability in lossy networks. The experimental results summarized in this paper confirm that the proposed method efficiently uses energy and computational resources and at the same time provides security properties on par with the Datagram TLS (DTLS) standard.

  20. A Lightweight Protocol for Secure Video Streaming

    PubMed Central

    Morkevicius, Nerijus; Bagdonas, Kazimieras

    2018-01-01

    The Internet of Things (IoT) introduces many new challenges which cannot be solved using traditional cloud and host computing models. A new architecture known as fog computing is emerging to address these technological and security gaps. Traditional security paradigms focused on providing perimeter-based protections and client/server point to point protocols (e.g., Transport Layer Security (TLS)) are no longer the best choices for addressing new security challenges in fog computing end devices, where energy and computational resources are limited. In this paper, we present a lightweight secure streaming protocol for the fog computing “Fog Node-End Device” layer. This protocol is lightweight, connectionless, supports broadcast and multicast operations, and is able to provide data source authentication, data integrity, and confidentiality. The protocol is based on simple and energy efficient cryptographic methods, such as Hash Message Authentication Codes (HMAC) and symmetrical ciphers, and uses modified User Datagram Protocol (UDP) packets to embed authentication data into streaming data. Data redundancy could be added to improve reliability in lossy networks. The experimental results summarized in this paper confirm that the proposed method efficiently uses energy and computational resources and at the same time provides security properties on par with the Datagram TLS (DTLS) standard. PMID:29757988

  1. Evidence-Based Practice Guideline: Fall Prevention for Older Adults.

    PubMed

    Kruschke, Cheryl; Butcher, Howard K

    2017-11-01

    Falls are a major cause of injury and death annually for millions of individuals 65 and older. Older adults are at risk for falls for a variety of reasons regardless of where they live. Falls are defined as any sudden drop from one surface to a lower surface. The purpose of this fall prevention evidence-based practice guideline is to describe strategies that can identify individuals at risk for falls. A 10-step protocol including screening for falls, comprehensive fall assessment, gait and balance screening when necessary, and an individualized fall intervention program addressing specific fall risks is presented. Reassessing fall risk and fall prevention programs will ensure a proactive approach to reducing falls in the aging population. [Journal of Gerontological Nursing, 43(11), 15-21.]. Copyright 2017, SLACK Incorporated.

  2. Self-adaptive trust based ABR protocol for MANETs using Q-learning.

    PubMed

    Kumar, Anitha Vijaya; Jeyapal, Akilandeswari

    2014-01-01

    Mobile ad hoc networks (MANETs) are a collection of mobile nodes with a dynamic topology. MANETs work under scalable conditions for many applications and pose different security challenges. Due to the nomadic nature of nodes, detecting misbehaviour is a complex problem. Nodes also share routing information among the neighbours in order to find the route to the destination. This requires nodes to trust each other. Thus we can state that trust is a key concept in secure routing mechanisms. A number of cryptographic protection techniques based on trust have been proposed. Q-learning is a recently used technique, to achieve adaptive trust in MANETs. In comparison to other machine learning computational intelligence techniques, Q-learning achieves optimal results. Our work focuses on computing a score using Q-learning to weigh the trust of a particular node over associativity based routing (ABR) protocol. Thus secure and stable route is calculated as a weighted average of the trust value of the nodes in the route and associativity ticks ensure the stability of the route. Simulation results show that Q-learning based trust ABR protocol improves packet delivery ratio by 27% and reduces the route selection time by 40% over ABR protocol without trust calculation.

  3. Self-Adaptive Trust Based ABR Protocol for MANETs Using Q-Learning

    PubMed Central

    Jeyapal, Akilandeswari

    2014-01-01

    Mobile ad hoc networks (MANETs) are a collection of mobile nodes with a dynamic topology. MANETs work under scalable conditions for many applications and pose different security challenges. Due to the nomadic nature of nodes, detecting misbehaviour is a complex problem. Nodes also share routing information among the neighbours in order to find the route to the destination. This requires nodes to trust each other. Thus we can state that trust is a key concept in secure routing mechanisms. A number of cryptographic protection techniques based on trust have been proposed. Q-learning is a recently used technique, to achieve adaptive trust in MANETs. In comparison to other machine learning computational intelligence techniques, Q-learning achieves optimal results. Our work focuses on computing a score using Q-learning to weigh the trust of a particular node over associativity based routing (ABR) protocol. Thus secure and stable route is calculated as a weighted average of the trust value of the nodes in the route and associativity ticks ensure the stability of the route. Simulation results show that Q-learning based trust ABR protocol improves packet delivery ratio by 27% and reduces the route selection time by 40% over ABR protocol without trust calculation. PMID:25254243

  4. EXACT2: the semantics of biomedical protocols

    PubMed Central

    2014-01-01

    Background The reliability and reproducibility of experimental procedures is a cornerstone of scientific practice. There is a pressing technological need for the better representation of biomedical protocols to enable other agents (human or machine) to better reproduce results. A framework that ensures that all information required for the replication of experimental protocols is essential to achieve reproducibility. Methods We have developed the ontology EXACT2 (EXperimental ACTions) that is designed to capture the full semantics of biomedical protocols required for their reproducibility. To construct EXACT2 we manually inspected hundreds of published and commercial biomedical protocols from several areas of biomedicine. After establishing a clear pattern for extracting the required information we utilized text-mining tools to translate the protocols into a machine amenable format. We have verified the utility of EXACT2 through the successful processing of previously 'unseen' (not used for the construction of EXACT2) protocols. Results The paper reports on a fundamentally new version EXACT2 that supports the semantically-defined representation of biomedical protocols. The ability of EXACT2 to capture the semantics of biomedical procedures was verified through a text mining use case. In this EXACT2 is used as a reference model for text mining tools to identify terms pertinent to experimental actions, and their properties, in biomedical protocols expressed in natural language. An EXACT2-based framework for the translation of biomedical protocols to a machine amenable format is proposed. Conclusions The EXACT2 ontology is sufficient to record, in a machine processable form, the essential information about biomedical protocols. EXACT2 defines explicit semantics of experimental actions, and can be used by various computer applications. It can serve as a reference model for for the translation of biomedical protocols in natural language into a semantically

  5. Preparing practicing dentists to engage in practice-based research

    PubMed Central

    DeRouen, Timothy A.; Hujoel, Philippe; Leroux, Brian; Mancl, Lloyd; Sherman, Jeffrey; Hilton, Thomas; Berg, Joel; Ferracane, Jack

    2013-01-01

    Background The authors describe an educational program designed to prepare practicing dentists to engage in practice-based research in their practices—a trend receiving more emphasis and funding from the National Institute of Dental and Craniofacial Research (NIDCR). Methods The Northwest Practice-based REsearch Collaborative in Evidence-based DENTistry (PRECEDENT), an NIDCR-funded network of which the authors are members, developed a one-day educational program to educate practitioners in principles of good clinical research. The program has four components built around the following questions: “What is the question?”; “What are the options?”; “How do you evaluate the evidence?”; and “How do you conduct a study?” Results The intensive one-day program initially offered in early 2006, which concluded with applications of research principles to research topics of interest to practitioners, was well-received. Despite their admission that the research methodology by itself was not of great interest, the dentists recognized the importance of the background material in equipping them to conduct quality studies in their practices. Conclusions Dentists interested in participating in practice-based research view training in research methodology as helpful to becoming better practitioner-investigators. The PRECEDENT training program seemed to reinforce their interest. Practice Implications As dentistry evolves to become more evidence-based, more and more of the evidence will come from practice-based research. This training program prepares practicing dentists to become engaged in this trend. PMID:18310739

  6. Developing a Video-Based eHealth Intervention for HIV-Positive Gay, Bisexual, and Other Men Who Have Sex with Men: Study Protocol for a Randomized Controlled Trial.

    PubMed

    Hirshfield, Sabina; Downing, Martin J; Parsons, Jeffrey T; Grov, Christian; Gordon, Rachel J; Houang, Steven T; Scheinmann, Roberta; Sullivan, Patrick S; Yoon, Irene S; Anderson, Ian; Chiasson, Mary Ann

    2016-06-17

    Gay, bisexual, and other men who have sex with men (GBMSM) accounted for 67% of new US human immunodeficiency virus (HIV) infections in 2012; however, less than 40% of HIV-positive GBMSM are virally suppressed. Preventing transmission from virally unsuppressed men who have condomless anal sex (CAS) with serodiscordant partners is a public health imperative. New HIV infections in GBMSM are attributed in part to online access to sex partners; therefore, low-cost eHealth interventions are a unique opportunity to reach men where they meet partners. To describe the protocol of a randomized controlled trial evaluating whether video-based messaging delivered online may lead to reductions in serodiscordant CAS and increased HIV disclosure. Sex Positive!([+]) is a two-arm, phase III, video-based randomized controlled trial delivered online to GBMSM living with HIV. Participants in the intervention arm receive 10 video vignettes grounded in social learning and social cognitive theories that are designed to elicit critical thinking around issues of HIV transmission and disclosure. Participants in the attention control arm receive 10 video vignettes that focus on healthy living. All videos are optimized for mobile viewing. The study protocol includes five online assessments conducted over a 1-year period among 1500 US white, black, or Hispanic/Latino GBMSM living with HIV who report suboptimal antiretroviral therapy (ART) adherence or a detectable viral load in the past 12 months and recent CAS (past 6 months) with HIV-negative or unknown status male partners. Compared to the control arm, we hypothesize that men who watch the intervention videos will report at 12-month follow-up significantly fewer serodiscordant CAS partners, increased HIV disclosure, and improved social cognition (eg, condom use self-efficacy, perceived responsibility). Participant recruitment began in June 2015 and ended in December 2015. This protocol describes the underlying theoretical framework and

  7. Developing a Video-Based eHealth Intervention for HIV-Positive Gay, Bisexual, and Other Men Who Have Sex with Men: Study Protocol for a Randomized Controlled Trial

    PubMed Central

    Downing Jr, Martin J; Parsons, Jeffrey T; Grov, Christian; Gordon, Rachel J; Houang, Steven T; Scheinmann, Roberta; Sullivan, Patrick S; Yoon, Irene S; Anderson, Ian; Chiasson, Mary Ann

    2016-01-01

    Background Gay, bisexual, and other men who have sex with men (GBMSM) accounted for 67% of new US human immunodeficiency virus (HIV) infections in 2012; however, less than 40% of HIV-positive GBMSM are virally suppressed. Preventing transmission from virally unsuppressed men who have condomless anal sex (CAS) with serodiscordant partners is a public health imperative. New HIV infections in GBMSM are attributed in part to online access to sex partners; therefore, low-cost eHealth interventions are a unique opportunity to reach men where they meet partners. Objective To describe the protocol of a randomized controlled trial evaluating whether video-based messaging delivered online may lead to reductions in serodiscordant CAS and increased HIV disclosure. Methods Sex Positive![+] is a two-arm, phase III, video-based randomized controlled trial delivered online to GBMSM living with HIV. Participants in the intervention arm receive 10 video vignettes grounded in social learning and social cognitive theories that are designed to elicit critical thinking around issues of HIV transmission and disclosure. Participants in the attention control arm receive 10 video vignettes that focus on healthy living. All videos are optimized for mobile viewing. The study protocol includes five online assessments conducted over a 1-year period among 1500 US white, black, or Hispanic/Latino GBMSM living with HIV who report suboptimal antiretroviral therapy (ART) adherence or a detectable viral load in the past 12 months and recent CAS (past 6 months) with HIV-negative or unknown status male partners. Compared to the control arm, we hypothesize that men who watch the intervention videos will report at 12-month follow-up significantly fewer serodiscordant CAS partners, increased HIV disclosure, and improved social cognition (eg, condom use self-efficacy, perceived responsibility). Results Participant recruitment began in June 2015 and ended in December 2015. Conclusions This protocol

  8. Nuclear Cardiology Practices and Radiation Exposure in the Oceania Region: Results From the IAEA Nuclear Cardiology Protocols Study (INCAPS).

    PubMed

    Biswas, Sinjini; Better, Nathan; Pascual, Thomas N B; Mercuri, Mathew; Vitola, João V; Karthikeyan, Ganesan; Westcott, James; Alexánderson, Erick; Allam, Adel H; Al-Mallah, Mouaz H; Bom, Henry Hee-Seung; Bouyoucef, Salah E; Flotats, Albert; Jerome, Scott; Kaufman, Philip A; Lele, Vikram; Luxenburg, Osnat; Mahmarian, John J; Shaw, Leslee J; Underwood, S Richard; Rehani, Madan; Kashyap, Ravi; Dondi, Maurizio; Paez, Diana; Einstein, Andrew J

    2017-01-01

    There is concern about radiation exposure with radionuclide myocardial perfusion imaging (MPI). This sub-study of the International Atomic Energy Agency (IAEA) Nuclear Cardiology Protocols Study reports radiation doses from MPI, and use of dose-optimisation protocols in Australia and New Zealand (ANZ), and compares them with data from the rest of the world. Data were collected from 7911 MPI studies performed in 308 laboratories worldwide in one week in 2013, including 439 MPI studies from 34 ANZ laboratories. For each laboratory, effective radiation dose (ED) and a quality index (QI) score (out of 8) based on pre-specified "best practices" was determined. In ANZ patients, ED ranged from 0.9-17.9 milliSievert (mSv). Median ED was similar in ANZ compared with the rest of the world (10.0 (IQR: 6.5-11.7) vs. 10.0 (IQR 6.4-12.6, P=0.15), as were mean QI scores (5.5±0.7 vs. 5.4±1.3, P=0.84). Use of stress-only imaging (17.6% vs. 31.8% of labs, P=0.09) and weight-based dosing of technetium-99m (14.7% vs. 30.3%, P=0.07) was lower in ANZ compared with the rest of the world but this difference was not statistically significant. Median ED was significantly lower in metropolitan versus non-metropolitan laboratories (10.1 mSv vs. 11.6 mSv, P<0.01), although mean QI scores were similar (5.4±0.8 vs. 5.5±0.7, P=0.75). Across ANZ, there is variability in ED from MPI, and use of radiation safety practices, particularly between metropolitan and non-metropolitan laboratories. Overall, ANZ laboratories have a similar median ED to laboratories in the rest of the world. Copyright © 2016 Australian and New Zealand Society of Cardiac and Thoracic Surgeons (ANZSCTS) and the Cardiac Society of Australia and New Zealand (CSANZ). Published by Elsevier B.V. All rights reserved.

  9. Cure Cycle Design Methodology for Fabricating Reactive Resin Matrix Fiber Reinforced Composites: A Protocol for Producing Void-free Quality Laminates

    NASA Technical Reports Server (NTRS)

    Hou, Tan-Hung

    2014-01-01

    For the fabrication of resin matrix fiber reinforced composite laminates, a workable cure cycle (i.e., temperature and pressure profiles as a function of processing time) is needed and is critical for achieving void-free laminate consolidation. Design of such a cure cycle is not trivial, especially when dealing with reactive matrix resins. An empirical "trial and error" approach has been used as common practice in the composite industry. Such an approach is not only costly, but also ineffective at establishing the optimal processing conditions for a specific resin/fiber composite system. In this report, a rational "processing science" based approach is established, and a universal cure cycle design protocol is proposed. Following this protocol, a workable and optimal cure cycle can be readily and rationally designed for most reactive resin systems in a cost effective way. This design protocol has been validated through experimental studies of several reactive polyimide composites for a wide spectrum of usage that has been documented in the previous publications.

  10. Standardisation of neonatal clinical practice.

    PubMed

    Bhutta, Z A; Giuliani, F; Haroon, A; Knight, H E; Albernaz, E; Batra, M; Bhat, B; Bertino, E; McCormick, K; Ochieng, R; Rajan, V; Ruyan, P; Cheikh Ismail, L; Paul, V

    2013-09-01

    The International Fetal and Newborn Growth Consortium for the 21(st) Century (INTERGROWTH-21(st) ) is a large-scale, population-based, multicentre project involving health institutions from eight geographically diverse countries, which aims to assess fetal, newborn and preterm growth under optimal conditions. Given the multicentre nature of the project and the expected number of preterm births, it is vital that all centres follow the same standardised clinical care protocols to assess and manage preterm infants, so as to ensure maximum validity of the resulting standards as indicators of growth and nutrition with minimal confounding. Moreover, it is well known that evidence-based clinical practice guidelines can reduce the delivery of inappropriate care and support the introduction of new knowledge into clinical practice. The INTERGROWTH-21(st) Neonatal Group produced an operations manual, which reflects the consensus reached by members of the group regarding standardised definitions of neonatal morbidities and the minimum standards of care to be provided by all centres taking part in the project. The operational definitions and summary management protocols were developed by consensus through a Delphi process based on systematic reviews of relevant guidelines and management protocols by authoritative bodies. This paper describes the process of developing the Basic Neonatal Care Manual, as well as the morbidity definitions and standardised neonatal care protocols applied across all the INTERGROWTH-21(st) participating centres. Finally, thoughts about implementation strategies are presented. © 2013 Royal College of Obstetricians and Gynaecologists.

  11. Wireless access to a pharmaceutical database: A demonstrator for data driven Wireless Application Protocol applications in medical information processing

    PubMed Central

    Hansen, Michael Schacht

    2001-01-01

    Background The Wireless Application Protocol technology implemented in newer mobile phones has built-in facilities for handling much of the information processing needed in clinical work. Objectives To test a practical approach we ported a relational database of the Danish pharmaceutical catalogue to Wireless Application Protocol using open source freeware at all steps. Methods We used Apache 1.3 web software on a Linux server. Data containing the Danish pharmaceutical catalogue were imported from an ASCII file into a MySQL 3.22.32 database using a Practical Extraction and Report Language script for easy update of the database. Data were distributed in 35 interrelated tables. Each pharmaceutical brand name was given its own card with links to general information about the drug, active substances, contraindications etc. Access was available through 1) browsing therapeutic groups and 2) searching for a brand name. The database interface was programmed in the server-side scripting language PHP3. Results A free, open source Wireless Application Protocol gateway to a pharmaceutical catalogue was established to allow dial-in access independent of commercial Wireless Application Protocol service providers. The application was tested on the Nokia 7110 and Ericsson R320s cellular phones. Conclusions We have demonstrated that Wireless Application Protocol-based access to a dynamic clinical database can be established using open source freeware. The project opens perspectives for a further integration of Wireless Application Protocol phone functions in clinical information processing: Global System for Mobile communication telephony for bilateral communication, asynchronous unilateral communication via e-mail and Short Message Service, built-in calculator, calendar, personal organizer, phone number catalogue and Dictaphone function via answering machine technology. An independent Wireless Application Protocol gateway may be placed within hospital firewalls, which may be an

  12. A web-based computer-tailored smoking prevention programme for primary school children: intervention design and study protocol

    PubMed Central

    2012-01-01

    Background Although the number of smokers has declined in the last decade, smoking is still a major health problem among youngsters and adolescents. For this reason, there is a need for effective smoking prevention programmes targeting primary school children. A web-based computer-tailored feedback programme may be an effective intervention to stimulate youngsters not to start smoking, and increase their knowledge about the adverse effects of smoking and their attitudes and self-efficacy regarding non-smoking. Methods & design This paper describes the development and evaluation protocol of a web-based out-of-school smoking prevention programme for primary school children (age 10-13 years) entitled ‘Fun without Smokes’. It is a transformation of a postal mailed intervention to a web-based intervention. Besides this transformation the effects of prompts will be examined. This web-based intervention will be evaluated in a 2-year cluster randomised controlled trial (c-RCT) with three study arms. An intervention and intervention + prompt condition will be evaluated for effects on smoking behaviour, compared with a no information control condition. Information about pupils’ smoking status and other factors related to smoking will be obtained using a web-based questionnaire. After completing the questionnaire pupils in both intervention conditions will receive three computer-tailored feedback letters in their personal e-mail box. Attitudes, social influences and self-efficacy expectations will be the content of these personalised feedback letters. Pupils in the intervention + prompt condition will - in addition to the personalised feedback letters - receive e-mail and SMS messages prompting them to revisit the ‘Fun without Smokes’ website. The main outcome measures will be ever smoking and the utilisation of the ‘Fun without Smokes’ website. Measurements will be carried out at baseline, 12 months and 24 months of follow-up. Discussion The present study

  13. Blended care vs. usual care in the treatment of depressive symptoms and disorders in general practice [BLENDING]: study protocol of a non-inferiority randomized trial.

    PubMed

    Massoudi, Btissame; Blanker, Marco H; van Valen, Evelien; Wouters, Hans; Bockting, Claudi L H; Burger, Huibert

    2017-06-13

    The majority of patients with depressive disorders are treated by general practitioners (GPs) and are prescribed antidepressant medication. Patients prefer psychological treatments but they are under-used, mainly due to time constraints and limited accessibility. A promising approach to deliver psychological treatment is blended care, i.e. guided online treatment. However, the cost-effectiveness of blended care formatted as an online psychological treatment supported by the patients' own GP or general practice mental health worker (MHW) in routine primary care is unknown. We aim to demonstrate non-inferiority of blended care compared with usual care in patients with depressive symptoms or a depressive disorder in general practice. Additionally, we will explore the real-time course over the day of emotions and affect, and events within individuals during treatment. This is a pragmatic non-inferiority trial including 300 patients with depressive symptoms, recruited by collaborating GPs and MHWs. After inclusion, participants are randomized to either blended care or usual care in routine general practice. Blended care consists of the 'Act and Feel' treatment: an eight-week web-based program based on behavioral activation with integrated monitoring of depressive symptomatology and automatized feedback. GPs or their MHWs coach the participants through regular face-to-face or telephonic consultations with at least three sessions. Depressive symptomatology, health status, functional impairment, treatment satisfaction, daily activities and resource use are assessed during a follow-up period of 12 months. During treatment, real-time fluctuations in emotions and affect, and daily events will be rated using ecological momentary assessment. The primary outcome is the reduction of depressive symptoms from baseline to three months follow-up. We will conduct intention-to-treat analyses and supplementary per-protocol analyses. This trial will show whether blended care might be an

  14. Use of an evidence-based protocol to screen for sleep-disordered breathing in a heart failure disease management clinic.

    PubMed

    Garner, Shelby L; Traverse, Ramona D

    2014-01-01

    Undiagnosed and untreated sleep-disordered breathing can lead to negative health outcomes and increased utilization of health resources among patients with heart failure. The purpose of this evidence-based practice project was to implement and evaluate a new multifaceted sleep-disordered breathing screening protocol in a heart failure disease management clinic. The combined use of a symptoms questionnaire, the Epworth sleepiness scale, and overnight pulse oximetry was significantly more effective in identifying patients with a positive diagnosis of sleep-disordered breathing than using the Epworth sleepiness scale alone (P < .05).

  15. A decentralized fuzzy C-means-based energy-efficient routing protocol for wireless sensor networks.

    PubMed

    Alia, Osama Moh'd

    2014-01-01

    Energy conservation in wireless sensor networks (WSNs) is a vital consideration when designing wireless networking protocols. In this paper, we propose a Decentralized Fuzzy Clustering Protocol, named DCFP, which minimizes total network energy dissipation to promote maximum network lifetime. The process of constructing the infrastructure for a given WSN is performed only once at the beginning of the protocol at a base station, which remains unchanged throughout the network's lifetime. In this initial construction step, a fuzzy C-means algorithm is adopted to allocate sensor nodes into their most appropriate clusters. Subsequently, the protocol runs its rounds where each round is divided into a CH-Election phase and a Data Transmission phase. In the CH-Election phase, the election of new cluster heads is done locally in each cluster where a new multicriteria objective function is proposed to enhance the quality of elected cluster heads. In the Data Transmission phase, the sensing and data transmission from each sensor node to their respective cluster head is performed and cluster heads in turn aggregate and send the sensed data to the base station. Simulation results demonstrate that the proposed protocol improves network lifetime, data delivery, and energy consumption compared to other well-known energy-efficient protocols.

  16. A Decentralized Fuzzy C-Means-Based Energy-Efficient Routing Protocol for Wireless Sensor Networks

    PubMed Central

    2014-01-01

    Energy conservation in wireless sensor networks (WSNs) is a vital consideration when designing wireless networking protocols. In this paper, we propose a Decentralized Fuzzy Clustering Protocol, named DCFP, which minimizes total network energy dissipation to promote maximum network lifetime. The process of constructing the infrastructure for a given WSN is performed only once at the beginning of the protocol at a base station, which remains unchanged throughout the network's lifetime. In this initial construction step, a fuzzy C-means algorithm is adopted to allocate sensor nodes into their most appropriate clusters. Subsequently, the protocol runs its rounds where each round is divided into a CH-Election phase and a Data Transmission phase. In the CH-Election phase, the election of new cluster heads is done locally in each cluster where a new multicriteria objective function is proposed to enhance the quality of elected cluster heads. In the Data Transmission phase, the sensing and data transmission from each sensor node to their respective cluster head is performed and cluster heads in turn aggregate and send the sensed data to the base station. Simulation results demonstrate that the proposed protocol improves network lifetime, data delivery, and energy consumption compared to other well-known energy-efficient protocols. PMID:25162060

  17. A research-based child welfare employee selection protocol: strengthening retention of the workforce.

    PubMed

    Ellett, Alberta J; Ellett, Chad D; Ellis, Jacquelyn; Lerner, Betsy

    2009-01-01

    This article describes the development and initial implementation of a new employee selection protocol (ESP) for child welfare grounded in the results of recent large-scale employee retention studies and a set of research-based, minimally essential knowledge, skills, abilities, and values. The complete ESP consists of a sequenced set of Web- and site-based assessment processes and procedures for potential applicants. Using the ESP, applicants and employers make informed decisions about the goodness of fit between the applicant and the demands of a career in child welfare. To date, the new ESP has been piloted in three Georgia Division of Family and Children Services (DFCS) regions and implemented by all nine colleges and universities participating in IV-E child welfare education programs. Evaluation data collected from students and new employees in one DFCS region strongly support the value of the ESP Web-based activities to make a more informed decision about whether to apply for the IV-E stipends and child welfare positions. Feedback from trained ESP assessors supports the value of various ESP activities. A major goal of implementing the ESP is to select more professionally committed and highly qualified applicants to strengthen employee retention and outcomes for children and families.

  18. Developing a Web-Based Nursing Practice and Research Information Management System: A Pilot Study.

    PubMed

    Choi, Jeeyae; Lapp, Cathi; Hagle, Mary E

    2015-09-01

    Many hospital information systems have been developed and implemented to collect clinical data from the bedside and have used the information to improve patient care. Because of a growing awareness that the use of clinical information improves quality of care and patient outcomes, measuring tools (electronic and paper based) have been developed, but most of them require multiple steps of data collection and analysis. This necessitated the development of a Web-based Nursing Practice and Research Information Management System that processes clinical nursing data to measure nurses' delivery of care and its impact on patient outcomes and provides useful information to clinicians, administrators, researchers, and policy makers at the point of care. This pilot study developed a computer algorithm based on a falls prevention protocol and programmed the prototype Web-based Nursing Practice and Research Information Management System. It successfully measured performance of nursing care delivered and its impact on patient outcomes successfully using clinical nursing data from the study site. Although Nursing Practice and Research Information Management System was tested with small data sets, results of study revealed that it has the potential to measure nurses' delivery of care and its impact on patient outcomes, while pinpointing components of nursing process in need of improvement.

  19. Intervention mapping protocol for developing a theory-based diabetes self-management education program.

    PubMed

    Song, Misoon; Choi, Suyoung; Kim, Se-An; Seo, Kyoungsan; Lee, Soo Jin

    2015-01-01

    Development of behavior theory-based health promotion programs is encouraged with the paradigm shift from contents to behavior outcomes. This article describes the development process of the diabetes self-management program for older Koreans (DSME-OK) using intervention mapping (IM) protocol. The IM protocol includes needs assessment, defining goals and objectives, identifying theory and determinants, developing a matrix to form change objectives, selecting strategies and methods, structuring the program, and planning for evaluation and pilot testing. The DSME-OK adopted seven behavior objectives developed by the American Association of Diabetes Educators as behavioral outcomes. The program applied an information-motivation-behavioral skills model, and interventions were targeted to 3 determinants to change health behaviors. Specific methods were selected to achieve each objective guided by IM protocol. As the final step, program evaluation was planned including a pilot test. The DSME-OK was structured as the 3 determinants of the IMB model were intervened to achieve behavior objectives in each session. The program has 12 weekly 90-min sessions tailored for older adults. Using the IM protocol in developing a theory-based self-management program was beneficial in terms of providing a systematic guide to developing theory-based and behavior outcome-focused health education programs.

  20. Video- or text-based e-learning when teaching clinical procedures? A randomized controlled trial

    PubMed Central

    Buch, Steen Vigh; Treschow, Frederik Philip; Svendsen, Jesper Brink; Worm, Bjarne Skjødt

    2014-01-01

    Background and aims This study investigated the effectiveness of two different levels of e-learning when teaching clinical skills to medical students. Materials and methods Sixty medical students were included and randomized into two comparable groups. The groups were given either a video- or text/picture-based e-learning module and subsequently underwent both theoretical and practical examination. A follow-up test was performed 1 month later. Results The students in the video group performed better than the illustrated text-based group in the practical examination, both in the primary test (P<0.001) and in the follow-up test (P<0.01). Regarding theoretical knowledge, no differences were found between the groups on the primary test, though the video group performed better on the follow-up test (P=0.04). Conclusion Video-based e-learning is superior to illustrated text-based e-learning when teaching certain practical clinical skills. PMID:25152638

  1. A statistical frame based TDMA protocol for human body communication.

    PubMed

    Nie, Zedong; Li, Zhao; Huang, Renwei; Liu, Yuhang; Li, Jingzhen; Wang, Lei

    2015-07-09

    Human body communication (HBC) using the human body as the transmission medium, which has been regarded as one of the most promising short-range communications in wireless body area networks (WBAN). Compared to the traditional wireless networks, two challenges are existed in HBC based WBAN. (1) Its sensor nodes should be energy saving since it is inconvenient to replace or recharge the battery on these sensor nodes; (2) the coordinator should be able to react dynamically and rapidly to the burst traffic triggered by sensing events. Those burst traffic conditions include vital physical signal (electrocardiogram, electroencephalogram etc.) monitoring, human motion detection (fall detection, activity monitoring, gesture recognition, motion sensing etc.) and so on. To cope with aforementioned challenges, a statistical frame based TDMA (S-TDMA) protocol with multi-constrained (energy, delay, transmission efficiency and emergency management) service is proposed in this paper. The scenarios where burst traffic is often triggered rapidly with low power consumption and low delay is handled in our proposed S-TDMA. A beacon frame with the contained synchronous and poll information is designed to reduce the possibility of collisions of request frames. A statistical frame which broadcasts the unified scheduling information is adopted to avoid packet collisions, idle listening and overhearing. Dynamic time slot allocation mechanism is presented to manage the burst traffic and reduce the active period in each beacon period. An emergency mechanism is proposed for vital signals to be transmitted. The theory analysis is proceed and the result is evaluated in the hardware platform. To verify its feasibility, S-TDMA was fully implemented on our independently-developed HBC platform where four sensor nodes and a coordinator are fastened on a human body. Experiment results show that S-TDMA costs 89.397 mJ every 20 s when the payload size is 122 bytes, 9.51% lower than Lightweight MAC

  2. Isolation of 1E4 IgM Anti-Fasciola hepatica Rediae Monoclonal Antibody from Ascites: Comparison of Two Purification Protocols.

    PubMed

    Alba, Annia; Marcet, Ricardo; Otero, Oscar; Hernández, Hilda M; Figueredo, Mabel; Sarracent, Jorge

    2016-02-01

    Purification of immunoglobulin M (IgM) antibodies could be challenging, and is often characterized by the optimization of the purification protocol to best suit the particular features of the molecule. Here, two different schemes were compared to purify, from ascites, the 1E4 IgM monoclonal antibody (mAb) previously raised against the stage of redia of the trematode Fasciola hepatica. This immunoglobulin is used as capture antibody in an immunoenzymatic assay to detect parasite ongoing infection in its intermediate hosts. The first purification protocol of the 1E4 mAb involved two chromatographic steps: an affinity chromatography on a Concanavalin A matrix followed by size exclusion chromatography. An immunoaffinity chromatography was selected as the second protocol for one-step purification of the antibody using the crude extract of adult parasites coupled to a commercial matrix. Immunoreactivity of the fractions during purification schemes was assessed by indirect immunoenzymatic assays against the crude extract of F. hepatica rediae, while purity was estimated by protein electrophoresis. Losses on the recovery of the antibody isolated by the first purification protocol occurred due to protein precipitation during the concentration of the sample and to low resolution of the size exclusion molecular chromatography step regarding this particular immunoglobulin. The immunoaffinity chromatography using F. hepatica antigens as ligands proved to be the most suitable protocol yielding a pure and immunoreactive antibody. The purification protocols used are discussed regarding efficiency and difficulties.

  3. Quantum private query based on single-photon interference

    NASA Astrophysics Data System (ADS)

    Xu, Sheng-Wei; Sun, Ying; Lin, Song

    2016-08-01

    Quantum private query (QPQ) has become a research hotspot recently. Specially, the quantum key distribution (QKD)-based QPQ attracts lots of attention because of its practicality. Various such kind of QPQ protocols have been proposed based on different technologies of quantum communications. Single-photon interference is one of such technologies, on which the famous QKD protocol GV95 is just based. In this paper, we propose two QPQ protocols based on single-photon interference. The first one is simpler and easier to realize, and the second one is loss tolerant and flexible, and more practical than the first one. Furthermore, we analyze both the user privacy and the database privacy in the proposed protocols.

  4. Comparing Usual Care With a Warfarin Initiation Protocol After Mechanical Heart Valve Replacement.

    PubMed

    Roberts, Gregory; Razooqi, Rasha; Quinn, Stephen

    2017-03-01

    The immediate postoperative warfarin sensitivity for patients receiving heart valve prostheses is increased. Established warfarin initiation protocols may lack clinical applicability, resulting in dosing based on clinical judgment. To compare current practice for warfarin initiation with a known warfarin initiation protocol, with doses proportionally reduced to account for the increased postoperative sensitivity. We compared the Mechanical Heart Valve Warfarin Initiation Protocol (Protocol group) with current practice (clinical judgment-Empirical group) for patients receiving mechanical heart valves in an observational before-and-after format. End points were the time to achieve a stable therapeutic international normalized ratio (INR), doses held in the first 6 days, and overanticoagulation in the first 6 days. The Protocol group (n = 37) achieved a stable INR more rapidly than the Empirical group (n = 77; median times 5.1 and 8.7 days, respectively; P = 0.002). Multivariable analysis indicated that the Protocol group (hazard ratio [HR] = 2.22; P = 0.005) and men (HR = 1.76; P = 0.043) more rapidly achieved a stable therapeutic INR. Age, serum albumin, amiodarone, presence of severe heart failure, and surgery type had no impact. Protocol patients had fewer doses held (1.1% vs 10.1%, P < 0.001) and no difference in overanticoagulation (2.7% vs 9.1%, P = 0.27). The Mechanical Heart Valve Warfarin Initiation Protocol provided a reliable approach to initiating warfarin in patients receiving mechanical aortic or mitral valves.

  5. Implementing Evidence-Based Social Work Practice

    ERIC Educational Resources Information Center

    Mullen, Edward J.; Bledsoe, Sarah E.; Bellamy, Jennifer L.

    2008-01-01

    Recently, social work has been influenced by new forms of practice that hold promise for bringing practice and research together to strengthen the scientific knowledge base supporting social work intervention. The most recent new practice framework is evidence-based practice. However, although evidence-based practice has many qualities that might…

  6. An intelligent case-adjustment algorithm for the automated design of population-based quality auditing protocols.

    PubMed

    Advani, Aneel; Jones, Neil; Shahar, Yuval; Goldstein, Mary K; Musen, Mark A

    2004-01-01

    We develop a method and algorithm for deciding the optimal approach to creating quality-auditing protocols for guideline-based clinical performance measures. An important element of the audit protocol design problem is deciding which guide-line elements to audit. Specifically, the problem is how and when to aggregate individual patient case-specific guideline elements into population-based quality measures. The key statistical issue involved is the trade-off between increased reliability with more general population-based quality measures versus increased validity from individually case-adjusted but more restricted measures done at a greater audit cost. Our intelligent algorithm for auditing protocol design is based on hierarchically modeling incrementally case-adjusted quality constraints. We select quality constraints to measure using an optimization criterion based on statistical generalizability coefficients. We present results of the approach from a deployed decision support system for a hypertension guideline.

  7. Cognitive Hypnotherapy as a Transdiagnostic Protocol for Emotional Disorders.

    PubMed

    Alladin, Assen; Amundson, Jon

    2016-01-01

    This article describes cognitive hypnotherapy (CH), an integrative treatment that provides an evidence-based framework for synthesizing clinical practice and research. CH combines hypnotherapy with cognitive-behavior therapy in the management of emotional disorders. This blended version of clinical practice meets criteria for an assimilative model of integrative psychotherapy, which incorporates both theory and empirical findings. Issues related to (a) additive effect of hypnosis in treatment, (b) transdiagnostic consideration, and (c) unified treatment protocols in the treatment of emotional disorders are considered in light of cognitive hypnotherapy.

  8. An agenda-based routing protocol in delay tolerant mobile sensor networks.

    PubMed

    Wang, Xiao-Min; Zhu, Jin-Qi; Liu, Ming; Gong, Hai-Gang

    2010-01-01

    Routing in delay tolerant mobile sensor networks (DTMSNs) is challenging due to the networks' intermittent connectivity. Most existing routing protocols for DTMSNs use simplistic random mobility models for algorithm design and performance evaluation. In the real world, however, due to the unique characteristics of human mobility, currently existing random mobility models may not work well in environments where mobile sensor units are carried (such as DTMSNs). Taking a person's social activities into consideration, in this paper, we seek to improve DTMSN routing in terms of social structure and propose an agenda based routing protocol (ARP). In ARP, humans are classified based on their agendas and data transmission is made according to sensor nodes' transmission rankings. The effectiveness of ARP is demonstrated through comprehensive simulation studies.

  9. 16 CFR 1212.4 - Test protocol.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 16 Commercial Practices 2 2012-01-01 2012-01-01 false Test protocol. 1212.4 Section 1212.4... STANDARD FOR MULTI-PURPOSE LIGHTERS Requirements for Child-Resistance § 1212.4 Test protocol. (a) Child test panel. (1) The test to determine if a multi-purpose lighter is resistant to successful operation...

  10. A universal data access and protocol integration mechanism for smart home

    NASA Astrophysics Data System (ADS)

    Shao, Pengfei; Yang, Qi; Zhang, Xuan

    2013-03-01

    With the lack of standardized or completely missing communication interfaces in home electronics, there is no perfect solution to address every aspect in smart homes based on existing protocols and technologies. In addition, the central control unit (CCU) of smart home system working point-to-point between the multiple application interfaces and the underlying hardware interfaces leads to its complicated architecture and unpleasant performance. A flexible data access and protocol integration mechanism is required. The current paper offers a universal, comprehensive data access and protocol integration mechanism for a smart home. The universal mechanism works as a middleware adapter with unified agreements of the communication interfaces and protocols, offers an abstraction of the application level from the hardware specific and decoupling the hardware interface modules from the application level. Further abstraction for the application interfaces and the underlying hardware interfaces are executed based on adaption layer to provide unified interfaces for more flexible user applications and hardware protocol integration. This new universal mechanism fundamentally changes the architecture of the smart home and in some way meets the practical requirement of smart homes more flexible and desirable.

  11. Barriers and Facilitators to eHealth Use in Daily Practice: Perspectives of Patients and Professionals in Dermatology.

    PubMed

    Ariens, Lieneke Fm; Schussler-Raymakers, Florine Ml; Frima, Cynthia; Flinterman, Annebeth; Hamminga, Eefje; Arents, Bernd Wm; Bruijnzeel-Koomen, Carla Afm; de Bruin-Weller, Marjolein S; van Os-Medendorp, Harmieke

    2017-09-05

    The number of eHealth interventions in the management of chronic diseases such as atopic dermatitis (AD) is growing. Despite promising results, the implementation and use of these interventions is limited. This study aimed to assess opinions of the most important stakeholders influencing the implementation and use of eHealth services in daily dermatology practice. The perspectives of health care professionals and patients towards the implementation and use of eHealth services in daily practice were assessed by using a mixed method design. A cross-sectional survey based on the eHealth implementation toolkit (eHit) was conducted to explore factors influencing the adoption of eHealth interventions offering the possibility of e-consultations, Web-based monitoring, and Web-based self-management training among dermatologists and dermatology nurses. The perspectives of patients with atopic dermatitis (AD) regarding the use of eHealth services were discussed in an online focus group. Health care professionals (n=99) and patients (n=9) acknowledged the value of eHealth services and were willing to use these digital tools in daily dermatology practice. Key identified barriers (statements with <50% of the participants scoring totally agree or agree) in the implementation and adoption of eHealth interventions included concerns about the availability (12/99, 12%) and allocation (14/99, 14%) of resources, financial aspects (26/99, 26%), reliability, security, and confidentially of the intervention itself (29/99, 29%), and the lack of education and training (6/99, 6%). Health care professionals and patients acknowledge the benefits arising from the implementation and use of eHealth services in daily dermatology practice. However, some important barriers were identified that might be useful in addressing the implementation strategy in order to enhance the implementation success of eHealth interventions in dermatology. ©Lieneke FM Ariens, Florine ML Schussler-Raymakers, Cynthia

  12. A Secure Region-Based Geographic Routing Protocol (SRBGR) for Wireless Sensor Networks

    PubMed Central

    Adnan, Ali Idarous; Hanapi, Zurina Mohd; Othman, Mohamed; Zukarnain, Zuriati Ahmad

    2017-01-01

    Due to the lack of dependency for routing initiation and an inadequate allocated sextant on responding messages, the secure geographic routing protocols for Wireless Sensor Networks (WSNs) have attracted considerable attention. However, the existing protocols are more likely to drop packets when legitimate nodes fail to respond to the routing initiation messages while attackers in the allocated sextant manage to respond. Furthermore, these protocols are designed with inefficient collection window and inadequate verification criteria which may lead to a high number of attacker selections. To prevent the failure to find an appropriate relay node and undesirable packet retransmission, this paper presents Secure Region-Based Geographic Routing Protocol (SRBGR) to increase the probability of selecting the appropriate relay node. By extending the allocated sextant and applying different message contention priorities more legitimate nodes can be admitted in the routing process. Moreover, the paper also proposed the bound collection window for a sufficient collection time and verification cost for both attacker identification and isolation. Extensive simulation experiments have been performed to evaluate the performance of the proposed protocol in comparison with other existing protocols. The results demonstrate that SRBGR increases network performance in terms of the packet delivery ratio and isolates attacks such as Sybil and Black hole. PMID:28121992

  13. A Secure Region-Based Geographic Routing Protocol (SRBGR) for Wireless Sensor Networks.

    PubMed

    Adnan, Ali Idarous; Hanapi, Zurina Mohd; Othman, Mohamed; Zukarnain, Zuriati Ahmad

    2017-01-01

    Due to the lack of dependency for routing initiation and an inadequate allocated sextant on responding messages, the secure geographic routing protocols for Wireless Sensor Networks (WSNs) have attracted considerable attention. However, the existing protocols are more likely to drop packets when legitimate nodes fail to respond to the routing initiation messages while attackers in the allocated sextant manage to respond. Furthermore, these protocols are designed with inefficient collection window and inadequate verification criteria which may lead to a high number of attacker selections. To prevent the failure to find an appropriate relay node and undesirable packet retransmission, this paper presents Secure Region-Based Geographic Routing Protocol (SRBGR) to increase the probability of selecting the appropriate relay node. By extending the allocated sextant and applying different message contention priorities more legitimate nodes can be admitted in the routing process. Moreover, the paper also proposed the bound collection window for a sufficient collection time and verification cost for both attacker identification and isolation. Extensive simulation experiments have been performed to evaluate the performance of the proposed protocol in comparison with other existing protocols. The results demonstrate that SRBGR increases network performance in terms of the packet delivery ratio and isolates attacks such as Sybil and Black hole.

  14. Implementation of a mandatory checklist of protocols and objectives improves compliance with a wide range of evidence-based intensive care unit practices.

    PubMed

    Byrnes, Matthew C; Schuerer, Douglas J E; Schallom, Marilyn E; Sona, Carrie S; Mazuski, John E; Taylor, Beth E; McKenzie, Wendi; Thomas, James M; Emerson, Jeffrey S; Nemeth, Jennifer L; Bailey, Ruth A; Boyle, Walter A; Buchman, Timothy G; Coopersmith, Craig M

    2009-10-01

    To determine a) if a checklist covering a diverse group of intensive care unit protocols and objectives would improve clinician consideration of these domains and b) if improved consideration would change practice patterns. Pre- and post observational study. A 24-bed surgical/burn/trauma intensive care unit in a teaching hospital. A total of 1399 patients admitted between June 2006 and May 2007. The first component of the study evaluated whether mandating verbal review of a checklist covering 14 intensive care unit best practices altered verbal consideration of these domains. Evaluation was performed using real-time bedside audits on morning rounds. The second component evaluated whether the checklist altered implementation of these domains by changing practice patterns. Evaluation was performed by analyzing data from the Project IMPACT database after patients left the intensive care unit. Verbal consideration of evaluable domains improved from 90.9% (530/583) to 99.7% (669/671, p < .0001) after verbal review of the checklist was mandated. Bedside consideration improved on the use of deep venous thrombosis prophylaxis (p < .05), stress ulcer prophylaxis (p < .01), oral care for ventilated patients (p < 0.01), electrolyte repletion (p < .01), initiation of physical therapy (p < .05), and documentation of restraint orders (p < .0001). Mandatory verbal review of the checklist resulted in a greater than two-fold increase in transferring patients out of the intensive care unit on telemetry (16% vs. 35%, p < .0001) and initiation of physical therapy (28% vs. 42%, p < .0001) compared with baseline practice. A mandatory verbal review of a checklist covering a wide range of objectives and goals at each patient's bedside is an effective method to improve both consideration and implementation of intensive care unit best practices. A bedside checklist is a simple, cost-effective method to prevent errors of omission in basic domains of intensive care unit management that might

  15. Prospective Intervention of a Novel Levothyroxine Dosing Protocol Based on Body Mass Index after Thyroidectomy.

    PubMed

    Elfenbein, Dawn M; Schaefer, Sarah; Shumway, Cynthia; Chen, Herbert; Sippel, Rebecca S; Schneider, David F

    2016-01-01

    Weight-based postoperative levothyroxine (LT4) dosing often fails to appropriately dose overweight and underweight patients. Previously, we created an LT4-dosing algorithm based on BMI. We hypothesize that more patients will achieve euthyroidism at their postoperative visit with the use of the protocol. A prospective evaluation was performed of our previously published BMI-based LT4 dosing. All adults who underwent thyroidectomy for benign disease between January 1, 2011 and December 31, 2013 were included; the new protocol was implemented in October 2012. Serum TSH was measured for all patients 6 to 8 weeks postoperatively, and adjustments were based on TSH. Three hundred and thirty patients were included, with 54% undergoing thyroidectomy after institution of the protocol. The groups were well matched. Before protocol implementation, LT4 was dosed solely by weight and 25% of patients were euthyroid at initial follow-up. After the protocol, 39% of patients were euthyroid (p = 0.01). The percentage of patients who were given too high a dose of LT4 remained the same (46% vs 42%), and there was a significant reduction in the number of patients who were given too little (29% vs 19%; p = 0.05). The effect was most profound in patients with low and normal BMI, and there were slight differences between sexes. Although correct initial dosing of LT4 remains challenging, this dosing protocol that we developed and implemented has improved patient care by increasing the number of patients who achieve euthyroidism at the first postoperative visit. We have made a change to our original protocol to incorporate sex differences into the calculation. Copyright © 2016 American College of Surgeons. Published by Elsevier Inc. All rights reserved.

  16. Fluoroquinolone-based protocols for eradication of Helicobacter pylori.

    PubMed

    Rispo, Antonio; Capone, Pietro; Castiglione, Fabiana; Pasquale, Luigi; Rea, Matilde; Caporaso, Nicola

    2014-07-21

    Helicobacter pylori (H. pylori) is a widespread pathogen infecting about 40% of people living in urban areas and over 90% of people living in the developing regions of the world. H. pylori is well-documented as the main factor in the pathogenesis of peptic ulcer disease, chronic gastritis, and gastric malignancies such as cancer and mucosa-associated lymphoid tissue-lymphoma; hence, its eradication is strongly recommended. The Maastricht IV consensus, which focused on the management of H. pylori infection, set important new strategies in terms of treatment approaches, particularly with regards to first- and second-line treatment protocols and led to improved knowledge and understanding of H. pylori resistance to antibiotics. In recent years, various fluoroquinolone-based protocols, mainly including levofloxacin, have been proposed and effectively tested at all therapeutic lines for H. pylori eradication. The aim of the present paper is to review the scientific literature focused on the use of fluoroquinolones in eradicating H. pylori.

  17. A Gossip-based Energy Efficient Protocol for Robust In-network Aggregation in Wireless Sensor Networks

    NASA Astrophysics Data System (ADS)

    Fauji, Shantanu

    We consider the problem of energy efficient and fault tolerant in--network aggregation for wireless sensor networks (WSNs). In-network aggregation is the process of aggregation while collecting data from sensors to the base station. This process should be energy efficient due to the limited energy at the sensors and tolerant to the high failure rates common in sensor networks. Tree based in--network aggregation protocols, although energy efficient, are not robust to network failures. Multipath routing protocols are robust to failures to a certain degree but are not energy efficient due to the overhead in the maintenance of multiple paths. We propose a new protocol for in-network aggregation in WSNs, which is energy efficient, achieves high lifetime, and is robust to the changes in the network topology. Our protocol, gossip--based protocol for in-network aggregation (GPIA) is based on the spreading of information via gossip. GPIA is not only adaptive to failures and changes in the network topology, but is also energy efficient. Energy efficiency of GPIA comes from all the nodes being capable of selective message reception and detecting convergence of the aggregation early. We experimentally show that GPIA provides significant improvement over some other competitors like the Ridesharing, Synopsis Diffusion and the pure version of gossip. GPIA shows ten fold, five fold and two fold improvement over the pure gossip, the synopsis diffusion and Ridesharing protocols in terms of network lifetime, respectively. Further, GPIA retains gossip's robustness to failures and improves upon the accuracy of synopsis diffusion and Ridesharing.

  18. A universal TaqMan-based RT-PCR protocol for cost-efficient detection of small noncoding RNA.

    PubMed

    Jung, Ulrike; Jiang, Xiaoou; Kaufmann, Stefan H E; Patzel, Volker

    2013-12-01

    Several methods for the detection of RNA have been developed over time. For small RNA detection, a stem-loop reverse primer-based protocol relying on TaqMan RT-PCR has been described. This protocol requires an individual specific TaqMan probe for each target RNA and, hence, is highly cost-intensive for experiments with small sample sizes or large numbers of different samples. We describe a universal TaqMan-based probe protocol which can be used to detect any target sequence and demonstrate its applicability for the detection of endogenous as well as artificial eukaryotic and bacterial small RNAs. While the specific and the universal probe-based protocol showed the same sensitivity, the absolute sensitivity of detection was found to be more than 100-fold lower for both than previously reported. In subsequent experiments, we found previously unknown limitations intrinsic to the method affecting its feasibility in determination of mature template RISC incorporation as well as in multiplexing. Both protocols were equally specific in discriminating between correct and incorrect small RNA targets or between mature miRNA and its unprocessed RNA precursor, indicating the stem-loop RT-primer, but not the TaqMan probe, triggers target specificity. The presented universal TaqMan-based RT-PCR protocol represents a cost-efficient method for the detection of small RNAs.

  19. Simple protocols for oblivious transfer and secure identification in the noisy-quantum-storage model

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Schaffner, Christian

    2010-09-15

    We present simple protocols for oblivious transfer and password-based identification which are secure against general attacks in the noisy-quantum-storage model as defined in R. Koenig, S. Wehner, and J. Wullschleger [e-print arXiv:0906.1030]. We argue that a technical tool from Koenig et al. suffices to prove security of the known protocols. Whereas the more involved protocol for oblivious transfer from Koenig et al. requires less noise in storage to achieve security, our ''canonical'' protocols have the advantage of being simpler to implement and the security error is easier control. Therefore, our protocols yield higher OT rates for many realistic noise parameters.more » Furthermore, a proof of security of a direct protocol for password-based identification against general noisy-quantum-storage attacks is given.« less

  20. A qualitative evaluation of general practitioners’ views on protocol-driven eReferral in Scotland

    PubMed Central

    2014-01-01

    Background The ever increasing volume of referrals from primary care to specialist services is putting considerable pressure on resource-constrained health services while effective communication across fragmented services remains a substantial challenge. Previous studies have suggested that electronic referrals (eReferral) can bear important benefits for cross-organisational processes and patient care management. Methods We conducted 25 semi-structured interviews and 1 focus group with primary care providers to elucidate General Practitioners’ (GPs) perspectives on information management processes in the patient pathway in NHSScotland, 1 focus group with members of the Scottish Electronic Patient Record programme and one interview with a senior architect of the Scottish Care Information national eReferral System (SCI Gateway). Using Normalisation Process Theory, we performed a qualitative analysis to elucidate GPs’ perspectives on eReferral to identify the factors which they felt either facilitated or hindered referral processes. Results The majority of GPs interviewed felt that eReferral substantially streamlined communication processes, with the immediate transfer of referral documents and the availability of an electronic audit trail perceived as two substantial improvements over paper-based referrals. Most GPs felt that the SCI Gateway system was reasonably straightforward to use. Referral protocols and templates could be perceived as useful by some GPs while others considered them to be cumbersome at times. Conclusion Our study suggests that the deployment and adoption of eReferral across the NHS in Scotland has been achieved by a combination of factors: (i) a policy context – including national mandatory targets for eReferral – which all NHS health-boards were bound to operationalise through their Local Delivery Plans and also (ii) the fact that primary care doctors considered that the overall benefits brought by the deployment of eReferral throughout

  1. A Web-Based Decision Tool to Improve Contraceptive Counseling for Women With Chronic Medical Conditions: Protocol For a Mixed Methods Implementation Study.

    PubMed

    Wu, Justine P; Damschroder, Laura J; Fetters, Michael D; Zikmund-Fisher, Brian J; Crabtree, Benjamin F; Hudson, Shawna V; Ruffin, Mack T; Fucinari, Juliana; Kang, Minji; Taichman, L Susan; Creswell, John W

    2018-04-18

    Women with chronic medical conditions, such as diabetes and hypertension, have a higher risk of pregnancy-related complications compared with women without medical conditions and should be offered contraception if desired. Although evidence based guidelines for contraceptive selection in the presence of medical conditions are available via the United States Medical Eligibility Criteria (US MEC), these guidelines are underutilized. Research also supports the use of decision tools to promote shared decision making between patients and providers during contraceptive counseling. The overall goal of the MiHealth, MiChoice project is to design and implement a theory-driven, Web-based tool that incorporates the US MEC (provider-level intervention) within the vehicle of a contraceptive decision tool for women with chronic medical conditions (patient-level intervention) in community-based primary care settings (practice-level intervention). This will be a 3-phase study that includes a predesign phase, a design phase, and a testing phase in a randomized controlled trial. This study protocol describes phase 1 and aim 1, which is to determine patient-, provider-, and practice-level factors that are relevant to the design and implementation of the contraceptive decision tool. This is a mixed methods implementation study. To customize the delivery of the US MEC in the decision tool, we selected high-priority constructs from the Consolidated Framework for Implementation Research and the Theoretical Domains Framework to drive data collection and analysis at the practice and provider level, respectively. A conceptual model that incorporates constructs from the transtheoretical model and the health beliefs model undergirds patient-level data collection and analysis and will inform customization of the decision tool for this population. We will recruit 6 community-based primary care practices and conduct quantitative surveys and semistructured qualitative interviews with women who

  2. Direct pulp capping of permanent teeth in New Zealand general dental practice--a practice based research study.

    PubMed

    Friedlander, L; McElroy, K; Daniel, B; Cullinan, M; Hanlin, S

    2015-06-01

    This study aimed to investigate treatment protocols and opinions towards direct pulp capping (DPC) amongst New Zealand (NZ) general dental practitioners (GDP) through a Practice Based Research Network (PBRN) study. Mixed-methods approach using qualitative thematic and quantitative analysis. An on-line survey containing Likert scale items and open-ended questions was distributed to GDPs on the Dental Council of New Zealand (DCNZ) register (2012) to collect information on practitioner demographics, treatment protocols, continuing professional development (CPD) and philosophies towards DPC. RESULTs: Two hundred and ten GDPs from North and South Islands providing care in main centres and rural areas engaged with the PBRN and participated in the study. Almost all performed DPC treatment although it was not a common procedure. DPC was perceived as 'successful' or 'very successful' by 95% of respondents, mostly for cases of reversible pulpitis. Most provided DPC for patients of all ages but younger patients were perceived to have the best clinical outcomes. Calcium hydroxide and MTA were the most commonly used materials for DPC. MTA was believed to have the best outcome but cost and handling properties were barriers to its use. The majority of respondents had participated in CPD related to vital pulp therapy and regarded this treatment as conservative and providing time and financial benefits compared with more invasive treatment. Clinicians' timeframes for assessing healing were variable, and combined clinical and radiographic findings were considered most useful. New Zealand dentists perceive DPC as a successful and conservative treatment in selected cases. The findings have provided insights into engagement of NZ dentists in using research to inform everyday clinical practice through a PBRN study.

  3. Wireless access to a pharmaceutical database: a demonstrator for data driven Wireless Application Protocol (WAP) applications in medical information processing.

    PubMed

    Schacht Hansen, M; Dørup, J

    2001-01-01

    The Wireless Application Protocol technology implemented in newer mobile phones has built-in facilities for handling much of the information processing needed in clinical work. To test a practical approach we ported a relational database of the Danish pharmaceutical catalogue to Wireless Application Protocol using open source freeware at all steps. We used Apache 1.3 web software on a Linux server. Data containing the Danish pharmaceutical catalogue were imported from an ASCII file into a MySQL 3.22.32 database using a Practical Extraction and Report Language script for easy update of the database. Data were distributed in 35 interrelated tables. Each pharmaceutical brand name was given its own card with links to general information about the drug, active substances, contraindications etc. Access was available through 1) browsing therapeutic groups and 2) searching for a brand name. The database interface was programmed in the server-side scripting language PHP3. A free, open source Wireless Application Protocol gateway to a pharmaceutical catalogue was established to allow dial-in access independent of commercial Wireless Application Protocol service providers. The application was tested on the Nokia 7110 and Ericsson R320s cellular phones. We have demonstrated that Wireless Application Protocol-based access to a dynamic clinical database can be established using open source freeware. The project opens perspectives for a further integration of Wireless Application Protocol phone functions in clinical information processing: Global System for Mobile communication telephony for bilateral communication, asynchronous unilateral communication via e-mail and Short Message Service, built-in calculator, calendar, personal organizer, phone number catalogue and Dictaphone function via answering machine technology. An independent Wireless Application Protocol gateway may be placed within hospital firewalls, which may be an advantage with respect to security. However, if

  4. 16 CFR 1210.4 - Test protocol.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 16 Commercial Practices 2 2012-01-01 2012-01-01 false Test protocol. 1210.4 Section 1210.4... STANDARD FOR CIGARETTE LIGHTERS Requirements for Child Resistance § 1210.4 Test protocol. (a) Child test panel. (1) The test to determine if a lighter is resistant to successful operation by children uses a...

  5. Finite-key analysis for the 1-decoy state QKD protocol

    NASA Astrophysics Data System (ADS)

    Rusca, Davide; Boaron, Alberto; Grünenfelder, Fadri; Martin, Anthony; Zbinden, Hugo

    2018-04-01

    It has been shown that in the asymptotic case of infinite-key length, the 2-decoy state Quantum Key Distribution (QKD) protocol outperforms the 1-decoy state protocol. Here, we present a finite-key analysis of the 1-decoy method. Interestingly, we find that for practical block sizes of up to 108 bits, the 1-decoy protocol achieves for almost all experimental settings higher secret key rates than the 2-decoy protocol. Since using only one decoy is also easier to implement, we conclude that it is the best choice for QKD, in most common practical scenarios.

  6. A General Self-Organized Tree-Based Energy-Balance Routing Protocol for Wireless Sensor Network

    NASA Astrophysics Data System (ADS)

    Han, Zhao; Wu, Jie; Zhang, Jie; Liu, Liefeng; Tian, Kaiyun

    2014-04-01

    Wireless sensor network (WSN) is a system composed of a large number of low-cost micro-sensors. This network is used to collect and send various kinds of messages to a base station (BS). WSN consists of low-cost nodes with limited battery power, and the battery replacement is not easy for WSN with thousands of physically embedded nodes, which means energy efficient routing protocol should be employed to offer a long-life work time. To achieve the aim, we need not only to minimize total energy consumption but also to balance WSN load. Researchers have proposed many protocols such as LEACH, HEED, PEGASIS, TBC and PEDAP. In this paper, we propose a General Self-Organized Tree-Based Energy-Balance routing protocol (GSTEB) which builds a routing tree using a process where, for each round, BS assigns a root node and broadcasts this selection to all sensor nodes. Subsequently, each node selects its parent by considering only itself and its neighbors' information, thus making GSTEB a dynamic protocol. Simulation results show that GSTEB has a better performance than other protocols in balancing energy consumption, thus prolonging the lifetime of WSN.

  7. A Familiarization Protocol Facilitates the Participation of Children with ASD in Electrophysiological Research.

    PubMed

    Turcios, Jacqueline; Cook, Barbara; Irwin, Julia; Rispoli, Taylor; Landi, Nicole

    2017-07-31

    This paper includes a detailed description of a familiarization protocol, which is used as an integral component of a larger research protocol to collect electroencephalography (EEG) data and Event-Related Potentials (ERPs). At present, the systems available for the collection of high-quality EEG/ERP data make significant demands on children with developmental disabilities, such as those with an Autism Spectrum Disorder (ASD). Children with ASD may have difficulty adapting to novel situations, tolerating uncomfortable sensory stimuli, and sitting quietly. This familiarization protocol uses Evidence-Based Practices (EBPs) to increase research participants' knowledge and understanding of the specific activities and steps of the research protocol. The tools in this familiarization protocol are a social narrative, a visual schedule, the Premack principle, role-playing, and modeling. The goal of this familiarization protocol is to increase understanding and agency and to potentially reduce anxiety for child participants, resulting in a greater likelihood of the successful completion of the research protocol for the collection of EEG/ERP data.

  8. Internet Protocol Implementation Guide.

    DTIC Science & Technology

    1982-08-01

    RD-R153 624 INTERNET PROTOCOL IMPLEMENTATION GIDE(U) SRI 1/2 INTERNATIONAL MENLO PARK CA NETWORK INFORMATION CENTER AUG 82 DCA2e-83-C-8e25 N... INTERNET PROTOCOL S IMPLEMENTATION GUIDE August 1982 DTICFL. !.ECTE .-" MAY 1 31985 ;z B Q.. Network Information Center SRI International Menlo Park...this is more information than the receiving Internet * module needs. The specified procedure is to take the return route recorded in the first

  9. Making practice transparent through e-portfolio.

    PubMed

    Stewart, Sarah M

    2013-12-01

    Midwives are required to maintain a professional portfolio as part of their statutory requirements. Some midwives are using open social networking tools and processes to develop an e-portfolio. However, confidentiality of patient and client data and professional reputation have to be taken into consideration when using online public spaces for reflection. There is little evidence about how midwives use social networking tools for ongoing learning. It is uncertain how reflecting in an e-portfolio with an audience impacts on learning outcomes. This paper investigates ways in which reflective midwifery practice be carried out using e-portfolio in open, social networking platforms using collaborative processes. Using an auto-ethnographic approach I explored my e-portfolio and selected posts that had attracted six or more comments. I used thematic analysis to identify themes within the textual conversations in the posts and responses posted by readers. The analysis identified that my collaborative e-portfolio had four themes: to provide commentary and discuss issues; to reflect and process learning; to seek advice, brainstorm and process ideas for practice, projects and research, and provide evidence of professional development. E-portfolio using open social networking tools and processes is a viable option for midwives because it facilitates collaborative reflection and shared learning. However, my experience shows that concerns about what people think, and client confidentiality does impact on the nature of open reflection and learning outcomes. I conclude this paper with a framework for managing midwifery statutory obligations using online public spaces and social networking tools. Copyright © 2013 Australian College of Midwives. Published by Elsevier Ltd. All rights reserved.

  10. [The intervention mapping protocol: A structured process to develop, implement and evaluate health promotion programs].

    PubMed

    Fassier, J-B; Lamort-Bouché, M; Sarnin, P; Durif-Bruckert, C; Péron, J; Letrilliart, L; Durand, M-J

    2016-02-01

    Health promotion programs are expected to improve population health and reduce social inequalities in health. However, their theoretical foundations are frequently ill-defined, and their implementation faces many obstacles. The aim of this article is to describe the intervention mapping protocol in health promotion programs planning, used recently in several countries. The challenges of planning health promotion programs are presented, and the six steps of the intervention mapping protocol are described with an example. Based on a literature review, the use of this protocol, its requirements and potential limitations are discussed. The intervention mapping protocol has four essential characteristics: an ecological perspective (person-environment), a participative approach, the use of theoretical models in human and social sciences and the use of scientific evidence. It comprises six steps: conduct a health needs assessment, define change objectives, select theory-based change techniques and practical applications, organize techniques and applications into an intervention program (logic model), plan for program adoption, implementation, and sustainability, and generate an evaluation plan. This protocol was used in different countries and domains such as obesity, tobacco, physical activity, cancer and occupational health. Although its utilization requires resources and a critical stance, this protocol was used to develop interventions which efficacy was demonstrated. The intervention mapping protocol is an integrated process that fits the scientific and practical challenges of health promotion. It could be tested in France as it was used in other countries, in particular to reduce social inequalities in health. Copyright © 2016. Published by Elsevier Masson SAS.

  11. Practice-Based Research: Another Pathway for Closing the Research-Practice Gap

    ERIC Educational Resources Information Center

    Crooke, Pamela J.; Olswang, Lesley B.

    2015-01-01

    Purpose: Practice-based research is proposed as an additional way to bridge the divide between research and practice. Method: The article compares the traditional, laboratory-based research with research that is generated from practice: practice-based research. The defining features of each are described, with an emphasis on contrasting internal…

  12. Applying the Intervention Mapping protocol to develop a kindergarten-based, family-involved intervention to increase European preschool children's physical activity levels: the ToyBox-study.

    PubMed

    De Craemer, M; De Decker, E; De Bourdeaudhuij, I; Verloigne, M; Duvinage, K; Koletzko, B; Ibrügger, S; Kreichauf, S; Grammatikaki, E; Moreno, L; Iotova, V; Socha, P; Szott, K; Manios, Y; Cardon, G

    2014-08-01

    Although sufficient physical activity is beneficial for preschoolers' health, activity levels in most preschoolers are low. As preschoolers spend a considerable amount of time at home and at kindergarten, interventions should target both environments to increase their activity levels. The aim of the current paper was to describe the six different steps of the Intervention Mapping protocol towards the systematic development and implementation of the physical activity component of the ToyBox-intervention. This intervention is a kindergarten-based, family-involved intervention implemented across six European countries. Based on the results of literature reviews and focus groups with parents/caregivers and kindergarten teachers, matrices of change objectives were created. Then, theory-based methods and practical strategies were selected to develop intervention materials at three different levels: (i) individual level (preschoolers); (ii) interpersonal level (parents/caregivers) and (iii) organizational level (teachers). This resulted in a standardized intervention with room for local and cultural adaptations in each participating country. Although the Intervention Mapping protocol is a time-consuming process, using this systematic approach may lead to an increase in intervention effectiveness. The presented matrices of change objectives are useful for future programme planners to develop and implement an intervention based on the Intervention Mapping protocol to increase physical activity levels in preschoolers. © 2014 World Obesity.

  13. Compact Modbus TCP/IP protocol for data acquisition systems based on limited hardware resources

    NASA Astrophysics Data System (ADS)

    Bai, Q.; Jin, B.; Wang, D.; Wang, Y.; Liu, X.

    2018-04-01

    The Modbus TCP/IP has been a standard industry communication protocol and widely utilized for establishing sensor-cloud platforms on the Internet. However, numerous existing data acquisition systems built on traditional single-chip microcontrollers without sufficient resources cannot support it, because the complete Modbus TCP/IP protocol always works dependent on a full operating system which occupies abundant hardware resources. Hence, a compact Modbus TCP/IP protocol is proposed in this work to make it run efficiently and stably even on a resource-limited hardware platform. Firstly, the Modbus TCP/IP protocol stack is analyzed and the refined protocol suite is rebuilt by streamlining the typical TCP/IP suite. Then, specific implementation of every hierarchical layer is respectively presented in detail according to the protocol structure. Besides, the compact protocol is implemented in a traditional microprocessor to validate the feasibility of the scheme. Finally, the performance of the proposed scenario is assessed. The experimental results demonstrate that message packets match the frame format of Modbus TCP/IP protocol and the average bandwidth reaches to 1.15 Mbps. The compact protocol operates stably even based on a traditional microcontroller with only 4-kB RAM and 12-MHz system clock, and no communication congestion or frequent packet loss occurs.

  14. E-Learning Instructional Design Practice in American and Australian Institutions

    ERIC Educational Resources Information Center

    Sadeghi, Sayed Hadi

    2017-01-01

    This research study provides a comparative understanding of instructional design e-practice in an Australian and an American university. This comparative study identifies information relating to the current status of instructional design e-practice that will be of assistance to Australian universities to improve their existing online programs. The…

  15. SU-E-I-57: Evaluation and Optimization of Effective-Dose Using Different Beam-Hardening Filters in Clinical Pediatric Shunt CT Protocol

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Gill, K; Aldoohan, S; Collier, J

    Purpose: Study image optimization and radiation dose reduction in pediatric shunt CT scanning protocol through the use of different beam-hardening filters Methods: A 64-slice CT scanner at OU Childrens Hospital has been used to evaluate CT image contrast-to-noise ratio (CNR) and measure effective-doses based on the concept of CT dose index (CTDIvol) using the pediatric head shunt scanning protocol. The routine axial pediatric head shunt scanning protocol that has been optimized for the intrinsic x-ray tube filter has been used to evaluate CNR by acquiring images using the ACR approved CT-phantom and radiation dose CTphantom, which was used to measuremore » CTDIvol. These results were set as reference points to study and evaluate the effects of adding different filtering materials (i.e. Tungsten, Tantalum, Titanium, Nickel and Copper filters) to the existing filter on image quality and radiation dose. To ensure optimal image quality, the scanner routine air calibration was run for each added filter. The image CNR was evaluated for different kVps and wide range of mAs values using above mentioned beam-hardening filters. These scanning protocols were run under axial as well as under helical techniques. The CTDIvol and the effective-dose were measured and calculated for all scanning protocols and added filtration, including the intrinsic x-ray tube filter. Results: Beam-hardening filter shapes energy spectrum, which reduces the dose by 27%. No noticeable changes in image low contrast detectability Conclusion: Effective-dose is very much dependent on the CTDIVol, which is further very much dependent on beam-hardening filters. Substantial reduction in effective-dose is realized using beam-hardening filters as compare to the intrinsic filter. This phantom study showed that significant radiation dose reduction could be achieved in CT pediatric shunt scanning protocols without compromising in diagnostic value of image quality.« less

  16. Feedback informed treatment: evidence-based practice meets social construction.

    PubMed

    Tilsen, Julie; McNamee, Sheila

    2015-03-01

    This article explores the challenges presented by the mandate for evidence-based practice for family therapists who identify with the philosophical stance of social construction. The history of psychotherapy outcome research is reviewed, as are current findings that provide empirical evidence for an engaged, dialogic practice. The authors suggest that the binary between empiricism and social construction may be unhinged by understanding empiricism as a particular discursive frame (i.e., a particular way of talking, acting, and being in the world), one of many available as a way of understanding and talking about our work. Through a case vignette, the authors introduce the evidence-based practice of Feedback Informed Treatment as an elaboration of social construction, and as an example of bridging the gap between the discursive frames of empiricism and social construction. © 2014 Family Process Institute.

  17. Movement towards transdiagnostic psychotherapeutic practices for the affective disorders.

    PubMed

    Gros, Daniel F; Allan, Nicholas P; Szafranski, Derek D

    2016-08-01

    Evidence-based cognitive behavioural therapy (CBT) practices were first developed in the 1960s. Over the decades, refinements and alternative symptom foci resulted in the development of several CBT protocols/manuals for each of the many disorders, especially in the affective disorders. Although shown to be effective in highly trained providers, the proliferation of CBT protocols also has shown to demonstrate challenges in dissemination and implementation efforts due to the sheer number of CBT protocols and their related training requirements (eg, 6 months per protocol) and their related cost (eg, over US$2000 each; lost days/hours at work). To address these concerns, newer transdiagnostic CBT protocols have been developed to reduce the number of disorder-specific CBT protocols needed to treat patients with affective disorders. Transdiagnostic treatments are based on the notion that various disorder-specific CBT protocols contain important but overlapping treatment components that can be distilled into a single treatment and therefore address the symptoms and comorbidities across all of the disorders at once. 3 examples of transdiagnostic treatments include group CBT of anxiety, unified protocol for transdiagnostic treatment for emotional disorders and transdiagnostic behaviour therapy. Each transdiagnostic protocol is designed for a different set of disorders, contains a varied amount of CBT treatment components and is tested in different types of samples. However, together, these 3 transdiagnostic psychotherapies represent the future of CBT practice. Published by the BMJ Publishing Group Limited. For permission to use (where not already granted under a licence) please go to http://www.bmj.com/company/products-services/rights-and-licensing/

  18. Alternating-Offers Protocol for Multi-issue Bilateral Negotiation in Semantic-Enabled Marketplaces

    NASA Astrophysics Data System (ADS)

    Ragone, Azzurra; di Noia, Tommaso; di Sciascio, Eugenio; Donini, Francesco M.

    We present a semantic-based approach to multi-issue bilateral negotiation for e-commerce. We use Description Logics to model advertisements, and relations among issues as axioms in a TBox. We then introduce a logic-based alternating-offers protocol, able to handle conflicting information, that merges non-standard reasoning services in Description Logics with utility thoery to find the most suitable agreements. We illustrate and motivate the theoretical framework, the logical language, and the negotiation protocol.

  19. Study protocol for the recruitment of female sex workers and their non-commercial partners into couple-based HIV research.

    PubMed

    Syvertsen, Jennifer L; Robertson, Angela M; Abramovitz, Daniela; Rangel, M Gudelia; Martinez, Gustavo; Patterson, Thomas L; Ulibarri, Monica D; Vera, Alicia; El-Bassel, Nabila; Strathdee, Steffanie A

    2012-02-20

    Researchers are increasingly recognizing the importance of addressing sexual and drug-related HIV risk within the context of intimate relationships rather than solely focusing on individual behaviors. Practical and effective methods are needed to recruit, screen, and enroll the high risk and hard-to-reach couples who would most benefit from HIV interventions, such as drug-using female sex workers (FSWs) and their intimate, non-commercial partners. This paper outlines a bi-national, multidisciplinary effort to develop and implement a study protocol for research on the social context and epidemiology of HIV, sexually transmitted infections (STI), and high risk behaviors among FSWs and their non-commercial male partners in Tijuana and Ciudad Juarez, Mexico. We provide an overview of our study and specifically focus on the sampling, recruitment, screening, and successful enrollment of high risk couples into a public health study in this context. We used targeted and snowball sampling to recruit couples through the female partner first and administered a primary screener to check her initial eligibility. Willing and eligible females then invited their primary male partners for couple-based screening using a couple verification screening (CVS) instrument adapted from previous studies. The CVS rechecked eligibility and separately asked each partner the same questions about their relationship to "test" if the couple was legitimate. We adapted the original protocol to consider issues of gender and power within the local cultural and socioeconomic context and expanded the question pool to create multiple versions of the CVS that were randomly administered to potential couples to determine eligibility and facilitate study enrollment. The protocol successfully enrolled 214 high risk couples into a multi-site public health study. This work suggests the importance of collaborating to construct a study protocol, understanding the local population and context, and drawing on

  20. Evaluation of sexual history-based screening of anatomic sites for chlamydia trachomatis and neisseria gonorrhoeae infection in men having sex with men in routine practice.

    PubMed

    Peters, Remco P H; Verweij, Stephan P; Nijsten, Noëmi; Ouburg, Sander; Mutsaers, Johan; Jansen, Casper L; van Leeuwen, A Petra; Morré, Servaas A

    2011-07-26

    Sexually transmitted infection (STI) screening programmes are implemented in many countries to decrease burden of STI and to improve sexual health. Screening for Chlamydia trachomatis and Neisseria gonorrhoeae has a prominent role in these protocols. Most of the screening programmes concerning men having sex with men (MSM) are based on opportunistic urethral testing. In The Netherlands, a history-based approach is used. The aim of this study is to evaluate the protocol of screening anatomic sites for C. trachomatis and N. gonorrhoeae infection based on sexual history in MSM in routine practice in The Netherlands. All MSM visiting the clinic for STI in The Hague are routinely asked about their sexual practice during consulting. As per protocol, tests for urogenital, oropharyngeal and anorectal infection are obtained based on reported site(s) of sexual contact. All consultations are entered into a database as part of the national STI monitoring system. Data of an 18 months period were retrieved from this database and analysed. A total of 1455 consultations in MSM were registered during the study period. The prevalence of C. trachomatis and N. gonorrhoeae per anatomic site was: urethral infection 4.0% respectively and 2.8%, oropharynx 1.5% and 4.2%, and anorectum 8.2% and 6.0%. The majority of chlamydia cases (72%) involved a single anatomic site, which was especially manifest for anorectal infections (79%), while 42% of gonorrhoea cases were single site. Twenty-six percent of MSM with anorectal chlamydia and 17% with anorectal gonorrhoea reported symptoms of proctitis; none of the oropharyngeal infections were symptomatic. Most cases of anorectal infection (83%) and oropharyngeal infection (100%) would have remained undiagnosed with a symptom-based protocol. The current strategy of sexual-history based screening of multiple anatomic sites for chlamydia and gonorrhoea in MSM is a useful and valid guideline which is to be preferred over a symptom-based screening

  1. The History of Evidence-Based Practice in Nursing Education and Practice.

    PubMed

    Mackey, April; Bassendowski, Sandra

    Beginning with Florence Nightingale in the 1800s and evolving again within the medical community, evidence-based practice continues to advance along with the nursing discipline. Evidence-based practice is foundational to undergraduate and graduate nursing education and is a way for the nursing discipline to minimize the theory to practice gap. This article discusses the concept of evidence-based practice from a historical perspective as it relates to nursing in the educational and practice domains. The concept evidence-based practice is defined, and the similarities and differences to evidence-based medicine are discussed. It is crucial that registered nurses be proactive in their quest for research knowledge, so the gap between theory and practice continues to close. Utilizing nursing best practice guidelines, reviewing and implementing applicable research evidence, and taking advantage of technological advances are all ways in which nursing can move forward as a well-informed discipline. Copyright © 2016 Elsevier Inc. All rights reserved.

  2. Improving capacity for evidence-based practice in South East Asia: evaluating the role of research fellowships in the SEA-ORCHID Project

    PubMed Central

    2010-01-01

    Background Fellowships are a component of many professional education programs. They provide opportunities to develop skills and competencies in an environment where time is protected and resources and technical support are more readily available. The SEA-ORCHID fellowships program aimed to increase capacity for evidence-based practice and research synthesis, and to encourage fellows to become leaders in these areas. Methods Fellows included doctors, nurses, midwives and librarians working in the maternal and neonatal areas of nine hospitals in South East Asia. Fellowships were undertaken in Australia and involved specific outputs related to evidence-based practice or research synthesis. Training and support was tailored according to the type of output and the fellow's experience and expertise. We evaluated the fellowships program quantitatively and qualitatively through written evaluations, interviews and follow-up of fellowship activities. Results During 2006-07, 23 fellows from Thailand, Indonesia, Malaysia and the Philippines undertook short-term fellowships (median four weeks) in Australia. The main outputs were drafts of Cochrane systematic reviews, clinical practice guidelines and protocols for randomised trials, and training materials to support evidence-based practice. Protocols for Cochrane systematic reviews were more likely to be completed than other outcomes. The fellows identified several components that were critical to the program's overall success; these included protected time, tailored training, and access to technical expertise and resources. On returning home, fellows identified a lack of time and limited access to the internet and evidence-based resources as barriers to completing their outputs. The support of colleagues and senior staff was noted as an important enabler of progress, and research collaborators from other institutions and countries were also important sources of support. Conclusions The SEA-ORCHID fellowships program provided

  3. Designing Reflective Practice in the Context of OER-Based E-Learning

    ERIC Educational Resources Information Center

    Karunanayaka, Shironica P.; Naidu, Som; Rajendra, J. C. N.; Ratnayake, H. U. W.

    2017-01-01

    Much is said about the importance of reflective practice especially in the professions. Yet much of what happens as part of reflective practice in the professions such as teaching is most of the time left to chance. Reflective practice allows practitioners to see the link between theory and practice by thoughtfully considering their own…

  4. IDMA-Based MAC Protocol for Satellite Networks with Consideration on Channel Quality

    PubMed Central

    2014-01-01

    In order to overcome the shortcomings of existing medium access control (MAC) protocols based on TDMA or CDMA in satellite networks, interleave division multiple access (IDMA) technique is introduced into satellite communication networks. Therefore, a novel wide-band IDMA MAC protocol based on channel quality is proposed in this paper, consisting of a dynamic power allocation algorithm, a rate adaptation algorithm, and a call admission control (CAC) scheme. Firstly, the power allocation algorithm combining the technique of IDMA SINR-evolution and channel quality prediction is developed to guarantee high power efficiency even in terrible channel conditions. Secondly, the effective rate adaptation algorithm, based on accurate channel information per timeslot and by the means of rate degradation, can be realized. What is more, based on channel quality prediction, the CAC scheme, combining the new power allocation algorithm, rate scheduling, and buffering strategies together, is proposed for the emerging IDMA systems, which can support a variety of traffic types, and offering quality of service (QoS) requirements corresponding to different priority levels. Simulation results show that the new wide-band IDMA MAC protocol can make accurate estimation of available resource considering the effect of multiuser detection (MUD) and QoS requirements of multimedia traffic, leading to low outage probability as well as high overall system throughput. PMID:25126592

  5. Best Practices and Testing Protocols for Benchmarking ORR Activities of Fuel Cell Electrocatalysts Using Rotating Disk Electrode

    DOE PAGES

    Kocha, Shyam S.; Shinozaki, Kazuma; Zack, Jason W.; ...

    2017-05-02

    Thin-film-rotating disk electrodes (TF-RDEs) are the half-cell electrochemical system of choice for rapid screening of oxygen reduction reaction (ORR) activity of novel Pt supported on carbon black supports (Pt/C) electrocatalysts. It has been shown that the magnitude of the measured ORR activity and reproducibility are highly dependent on the system cleanliness, evaluation protocols, and operating conditions as well as ink formulation, composition, film drying, and the resultant film thickness and uniformity. Accurate benchmarks of baseline Pt/C catalysts evaluated using standardized protocols and best practices are necessary to expedite ultra-low-platinum group metal (PGM) catalyst development that is crucial for the imminentmore » commercialization of fuel cell vehicles. We report results of evaluation in three independent laboratories of Pt/C electrocatalysts provided by commercial fuel cell catalyst manufacturers (Johnson Matthey, Umicore, Tanaka Kikinzoku Kogyo - TKK). The studies were conducted using identical evaluation protocols/ink formulation/film fabrication albeit employing unique electrochemical cell designs specific to each laboratory. Furthermore, the ORR activities reported in this work provide a baseline and criteria for selection and scale-up of novel high activity ORR electrocatalysts for implementation in proton exchange membrane fuel cells (PEMFCs).« less

  6. Best Practices and Testing Protocols for Benchmarking ORR Activities of Fuel Cell Electrocatalysts Using Rotating Disk Electrode

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Kocha, Shyam S.; Shinozaki, Kazuma; Zack, Jason W.

    Abstract Thin-film-rotating disk electrodes (TF-RDEs) are the half-cell electrochemical system of choice for rapid screening of oxygen reduction reaction (ORR) activity of novel Pt supported on carbon black supports (Pt/C) electrocatalysts. It has been shown that the magnitude of the measured ORR activity and reproducibility are highly dependent on the system cleanliness, evaluation protocols, and operating conditions as well as ink formulation, composition, film drying, and the resultant film thickness and uniformity. Accurate benchmarks of baseline Pt/C catalysts evaluated using standardized protocols and best practices are necessary to expedite ultra-low-platinum group metal (PGM) catalyst development that is crucial for themore » imminent commercialization of fuel cell vehicles. We report results of evaluation in three independent laboratories of Pt/C electrocatalysts provided by commercial fuel cell catalyst manufacturers (Johnson Matthey, Umicore, Tanaka Kikinzoku Kogyo—TKK). The studies were conducted using identical evaluation protocols/ink formulation/film fabrication albeit employing unique electrochemical cell designs specific to each laboratory. The ORR activities reported in this work provide a baseline and criteria for selection and scale-up of novel high activity ORR electrocatalysts for implementation in proton exchange membrane fuel cells (PEMFCs).« less

  7. Best Practices and Testing Protocols for Benchmarking ORR Activities of Fuel Cell Electrocatalysts Using Rotating Disk Electrode

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Kocha, Shyam S.; Shinozaki, Kazuma; Zack, Jason W.

    Thin-film-rotating disk electrodes (TF-RDEs) are the half-cell electrochemical system of choice for rapid screening of oxygen reduction reaction (ORR) activity of novel Pt supported on carbon black supports (Pt/C) electrocatalysts. It has been shown that the magnitude of the measured ORR activity and reproducibility are highly dependent on the system cleanliness, evaluation protocols, and operating conditions as well as ink formulation, composition, film drying, and the resultant film thickness and uniformity. Accurate benchmarks of baseline Pt/C catalysts evaluated using standardized protocols and best practices are necessary to expedite ultra-low-platinum group metal (PGM) catalyst development that is crucial for the imminentmore » commercialization of fuel cell vehicles. We report results of evaluation in three independent laboratories of Pt/C electrocatalysts provided by commercial fuel cell catalyst manufacturers (Johnson Matthey, Umicore, Tanaka Kikinzoku Kogyo - TKK). The studies were conducted using identical evaluation protocols/ink formulation/film fabrication albeit employing unique electrochemical cell designs specific to each laboratory. Furthermore, the ORR activities reported in this work provide a baseline and criteria for selection and scale-up of novel high activity ORR electrocatalysts for implementation in proton exchange membrane fuel cells (PEMFCs).« less

  8. Evaluation of Protocol Uniformity Concerning Laparoscopic Cholecystectomy in The Netherlands

    PubMed Central

    Goossens, Richard H. M.; van Eijk, Daan J.; Lange, Johan F.

    2008-01-01

    Background Iatrogenic bile duct injury remains a current complication of laparoscopic cholecystectomy. One uniform and standardized protocol, based on the “critical view of safety” concept of Strasberg, should reduce the incidence of this complication. Furthermore, owing to the rapid development of minimally invasive surgery, technicians are becoming more frequently involved. To improve communication between the operating team and technicians, standardized actions should also be defined. The aim of this study was to compare existing protocols for laparoscopic cholecystectomy from various Dutch hospitals. Methods Fifteen Dutch hospitals were contacted for evaluation of their protocols for laparoscopic cholecystectomy. All evaluated protocols were divided into six steps and were compared accordingly. Results In total, 13 hospitals responded—5 academic hospitals, 5 teaching hospitals, 3 community hospitals—of which 10 protocols were usable for comparison. Concerning the trocar positions, only minor differences were found. The concept of “critical view of safety” was represented in just one protocol. Furthermore, the order of clipping and cutting the cystic artery and duct differed. Descriptions of instruments and apparatus were also inconsistent. Conclusions Present protocols differ too much to define a universal procedure among surgeons in The Netherlands. The authors propose one (inter)national standardized protocol, including standardized actions. This uniform standardized protocol has to be officially released and recommended by national scientific associations (e.g., the Dutch Society of Surgery) or international societies (e.g., European Association for Endoscopic Surgery and Society of American Gastrointestinal and Endoscopic Surgeons). The aim is to improve patient safety and professional communication, which are necessary for new developments. PMID:18224485

  9. A gossip based information fusion protocol for distributed frequent itemset mining

    NASA Astrophysics Data System (ADS)

    Sohrabi, Mohammad Karim

    2018-07-01

    The computational complexity, huge memory space requirement, and time-consuming nature of frequent pattern mining process are the most important motivations for distribution and parallelization of this mining process. On the other hand, the emergence of distributed computational and operational environments, which causes the production and maintenance of data on different distributed data sources, makes the parallelization and distribution of the knowledge discovery process inevitable. In this paper, a gossip based distributed itemset mining (GDIM) algorithm is proposed to extract frequent itemsets, which are special types of frequent patterns, in a wireless sensor network environment. In this algorithm, local frequent itemsets of each sensor are extracted using a bit-wise horizontal approach (LHPM) from the nodes which are clustered using a leach-based protocol. Heads of clusters exploit a gossip based protocol in order to communicate each other to find the patterns which their global support is equal to or more than the specified support threshold. Experimental results show that the proposed algorithm outperforms the best existing gossip based algorithm in term of execution time.

  10. Optimization of the scan protocols for CT-based material extraction in small animal PET/CT studies

    NASA Astrophysics Data System (ADS)

    Yang, Ching-Ching; Yu, Jhih-An; Yang, Bang-Hung; Wu, Tung-Hsin

    2013-12-01

    We investigated the effects of scan protocols on CT-based material extraction to minimize radiation dose while maintaining sufficient image information in small animal studies. The phantom simulation experiments were performed with the high dose (HD), medium dose (MD) and low dose (LD) protocols at 50, 70 and 80 kVp with varying mA s. The reconstructed CT images were segmented based on Hounsfield unit (HU)-physical density (ρ) calibration curves and the dual-energy CT-based (DECT) method. Compared to the (HU;ρ) method performed on CT images acquired with the 80 kVp HD protocol, a 2-fold improvement in segmentation accuracy and a 7.5-fold reduction in radiation dose were observed when the DECT method was performed on CT images acquired with the 50/80 kVp LD protocol, showing the possibility to reduce radiation dose while achieving high segmentation accuracy.

  11. A security and privacy preserving e-prescription system based on smart cards.

    PubMed

    Hsu, Chien-Lung; Lu, Chung-Fu

    2012-12-01

    In 2002, Ateniese and Medeiros proposed an e-prescription system, in which the patient can store e-prescription and related information using smart card. Latter, Yang et al. proposed a novel smart-card based e-prescription system based on Ateniese and Medeiros's system in 2004. Yang et al. considered the privacy issues of prescription data and adopted the concept of a group signature to provide patient's privacy protection. To make the e-prescription system more realistic, they further applied a proxy signature to allow a patient to delegate his signing capability to other people. This paper proposed a novel security and privacy preserving e-prescription system model based on smart cards. A new role, chemist, is included in the system model for settling the medicine dispute. We further presented a concrete identity-based (ID-based) group signature scheme and an ID-based proxy signature scheme to realize the proposed model. Main property of an ID-based system is that public key is simple user's identity and can be verified without extra public key certificates. Our ID-based group signature scheme can allow doctors to sign e-prescription anonymously. In a case of a medical dispute, identities of the doctors can be identified. The proposed ID-based proxy signature scheme can improve signing delegation and allows a delegation chain. The proposed e-prescription system based on our proposed two cryptographic schemes is more practical and efficient than Yang et al.'s system in terms of security, communication overheads, computational costs, practical considerations.

  12. A model of four hierarchical levels to train Chinese residents' teaching skills for "practice-based learning and improvement" competency.

    PubMed

    Yang, Ying-Ying; Yang, Ling-Yu; Hsu, Hui-Chi; Huang, Chia-Chang; Huang, Chin-Chou; Kirby, Ralph; Cheng, Hao Min; Chang, Ching-Chi; Chuang, Chiao-Lin; Liang, Jen-Feng; Lin, Chun-Chi; Lee, Wei-Shin; Ho, Shung-Tai; Lee, Fa-Yauh

    2015-01-01

    The current study focused on validating a protocol for training and auditing the resident's practice-based learning and improvement (PBLI) and quality improvement (QI) competencies for primary care. Twelve second-year (R2), 12 first-year (R1) and 12 postgraduate year-1 residents were enrolled into group A, B and C, respectively, as trainees. After three training protocols had been completed, a writing test, self-assessed questionnaire and mini-OSTE and end-of-rotation assessment were used in auditing the PBLI competency, performance and teaching ability of trainees. Baseline expert-assessed PBLI and QI knowledge application tool writing scores were low for the R1 and R2 residents. After three training protocols, PBLI and QI proficiencies, performance and teaching abilities were improved to similar levels cross the three training levels of residents based on the expert-assessed writing test-audited assessments and on the faculty and standardized clerk-assessed end-of-rotation-/mini-OSTE-audited assessments. The different four-level hierarchical protocols used to teach group A, B and C were equally beneficial and fitted their needs; namely the different levels of the trainees. Specifically, each level was able to augment their PBLI and QI proficiency. This educational intervention helps medical institutions to train residents as PBLI instructors.

  13. A Secure Cluster-Based Multipath Routing Protocol for WMSNs

    PubMed Central

    Almalkawi, Islam T.; Zapata, Manel Guerrero; Al-Karaki, Jamal N.

    2011-01-01

    The new characteristics of Wireless Multimedia Sensor Network (WMSN) and its design issues brought by handling different traffic classes of multimedia content (video streams, audio, and still images) as well as scalar data over the network, make the proposed routing protocols for typical WSNs not directly applicable for WMSNs. Handling real-time multimedia data requires both energy efficiency and QoS assurance in order to ensure efficient utility of different capabilities of sensor resources and correct delivery of collected information. In this paper, we propose a Secure Cluster-based Multipath Routing protocol for WMSNs, SCMR, to satisfy the requirements of delivering different data types and support high data rate multimedia traffic. SCMR exploits the hierarchical structure of powerful cluster heads and the optimized multiple paths to support timeliness and reliable high data rate multimedia communication with minimum energy dissipation. Also, we present a light-weight distributed security mechanism of key management in order to secure the communication between sensor nodes and protect the network against different types of attacks. Performance evaluation from simulation results demonstrates a significant performance improvement comparing with existing protocols (which do not even provide any kind of security feature) in terms of average end-to-end delay, network throughput, packet delivery ratio, and energy consumption. PMID:22163854

  14. A secure cluster-based multipath routing protocol for WMSNs.

    PubMed

    Almalkawi, Islam T; Zapata, Manel Guerrero; Al-Karaki, Jamal N

    2011-01-01

    The new characteristics of Wireless Multimedia Sensor Network (WMSN) and its design issues brought by handling different traffic classes of multimedia content (video streams, audio, and still images) as well as scalar data over the network, make the proposed routing protocols for typical WSNs not directly applicable for WMSNs. Handling real-time multimedia data requires both energy efficiency and QoS assurance in order to ensure efficient utility of different capabilities of sensor resources and correct delivery of collected information. In this paper, we propose a Secure Cluster-based Multipath Routing protocol for WMSNs, SCMR, to satisfy the requirements of delivering different data types and support high data rate multimedia traffic. SCMR exploits the hierarchical structure of powerful cluster heads and the optimized multiple paths to support timeliness and reliable high data rate multimedia communication with minimum energy dissipation. Also, we present a light-weight distributed security mechanism of key management in order to secure the communication between sensor nodes and protect the network against different types of attacks. Performance evaluation from simulation results demonstrates a significant performance improvement comparing with existing protocols (which do not even provide any kind of security feature) in terms of average end-to-end delay, network throughput, packet delivery ratio, and energy consumption.

  15. Security Verification of Secure MANET Routing Protocols

    DTIC Science & Technology

    2012-03-22

    SECURITY VERIFICATION OF SECURE MANET ROUTING PROTOCOLS THESIS Matthew F. Steele, Captain, USAF AFIT/GCS/ ENG /12-03 DEPARTMENT OF THE AIR FORCE AIR...States AFIT/GCS/ ENG /12-03 SECURITY VERIFICATION OF SECURE MANET ROUTING PROTOCOLS THESIS Presented to the Faculty Department of Electrical and Computer...DISTRIBUTION UNLIMITED AFIT/GCS/ ENG /12-03 SECURITY VERIFICATION OF SECURE MANET ROUTING PROTOCOLS Matthew F. Steele, B.S.E.E. Captain, USAF

  16. Modelling the protocol stack in NCS with deterministic and stochastic petri net

    NASA Astrophysics Data System (ADS)

    Hui, Chen; Chunjie, Zhou; Weifeng, Zhu

    2011-06-01

    Protocol stack is the basis of the networked control systems (NCS). Full or partial reconfiguration of protocol stack offers both optimised communication service and system performance. Nowadays, field testing is unrealistic to determine the performance of reconfigurable protocol stack; and the Petri net formal description technique offers the best combination of intuitive representation, tool support and analytical capabilities. Traditionally, separation between the different layers of the OSI model has been a common practice. Nevertheless, such a layered modelling analysis framework of protocol stack leads to the lack of global optimisation for protocol reconfiguration. In this article, we proposed a general modelling analysis framework for NCS based on the cross-layer concept, which is to establish an efficiency system scheduling model through abstracting the time constraint, the task interrelation, the processor and the bus sub-models from upper and lower layers (application, data link and physical layer). Cross-layer design can help to overcome the inadequacy of global optimisation based on information sharing between protocol layers. To illustrate the framework, we take controller area network (CAN) as a case study. The simulation results of deterministic and stochastic Petri-net (DSPN) model can help us adjust the message scheduling scheme and obtain better system performance.

  17. Effectiveness of enhanced cognitive behavioral therapy (CBT-E) for eating disorders: study protocol for a randomized controlled trial.

    PubMed

    de Jong, Martie; Korrelboom, Kees; van der Meer, Iris; Deen, Mathijs; Hoek, Hans W; Spinhoven, Philip

    2016-12-03

    While eating disorder not otherwise specified (EDNOS) is the most common eating disorder (ED) diagnosis in routine clinical practice, no specific treatment methods for this diagnosis have yet been developed and studied. Enhanced cognitive behavioral therapy (CBT-E) has been described and put to the test as a transdiagnostic treatment protocol for all EDs, including EDNOS. Initial research in the UK suggests that CBT-E is more effective for EDs, especially bulimia nervosa (BN) and EDNOS, than the earlier version of CBT. These positive results of CBT-E have to be replicated in more detail, preferably by independent researchers in different countries. Being the first Dutch study into CBT-E, the results from this national multicenter study - on three sites specialized in EDs - will deliver important information about the effectiveness of CBT-E in several domains of ED pathology, while providing input for the upcoming update of the Dutch Multidisciplinary Guideline for the Treatment of Eating Disorders. A multicenter randomized controlled trial will be conducted. One hundred and thirty-two adult outpatients (aged 18 years and older) with an ED diagnosis and a Body Mass index (BMI) of between 17.5 and 40 will be randomly allocated to the control or the intervention group. Subjects in the control group will receive Treatment as Usual (standard outpatient treatment provided at the participating sites). Subjects in the intervention group will receive 20 sessions of CBT-E in 20 weeks. The design is a 2 (group) × 5 (time) repeated measures factorial design in which neither therapists nor patients will be blinded for treatment allocation. The primary outcome measure is recovery from the ED. Secondary outcome measures include ED psychopathology, common mental disorders, anxiety and depressive symptoms, health-related quality of life, health care use and productivity loss. Self-esteem, perfectionism and interpersonal problems will be examined as putative predictors and

  18. Pregnancy Research on Osteopathic Manipulation Optimizing Treatment Effects: The PROMOTE Study Protocol.

    PubMed

    Hensel, Kendi L; Carnes, Michael S; Stoll, Scott T

    2016-11-01

    The structural and physiologic changes in a woman's body during pregnancy can predispose pregnant women to low back pain and its associated disability, as well as to complications of pregnancy, labor, and delivery. Anecdotal and empirical evidence has indicated that osteopathic manipulative treatment (OMT) may be efficacious in improving pain and functionality in women who are pregnant. Based on that premise, the Pregnancy Research on Osteopathic Manipulation Optimizing Treatment Effects (PROMOTE) study was designed as a prospective, randomized, placebo-controlled, and blinded clinical trial to evaluate the efficacy of an OMT protocol for pain during third-trimester pregnancy. The OMT protocol developed for the PROMOTE study was based on physiologic theory and the concept of the interrelationship of structure and function. The 12 well-defined, standardized OMT techniques used in the protocol are commonly taught at osteopathic medical schools in the United States. These techniques can be easily replicated as a 20-minute protocol applied in conjunction with usual prenatal care, thus making it feasible to implement into clinical practice. This article presents an overview of the study design and treatment protocols used in the PROMOTE study.

  19. Short Review on Quantum Key Distribution Protocols.

    PubMed

    Giampouris, Dimitris

    2017-01-01

    Cryptographic protocols and mechanisms are widely investigated under the notion of quantum computing. Quantum cryptography offers particular advantages over classical ones, whereas in some cases established protocols have to be revisited in order to maintain their functionality. The purpose of this paper is to provide the basic definitions and review the most important theoretical advancements concerning the BB84 and E91 protocols. It also aims to offer a summary on some key developments on the field of quantum key distribution, closely related with the two aforementioned protocols. The main goal of this study is to provide the necessary background information along with a thorough review on the theoretical aspects of QKD, concentrating on specific protocols. The BB84 and E91 protocols have been chosen because most other protocols are similar to these, a fact that makes them important for the general understanding of how the QKD mechanism functions.

  20. Hepatocellular carcinoma: From clinical practice to evidence-based treatment protocols

    PubMed Central

    Galun, Danijel; Basaric, Dragan; Zuvela, Marinko; Bulajic, Predrag; Bogdanovic, Aleksandar; Bidzic, Nemanja; Milicevic, Miroslav

    2015-01-01

    Hepatocellular carcinoma (HCC) is one of the major malignant diseases in many healthcare systems. The growing number of new cases diagnosed each year is nearly equal to the number of deaths from this cancer. Worldwide, HCC is a leading cause of cancer-related deaths, as it is the fifth most common cancer and the third most important cause of cancer related death in men. Among various risk factors the two are prevailing: viral hepatitis, namely chronic hepatitis C virus is a well-established risk factor contributing to the rising incidence of HCC. The epidemic of obesity and the metabolic syndrome, not only in the United States but also in Asia, tend to become the leading cause of the long-term rise in the HCC incidence. Today, the diagnosis of HCC is established within the national surveillance programs in developed countries while the diagnosis of symptomatic, advanced stage disease still remains the characteristic of underdeveloped countries. Although many different staging systems have been developed and evaluated the Barcelona-Clinic Liver Cancer staging system has emerged as the most useful to guide HCC treatment. Treatment allocation should be decided by a multidisciplinary board involving hepatologists, pathologists, radiologists, liver surgeons and oncologists guided by personalized -based medicine. This approach is important not only to balance between different oncologic treatments strategies but also due to the complexity of the disease (chronic liver disease and the cancer) and due to the large number of potentially efficient therapies. Careful patient selection and a tailored treatment modality for every patient, either potentially curative (surgical treatment and tumor ablation) or palliative (transarterial therapy, radioembolization and medical treatment, i.e., sorafenib) is mandatory to achieve the best treatment outcome. PMID:26380652

  1. Two RFID standard-based security protocols for healthcare environments.

    PubMed

    Picazo-Sanchez, Pablo; Bagheri, Nasour; Peris-Lopez, Pedro; Tapiador, Juan E

    2013-10-01

    Radio Frequency Identification (RFID) systems are widely used in access control, transportation, real-time inventory and asset management, automated payment systems, etc. Nevertheless, the use of this technology is almost unexplored in healthcare environments, where potential applications include patient monitoring, asset traceability and drug administration systems, to mention just a few. RFID technology can offer more intelligent systems and applications, but privacy and security issues have to be addressed before its adoption. This is even more dramatical in healthcare applications where very sensitive information is at stake and patient safety is paramount. In Wu et al. (J. Med. Syst. 37:19, 43) recently proposed a new RFID authentication protocol for healthcare environments. In this paper we show that this protocol puts location privacy of tag holders at risk, which is a matter of gravest concern and ruins the security of this proposal. To facilitate the implementation of secure RFID-based solutions in the medical sector, we suggest two new applications (authentication and secure messaging) and propose solutions that, in contrast to previous proposals in this field, are fully based on ISO Standards and NIST Security Recommendations.

  2. Current practices in long-term video-EEG monitoring services: A survey among partners of the E-PILEPSY pilot network of reference for refractory epilepsy and epilepsy surgery.

    PubMed

    Kobulashvili, Teia; Höfler, Julia; Dobesberger, Judith; Ernst, Florian; Ryvlin, Philippe; Cross, J Helen; Braun, Kees; Dimova, Petia; Francione, Stefano; Hecimovic, Hrvoje; Helmstaedter, Christoph; Kimiskidis, Vasilios K; Lossius, Morten Ingvar; Malmgren, Kristina; Marusic, Petr; Steinhoff, Bernhard J; Boon, Paul; Craiu, Dana; Delanty, Norman; Fabo, Daniel; Gil-Nagel, Antonio; Guekht, Alla; Hirsch, Edouard; Kalviainen, Reetta; Mameniskiené, Ruta; Özkara, Çiğdem; Seeck, Margitta; Rubboli, Guido; Krsek, Pavel; Rheims, Sylvain; Trinka, Eugen

    2016-05-01

    The European Union-funded E-PILEPSY network aims to improve awareness of, and accessibility to, epilepsy surgery across Europe. In this study we assessed current clinical practices in epilepsy monitoring units (EMUs) in the participating centers. A 60-item web-based survey was distributed to 25 centers (27 EMUs) of the E-PILEPSY network across 22 European countries. The questionnaire was designed to evaluate the characteristics of EMUs, including organizational aspects, admission, and observation of patients, procedures performed, safety issues, cost, and reimbursement. Complete responses were received from all (100%) EMUs surveyed. Continuous observation of patients was performed in 22 (81%) EMUs during regular working hours, and in 17 EMUs (63%) outside of regular working hours. Fifteen (56%) EMUs requested a signed informed consent before admission. All EMUs performed tapering/withdrawal of antiepileptic drugs, 14 (52%) prior to admission to an EMU. Specific protocols on antiepileptic drugs (AED) tapering were available in four (15%) EMUs. Standardized Operating Procedures (SOP) for the treatment of seizure clusters and status epilepticus were available in 16 (59%). Safety measures implemented by EMUs were: alarm seizure buttons in 21 (78%), restricted patient's ambulation in 19 (70%), guard rails in 16 (59%), and specially designated bathrooms in 7 (26%). Average costs for one inpatient day in EMU ranged between 100 and 2200 Euros. This study shows a considerable diversity in the organization and practice patterns across European epilepsy monitoring units. The collected data may contribute to the development and implementation of evidence-based recommended practices in LTM services across Europe. Copyright © 2016 The Authors. Published by Elsevier Ltd.. All rights reserved.

  3. Effects of Adding an Internet-Based Pain Coping Skills Training Protocol to a Standardized Education and Exercise Program for People With Persistent Hip Pain (HOPE Trial): Randomized Controlled Trial Protocol

    PubMed Central

    Rini, Christine; Keefe, Francis; French, Simon; Nelligan, Rachel; Kasza, Jessica; Forbes, Andrew; Dobson, Fiona; Haxby Abbott, J.; Dalwood, Andrew; Vicenzino, Bill; Harris, Anthony; Hinman, Rana S.

    2015-01-01

    Background Persistent hip pain in older people is usually due to hip osteoarthritis (OA), a major cause of pain, disability, and psychological dysfunction. Objective The purpose of this study is to evaluate whether adding an Internet-based pain coping skills training (PCST) protocol to a standardized intervention of education followed by physical therapist–instructed home exercise leads to greater reductions in pain and improvements in function. Design An assessor-, therapist-, and participant-blinded randomized controlled trial will be conducted. Setting The study will be conducted in a community setting. Participants The participants will be 142 people over 50 years of age with self-reported hip pain consistent with hip OA. Intervention Participants will be randomly allocated to: (1) a control group receiving a 24-week standardized intervention comprising an 8-week Internet-based education package followed by 5 individual physical therapy exercise sessions plus home exercises (3 times weekly) or (2) a PCST group receiving an 8-week Internet-based PCST protocol in addition to the control intervention. Measurements Outcomes will be measured at baseline and 8, 24, and 52 weeks, with the primary time point at 24 weeks. Primary outcomes are hip pain on walking and self-reported physical function. Secondary outcomes include health-related quality-of-life, participant-perceived treatment response, self-efficacy for pain management and function, pain coping attempts, pain catastrophizing, and physical activity. Measurements of adherence, adverse events, use of health services, and process measures will be collected at 24 and 52 weeks. Cost-effectiveness will be assessed at 52 weeks. Limitations A self-reported diagnosis of persistent hip pain will be used. Conclusions The findings will help determine whether adding an Internet-based PCST protocol to standardized education and physical therapist–instructed home exercise is more effective than education and exercise

  4. Effects of Adding an Internet-Based Pain Coping Skills Training Protocol to a Standardized Education and Exercise Program for People With Persistent Hip Pain (HOPE Trial): Randomized Controlled Trial Protocol.

    PubMed

    Bennell, Kim L; Rini, Christine; Keefe, Francis; French, Simon; Nelligan, Rachel; Kasza, Jessica; Forbes, Andrew; Dobson, Fiona; Abbott, J Haxby; Dalwood, Andrew; Vicenzino, Bill; Harris, Anthony; Hinman, Rana S

    2015-10-01

    Persistent hip pain in older people is usually due to hip osteoarthritis (OA), a major cause of pain, disability, and psychological dysfunction. The purpose of this study is to evaluate whether adding an Internet-based pain coping skills training (PCST) protocol to a standardized intervention of education followed by physical therapist-instructed home exercise leads to greater reductions in pain and improvements in function. An assessor-, therapist-, and participant-blinded randomized controlled trial will be conducted. The study will be conducted in a community setting. The participants will be 142 people over 50 years of age with self-reported hip pain consistent with hip OA. Participants will be randomly allocated to: (1) a control group receiving a 24-week standardized intervention comprising an 8-week Internet-based education package followed by 5 individual physical therapy exercise sessions plus home exercises (3 times weekly) or (2) a PCST group receiving an 8-week Internet-based PCST protocol in addition to the control intervention. Outcomes will be measured at baseline and 8, 24, and 52 weeks, with the primary time point at 24 weeks. Primary outcomes are hip pain on walking and self-reported physical function. Secondary outcomes include health-related quality-of-life, participant-perceived treatment response, self-efficacy for pain management and function, pain coping attempts, pain catastrophizing, and physical activity. Measurements of adherence, adverse events, use of health services, and process measures will be collected at 24 and 52 weeks. Cost-effectiveness will be assessed at 52 weeks. A self-reported diagnosis of persistent hip pain will be used. The findings will help determine whether adding an Internet-based PCST protocol to standardized education and physical therapist-instructed home exercise is more effective than education and exercise alone for persistent hip pain. This study has the potential to guide clinical practice toward innovative

  5. SACFIR: SDN-Based Application-Aware Centralized Adaptive Flow Iterative Reconfiguring Routing Protocol for WSNs.

    PubMed

    Aslam, Muhammad; Hu, Xiaopeng; Wang, Fan

    2017-12-13

    Smart reconfiguration of a dynamic networking environment is offered by the central control of Software-Defined Networking (SDN). Centralized SDN-based management architectures are capable of retrieving global topology intelligence and decoupling the forwarding plane from the control plane. Routing protocols developed for conventional Wireless Sensor Networks (WSNs) utilize limited iterative reconfiguration methods to optimize environmental reporting. However, the challenging networking scenarios of WSNs involve a performance overhead due to constant periodic iterative reconfigurations. In this paper, we propose the SDN-based Application-aware Centralized adaptive Flow Iterative Reconfiguring (SACFIR) routing protocol with the centralized SDN iterative solver controller to maintain the load-balancing between flow reconfigurations and flow allocation cost. The proposed SACFIR's routing protocol offers a unique iterative path-selection algorithm, which initially computes suitable clustering based on residual resources at the control layer and then implements application-aware threshold-based multi-hop report transmissions on the forwarding plane. The operation of the SACFIR algorithm is centrally supervised by the SDN controller residing at the Base Station (BS). This paper extends SACFIR to SDN-based Application-aware Main-value Centralized adaptive Flow Iterative Reconfiguring (SAMCFIR) to establish both proactive and reactive reporting. The SAMCFIR transmission phase enables sensor nodes to trigger direct transmissions for main-value reports, while in the case of SACFIR, all reports follow computed routes. Our SDN-enabled proposed models adjust the reconfiguration period according to the traffic burden on sensor nodes, which results in heterogeneity awareness, load-balancing and application-specific reconfigurations of WSNs. Extensive experimental simulation-based results show that SACFIR and SAMCFIR yield the maximum scalability, network lifetime and stability

  6. SACFIR: SDN-Based Application-Aware Centralized Adaptive Flow Iterative Reconfiguring Routing Protocol for WSNs

    PubMed Central

    Hu, Xiaopeng; Wang, Fan

    2017-01-01

    Smart reconfiguration of a dynamic networking environment is offered by the central control of Software-Defined Networking (SDN). Centralized SDN-based management architectures are capable of retrieving global topology intelligence and decoupling the forwarding plane from the control plane. Routing protocols developed for conventional Wireless Sensor Networks (WSNs) utilize limited iterative reconfiguration methods to optimize environmental reporting. However, the challenging networking scenarios of WSNs involve a performance overhead due to constant periodic iterative reconfigurations. In this paper, we propose the SDN-based Application-aware Centralized adaptive Flow Iterative Reconfiguring (SACFIR) routing protocol with the centralized SDN iterative solver controller to maintain the load-balancing between flow reconfigurations and flow allocation cost. The proposed SACFIR’s routing protocol offers a unique iterative path-selection algorithm, which initially computes suitable clustering based on residual resources at the control layer and then implements application-aware threshold-based multi-hop report transmissions on the forwarding plane. The operation of the SACFIR algorithm is centrally supervised by the SDN controller residing at the Base Station (BS). This paper extends SACFIR to SDN-based Application-aware Main-value Centralized adaptive Flow Iterative Reconfiguring (SAMCFIR) to establish both proactive and reactive reporting. The SAMCFIR transmission phase enables sensor nodes to trigger direct transmissions for main-value reports, while in the case of SACFIR, all reports follow computed routes. Our SDN-enabled proposed models adjust the reconfiguration period according to the traffic burden on sensor nodes, which results in heterogeneity awareness, load-balancing and application-specific reconfigurations of WSNs. Extensive experimental simulation-based results show that SACFIR and SAMCFIR yield the maximum scalability, network lifetime and stability

  7. Considerations for practice-based research: a cross-sectional survey of chiropractic, acupuncture and massage practices.

    PubMed

    Floden, Lysbeth; Howerter, Amy; Matthews, Eva; Nichter, Mark; Cunningham, James K; Ritenbaugh, Cheryl; Gordon, Judith S; Muramoto, Myra L

    2015-05-02

    Complementary and alternative medicine (CAM) use has steadily increased globally over the past two decades and is increasingly playing a role in the healthcare system in the United States. CAM practice-based effectiveness research requires an understanding of the settings in which CAM practitioners provide services. This paper describes and quantifies practice environment characteristics for a cross-sectional sample of doctors of chiropractic (DCs), licensed acupuncturists (LAcs), and licensed massage therapists (LMTs) in the United States. Using a cross-sectional telephone survey of DCs (n = 32), LAcs (n = 70), and LMTs (n = 184) in the Tucson, AZ metropolitan area, we collected data about each location where practitioners work, as well as measures on practitioner and practice characteristics including: patient volume, number of locations where practitioners worked, CAM practitioner types working at each location, and business models of practice. The majority of practitioners reported having one practice location (93.8% of DCs, 80% of LAcs and 59.8% of LMTs) where they treat patients. Patient volume/week was related to practitioner type; DCs saw 83.13 (SD = 49.29) patients/week, LAcs saw 22.29 (SD = 16.88) patients/week, and LMTs saw 14.21 (SD =10.25) patients per week. Practitioners completed surveys for N = 388 practice locations. Many CAM practices were found to be multidisciplinary and/or have more than one practitioner: 9/35 (25.7%) chiropractic practices, 24/87 (27.6%) acupuncture practices, and 141/266 (53.0%) massage practices. Practice business models across CAM practitioner types were heterogeneous, e.g. sole proprietor, employee, partner, and independent contractor. CAM practices vary across and within disciplines in ways that can significantly impact design and implementation of practice-based research. CAM research and intervention programs need to be mindful of the heterogeneity of CAM practices in order to create appropriate interventions, study

  8. Evidence based practice readiness: A concept analysis.

    PubMed

    Schaefer, Jessica D; Welton, John M

    2018-01-15

    To analyse and define the concept "evidence based practice readiness" in nurses. Evidence based practice readiness is a term commonly used in health literature, but without a clear understanding of what readiness means. Concept analysis is needed to define the meaning of evidence based practice readiness. A concept analysis was conducted using Walker and Avant's method to clarify the defining attributes of evidence based practice readiness as well as antecedents and consequences. A Boolean search of PubMed and Cumulative Index for Nursing and Allied Health Literature was conducted and limited to those published after the year 2000. Eleven articles met the inclusion criteria for this analysis. Evidence based practice readiness incorporates personal and organisational readiness. Antecedents include the ability to recognize the need for evidence based practice, ability to access and interpret evidence based practice, and a supportive environment. The concept analysis demonstrates the complexity of the concept and its implications for nursing practice. The four pillars of evidence based practice readiness: nursing, training, equipping and leadership support are necessary to achieve evidence based practice readiness. Nurse managers are in the position to address all elements of evidence based practice readiness. Creating an environment that fosters evidence based practice can improve patient outcomes, decreased health care cost, increase nurses' job satisfaction and decrease nursing turnover. © 2018 John Wiley & Sons Ltd.

  9. Performing private database queries in a real-world environment using a quantum protocol.

    PubMed

    Chan, Philip; Lucio-Martinez, Itzel; Mo, Xiaofan; Simon, Christoph; Tittel, Wolfgang

    2014-06-10

    In the well-studied cryptographic primitive 1-out-of-N oblivious transfer, a user retrieves a single element from a database of size N without the database learning which element was retrieved. While it has previously been shown that a secure implementation of 1-out-of-N oblivious transfer is impossible against arbitrarily powerful adversaries, recent research has revealed an interesting class of private query protocols based on quantum mechanics in a cheat sensitive model. Specifically, a practical protocol does not need to guarantee that the database provider cannot learn what element was retrieved if doing so carries the risk of detection. The latter is sufficient motivation to keep a database provider honest. However, none of the previously proposed protocols could cope with noisy channels. Here we present a fault-tolerant private query protocol, in which the novel error correction procedure is integral to the security of the protocol. Furthermore, we present a proof-of-concept demonstration of the protocol over a deployed fibre.

  10. Performing private database queries in a real-world environment using a quantum protocol

    PubMed Central

    Chan, Philip; Lucio-Martinez, Itzel; Mo, Xiaofan; Simon, Christoph; Tittel, Wolfgang

    2014-01-01

    In the well-studied cryptographic primitive 1-out-of-N oblivious transfer, a user retrieves a single element from a database of size N without the database learning which element was retrieved. While it has previously been shown that a secure implementation of 1-out-of-N oblivious transfer is impossible against arbitrarily powerful adversaries, recent research has revealed an interesting class of private query protocols based on quantum mechanics in a cheat sensitive model. Specifically, a practical protocol does not need to guarantee that the database provider cannot learn what element was retrieved if doing so carries the risk of detection. The latter is sufficient motivation to keep a database provider honest. However, none of the previously proposed protocols could cope with noisy channels. Here we present a fault-tolerant private query protocol, in which the novel error correction procedure is integral to the security of the protocol. Furthermore, we present a proof-of-concept demonstration of the protocol over a deployed fibre. PMID:24913129

  11. Intelligent QoS routing algorithm based on improved AODV protocol for Ad Hoc networks

    NASA Astrophysics Data System (ADS)

    Huibin, Liu; Jun, Zhang

    2016-04-01

    Mobile Ad Hoc Networks were playing an increasingly important part in disaster reliefs, military battlefields and scientific explorations. However, networks routing difficulties are more and more outstanding due to inherent structures. This paper proposed an improved cuckoo searching-based Ad hoc On-Demand Distance Vector Routing protocol (CSAODV). It elaborately designs the calculation methods of optimal routing algorithm used by protocol and transmission mechanism of communication-package. In calculation of optimal routing algorithm by CS Algorithm, by increasing QoS constraint, the found optimal routing algorithm can conform to the requirements of specified bandwidth and time delay, and a certain balance can be obtained among computation spending, bandwidth and time delay. Take advantage of NS2 simulation software to take performance test on protocol in three circumstances and validate the feasibility and validity of CSAODV protocol. In results, CSAODV routing protocol is more adapt to the change of network topological structure than AODV protocol, which improves package delivery fraction of protocol effectively, reduce the transmission time delay of network, reduce the extra burden to network brought by controlling information, and improve the routing efficiency of network.

  12. Protocol for a systematic review with network meta-analysis of the modalities used to deliver eHealth interventions for chronic pain.

    PubMed

    Slattery, Brian W; Haugh, Stephanie; Francis, Kady; O'Connor, Laura; Barrett, Katie; Dwyer, Christopher P; O'Higgins, Siobhan; Egan, Jonathan; McGuire, Brian E

    2017-03-03

    As eHealth interventions prove both efficacious and practical, and as they arguably overcome certain barriers encountered by traditional face-to-face treatment for chronic pain, their number has increased dramatically in recent times. However, there is a dearth of research that focuses on evaluating and comparing the different types of technology-assisted interventions. This is a protocol for a systematic review that aims to evaluate the eHealth modalities in the context of psychological and non-psychological (other than non-drug) interventions for chronic pain. We will search the Cochrane Central Register of Controlled Trials (CENTRAL: The Cochrane Library), MEDLINE, Embase and PsycINFO. Randomised controlled trials (RCTs) with more than 20 participants per trial arm that have evaluated non-drug psychological or non-psychological interventions delivered via an eHealth modality and have pain as an outcome measure will be included. Two review authors will independently extract data and assess the study suitability in accordance with the Cochrane Collaboration Risk of Bias Tool. Studies will be included if they measure at least one outcome variable in accordance with the IMMPACT guidelines (i.e. pain severity, pain interference, physical functioning, symptoms, emotional functioning, global improvement and disposition). Secondary outcomes will be measures of depression and health-related quality of life (HRQoL). A network meta-analysis will be conducted based on direct comparisons to generate indirect comparisons of modalities across treatment trials, which will return rankings for the eHealth modalities in terms of their effectiveness. Most trials that use an eHealth intervention to manage chronic pain typically use one modality. As a result, little evidence exists to support which modality type is the most effective. The current review will address this gap in the literature and compare the different eHealth modalities used for technology-assisted interventions for

  13. Emulation Platform for Cyber Analysis of Wireless Communication Network Protocols

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Van Leeuwen, Brian P.; Eldridge, John M.

    Wireless networking and mobile communications is increasing around the world and in all sectors of our lives. With increasing use, the density and complexity of the systems increase with more base stations and advanced protocols to enable higher data throughputs. The security of data transported over wireless networks must also evolve with the advances in technologies enabling more capable wireless networks. However, means for analysis of the effectiveness of security approaches and implementations used on wireless networks are lacking. More specifically a capability to analyze the lower-layer protocols (i.e., Link and Physical layers) is a major challenge. An analysis approachmore » that incorporates protocol implementations without the need for RF emissions is necessary. In this research paper several emulation tools and custom extensions that enable an analysis platform to perform cyber security analysis of lower layer wireless networks is presented. A use case of a published exploit in the 802.11 (i.e., WiFi) protocol family is provided to demonstrate the effectiveness of the described emulation platform.« less

  14. Study of consensus-based time synchronization in wireless sensor networks.

    PubMed

    He, Jianping; Li, Hao; Chen, Jiming; Cheng, Peng

    2014-03-01

    Recently, various consensus-based protocols have been developed for time synchronization in wireless sensor networks. However, due to the uncertainties lying in both the hardware fabrication and network communication processes, it is not clear how most of the protocols will perform in real implementations. In order to reduce such gap, this paper investigates whether and how the typical consensus-based time synchronization protocols can tolerate the uncertainties in practical sensor networks through extensive testbed experiments. For two typical protocols, i.e., Average Time Synchronization (ATS) and Maximum Time Synchronization (MTS), we first analyze how the time synchronization accuracy will be affected by various uncertainties in the system. Then, we implement both protocols on our sensor network testbed consisted of Micaz nodes, and investigate the time synchronization performance and robustness under various network settings. Noticing that the synchronized clocks under MTS may be slightly faster than the desirable clock, by adopting both maximum consensus and minimum consensus, we propose a modified protocol, MMTS, which is able to drive the synchronized clocks closer to the desirable clock while maintaining the convergence rate and synchronization accuracy of MTS. © 2013 ISA. Published by ISA. All rights reserved.

  15. Managing symptoms during cancer treatments: evaluating the implementation of evidence-informed remote support protocols

    PubMed Central

    2012-01-01

    Background Management of cancer treatment-related symptoms is an important safety issue given that symptoms can become life-threatening and often occur when patients are at home. With funding from the Canadian Partnership Against Cancer, a pan-Canadian steering committee was established with representation from eight provinces to develop symptom protocols using a rigorous methodology (CAN-IMPLEMENT©). Each protocol is based on a systematic review of the literature to identify relevant clinical practice guidelines. Protocols were validated by cancer nurses from across Canada. The aim of this study is to build an effective and sustainable approach for implementing evidence-informed protocols for nurses to use when providing remote symptom assessment, triage, and guidance in self-management for patients experiencing symptoms while undergoing cancer treatments. Methods A prospective mixed-methods study design will be used. Guided by the Knowledge to Action Framework, the study will involve (a) establishing an advisory knowledge user team in each of three targeted settings; (b) assessing factors influencing nurses’ use of protocols using interviews/focus groups and a standardized survey instrument; (c) adapting protocols for local use, ensuring fidelity of the content; (d) selecting intervention strategies to overcome known barriers and implementing the protocols; (e) conducting think-aloud usability testing; (f) evaluating protocol use and outcomes by conducting an audit of 100 randomly selected charts at each of the three settings; and (g) assessing satisfaction with remote support using symptom protocols and change in nurses’ barriers to use using survey instruments. The primary outcome is sustained use of the protocols, defined as use in 75% of the calls. Descriptive analysis will be conducted for the barriers, use of protocols, and chart audit outcomes. Content analysis will be conducted on interviews/focus groups and usability testing with comparisons across

  16. Proposed Requirements-driven User-scenario Development Protocol for the Belmont Forum E-Infrastructure and Data Management Cooperative Research Agreement

    NASA Astrophysics Data System (ADS)

    Wee, B.; Car, N.; Percivall, G.; Allen, D.; Fitch, P. G.; Baumann, P.; Waldmann, H. C.

    2014-12-01

    The Belmont Forum E-Infrastructure and Data Management Cooperative Research Agreement (CRA) is designed to foster a global community to collaborate on e-infrastructure challenges. One of the deliverables is an implementation plan to address global data infrastructure interoperability challenges and align existing domestic and international capabilities. Work package three (WP3) of the CRA focuses on the harmonization of global data infrastructure for sharing environmental data. One of the subtasks under WP3 is the development of user scenarios that guide the development of applicable deliverables. This paper describes the proposed protocol for user scenario development. It enables the solicitation of user scenarios from a broad constituency, and exposes the mechanisms by which those solicitations are evaluated against requirements that map to the Belmont Challenge. The underlying principle of traceability forms the basis for a structured, requirements-driven approach resulting in work products amenable to trade-off analyses and objective prioritization. The protocol adopts the ISO Reference Model for Open Distributed Processing (RM-ODP) as a top level framework. User scenarios are developed within RM-ODP's "Enterprise Viewpoint". To harmonize with existing frameworks, the protocol utilizes the conceptual constructs of "scenarios", "use cases", "use case categories", and use case templates as adopted by recent GEOSS Architecture Implementation Project (AIP) deliverables and CSIRO's eReefs project. These constructs are encapsulated under the larger construct of "user scenarios". Once user scenarios are ranked by goodness-of-fit to the Belmont Challenge, secondary scoring metrics may be generated, like goodness-of-fit to FutureEarth science themes. The protocol also facilitates an assessment of the ease of implementing given user scenario using existing GEOSS AIP deliverables. In summary, the protocol results in a traceability graph that can be extended to coordinate

  17. Facing the Challenge of e-Learning: Reflections on Teaching Evidence-Based Practice through Online Discussion Groups

    ERIC Educational Resources Information Center

    Clegg, Phil; Heap, John

    2006-01-01

    The advent of e-learning in higher education has entailed extensive use of online discussion boards to promote collaborative learning among students; however, the role of instructors as online facilitators is typically ill-defined due to a lack of sufficient standards or guidelines for good practice. In their audit of online discussion forum…

  18. A hop count based heuristic routing protocol for mobile delay tolerant networks.

    PubMed

    You, Lei; Li, Jianbo; Wei, Changjiang; Dai, Chenqu; Xu, Jixing; Hu, Lejuan

    2014-01-01

    Routing in delay tolerant networks (DTNs) is a challenge since it must handle network partitioning, long delays, and dynamic topology. Meanwhile, routing protocols of the traditional mobile ad hoc networks (MANETs) cannot work well due to the failure of its assumption that most network connections are available. In this paper, we propose a hop count based heuristic routing protocol by utilizing the information carried by the peripatetic packets in the network. A heuristic function is defined to help in making the routing decision. We formally define a custom operation for square matrices so as to transform the heuristic value calculation into matrix manipulation. Finally, the performance of our proposed algorithm is evaluated by the simulation results, which show the advantage of such self-adaptive routing protocol in the diverse circumstance of DTNs.

  19. A Hop Count Based Heuristic Routing Protocol for Mobile Delay Tolerant Networks

    PubMed Central

    Wei, Changjiang; Dai, Chenqu; Xu, Jixing; Hu, Lejuan

    2014-01-01

    Routing in delay tolerant networks (DTNs) is a challenge since it must handle network partitioning, long delays, and dynamic topology. Meanwhile, routing protocols of the traditional mobile ad hoc networks (MANETs) cannot work well due to the failure of its assumption that most network connections are available. In this paper, we propose a hop count based heuristic routing protocol by utilizing the information carried by the peripatetic packets in the network. A heuristic function is defined to help in making the routing decision. We formally define a custom operation for square matrices so as to transform the heuristic value calculation into matrix manipulation. Finally, the performance of our proposed algorithm is evaluated by the simulation results, which show the advantage of such self-adaptive routing protocol in the diverse circumstance of DTNs. PMID:25110736

  20. Practice guidelines for music interventions with hospitalized pediatric patients.

    PubMed

    Stouffer, Janice W; Shirk, Beverly J; Polomano, Rosemary C

    2007-12-01

    Music therapy is an effective complementary approach that can achieve specific therapeutic outcomes in the clinical management of pediatric patients. Growing research on music interventions has generated scientific knowledge about how this modality benefits patients and has formed the basis for effective protocols that can be used in practice. Although it can be challenging to translate research-based protocols into routine clinical care at the bedside, it is essential that music therapy interventions be aligned with evidence-based information and that accepted standards be established by the music therapy discipline to achieve the greatest benefit. The importance of partnerships between nurses and music therapists is emphasized to enhance the success of music-based treatments. This discussion synthesizes research findings that can be used to design pediatric practice guidelines in the application of music therapy.

  1. Bridging the Gap in Global Advanced Radiation Oncology Training: Impact of a Web-Based Open-Access Interactive Three-Dimensional Contouring Atlas on Radiation Oncologist Practice in Russia.

    PubMed

    McClelland, Shearwood; Chernykh, Marina; Dengina, Natalia; Gillespie, Erin F; Likhacheva, Anna; Usychkin, Sergey; Pankratov, Alexandr; Kharitonova, Ekaterina; Egorova, Yulia; Tsimafeyeu, Ilya; Tjulandin, Sergei; Thomas, Charles R; Mitin, Timur

    2018-06-25

    Radiation oncologists in Russia face a number of unique professional difficulties including lack of standardized training and continuing medical education. To combat this, under the auspices of the Russian Society of Clinical Oncology (RUSSCO), our group has developed a series of ongoing in-person interactive contouring workshops that are held during the major Russian oncology conferences in Moscow, Russia. Since November 2016 during each workshop, we utilized a web-based open-access interactive three-dimensional contouring atlas as part of our didactics. We sought to determine the impact of this resource on radiation oncology practice in Russia. We distributed an IRB-approved web-based survey to 172 practicing radiation oncologists in Russia. We inquired about practice demographics, RUSSCO contouring workshop attendance, and the clinical use of open-access English language interactive contouring atlas (eContour). The survey remained open for 2 months until November 2017. Eighty radiation oncologists completed the survey with a 46.5% response rate. Mean number of years in practice was 13.7. Sixty respondents (75%) attended at least one RUSSCO contouring workshop. Of those who were aware of eContour, 76% were introduced during a RUSSCO contouring workshop, and 81% continue to use it in their daily practice. The greatest obstacles to using the program were language barrier (51%) and internet access (38%). Nearly 90% reported their contouring practices changed since they started using the program, particularly for delineation of clinical target volumes (57%) and/or organs at risk (46%). More than 97% found the clinical pearls/links to cooperative group protocols in the software helpful in their daily practice. The majority used the contouring program several times per month (43%) or several times per week (41%). Face-to-face contouring instruction in combination with open-access web-based interactive contouring resource had a meaningful impact on perceived quality of

  2. Satellite Communications Using Commercial Protocols

    NASA Technical Reports Server (NTRS)

    Ivancic, William D.; Griner, James H.; Dimond, Robert; Frantz, Brian D.; Kachmar, Brian; Shell, Dan

    2000-01-01

    NASA Glenn Research Center has been working with industry, academia, and other government agencies in assessing commercial communications protocols for satellite and space-based applications. In addition, NASA Glenn has been developing and advocating new satellite-friendly modifications to existing communications protocol standards. This paper summarizes recent research into the applicability of various commercial standard protocols for use over satellite and space- based communications networks as well as expectations for future protocol development. It serves as a reference point from which the detailed work can be readily accessed. Areas that will be addressed include asynchronous-transfer-mode quality of service; completed and ongoing work of the Internet Engineering Task Force; data-link-layer protocol development for unidirectional link routing; and protocols for aeronautical applications, including mobile Internet protocol routing for wireless/mobile hosts and the aeronautical telecommunications network protocol.

  3. SU-F-R-06: Traumatic Brachial Plexus Injury Imaging, Developing a Coherent Clinical Protocol From Literature Review Through Practice

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Wu, D; France, E; Lambert, J

    Purpose: Medical Physics teams can now play a critical role to help plan and provide studied approaches for traumatic brachial plexus MR imaging (tbpMRI). This is especially important for coordination with uncommon applications, since it is challenging to select the right modality, parameters, and train technologists on the essential components. For this work, we started with a review of the medical literature, performed crossover/volunteer studies to bring tbpMRI to practice with greater image QC and protocol management. Methods: To the best of our knowledge, we reviewed the known searchable domain for tbpMRI. We found 69 total articles since 2000. Articlesmore » were evaluated with our published protocol for literature management (LIMES3). Two physicists and two radiologists condensed the information from all articles into a knowledgebase. Results: The initial literature demonstrated great heterogeneity, which was a sign that this area needed greater consistency. Despite inconsistency and imprecision, we extracted the most relevant targets using our long-term experience with protocol development in MSK. We ran volunteers on six different magnets of various field strengths with multiple receiver coils, and rebuilt a coherent protocol for tbpMRI. Our radiologists rated LIMES3 work as superior. We have received referrals from the ER and have conducted four patient evaluations. Conclusion: Traumatic brachial plexus MRI has great possible benefits for patients. This work supports the complexity of tbpMRI scanning. As this is rarely performed, it requires a more diligent protocol workflow, coordination of caregivers, and education within multiple clinical departments. Choosing the correct imaging exam can be critical, as patients can have significant neuropathy and/or paralysis. The LIMES3 protocol is well liked at our institution, and forms the cornerstone of understanding for our work. Our literature management led to a better clinical protocol creation despite the

  4. The Application of Observational Practice and Educational Networking in Simulation-Based and Distributed Medical Education Contexts.

    PubMed

    Welsher, Arthur; Rojas, David; Khan, Zain; VanderBeek, Laura; Kapralos, Bill; Grierson, Lawrence E M

    2018-02-01

    Research has revealed that individuals can improve technical skill performance by viewing demonstrations modeled by either expert or novice performers. These findings support the development of video-based observational practice communities that augment simulation-based skill education and connect geographically distributed learners. This study explores the experimental replicability of the observational learning effect when demonstrations are sampled from a community of distributed learners and serves as a context for understanding learner experiences within this type of training protocol. Participants from 3 distributed medical campuses engaged in a simulation-based learning study of the elliptical excision in which they completed a video-recorded performance before being assigned to 1 of 3 groups for a 2-week observational practice intervention. One group observed expert demonstrations, another observed novice demonstrations, and the third observed a combination of both. Participants returned for posttesting immediately and 1 month after the intervention. Participants also engaged in interviews regarding their perceptions of the usability and relevance of video-based observational practice to clinical education. Checklist (P < 0.0001) and global rating (P < 0.0001) measures indicate that participants, regardless of group assignment, improved after the intervention and after a 1-month retention period. Analyses revealed no significant differences between groups. Qualitative analyses indicate that participants perceived the observational practice platform to be usable, relevant, and potentially improved with enhanced feedback delivery. Video-based observational practice involving expert and/or novice demonstrations enhances simulation-based skill learning in a group of geographically distributed trainees. These findings support the use of Internet-mediated observational learning communities in distributed and simulation-based medical education contexts.

  5. Microcomputer Nurse-Practitioner Protocols

    PubMed Central

    Way, Anthony B.; Rowley, Blair A.; White, Melanie A.

    1982-01-01

    We have developed a set of protocols on a microcomputer to assist in the management of a geographically isolated nurse practitioner. If a mid-level practitioner is supervised by a physician, some system is needed to ensure that approved care is being provided. The currently available paper-based protocols do not adequately serve all the needs for training, auditing, and record keeping. Conversely, adequate systems based on large computers are not feasible for small clinics. We have therefore developed a microcomputer-based system of protocols for a small rural nurse-practitioner's clinic. Our programs are designed for direct use by the practitioners while the patient is in the clinic. The user is given immediate feedback about any errors. The supervisor is later provided with a summary of the protocol uses and errors, and a copy of any erroneous records. The system appears to be easy to use by the nurse practitioner. The protocols are quickly learned and auditing is facilitated.

  6. Practice‐based Research Network Research Good Practices (PRGPs): Summary of Recommendations

    PubMed Central

    Campbell‐Voytal, Kimberly; Daly, Jeanette; Nagykaldi, Zsolt J.; O'Beirne, Maeve; Sterling, Pamela; Fagnan, Lyle J.; Levy, Barcey; Michaels, LeAnn; Louks, Hannah A.; Smith, Paul; Aspy, Cheryl B.; Patterson, V. Beth; Kano, Miria; Sussman, Andrew L.; Williams, Robert; Neale, Anne Victoria

    2015-01-01

    Abstract Introduction Practice‐based research networks (PBRNs) conduct research in community settings, which poses quality control challenges to the integrity of research, such as study implementation and data collection. A foundation for improving research processes within PBRNs is needed to ensure research integrity. Methods Network directors and coordinators from seven U.S.‐based PBRNs worked with a professional team facilitator during semiannual in‐person meetings and monthly conference calls to produce content for a compendium of recommended research practices specific to the context of PBRNs. Participants were assigned to contribute content congruent with their expertise. Feedback on the draft document was obtained from attendees at the preconference workshop at the annual PBRN meeting in 2013. A revised document was circulated to additional PBRN peers prior to finalization. Results The PBRN Research Good Practices (PRGPs) document is organized into four chapters: (1) Building PBRN Infrastructure; (2) Study Development and Implementation; (3) Data Management, and (4) Dissemination Policies. Each chapter contains an introduction, detailed procedures for each section, and example resources with information links. Conclusion The PRGPs is a PBRN‐specific resource to facilitate PBRN management and staff training, to promote adherence to study protocols, and to increase validity and generalizability of study findings. PMID:26296309

  7. SAMP, the Simple Application Messaging Protocol: Letting applications talk to each other

    NASA Astrophysics Data System (ADS)

    Taylor, M. B.; Boch, T.; Taylor, J.

    2015-06-01

    SAMP, the Simple Application Messaging Protocol, is a hub-based communication standard for the exchange of data and control between participating client applications. It has been developed within the context of the Virtual Observatory with the aim of enabling specialised data analysis tools to cooperate as a loosely integrated suite, and is now in use by many and varied desktop and web-based applications dealing with astronomical data. This paper reviews the requirements and design principles that led to SAMP's specification, provides a high-level description of the protocol, and discusses some of its common and possible future usage patterns, with particular attention to those factors that have aided its success in practice.

  8. Psychometric Properties and U.S. National Norms of the Evidence-Based Practice Attitude Scale (EBPAS)

    ERIC Educational Resources Information Center

    Aarons, Gregory A.; Glisson, Charles; Hoagwood, Kimberly; Kelleher, Kelly; Landsverk, John; Cafri, Guy

    2010-01-01

    The Evidence-Based Practice Attitude Scale (EBPAS) assesses mental health and social service provider attitudes toward adopting evidence-based practices. Scores on the EBPAS derive from 4 subscales (i.e., Appeal, Requirements, Openness, and Divergence) as well as the total scale, and preliminary studies have linked EBPAS scores to clinic structure…

  9. Large scale validation of an efficient CRISPR/Cas-based multi gene editing protocol in Escherichia coli.

    PubMed

    Zerbini, Francesca; Zanella, Ilaria; Fraccascia, Davide; König, Enrico; Irene, Carmela; Frattini, Luca F; Tomasi, Michele; Fantappiè, Laura; Ganfini, Luisa; Caproni, Elena; Parri, Matteo; Grandi, Alberto; Grandi, Guido

    2017-04-24

    The exploitation of the CRISPR/Cas9 machinery coupled to lambda (λ) recombinase-mediated homologous recombination (recombineering) is becoming the method of choice for genome editing in E. coli. First proposed by Jiang and co-workers, the strategy has been subsequently fine-tuned by several authors who demonstrated, by using few selected loci, that the efficiency of mutagenesis (number of mutant colonies over total number of colonies analyzed) can be extremely high (up to 100%). However, from published data it is difficult to appreciate the robustness of the technology, defined as the number of successfully mutated loci over the total number of targeted loci. This information is particularly relevant in high-throughput genome editing, where repetition of experiments to rescue missing mutants would be impractical. This work describes a "brute force" validation activity, which culminated in the definition of a robust, simple and rapid protocol for single or multiple gene deletions. We first set up our own version of the CRISPR/Cas9 protocol and then we evaluated the mutagenesis efficiency by changing different parameters including sequence of guide RNAs, length and concentration of donor DNAs, and use of single stranded and double stranded donor DNAs. We then validated the optimized conditions targeting 78 "dispensable" genes. This work led to the definition of a protocol, featuring the use of double stranded synthetic donor DNAs, which guarantees mutagenesis efficiencies consistently higher than 10% and a robustness of 100%. The procedure can be applied also for simultaneous gene deletions. This work defines for the first time the robustness of a CRISPR/Cas9-based protocol based on a large sample size. Since the technical solutions here proposed can be applied to other similar procedures, the data could be of general interest for the scientific community working on bacterial genome editing and, in particular, for those involved in synthetic biology projects

  10. Effects of e-learning in a continuing education context on nursing care: a review of systematic qualitative, quantitative and mixed studies reviews (protocol)

    PubMed Central

    Gagnon, Marie-Pierre; Côté, José; Payne-Gagnon, Julie; Hudson, Emilie; Bouix-Picasso, Julien; Dubois, Carl-Ardy

    2017-01-01

    Introduction Continuing education (CE) is imperative to the future of professional nursing. The use of e-learning by registered nurses for CE is spreading. A review of systematic reviews will be conducted to develop a broad picture of the effects of e-learning in a CE context on nursing care. Methods and analysis Systematic qualitative, quantitative and mixed studies reviews published in English, French or Spanish from 1 January 2006 will be included. The outcomes of interest will be extracted and analysed inductively and deductively from the Nursing Care Performance Framework; some themes include nursing resources, nurses’ practice environment, processes, professional satisfaction, and nursing sensitive outcomes. Three reviewers will independently screen first the title and abstract of the papers, and then the full texts in order to assess eligibility. Two teams of two reviewers will extract the selected reviews’ characteristics and data. The results from various types of reviews will be integrated using a data-based convergent synthesis design. We will conduct a thematic synthesis and transform all quantitative and mixed data into qualitative data. Ethics and dissemination Ethics approval is not required for review of systematic reviews. We will summarise evidence concerning the negative, neutral and positive effects of various forms of e-learning on different aspects of nursing care. If we find gaps in the literature, we will highlight them and suggest ideas for further research. We will also focus on positive effects and present, if possible, the components and characteristics of e-learning interventions that were found to be successful. We will present this protocol and results in international conferences in nursing, medical, and health informatics domains. We will also submit the results of our work for peer-review publication in a journal indexed in the international bibliographic database of biomedical information. PMID:29042394

  11. Exercise-based treatments for substance use disorders: evidence, theory, and practicality

    PubMed Central

    Linke, Sarah E.; Ussher, Michael

    2016-01-01

    Background Epidemiological studies reveal that individuals who report risky substance use are generally less likely to meet physical activity guidelines (with the exception of certain population segments, such as adolescents and athletes). A growing body of evidence suggests that individuals with substance use disorders (SUDs) are interested in exercising and that they may derive benefits from regular exercise, in terms of both general health/fitness and SUD recovery. Objectives The aims of this paper were to: (i) summarize the research examining the effects of exercise-based treatments for SUDs; (ii) discuss the theoretical mechanisms and practical reasons for investigating this topic; (iii) identify the outstanding relevant research questions that warrant further inquiry; and (iv) describe potential implications for practice. Methods The following databases were searched for peer-reviewed original and review papers on the topic of substance use and exercise: PubMed Central, MEDLINE, EMBASE, PsycINFO, and CINAHL Plus. Reference lists of these publications were subsequently searched for any missed but relevant manuscripts. Identified papers were reviewed and summarized by both authors. Results The limited research conducted suggests that exercise may be an effective adjunctive treatment for SUDs. In contrast to the scarce intervention trials to date, a relative abundance of literature on the theoretical and practical reasons supporting the investigation of this topic has been published. Conclusions Definitive conclusions are difficult to draw due to diverse study protocols and low adherence to exercise programs, among other problems. Despite the currently limited and inconsistent evidence, numerous theoretical and practical reasons support exercise-based treatments for SUDs, including psychological, behavioral, neurobiological, nearly universal safety profile, and overall positive health effects. PMID:25397661

  12. Adaptive Practice: Next Generation Evidence-Based Practice in Digital Environments.

    PubMed

    Kennedy, Margaret Ann

    2016-01-01

    Evidence-based practice in nursing is considered foundational to safe, competent care. To date, rigid traditional perceptions of what constitutes 'evidence' have constrained the recognition and use of practice-based evidence and the exploitation of novel forms of evidence from data rich environments. Advancements such as the conceptualization of clinical intelligence, the prevalence of increasingly sophisticated digital health information systems, and the advancement of the Big Data phenomenon have converged to generate a new contemporary context. In today's dynamic data-rich environments, clinicians have new sources of valid evidence, and need a new paradigm supporting clinical practice that is adaptive to information generated by diverse electronic sources. This opinion paper presents adaptive practice as the next generation of evidence-based practice in contemporary evidence-rich environments and provides recommendations for the next phase of evolution.

  13. [PROtocol-based MObilizaTION on intensive care units : Design of a cluster randomized pilot study].

    PubMed

    Nydahl, P; Diers, A; Günther, U; Haastert, B; Hesse, S; Kerschensteiner, C; Klarmann, S; Köpke, S

    2017-10-12

    Despite convincing evidence for early mobilization of patients on intensive care units (ICU), implementation in practice is limited. Protocols for early mobilization, including in- and exclusion criteria, assessments, safety criteria, and step schemes may increase the rate of implementation and mobilization. Patients (population) on ICUs with a protocol for early mobilization (intervention), compared to patients on ICUs without protocol (control), will be more frequently mobilized (outcome). A multicenter, stepped-wedge, cluster-randomized pilot study is presented. Five ICUs will receive an adapted, interprofessional protocol for early mobilization in randomized order. Before and after implementation, mobilization of ICU patients will be evaluated by randomized monthly one-day point prevalence surveys. Primary outcome is the percentage of patients mobilized out of bed, operationalized as a score of ≥3 on the ICU Mobility Scale. Secondary outcome parameters will be presence and/or length of mechanical ventilation, delirium, stay on ICU and in hospital, barriers to early mobilization, adverse events, and process parameters as identified barriers, used strategies, and adaptions to local conditions. Exploratory evaluation of study feasibility and estimation of effect sizes as the basis for a future explanatory study.

  14. A Department-of-Anesthesiology-based management protocol for perioperative corneal abrasions

    PubMed Central

    Lichter, Jessica R; Marr, Lawrence B; Schilling, Dennis E; Hudson, Mark E; Boretsky, Robert H; Barad, Roxana F; Chelly, Jacques E

    2015-01-01

    Introduction Corneal abrasions (CAs) are the most prevalent ocular injuries in the perioperative period. Previously, patients at our community hospital would wait for an ophthalmologist to be available to manage these minor injuries. To decrease this waiting period – and thereby increase patient satisfaction – we developed an anesthesiology-based protocol to manage minor CAs arising in the recovery room. The current study sought to assess this protocol’s efficacy as well as further establish the incidence and some risk factors of CA. Methods This was a hospital-based, observational study. As per protocol, anesthesiologists saw and diagnosed any patient exhibiting symptoms of CA, after which they initiated a preestablished treatment regimen. To examine the efficacy of this protocol between March 2007 and December 2011, the number of CAs anesthesiologists managed and time to treatment were recorded. Additionally, the frequency of CAs was established along with some of their risk factors. Results Throughout the study period, there were 91,064 surgical cases, with 118 CAs (0.13% incidence). Anesthesiology alone managed 110 (93.22%) of these cases. The median time between the end of anesthesia to the time of prescribed ophthalmic medication was 156 minutes (first–third interquartile range: 108–219). All patients experienced resolution of symptoms by the morning following their complaint. Compared to the general surgical population, CA patients were older (P<0.01) and underwent longer surgeries (P<0.01). Conclusion Minor CAs can be safely and effectively managed using an anesthesiology-based approach. Advanced age and longer surgery are confirmed as risk factors for these injuries. PMID:26392749

  15. A secure RFID authentication protocol for healthcare environments using elliptic curve cryptosystem.

    PubMed

    Zhao, Zhenguo

    2014-05-01

    With the fast advancement of the wireless communication technology and the widespread use of medical systems, the radio frequency identification (RFID) technology has been widely used in healthcare environments. As the first important protocol for ensuring secure communication in healthcare environment, the RFID authentication protocols derive more and more attentions. Most of RFID authentication protocols are based on hash function or symmetric cryptography. To get more security properties, elliptic curve cryptosystem (ECC) has been used in the design of RFID authentication protocol. Recently, Liao and Hsiao proposed a new RFID authentication protocol using ECC and claimed their protocol could withstand various attacks. In this paper, we will show that their protocol suffers from the key compromise problem, i.e. an adversary could get the private key stored in the tag. To enhance the security, we propose a new RFID authentication protocol using ECC. Detailed analysis shows the proposed protocol not only could overcome weaknesses in Liao and Hsiao's protocol but also has the same performance. Therefore, it is more suitable for healthcare environments.

  16. Association of eHealth Literacy With Colorectal Cancer Knowledge and Screening Practice Among Internet Users in Japan

    PubMed Central

    2012-01-01

    Background In rapidly developing Internet-user societies, eHealth literacy has become important in promoting wellness. Although previous studies have observed that poor health literacy is associated with less knowledge and screening practice of colorectal cancer (CRC), little is known about whether eHealth literacy is associated with these variables. Objective The present study examined associations between eHealth literacy, knowledge of CRC, and CRC screening practices. Methods Data were analyzed for 2970 Japanese adults (men, 49.9%; mean age ± SD, 39.7 ± 10.9 years) who responded to an Internet-based cross-sectional survey. Knowledge of the definition of CRC, its risk factors and screening practice, previous experience of CRC screening, score on the Japanese version of the eHEALS (J-eHEALS), sociodemographic attributes (sex, age, marital status, educational attainment, and household income level), and frequency of Internet usage were obtained. Sociodemographic attributes and frequency of Internet usage were used as control variables in the multiple regression and logistic regression models. Results eHealth literacy was positively associated with CRC knowledge (β = .116, < .001), when the covariables of both eHealth literacy and CRC knowledge were used in the multiple regression model. Moreover, after controlling for sociodemographic factors, which were significantly associated with eHealth literacy and CRC screening practice, an increase of 1 point in the eHEALS score signified that participants were 1.03 times (95% CI = 1.01–1.05) more likely to undergo CRC screening. Conclusions Internet users with high eHealth literacy are more likely to have knowledge and previous screening practice related to CRC compared to those with low eHealth literacy. PMID:23149453

  17. Association of eHealth literacy with colorectal cancer knowledge and screening practice among internet users in Japan.

    PubMed

    Mitsutake, Seigo; Shibata, Ai; Ishii, Kaori; Oka, Koichiro

    2012-11-13

    In rapidly developing Internet-user societies, eHealth literacy has become important in promoting wellness. Although previous studies have observed that poor health literacy is associated with less knowledge and screening practice of colorectal cancer (CRC), little is known about whether eHealth literacy is associated with these variables. The present study examined associations between eHealth literacy, knowledge of CRC, and CRC screening practices. Data were analyzed for 2970 Japanese adults (men, 49.9%; mean age±SD, 39.7±10.9 years) who responded to an Internet-based cross-sectional survey. Knowledge of the definition of CRC, its risk factors and screening practice, previous experience of CRC screening, score on the Japanese version of the eHEALS (J-eHEALS), sociodemographic attributes (sex, age, marital status, educational attainment, and household income level), and frequency of Internet usage were obtained. Sociodemographic attributes and frequency of Internet usage were used as control variables in the multiple regression and logistic regression models. eHealth literacy was positively associated with CRC knowledge (β=.116, <.001), when the covariables of both eHealth literacy and CRC knowledge were used in the multiple regression model. Moreover, after controlling for sociodemographic factors, which were significantly associated with eHealth literacy and CRC screening practice, an increase of 1 point in the eHEALS score signified that participants were 1.03 times (95% CI=1.01-1.05) more likely to undergo CRC screening. Internet users with high eHealth literacy are more likely to have knowledge and previous screening practice related to CRC compared to those with low eHealth literacy.

  18. Evaluating the tolerability and acceptability of an alcohol-based hand rub - real-life experience with the WHO protocol.

    PubMed

    Wolfensberger, Aline; Durisch, Nina; Mertin, Juliane; Ajdler-Schaeffler, Evelyne; Sax, Hugo

    2015-01-01

    Optimizing user satisfaction with alcohol-based hand rubs (ABHR) may be vital to enhance hand hygiene performance. This study tested the tolerability and acceptability of a new ABHR (EVO9; Ecolab) in healthcare workers under daily working conditions and evaluated the practicability of the corresponding WHO protocol. We strictly applied the WHO single product ABHR evaluation protocol. A trained observer assessed hand skin conditions of healthy volunteers using at least 30 ml ABHR per day during their clinical work at baseline, day 3-5 and one month (visit 1-3). Participants rated ABHR tolerability and acceptability at visit 2 and 3. Additionally, we registered study time for participants and study team. Among 46 volunteers, 76% were female; 37% nurses, 28% physicians. Skin was observer-rated "not" or "incidentally" dry in 64.4%, 77.8%, and 90.9% participants at visit 1, 2, and 3, respectively. EVO9 was scored ≥5 (progressive scale, 1-7) for appearance, intactness, moisture content, and sensation by 95.7%, 97.7%, 88.9%, and 97.8% participants at visit 3, respectively. All WHO benchmarks were exceeded except for "speed of drying" at visit 2, and "texture" at visit 2 and 3. Cumulative study time expenditure was 14 days for the observer and four days for participants. EVO9 was well tolerated and accepted according to the WHO single ABHR evaluation protocol with the potential for improvement for stickiness. The WHO protocol is feasible but requires considerable time and logistics. It does not preclude bias, in this case especially due to the necessary switch to personal dispensers.

  19. Game-Based Practice versus Traditional Practice in Computer-Based Writing Strategy Training: Effects on Motivation and Achievement

    ERIC Educational Resources Information Center

    Proske, Antje; Roscoe, Rod D.; McNamara, Danielle S.

    2014-01-01

    Achieving sustained student engagement with practice in computer-based writing strategy training can be a challenge. One potential solution is to foster engagement by embedding practice in educational games; yet there is currently little research comparing the effectiveness of game-based practice versus more traditional forms of practice. In this…

  20. Using the intervention mapping protocol to reduce European preschoolers' sedentary behavior, an application to the ToyBox-Study.

    PubMed

    De Decker, Ellen; De Craemer, Marieke; De Bourdeaudhuij, Ilse; Verbestel, Vera; Duvinage, Kristin; Iotova, Violeta; Grammatikaki, Evangelia; Wildgruber, Andreas; Mouratidou, Theodora; Manios, Yannis; Cardon, Greet

    2014-02-19

    High levels of sedentary behavior are often measured in preschoolers, but only a few interventions have been developed to counteract this. Furthermore, detailed descriptions of interventions in preschoolers targeting different forms of sedentary behavior could not be located in the literature. The aim of the present paper was to describe the different steps of the Intervention Mapping Protocol used towards the development of an intervention component of the ToyBox-study focusing on decreasing preschoolers' sedentary behavior. The ToyBox-study focuses on the prevention of overweight in 4- to 6-year-old children by implementing a multi-component kindergarten-based intervention with family involvement in six different European countries. Applying the Intervention Mapping Protocol, six different steps were systematically completed for the structured planning and development of the intervention. A literature search and results from focus groups with parents/caregivers and kindergarten teachers were used as a guide during the development of the intervention and the intervention materials. The application of the different steps in the Intervention Mapping Protocol resulted in the creation of matrices of change objectives, followed by the selection of practical applications for five different intervention tools that could be used at the individual level of the preschool child, at the interpersonal level (i.e., parents/caregivers) and at the organizational level (i.e., kindergarten teachers). No cultural differences regarding preschoolers' sedentary behavior were identified between the participating countries during the focus groups, so cultural and local adaptations of the intervention materials were not necessary to improve the adoption and implementation of the intervention. A systematic and evidence-based approach was used for the development of this kindergarten-based family-involved intervention targeting preschoolers, with the inclusion of parental involvement. The

  1. Using the intervention mapping protocol to reduce European preschoolers’ sedentary behavior, an application to the ToyBox-Study

    PubMed Central

    2014-01-01

    Background High levels of sedentary behavior are often measured in preschoolers, but only a few interventions have been developed to counteract this. Furthermore, detailed descriptions of interventions in preschoolers targeting different forms of sedentary behavior could not be located in the literature. The aim of the present paper was to describe the different steps of the Intervention Mapping Protocol used towards the development of an intervention component of the ToyBox-study focusing on decreasing preschoolers’ sedentary behavior. The ToyBox-study focuses on the prevention of overweight in 4- to 6-year-old children by implementing a multi-component kindergarten-based intervention with family involvement in six different European countries. Methods Applying the Intervention Mapping Protocol, six different steps were systematically completed for the structured planning and development of the intervention. A literature search and results from focus groups with parents/caregivers and kindergarten teachers were used as a guide during the development of the intervention and the intervention materials. Results The application of the different steps in the Intervention Mapping Protocol resulted in the creation of matrices of change objectives, followed by the selection of practical applications for five different intervention tools that could be used at the individual level of the preschool child, at the interpersonal level (i.e., parents/caregivers) and at the organizational level (i.e., kindergarten teachers). No cultural differences regarding preschoolers’ sedentary behavior were identified between the participating countries during the focus groups, so cultural and local adaptations of the intervention materials were not necessary to improve the adoption and implementation of the intervention. Conclusions A systematic and evidence-based approach was used for the development of this kindergarten-based family-involved intervention targeting preschoolers, with

  2. A Passive Testing Approach for Protocols in Wireless Sensor Networks

    PubMed Central

    Che, Xiaoping; Maag, Stephane; Tan, Hwee-Xian; Tan, Hwee-Pink; Zhou, Zhangbing

    2015-01-01

    Smart systems are today increasingly developed with the number of wireless sensor devices drastically increasing. They are implemented within several contexts throughout our environment. Thus, sensed data transported in ubiquitous systems are important, and the way to carry them must be efficient and reliable. For that purpose, several routing protocols have been proposed for wireless sensor networks (WSN). However, one stage that is often neglected before their deployment is the conformance testing process, a crucial and challenging step. Compared to active testing techniques commonly used in wired networks, passive approaches are more suitable to the WSN environment. While some works propose to specify the protocol with state models or to analyze them with simulators and emulators, we here propose a logic-based approach for formally specifying some functional requirements of a novel WSN routing protocol. We provide an algorithm to evaluate these properties on collected protocol execution traces. Further, we demonstrate the efficiency and suitability of our approach by its application into common WSN functional properties, as well as specific ones designed from our own routing protocol. We provide relevant testing verdicts through a real indoor testbed and the implementation of our protocol. Furthermore, the flexibility, genericity and practicability of our approach have been proven by the experimental results. PMID:26610495

  3. A Passive Testing Approach for Protocols in Wireless Sensor Networks.

    PubMed

    Che, Xiaoping; Maag, Stephane; Tan, Hwee-Xian; Tan, Hwee-Pink; Zhou, Zhangbing

    2015-11-19

    Smart systems are today increasingly developed with the number of wireless sensor devices drastically increasing. They are implemented within several contexts throughout our environment. Thus, sensed data transported in ubiquitous systems are important, and the way to carry them must be efficient and reliable. For that purpose, several routing protocols have been proposed for wireless sensor networks (WSN). However, one stage that is often neglected before their deployment is the conformance testing process, a crucial and challenging step. Compared to active testing techniques commonly used in wired networks, passive approaches are more suitable to the WSN environment. While some works propose to specify the protocol with state models or to analyze them with simulators and emulators, we here propose a logic-based approach for formally specifying some functional requirements of a novel WSN routing protocol. We provide an algorithm to evaluate these properties on collected protocol execution traces. Further, we demonstrate the efficiency and suitability of our approach by its application into common WSN functional properties, as well as specific ones designed from our own routing protocol. We provide relevant testing verdicts through a real indoor testbed and the implementation of our protocol. Furthermore, the flexibility, genericity and practicability of our approach have been proven by the experimental results.

  4. Optimizing radiologist e-prescribing of CT oral contrast agent using a protocoling portal.

    PubMed

    Wasser, Elliot J; Galante, Nicholas J; Andriole, Katherine P; Farkas, Cameron; Khorasani, Ramin

    2013-12-01

    The purpose of this study is to quantify the time expenditure associated with radiologist ordering of CT oral contrast media when using an integrated protocoling portal and to determine radiologists' perceptions of the ordering process. This prospective study was performed at a large academic tertiary care facility. Detailed timing information for CT inpatient oral contrast orders placed via the computerized physician order entry (CPOE) system was gathered over a 14-day period. Analyses evaluated the amount of physician time required for each component of the ordering process. Radiologists' perceptions of the ordering process were assessed by survey. Descriptive statistics and chi-square analysis were performed. A total of 96 oral contrast agent orders were placed by 13 radiologists during the study period. The average time necessary to create a protocol for each case was 40.4 seconds (average range by subject, 20.0-130.0 seconds; SD, 37.1 seconds), and the average total time to create and sign each contrast agent order was 27.2 seconds (range, 10.0-50.0 seconds; SD, 22.4 seconds). Overall, 52.5% (21/40) of survey respondents indicated that radiologist entry of oral contrast agent orders improved patient safety. A minority of respondents (15% [6/40]) indicated that contrast agent order entry was either very or extremely disruptive to workflow. Radiologist e-prescribing of CT oral contrast agents using CPOE can be embedded in a protocol workflow. Integration of health IT tools can help to optimize user acceptance and adoption.

  5. Staff views on supporting evidence based practice for children with ASD.

    PubMed

    Trembath, David; Sulek, Rhylee; Paynter, Jessica; Simpson, Kate; Keen, Deb

    2017-11-22

    A variety of empirically supported interventions are available for children with autism spectrum disorder (ASD), but previous research suggests that their selection and use within an evidence-based practice (EBP) framework in clinical settings is challenging. To date, research has primarily focused on identifying individual, organisational, and contextual barriers to EBP rather than identifying collaborative solutions to these barriers through consultation with staff. The aim of our study was to explore staff views on supporting EBP in their work with children with ASD. We conducted five focus groups involving 29 professional (e.g., speech pathologists, teachers), paraprofessional (e.g., childcare workers), and managerial staff to explore their views. Audio recordings were transcribed verbatim and analysed using thematic analysis. Two central themes, comprising six categories, emerged to account for the participants' views. Initiative and Effort accounted for the range of creative strategies staff had developed to support their engagement in EBP. They also expressed the need for A Better Way involving organisational-wide support such as this engagement, including peer-to-peer mentoring. The findings suggest that an organisational-wide model to support engagement in EBP, with peer-to-peer mentoring at its foundation, may provide a desirable, ecologically valid, and acceptable model. Implications for Rehabilitation Clinicians and educators recognise the importance of evidence-based practice. Efforts to support evidence-based practice have focused mostly on access to research evidence. Clinicians and educators in this study were developing their own strategies based on intuition. They identified a need for organisation-wide approaches to supporting evidence-based practice. Peer-to-peer mentoring appears to be an acceptable and viable strategy.

  6. Examining clinical supervision as a mechanism for changes in practice: a research protocol.

    PubMed

    Dilworth, Sophie; Higgins, Isabel; Parker, Vicki; Kelly, Brian; Turner, Jane

    2014-02-01

    This paper describes the research protocol for a study exploring if and how clinical supervision facilitates change in practice relating to psychosocial aspects of care for Health Professionals, who have been trained to deliver a psychosocial intervention to adults with cancer. There is a recognized need to implement care that is in line with clinical practice guidelines for the psychosocial care of adults with cancer. Clinical supervision is recommended as a means to support Health Professionals in providing the recommended psychosocial care. A qualitative design embedded within an experimental, stepped wedge randomized control trial. The study will use discourse analysis to analyse audio-recorded data collected in clinical supervision sessions that are being delivered as one element of a large randomized control trial. The sessions will be attended primarily by nurses, but including physiotherapists, radiation therapists, occupational therapists. The Health Professionals are participants in a randomized control trial designed to reduce anxiety and depression of distressed adults with cancer. The sessions will be facilitated by psychiatrists experienced in psycho-oncology and the provision of clinical supervision. The proposed research is designed specifically to facilitate exploration of the mechanisms by which clinical supervision enables Health Professionals to deliver a brief, tailored psychosocial intervention in the context of their everyday practice. This is the first study to use discourse analysis embedded within an experimental randomized control trial to explore the mechanisms of change generated within clinical supervision by analysing the discourse within the clinical supervision sessions. © 2013 John Wiley & Sons Ltd.

  7. A Model for Evaluating eXtension Communities of Practice

    ERIC Educational Resources Information Center

    Kelsey, Kathleen D.; Stafne, Eric T.

    2012-01-01

    As Americans shift their work and leisure activities online, Extension seeks to remain viable by delivering programs through a website known as eXtension. eXtension is predicated on the voluntary labor of Extension specialists and educators who form Communities of Practice to create and deliver content through the website. Evaluation of eXtension…

  8. Intelligent ePR system for evidence-based research in radiotherapy: proton therapy for prostate cancer.

    PubMed

    Le, Anh H; Liu, Brent; Schulte, Reinhard; Huang, H K

    2011-11-01

    Proton therapy (PT) utilizes high energy particle proton beam to kill cancer cells at the target region for target cancer therapy. Due to the physical properties of the proton beam, PT delivers dose with higher precision and no exit dose compared to conventional radiotherapy. In PT, patient data are distributed among multiple systems, a hindrance to research on efficacy and effectiveness. A data mining method and a treatment plan navigator utilizing the infrastructure and data repository of a PT electronic patient record (ePR) was developed to minimize radiation toxicity and improve outcomes in prostate cancer treatment. MATERIALS/METHOD(S): The workflow of a proton therapy treatment in a radiation oncology department was reviewed, and a clinical data model and data flow were designed. A prototype PT ePR system with DICOM compliance was developed to manage prostate cancer patient images, treatment plans, and related clinical data. The ePR system consists of four main components: (1) Data Gateway; (2) ePR Server; (3) Decision Support Tools; and (4) Visualization and Display Tools. Decision support and visualization tools are currently developed based on DICOM images, DICOM-RT and DICOM-RT-ION objects data from prostate cancer patients treated with hypofractionation protocol proton therapy were used for evaluating ePR system effectiveness. Each patient data set includes a set of computed tomography (CT) DICOM images and four DICOM-RT and RT-ION objects. In addition, clinical outcomes data collected from PT cases were included to establish a knowledge base for outcomes analysis. A data mining search engine and an intelligent treatment plan navigator (ITPN) were developed and integrated with the ePR system. Evaluation was based on a data set of 39 PT patients and a hypothetical patient. The ePR system was able to facilitate the proton therapy workflow. The PT ePR system was feasible for prostate cancer patient treated with hypofractionation protocol in proton therapy

  9. In preparation of the nationwide dissemination of the school-based obesity prevention program DOiT: stepwise development applying the intervention mapping protocol.

    PubMed

    van Nassau, Femke; Singh, Amika S; van Mechelen, Willem; Brug, Johannes; Chin A Paw, Mai J M

    2014-08-01

    The school-based Dutch Obesity Intervention in Teenagers (DOiT) program is an evidence-based obesity prevention program. In preparation for dissemination throughout the Netherlands, this study aimed to adapt the initial program and to develop an implementation strategy and materials. We revisited the Intervention Mapping (IM) protocol, using results of the previous process evaluation and additional focus groups and interviews with students, parents, teachers, and professionals. The adapted 2-year DOiT program consists of a classroom, an environmental and a parental component. The year 1 lessons aim to increase awareness and knowledge of healthy behaviors. The lessons in year 2 focus on the influence of the (obesogenic) environment. The stepwise development of the implementation strategy resulted in objectives that support teachers' implementation. We developed a 7-step implementation strategy and supporting materials by translating the objectives into essential elements and practical strategies. This study illustrates how revisiting the IM protocol resulted in an adapted program and tailored implementation strategy based on previous evaluations as well as input from different stakeholders. The stepwise development of DOiT can serve as an example for other evidence-based programs in preparation for wider dissemination. Published 2014. This article is a U.S. Government work and is in the public domain in the USA.

  10. School-Based Methylphenidate Placebo Protocols: Methodological and Practical Issues.

    ERIC Educational Resources Information Center

    Hyman, Irwin A.; Wojtowicz, Alexandra; Lee, Kee Duk; Haffner, Mary Elizabeth; Fiorello, Catherine A.; And Others

    1998-01-01

    Focuses on methodological issues involved in choosing instruments to monitor behavior, once a comprehensive evaluation has suggested trials on Ritalin. Case examples illustrate problems of teacher compliance in filling out measures, supplying adequate placebos, and obtaining physical cooperation. Emerging school-based methodologies are discussed…

  11. Graduate and Undergraduate Students' Teaching Practices in a Place-Based Outreach Program

    ERIC Educational Resources Information Center

    Nilsen, Katherine Joy

    2013-01-01

    This study explores how university students (i.e., undergraduate and graduate students) participating in a place-based outreach program practiced teaching strategies on four field trips. The outreach program, Learning in Place-Based Environments (LPBE), provided opportunities for the university students to teach fifth grade students about place,…

  12. Exploring the Implementation of Steganography Protocols on Quantum Audio Signals

    NASA Astrophysics Data System (ADS)

    Chen, Kehan; Yan, Fei; Iliyasu, Abdullah M.; Zhao, Jianping

    2018-02-01

    Two quantum audio steganography (QAS) protocols are proposed, each of which manipulates or modifies the least significant qubit (LSQb) of the host quantum audio signal that is encoded as an FRQA (flexible representation of quantum audio) audio content. The first protocol (i.e. the conventional LSQb QAS protocol or simply the cLSQ stego protocol) is built on the exchanges between qubits encoding the quantum audio message and the LSQb of the amplitude information in the host quantum audio samples. In the second protocol, the embedding procedure to realize it implants information from a quantum audio message deep into the constraint-imposed most significant qubit (MSQb) of the host quantum audio samples, we refer to it as the pseudo MSQb QAS protocol or simply the pMSQ stego protocol. The cLSQ stego protocol is designed to guarantee high imperceptibility between the host quantum audio and its stego version, whereas the pMSQ stego protocol ensures that the resulting stego quantum audio signal is better immune to illicit tampering and copyright violations (a.k.a. robustness). Built on the circuit model of quantum computation, the circuit networks to execute the embedding and extraction algorithms of both QAS protocols are determined and simulation-based experiments are conducted to demonstrate their implementation. Outcomes attest that both protocols offer promising trade-offs in terms of imperceptibility and robustness.

  13. Data exchange technology based on handshake protocol for industrial automation system

    NASA Astrophysics Data System (ADS)

    Astafiev, A. V.; Shardin, T. O.

    2018-05-01

    In the article, questions of data exchange technology based on the handshake protocol for industrial automation system are considered. The methods of organizing the technology in client-server applications are analyzed. In the process of work, the main threats of client-server applications that arise during the information interaction of users are indicated. Also, a comparative analysis of analogue systems was carried out, as a result of which the most suitable option was chosen for further use. The basic schemes for the operation of the handshake protocol are shown, as well as the general scheme of the implemented application, which describes the entire process of interaction between the client and the server.

  14. Internet-Protocol-Based Satellite Bus Architecture Designed

    NASA Technical Reports Server (NTRS)

    Slywczak, Richard A.

    2004-01-01

    NASA is designing future complex satellite missions ranging from single satellites and constellations to space networks and sensor webs. These missions require more interoperability, autonomy, and coordination than previous missions; in addition, a desire exists to have scientists retrieve data directly from the satellite rather than a central distribution source. To meet these goals, NASA has been studying the possibility of extending the Transmission Control Protocol/Internet Protocol (TCP/IP) suite for spacebased applications.

  15. Inquiry-based instruction in secondary science classrooms: A survey of teacher practice

    NASA Astrophysics Data System (ADS)

    Gejda, Linda Muggeo

    The purpose of this quantitative investigation was to describe the extent to which secondary science teachers, who were certified through Connecticut's BEST portfolio assessment process between 1997 and 2004 and had taught secondary science during the past academic year, reported practicing the indicators of inquiry-based instruction in the classroom and the factors that they perceived facilitated, obstructed, or informed that practice. Indicators of inquiry-based instruction were derived from the Biological Sciences Curriculum Study (BSCS) 5E model (Bybee, 1997). The method for data collection was a researcher-developed, self-report, questionnaire entitled "Inquiry-based Instruction in Secondary Science Classrooms: A Survey", which was developed and disseminated using a slightly modified Dillman (2000) approach. Almost all of the study participants reported practicing the 5Es (engage, explore, explain, elaborate, and evaluate) of inquiry-based instruction in their secondary science classrooms. Time, resources, the need to cover material for mandatory assessments, the science topics or concepts being taught, and professional development on inquiry-based instruction were reported to be important considerations in participants' decisions to practice inquiry-based instruction in their science classrooms. A majority of the secondary science teachers participating in this study indicated they had the time, access to resources and the professional development opportunities they needed to practice inquiry-based instruction in their secondary classrooms. Study participants ranked having the time to teach in an inquiry-based fashion and the need to cover material for mandated testing as the biggest obstacles to their practice of inquiry-based instruction in the secondary classroom. Classroom experience and collegial exchange informed the inquiry-based instruction practice of the secondary science teachers who participated in this study. Recommendations for further research

  16. A Protocol-Based Decision for Choosing a Proper Surgical Treatment Option for Carotid Artery Stenosis.

    PubMed

    Jang, E-Wook; Chung, Joonho; Seo, Kwon-Duk; Suh, Sang Hyun; Kim, Yong Bae; Lee, Kyung-Yul

    2015-06-01

    There are two established surgical treatment options for carotid artery stenosis. Carotid endarterectomy (CEA) has been accepted as a gold standard for surgical treatment while carotid artery stenting (CAS) has recently become an alternative option. Each treatment option has advantages and disadvantages for the treatment outcomes. We propose a protocol for selection of a proper surgical treatment option for carotid artery stenosis. A total of 192 published articles on management of carotid artery stenosis were reviewed. Preoperatively considerable factors which had been repeatedly noted in those articles for the risk/benefits of CEA or CAS were selected. According to those factors, a protocol with four categories was established. CEA or CAS is indicated when the patient has a symptomatic stenosis ≥ 50%, or when the patient has an asymptomatic stenosis ≥ 80%. Each treatment option has absolute indications and favorable indications. Each absolute indication is scored with three points, and each favorable indication, one point. Based on the highest scores, a proper treatment option (CEA or CAS) is selected. We have been treating patients according to this protocol and evaluating the outcomes of our protocol-based decision because this protocol might be helpful in assessment of risk/benefit for selection of a proper surgical treatment option in patients with carotid artery stenosis.

  17. A Lightweight RFID Mutual Authentication Protocol Based on Physical Unclonable Function.

    PubMed

    Xu, He; Ding, Jie; Li, Peng; Zhu, Feng; Wang, Ruchuan

    2018-03-02

    With the fast development of the Internet of Things, Radio Frequency Identification (RFID) has been widely applied into many areas. Nevertheless, security problems of the RFID technology are also gradually exposed, when it provides life convenience. In particular, the appearance of a large number of fake and counterfeit goods has caused massive loss for both producers and customers, for which the clone tag is a serious security threat. If attackers acquire the complete information of a tag, they can then obtain the unique identifier of the tag by some technological means. In general, because there is no extra identifier of a tag, it is difficult to distinguish an original tag and its clone one. Once the legal tag data is obtained, attackers can be able to clone this tag. Therefore, this paper shows an efficient RFID mutual verification protocol. This protocol is based on the Physical Unclonable Function (PUF) and the lightweight cryptography to achieve efficient verification of a single tag. The protocol includes three process: tag recognition, mutual verification and update. The tag recognition is that the reader recognizes the tag; mutual verification is that the reader and tag mutually verify the authenticity of each other; update is supposed to maintain the latest secret key for the following verification. Analysis results show that this protocol has a good balance between performance and security.

  18. A Lightweight RFID Mutual Authentication Protocol Based on Physical Unclonable Function

    PubMed Central

    Ding, Jie; Zhu, Feng; Wang, Ruchuan

    2018-01-01

    With the fast development of the Internet of Things, Radio Frequency Identification (RFID) has been widely applied into many areas. Nevertheless, security problems of the RFID technology are also gradually exposed, when it provides life convenience. In particular, the appearance of a large number of fake and counterfeit goods has caused massive loss for both producers and customers, for which the clone tag is a serious security threat. If attackers acquire the complete information of a tag, they can then obtain the unique identifier of the tag by some technological means. In general, because there is no extra identifier of a tag, it is difficult to distinguish an original tag and its clone one. Once the legal tag data is obtained, attackers can be able to clone this tag. Therefore, this paper shows an efficient RFID mutual verification protocol. This protocol is based on the Physical Unclonable Function (PUF) and the lightweight cryptography to achieve efficient verification of a single tag. The protocol includes three process: tag recognition, mutual verification and update. The tag recognition is that the reader recognizes the tag; mutual verification is that the reader and tag mutually verify the authenticity of each other; update is supposed to maintain the latest secret key for the following verification. Analysis results show that this protocol has a good balance between performance and security. PMID:29498684

  19. A novel protocol for antibiotic prophylaxis based on preoperative kidney function in patients undergoing open heart surgery under cardiopulmonary bypass.

    PubMed

    Odaka, Mizuho; Minakata, Kenji; Toyokuni, Hideaki; Yamazaki, Kazuhiro; Yonezawa, Atsushi; Sakata, Ryuzo; Matsubara, Kazuo

    2015-08-01

    This study aimed to develop and assess the effectiveness of a protocol for antibiotic prophylaxis based on preoperative kidney function in patients undergoing open heart surgery. We established a protocol for antibiotic prophylaxis based on preoperative kidney function in patients undergoing open heart surgery. This novel protocol was assessed by comparing patients undergoing open heart surgery before (control group; n = 30) and after its implementation (protocol group; n = 31) at Kyoto University Hospital between July 2012 and January 2013. Surgical site infections (SSIs) were observed in 4 control group patients (13.3 %), whereas no SSIs were observed in the protocol group patients (P < 0.05). The total duration of antibiotic use decreased significantly from 80.7 ± 17.6 h (mean ± SD) in the control group to 55.5 ± 14.9 h in the protocol group (P < 0.05). Similarly, introduction of the protocol significantly decreased the total antibiotic dose used in the perioperative period (P < 0.05). Furthermore, antibiotic regimens were changed under suspicion of infection in 5 of 30 control group patients, whereas none of the protocol group patients required this additional change in the antibiotic regimen (P < 0.05). Our novel antibiotic prophylaxis protocol based on preoperative kidney function effectively prevents SSIs in patients undergoing open heart surgery.

  20. The Rockefeller University Navigation Program: A Structured Multidisciplinary Protocol Development and Educational Program to Advance Translational Research

    PubMed Central

    Kost, Rhonda G.; Dowd, Kathleen A.; Hurley, Arlene M.; Rainer, Tyler‐Lauren; Coller, Barry S.

    2014-01-01

    Abstract The development of translational clinical research protocols is complex. To assist investigators, we developed a structured supportive guidance process (Navigation) to expedite protocol development to the standards of good clinical practice (GCP), focusing on research ethics and integrity. Navigation consists of experienced research coordinators leading investigators through a concerted multistep protocol development process from concept initiation to submission of the final protocol. To assess the effectiveness of Navigation, we collect data on the experience of investigators, the intensity of support required for protocol development, IRB review outcomes, and protocol start and completion dates. One hundred forty‐four protocols underwent Navigation and achieved IRB approval since the program began in 2007, including 37 led by trainee investigators, 26 led by MDs, 9 by MD/PhDs, 57 by PhDs, and 12 by investigators with other credentials (e.g., RN, MPH). In every year, more than 50% of Navigated protocols were approved by the IRB within 30 days. For trainees who had more than one protocol navigated, the intensity of Navigation support required decreased over time. Navigation can increase access to translational studies for basic scientists, facilitate GCP training for investigators, and accelerate development and approval of protocols of high ethical and scientific quality. PMID:24405608

  1. Study protocol for the recruitment of female sex workers and their non-commercial partners into couple-based HIV research

    PubMed Central

    2012-01-01

    Background Researchers are increasingly recognizing the importance of addressing sexual and drug-related HIV risk within the context of intimate relationships rather than solely focusing on individual behaviors. Practical and effective methods are needed to recruit, screen, and enroll the high risk and hard-to-reach couples who would most benefit from HIV interventions, such as drug-using female sex workers (FSWs) and their intimate, non-commercial partners. This paper outlines a bi-national, multidisciplinary effort to develop and implement a study protocol for research on the social context and epidemiology of HIV, sexually transmitted infections (STI), and high risk behaviors among FSWs and their non-commercial male partners in Tijuana and Ciudad Juarez, Mexico. We provide an overview of our study and specifically focus on the sampling, recruitment, screening, and successful enrollment of high risk couples into a public health study in this context. Methods/Design We used targeted and snowball sampling to recruit couples through the female partner first and administered a primary screener to check her initial eligibility. Willing and eligible females then invited their primary male partners for couple-based screening using a couple verification screening (CVS) instrument adapted from previous studies. The CVS rechecked eligibility and separately asked each partner the same questions about their relationship to "test" if the couple was legitimate. We adapted the original protocol to consider issues of gender and power within the local cultural and socioeconomic context and expanded the question pool to create multiple versions of the CVS that were randomly administered to potential couples to determine eligibility and facilitate study enrollment. Discussion The protocol successfully enrolled 214 high risk couples into a multi-site public health study. This work suggests the importance of collaborating to construct a study protocol, understanding the local

  2. Optical protocols for terabit networks

    NASA Technical Reports Server (NTRS)

    Chua, P. L.; Lambert, J. L.; Morookian, J. M.; Bergman, L. A.

    1991-01-01

    This paper describes a new fiber-optic local area network technology providing 100X improvement over current technology, has full crossbar funtionality, and inherent data security. Based on optical code-division multiple access (CDMA), using spectral phase encoding/decoding of optical pulses, networking protocols are implemented entirely in the optical domain and thus conventional networking bottlenecks are avoided. Component and system issues for a proof-of-concept demonstration are discussed, as well as issues for a more practical and commercially exploitable system. Possible terrestrial and aerospace applications of this technology, and its impact on other technologies are explored. Some initial results toward realization of this concept are also included.

  3. A secure protocol for protecting the identity of providers when disclosing data for disease surveillance

    PubMed Central

    Hu, Jun; Mercer, Jay; Peyton, Liam; Kantarcioglu, Murat; Malin, Bradley; Buckeridge, David; Samet, Saeed; Earle, Craig

    2011-01-01

    Background Providers have been reluctant to disclose patient data for public-health purposes. Even if patient privacy is ensured, the desire to protect provider confidentiality has been an important driver of this reluctance. Methods Six requirements for a surveillance protocol were defined that satisfy the confidentiality needs of providers and ensure utility to public health. The authors developed a secure multi-party computation protocol using the Paillier cryptosystem to allow the disclosure of stratified case counts and denominators to meet these requirements. The authors evaluated the protocol in a simulated environment on its computation performance and ability to detect disease outbreak clusters. Results Theoretical and empirical assessments demonstrate that all requirements are met by the protocol. A system implementing the protocol scales linearly in terms of computation time as the number of providers is increased. The absolute time to perform the computations was 12.5 s for data from 3000 practices. This is acceptable performance, given that the reporting would normally be done at 24 h intervals. The accuracy of detection disease outbreak cluster was unchanged compared with a non-secure distributed surveillance protocol, with an F-score higher than 0.92 for outbreaks involving 500 or more cases. Conclusion The protocol and associated software provide a practical method for providers to disclose patient data for sentinel, syndromic or other indicator-based surveillance while protecting patient privacy and the identity of individual providers. PMID:21486880

  4. Leadership, Innovation Climate, and Attitudes toward Evidence-Based Practice during a Statewide Implementation

    PubMed Central

    Aarons, Gregory A.; Sommerfeld, David H.

    2013-01-01

    Objective Leadership is important in practice change, yet there are few studies addressing this issue in mental health and social services. This study examined the differential roles of transformational (i.e., charismatic) leadership and leader member exchange (i.e., the relationship between a supervisor and their direct service providers) on team innovation climate (i.e., openness to new innovations) and provider attitudes toward adopting evidence-based practice (EBP) during a statewide evidence-based practice implementation (EBPI) of an intervention to reduce child neglect. Methods Participants were 140 case-managers in 30 teams providing home-based services to families in a statewide child-welfare system. Teams were assigned by region to EBPI or services as usual (SAU) conditions. Multiple group path analysis was used to examine associations of transformational leadership and leader member exchange with innovation climate and attitudes toward adoption and use of EBP. Results Transformational leadership predicted higher innovation climate during implementation while leader member exchange predicted higher innovation climate during SAU. Innovation climate was, in turn, associated with more positive attitudes toward EBP for the EBPI group. Conclusions Strategies designed to enhance supervisor transformational leadership have the potential to facilitate implementation efforts by promoting a strong climate for EBPI and positive provider attitudes toward adoption and use of EBP. PMID:22449648

  5. Stimulation of the young poor responder: comparison of the luteal estradiol/gonadotropin-releasing hormone antagonist priming protocol versus oral contraceptive microdose leuprolide.

    PubMed

    Shastri, Shefali M; Barbieri, Elizabeth; Kligman, Isaac; Schoyer, Katherine D; Davis, Owen K; Rosenwaks, Zev

    2011-02-01

    To evaluate in vitro fertilization (IVF) cycle outcomes in young poor responders treated with a luteal estradiol/gonadotropin-releasing hormone antagonist (E(2)/ANT) protocol versus an oral contraceptive pill microdose leuprolide protocol (OCP-MDL). Retrospective cohort. Academic practice. Poor responders: 186 women, aged <35 years undergoing IVF with either E(2)/ANT or OCP-MDL protocols. None. Clinical pregnancies, oocytes retrieved, cancellation rate. Patients in the E(2)/ANT group had a greater gonadotropin requirement (71.9 ± 22.2 vs. 57.6 ± 25.7) and lower E(2) level (1,178.6 ± 668 vs. 1,627 ± 889), yet achieved similar numbers of oocytes retrieved and fertilized, and a greater number of embryos transferred (2.3 ± 0.9 vs. 2.0 ± 1.1) with a better mean grade (2.14 ± .06 vs. 2.7 ± 1.8) compared with the OCP/MDL group. The E2/ANT group exhibited a trend toward improved implantation rates (30.5% vs. 21.1%) and ongoing pregnancy rates per started cycle: 44 out of 117 (37%) versus 17 out of 69 (25%). Poor responders aged <35 years may be treated with the aggressive E(2)/ANT protocol to improve cycle outcomes. Both protocols remain viable options for this group. Adequately powered, randomized clinical comparison appears justified. Copyright © 2011 American Society for Reproductive Medicine. Published by Elsevier Inc. All rights reserved.

  6. SU-E-J-07: A Functional MR Protocol for the Pancreatic Tumor Delineation

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Andreychenko, A; Heerkens, H; Meijer, G

    2014-06-01

    Purpose: Pancreatic cancer is one of the cancers with the poorest survival prognosis. At the time of diagnosis most of pancreatic cancers are unresectable and those patients can be treated by radiotherapy. Radiotherapy for pancreatic cancer is limited due to uncertainties in CT-based delineations. MRI provides an excellent soft tissue contrast. Here, an MR protocol is developed to improve delineations for radiotherapy treatment of pancreatic cancer. In a later stage this protocol can also be used for on-line visualization of the pancreas during MRI guided treatments. Methods: Nine pancreatic cancer patients were included. The MR protocol included T2 weighted(T2w), T1more » weighted(T1w), diffusion weighted(DWI) and dynamic contrast enhanced(DCE) techniques. The tumor was delineated on T2w and T1w MRI by an experienced radiation oncologist. Healthy pancreas or pancreatitis (assigned by the oncologist based on T2w) areas were also delineated. Apparent diffusion coefficient(ADC), and area under the curve(AUC)/time to peak(TTP) maps were obtained from DWI and DCE scans, respectively. Results: A clear demarcation of tumor area was visible on b800 DWI images in 5 patients. ADC maps of those patients characterized tumor as an area with restricted water diffusion. Tumor delineations based on solely DCE were possible in 7 patients. In 6 of those patients AUC maps demonstrated tumor heterogeneity: a hypointense area with a hyperintense ring. TTP values clearly discriminated the tumor and the healthy pancreas but could not distinguish tumor and the pancreatitis accurately. Conclusion: MR imaging results in a more pronounced tumor contrast than contrast enhanced CT. The addition of quantitative, functional MRI provides valuable, additional information to the radiation oncologist on the spatial tumor extent by discriminating tumor from the healthy pancreas(TTP, DWI) and characterizing the tumor(ADC). Our findings indicate that tumor delineation in pancreatic cancer can

  7. Reliability and criterion validity of an observation protocol for working technique assessments in cash register work.

    PubMed

    Palm, Peter; Josephson, Malin; Mathiassen, Svend Erik; Kjellberg, Katarina

    2016-06-01

    We evaluated the intra- and inter-observer reliability and criterion validity of an observation protocol, developed in an iterative process involving practicing ergonomists, for assessment of working technique during cash register work for the purpose of preventing upper extremity symptoms. Two ergonomists independently assessed 17 15-min videos of cash register work on two occasions each, as a basis for examining reliability. Criterion validity was assessed by comparing these assessments with meticulous video-based analyses by researchers. Intra-observer reliability was acceptable (i.e. proportional agreement >0.7 and kappa >0.4) for 10/10 questions. Inter-observer reliability was acceptable for only 3/10 questions. An acceptable inter-observer reliability combined with an acceptable criterion validity was obtained only for one working technique aspect, 'Quality of movements'. Thus, major elements of the cashiers' working technique could not be assessed with an acceptable accuracy from short periods of observations by one observer, such as often desired by practitioners. Practitioner Summary: We examined an observation protocol for assessing working technique in cash register work. It was feasible in use, but inter-observer reliability and criterion validity were generally not acceptable when working technique aspects were assessed from short periods of work. We recommend the protocol to be used for educational purposes only.

  8. Comparison of two MAC protocols based on LEO satellite networks

    NASA Astrophysics Data System (ADS)

    Guan, Mingxiang; Wang, Ruichun

    2009-12-01

    With the development of LEO satellite communication, it is the basic requirement that various kinds of services will be provided. Considering that weak channel collision detection ability, long propagation delay and heavy load in LEO satellite communication system, a valid adaptive access control protocol APRMA is proposed. Different access probability functions for different services are obtained and appropriate access probabilities for voice and data users are updated slot by slot based on the estimation of the voice traffic and the channel status. Finally simulation results demonstrate that the performance of system is improved by the APRMA compared with the conventional PRMA, with an acceptable trade-off between QoS of voice and delay of data. Also the APRMA protocol will be suitable for HAPS (high altitude platform station) with the characters of weak channel collision detection ability, long propagation delay and heavy load.

  9. SU-E-J-214: MR Protocol Development to Visualize Sirius MRI Markers in Prostate Brachytherapy Patients for MR-Based Post-Implant Dosimetry

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Lim, T; Wang, J; Frank, S

    Purpose: The current CT-based post-implant dosimetry allows precise seed localization but limited anatomical delineation. Switching to MR-based post-implant dosimetry is confounded by imprecise seed localization. One approach is to place positive-contrast markers (Sirius) adjacent to the negative-contrast seeds. This patient study aims to assess the utility of a 3D fast spoiled gradient-recalled echo (FSPGR) sequence to visualize Sirius markers for post-implant dosimetry. Methods: MRI images were acquired in prostate implant patients (n=10) on Day 0 (day-of-implant) and Day 30. The post-implant MR protocol consisted of 3D T2-weighted fast-spin-echo (FSE), T2-weighted 2D-FSE (axial) and T1-weighted 2D-FSE (axial/sagittal/coronal). We incorporated a 3D-FSPGRmore » sequence into the post-implant MR protocol to visualize the Sirius markers. Patients were scanned with different number-of-excitations (6, 8, 10), field-of-view (10cm, 14cm, 18cm), slice thickness (1mm, 0.8mm), flip angle (14 degrees, 20 degrees), bandwidth (122.070 Hz/pixel, 325.508 Hz/pixel, 390.625 Hz/pixel), phase encoding steps (160, 192, 224, 256), frequency-encoding direction (right/left, anterior/posterior), echo-time type (minimum-full, out-of-phase), field strength (1.5T, 3T), contrast (with, without), scanner vendor (Siemens, GE), coil (endorectal-coil only, endorectal-and-torso-coil, torsocoil only), endorectal-coil filling (30cc, 50cc) and endorectal-coil filling type (air, perfluorocarbon [PFC]). For post-implant dosimetric evaluation with greater anatomical detail, 3D-FSE images were fused with 3D-FSPGR images. For comparison with CT-based post-implant dosimetry, CT images were fused with 3D-FSPGR images. Results: The 3D-FSPGR sequence facilitated visualization of markers in patients. Marker visualization helped distinguish signal voids as seeds versus needle tracks for more definitive MR-based post-implant dosimetry. On the CT-MR fused images, the distance between the seed on CT to MR

  10. Multi-Party Quantum Private Comparison Protocol Based on Entanglement Swapping of Bell Entangled States

    NASA Astrophysics Data System (ADS)

    Ye, Tian-Yu

    2016-09-01

    Recently, Liu et al. proposed a two-party quantum private comparison (QPC) protocol using entanglement swapping of Bell entangled state (Commun. Theor. Phys. 57 (2012) 583). Subsequently Liu et al. pointed out that in Liu et al.'s protocol, the TP can extract the two users' secret inputs without being detected by launching the Bell-basis measurement attack, and suggested the corresponding improvement to mend this loophole (Commun. Theor. Phys. 62 (2014) 210). In this paper, we first point out the information leakage problem toward TP existing in both of the above two protocols, and then suggest the corresponding improvement by using the one-way hash function to encrypt the two users' secret inputs. We further put forward the three-party QPC protocol also based on entanglement swapping of Bell entangled state, and then validate its output correctness and its security in detail. Finally, we generalize the three-party QPC protocol into the multi-party case, which can accomplish arbitrary pair's comparison of equality among K users within one execution. Supported by the National Natural Science Foundation of China under Grant No. 61402407

  11. A Simple XML Producer-Consumer Protocol

    NASA Technical Reports Server (NTRS)

    Smith, Warren; Gunter, Dan; Quesnel, Darcy

    2000-01-01

    This document describes a simple XML-based protocol that can be used for producers of events to communicate with consumers of events. The protocol described here is not meant to be the most efficient protocol, the most logical protocol, or the best protocol in any way. This protocol was defined quickly and it's intent is to give us a reasonable protocol that we can implement relatively easily and then use to gain experience in distributed event services. This experience will help us evaluate proposals for event representations, XML-based encoding of information, and communication protocols. The next section of this document describes how we represent events in this protocol and then defines the two events that we choose to use for our initial experiments. These definitions are made by example so that they are informal and easy to understand. The following section then proceeds to define the producer-consumer protocol we have agreed upon for our initial experiments.

  12. Personalized E- learning System Based on Intelligent Agent

    NASA Astrophysics Data System (ADS)

    Duo, Sun; Ying, Zhou Cai

    Lack of personalized learning is the key shortcoming of traditional e-Learning system. This paper analyzes the personal characters in e-Learning activity. In order to meet the personalized e-learning, a personalized e-learning system based on intelligent agent was proposed and realized in the paper. The structure of system, work process, the design of intelligent agent and the realization of intelligent agent were introduced in the paper. After the test use of the system by certain network school, we found that the system could improve the learner's initiative participation, which can provide learners with personalized knowledge service. Thus, we thought it might be a practical solution to realize self- learning and self-promotion in the lifelong education age.

  13. Implementation of evidence-based weekend service recommendations for allied health managers: a cluster randomised controlled trial protocol.

    PubMed

    Sarkies, Mitchell N; White, Jennifer; Morris, Meg E; Taylor, Nicholas F; Williams, Cylie; O'Brien, Lisa; Martin, Jenny; Bardoel, Anne; Holland, Anne E; Carey, Leeanne; Skinner, Elizabeth H; Bowles, Kelly-Ann; Grant, Kellie; Philip, Kathleen; Haines, Terry P

    2018-04-24

    It is widely acknowledged that health policy and practice do not always reflect current research evidence. Whether knowledge transfer from research to practice is more successful when specific implementation approaches are used remains unclear. A model to assist engagement of allied health managers and clinicians with research implementation could involve disseminating evidence-based policy recommendations, along with the use of knowledge brokers. We developed such a model to aid decision-making for the provision of weekend allied health services. This protocol outlines the design and methods for a multi-centre cluster randomised controlled trial to evaluate the success of research implementation strategies to promote evidence-informed weekend allied health resource allocation decisions, especially in hospital managers. This multi-centre study will be a three-group parallel cluster randomised controlled trial. Allied health managers from Australian and New Zealand hospitals will be randomised to receive either (1) an evidence-based policy recommendation document to guide weekend allied health resource allocation decisions, (2) the same policy recommendation document with support from a knowledge broker to help implement weekend allied health policy recommendations, or (3) a usual practice control group. The primary outcome will be alignment of weekend allied health service provision with policy recommendations. This will be measured by the number of allied health service events (occasions of service) occurring on weekends as a proportion of total allied health service events for the relevant hospital wards at baseline and 12-month follow-up. Evidence-based policy recommendation documents communicate key research findings in an accessible format. This comparatively low-cost research implementation strategy could be combined with using a knowledge broker to work collaboratively with decision-makers to promote knowledge transfer. The results will assist managers to

  14. Economic impact of converting an interventional pain medicine physician office-based practice into a provider-based ambulatory pain practice.

    PubMed

    Grider, Jay S; Findley, Kelley A; Higdon, Courtney; Curtright, Jonathan; Clark, Don P

    2014-01-01

    One consequence of the shifting economic health care landscape is the growing trend of physician employment and practice acquisition by hospitals. These acquired practices are often converted into hospital- or provider-based clinics. This designation brings the increased services of the hospital, the accreditation of the hospital, and a new billing structure verses the private clinic (the combination of the facility and professional fee billing). One potential concern with moving to a provider-based designation is that this new structure might make the practice less competitive in a marketplace that may still be dominated by private physician office-based practices. The aim of the current study was to evaluate the impact of the provider-based/hospital fee structure on clinical volume. Determine the effect of transition to a hospital- or provider-based practice setting (with concomitant cost implications) on patient volume in the current practice milieu.   Community hospital-based academic interventional pain medicine practice. Economic analysis of effect of change in price structure on clinical volumes. The current study evaluates the effect of a change in designation with price implications on the demand for clinical services that accompany the transition to a hospital-based practice setting from a physician office setting in an academic community hospital. Clinical volumes of both procedures and clinic volumes increased in a mature practice setting following transition to a provider-based designation and the accompanying facility and professional fee structure. Following transition to a provider-based designation clinic visits were increased 24% while procedural volume demand did not change. Single practice entity and single geographic location in southeastern United States. The conversion to a hospital- or provider-based setting does not negatively impact clinical volume and referrals to community-based pain medicine practice. These results imply that factors

  15. Learning With E-books and Project-based Strategy in a Community Health Nursing Course.

    PubMed

    Sung, Tien-Wen; Wu, Ting-Ting

    2018-03-01

    With advances in information technology, "information-assisted instruction" has been gradually introduced to nursing education curricula. Specifically, the integration of an e-book system can effectively enhance nursing students' attention and interest. Most studies on nursing education that incorporated e-books have focused on the advantages of convenience and assistance provided by e-books. Few studies have addressed community health nursing and off-campus practice activities in relation to suitable teaching strategies for learning activities. This study involved designing and planning a multimedia e-book learning system with a project-based learning activity that conforms to the curriculum and practical requirements of a community health nursing course. The purpose was to reduce the gap between theory and practice and realize an effective learning process. For learning evaluations, a final examination analysis with an independent sample t test; a scoring scheme with intrateam, interteam, and expert ratings; and Bloom's taxonomy-based analysis were conducted. The evaluation results indicated that the comprehension and learning abilities of the experimental group using the e-book system with a mobile device were effectively improved. In addition, the exploratory process involved in project-based learning can develop multiple cognitive skills and problem-solving ability, thereby realizing effective learning.

  16. A best practice fall prevention exercise program to improve balance, strength / power, and psychosocial health in older adults: study protocol for a randomized controlled trial.

    PubMed

    Gschwind, Yves J; Kressig, Reto W; Lacroix, Andre; Muehlbauer, Thomas; Pfenninger, Barbara; Granacher, Urs

    2013-10-09

    With increasing age neuromuscular deficits (e.g., sarcopenia) may result in impaired physical performance and an increased risk for falls. Prominent intrinsic fall-risk factors are age-related decreases in balance and strength / power performance as well as cognitive decline. Additional studies are needed to develop specifically tailored exercise programs for older adults that can easily be implemented into clinical practice. Thus, the objective of the present trial is to assess the effects of a fall prevention program that was developed by an interdisciplinary expert panel on measures of balance, strength / power, body composition, cognition, psychosocial well-being, and falls self-efficacy in healthy older adults. Additionally, the time-related effects of detraining are tested. Healthy old people (n = 54) between the age of 65 to 80 years will participate in this trial. The testing protocol comprises tests for the assessment of static / dynamic steady-state balance (i.e., Sharpened Romberg Test, instrumented gait analysis), proactive balance (i.e., Functional Reach Test; Timed Up and Go Test), reactive balance (i.e., perturbation test during bipedal stance; Push and Release Test), strength (i.e., hand grip strength test; Chair Stand Test), and power (i.e., Stair Climb Power Test; countermovement jump). Further, body composition will be analysed using a bioelectrical impedance analysis system. In addition, questionnaires for the assessment of psychosocial (i.e., World Health Organisation Quality of Life Assessment-Bref), cognitive (i.e., Mini Mental State Examination), and fall risk determinants (i.e., Fall Efficacy Scale - International) will be included in the study protocol. Participants will be randomized into two intervention groups or the control / waiting group. After baseline measures, participants in the intervention groups will conduct a 12-week balance and strength / power exercise intervention 3 times per week, with each training session lasting 30 min

  17. Internal medicine residency graduates' perceptions of the systems-based practice and practice-based learning and improvement competencies.

    PubMed

    Didwania, Aashish; McGaghie, William C; Cohen, Elaine; Wayne, Diane B

    2010-01-01

    Resident education in Systems-Based Practice (SBP) and Practice-Based Learning and Improvement (PBLI) is required but underemphasized. The objectives are to identify SBP and PBLI knowledge and skills with the most relevance to our graduates' practices and to determine how well they were prepared during residency training to address these issues. A survey was drafted based on Accreditation Council for Graduate Medical Education competency definitions and published literature on SBP and PBLI. Respondents indicated the extent to which each item is relevant to their practice and the adequacy of instruction received on a 5-point Likert scale. All topics had high perceived relevance to practice with most topics rated low for adequacy of training. Topics of practice management and health care economics contained the largest gaps between mean ratings of relevance and adequacy of training (p < .001). Few differences in ratings were seen based on graduate demographics. This survey has allowed us to prioritize SBP and PBLI curricula to meet the needs of our graduates.

  18. National Football League Head, Neck and Spine Committee's Concussion Diagnosis and Management Protocol: 2017-18 season.

    PubMed

    Ellenbogen, Richard G; Batjer, Hunt; Cardenas, Javier; Berger, Mitchel; Bailes, Julian; Pieroth, Elizabeth; Heyer, Robert; Theodore, Nicholas; Hsu, Wellington; Nabel, Elizabeth; Maroon, Joe; Cantu, Robert; Barnes, Ronnie; Collins, James; Putukian, Margot; Lonser, Russell; Solomon, Gary; Sills, Allen

    2018-03-16

    One of the National Football League's (NFL) Head, Neck and Spine Committee's principal goals is to create a 'best practice' protocol for concussion diagnosis and management for its players. The science related to concussion diagnosis and management continues to evolve, thus the protocol has evolved contemporaneously. The Fifth International Conference on Concussion in Sport was held in Berlin in 2016, and guidelines for sports concussion diagnosis and management were revised and refined. The NFL Head, Neck and Spine Committee has synthesised the most recent empirical evidence for sports concussion diagnosis and management including the Berlin consensus statement and tailored it to the game played in the NFL. One of the goals of the Committee is to provide a standardised, reliable, efficient and evidence-based protocol for concussion diagnosis and management that can be applied in this professional sport during practice and game day. In this article, the end-of-season version of the 2017-18 NFL Concussion Diagnosis and Management Protocol is described along with its clinical rationale. Immediate actions for concussion programme enhancement and research are reviewed. It is the Committee's expectation that the protocol will undergo refinement and revision over time as the science and clinical practice related to concussion in sports crystallise. © Article author(s) (or their employer(s) unless otherwise stated in the text of the article) 2018. All rights reserved. No commercial use is permitted unless otherwise expressly granted.

  19. Straight Talk About Birth Control: A Contraceptive Education Protocol for Home Care.

    PubMed

    Schoenberg, Leslie

    Home healthcare providers play a critical role in the prevention of unintended pregnancies by providing evidence-based contraception education during home visits. This article describes an innovative and comprehensive contraception protocol that was developed for Nurse-Family Partnership to improve contraception education for home healthcare patients. The protocol focused on increasing uptake of long-acting reversible contraception (LARC) for high-risk prenatal and postpartum home healthcare patients. The protocol was designed to reduce early subsequent pregnancies and thereby improve outcomes for mothers and their infants. An evidence-based translation project was designed and piloted in three California counties. The protocol consisted of a contraception education module for nurses and a patient education toolkit. The toolkit included an interactive patient education workbook emphasizing LARC methods for nurses to complete with their patients along with other teaching tools. The project was evaluated using pre- and posttest surveys that measured changes in nurses' knowledge, attitudes, and practice before, after, and 2 months after implementation. Outcomes revealed the following statistically significant results: (a) nurses' knowledge doubled at the first posttest and persisted at 2 months, (b) nurses' attitudes improved on two of the three measures, and (c) there was a 17.7% increase in the frequency of LARC birth control education 2 months after implementation. An evidence-based contraception protocol can promote acceptance of LARC methods and improve home healthcare clinician comfort with and frequency of birth control education.

  20. Description and effects of sequential behavior practice in teacher education.

    PubMed

    Sharpe, T; Lounsbery, M; Bahls, V

    1997-09-01

    This study examined the effects of a sequential behavior feedback protocol on the practice-teaching experiences of undergraduate teacher trainees. The performance competencies of teacher trainees were analyzed using an alternative opportunities for appropriate action measure. Data support the added utility of sequential (Sharpe, 1997a, 1997b) behavior analysis information in systematic observation approaches to teacher education. One field-based undergraduate practicum using sequential behavior (i.e., field systems analysis) principles was monitored. Summarized are the key elements of the (a) classroom instruction provided as a precursor to the practice teaching experience, (b) practice teaching experience, and (c) field systems observation tool used for evaluation and feedback, including multiple-baseline data (N = 4) to support this approach to teacher education. Results point to (a) the strong relationship between sequential behavior feedback and the positive change in four preservice teachers' day-to-day teaching practices in challenging situational contexts, and (b) the relationship between changes in teacher practices and positive changes in the behavioral practices of gymnasium pupils. Sequential behavior feedback was also socially validated by the undergraduate participants and Professional Development School teacher supervisors in the study.