Sample records for experimental protocol based

  1. Experimental eavesdropping attack against Ekert's protocol based on Wigner's inequality

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Bovino, F. A.; Colla, A. M.; Castagnoli, G.

    2003-09-01

    We experimentally implemented an eavesdropping attack against the Ekert protocol for quantum key distribution based on the Wigner inequality. We demonstrate a serious lack of security of this protocol when the eavesdropper gains total control of the source. In addition we tested a modified Wigner inequality which should guarantee a secure quantum key distribution.

  2. Using semantics for representing experimental protocols.

    PubMed

    Giraldo, Olga; García, Alexander; López, Federico; Corcho, Oscar

    2017-11-13

    An experimental protocol is a sequence of tasks and operations executed to perform experimental research in biological and biomedical areas, e.g. biology, genetics, immunology, neurosciences, virology. Protocols often include references to equipment, reagents, descriptions of critical steps, troubleshooting and tips, as well as any other information that researchers deem important for facilitating the reusability of the protocol. Although experimental protocols are central to reproducibility, the descriptions are often cursory. There is the need for a unified framework with respect to the syntactic structure and the semantics for representing experimental protocols. In this paper we present "SMART Protocols ontology", an ontology for representing experimental protocols. Our ontology represents the protocol as a workflow with domain specific knowledge embedded within a document. We also present the S ample I nstrument R eagent O bjective (SIRO) model, which represents the minimal common information shared across experimental protocols. SIRO was conceived in the same realm as the Patient Intervention Comparison Outcome (PICO) model that supports search, retrieval and classification purposes in evidence based medicine. We evaluate our approach against a set of competency questions modeled as SPARQL queries and processed against a set of published and unpublished protocols modeled with the SP Ontology and the SIRO model. Our approach makes it possible to answer queries such as Which protocols use tumor tissue as a sample. Improving reporting structures for experimental protocols requires collective efforts from authors, peer reviewers, editors and funding bodies. The SP Ontology is a contribution towards this goal. We build upon previous experiences and bringing together the view of researchers managing protocols in their laboratory work. Website: https://smartprotocols.github.io/ .

  3. Link-state-estimation-based transmission power control in wireless body area networks.

    PubMed

    Kim, Seungku; Eom, Doo-Seop

    2014-07-01

    This paper presents a novel transmission power control protocol to extend the lifetime of sensor nodes and to increase the link reliability in wireless body area networks (WBANs). We first experimentally investigate the properties of the link states using the received signal strength indicator (RSSI). We then propose a practical transmission power control protocol based on both short- and long-term link-state estimations. Both the short- and long-term link-state estimations enable the transceiver to adapt the transmission power level and target the RSSI threshold range, respectively, to simultaneously satisfy the requirements of energy efficiency and link reliability. Finally, the performance of the proposed protocol is experimentally evaluated in two experimental scenarios-body posture change and dynamic body motion-and compared with the typical WBAN transmission power control protocols, a real-time reactive scheme, and a dynamic postural position inference mechanism. From the experimental results, it is found that the proposed protocol increases the lifetime of the sensor nodes by a maximum of 9.86% and enhances the link reliability by reducing the packet loss by a maximum of 3.02%.

  4. Proof-of-principle experimental realization of a qubit-like qudit-based quantum key distribution scheme

    NASA Astrophysics Data System (ADS)

    Wang, Shuang; Yin, Zhen-Qiang; Chau, H. F.; Chen, Wei; Wang, Chao; Guo, Guang-Can; Han, Zheng-Fu

    2018-04-01

    In comparison to qubit-based protocols, qudit-based quantum key distribution ones generally allow two cooperative parties to share unconditionally secure keys under a higher channel noise. However, it is very hard to prepare and measure the required quantum states in qudit-based protocols in general. One exception is the recently proposed highly error tolerant qudit-based protocol known as the Chau15 (Chau 2015 Phys. Rev. A 92 062324). Remarkably, the state preparation and measurement in this protocol can be done relatively easily since the required states are phase encoded almost like the diagonal basis states of a qubit. Here we report the first proof-of-principle demonstration of the Chau15 protocol. One highlight of our experiment is that its post-processing is based on practical one-way manner, while the original proposal in Chau (2015 Phys. Rev. A 92 062324) relies on complicated two-way post-processing, which is a great challenge in experiment. In addition, by manipulating time-bin qudit and measurement with a variable delay interferometer, our realization is extensible to qudit with high-dimensionality and confirms the experimental feasibility of the Chau15 protocol.

  5. Latency correction of event-related potentials between different experimental protocols

    NASA Astrophysics Data System (ADS)

    Iturrate, I.; Chavarriaga, R.; Montesano, L.; Minguez, J.; Millán, JdR

    2014-06-01

    Objective. A fundamental issue in EEG event-related potentials (ERPs) studies is the amount of data required to have an accurate ERP model. This also impacts the time required to train a classifier for a brain-computer interface (BCI). This issue is mainly due to the poor signal-to-noise ratio and the large fluctuations of the EEG caused by several sources of variability. One of these sources is directly related to the experimental protocol or application designed, and may affect the amplitude or latency of ERPs. This usually prevents BCI classifiers from generalizing among different experimental protocols. In this paper, we analyze the effect of the amplitude and the latency variations among different experimental protocols based on the same type of ERP. Approach. We present a method to analyze and compensate for the latency variations in BCI applications. The algorithm has been tested on two widely used ERPs (P300 and observation error potentials), in three experimental protocols in each case. We report the ERP analysis and single-trial classification. Main results. The results obtained show that the designed experimental protocols significantly affect the latency of the recorded potentials but not the amplitudes. Significance. These results show how the use of latency-corrected data can be used to generalize the BCIs, reducing the calibration time when facing a new experimental protocol.

  6. Generation of concatenated Greenberger-Horne-Zeilinger-type entangled coherent state based on linear optics

    NASA Astrophysics Data System (ADS)

    Guo, Rui; Zhou, Lan; Gu, Shi-Pu; Wang, Xing-Fu; Sheng, Yu-Bo

    2017-03-01

    The concatenated Greenberger-Horne-Zeilinger (C-GHZ) state is a new type of multipartite entangled state, which has potential application in future quantum information. In this paper, we propose a protocol of constructing arbitrary C-GHZ entangled state approximatively. Different from previous protocols, each logic qubit is encoded in the coherent state. This protocol is based on the linear optics, which is feasible in experimental technology. This protocol may be useful in quantum information based on the C-GHZ state.

  7. EXACT2: the semantics of biomedical protocols

    PubMed Central

    2014-01-01

    Background The reliability and reproducibility of experimental procedures is a cornerstone of scientific practice. There is a pressing technological need for the better representation of biomedical protocols to enable other agents (human or machine) to better reproduce results. A framework that ensures that all information required for the replication of experimental protocols is essential to achieve reproducibility. Methods We have developed the ontology EXACT2 (EXperimental ACTions) that is designed to capture the full semantics of biomedical protocols required for their reproducibility. To construct EXACT2 we manually inspected hundreds of published and commercial biomedical protocols from several areas of biomedicine. After establishing a clear pattern for extracting the required information we utilized text-mining tools to translate the protocols into a machine amenable format. We have verified the utility of EXACT2 through the successful processing of previously 'unseen' (not used for the construction of EXACT2) protocols. Results The paper reports on a fundamentally new version EXACT2 that supports the semantically-defined representation of biomedical protocols. The ability of EXACT2 to capture the semantics of biomedical procedures was verified through a text mining use case. In this EXACT2 is used as a reference model for text mining tools to identify terms pertinent to experimental actions, and their properties, in biomedical protocols expressed in natural language. An EXACT2-based framework for the translation of biomedical protocols to a machine amenable format is proposed. Conclusions The EXACT2 ontology is sufficient to record, in a machine processable form, the essential information about biomedical protocols. EXACT2 defines explicit semantics of experimental actions, and can be used by various computer applications. It can serve as a reference model for for the translation of biomedical protocols in natural language into a semantically-defined format. PMID:25472549

  8. The Behavior of TCP and Its Extensions in Space

    NASA Technical Reports Server (NTRS)

    Wang, Ruhai; Horan, Stephen

    2001-01-01

    The performance of Transmission Control Protocol (TCP) in space has been examined from the observations of simulation and experimental tests for several years at National Aeronautics and Space Administration (NASA), Department of Defense (DoD) and universities. At New Mexico State University (NMSU), we have been concentrating on studying the performance of two protocol suites: the file transfer protocol (ftp) running over Transmission Control Protocol/Internet Protocol (TCP/IP) stack and the file protocol (fp) running over the Space Communications Protocol Standards (SCPS)-Transport Protocol (TP) developed under the Consultative Committee for Space Data Systems (CCSDS) standards process. SCPS-TP is considered to be TCP's extensions for space communications. This dissertation experimentally studies the behavior of TCP and SCPS-TP by running the protocol suites over both the Space-to-Ground Link Simulator (SGLS) test-bed and realistic satellite link. The study concentrates on comparing protocol behavior by plotting the averaged file transfer times for different experimental configurations and analyzing them using Statistical Analysis System (SAS) based procedures. The effects of different link delays and various Bit-Error-Rates (BERS) on each protocol performance are also studied and linear regression models are built for experiments over SGLS test-bed to reflect the relationships between the file transfer time and various transmission conditions.

  9. Continuous-variable protocol for oblivious transfer in the noisy-storage model.

    PubMed

    Furrer, Fabian; Gehring, Tobias; Schaffner, Christian; Pacher, Christoph; Schnabel, Roman; Wehner, Stephanie

    2018-04-13

    Cryptographic protocols are the backbone of our information society. This includes two-party protocols which offer protection against distrustful players. Such protocols can be built from a basic primitive called oblivious transfer. We present and experimentally demonstrate here a quantum protocol for oblivious transfer for optical continuous-variable systems, and prove its security in the noisy-storage model. This model allows us to establish security by sending more quantum signals than an attacker can reliably store during the protocol. The security proof is based on uncertainty relations which we derive for continuous-variable systems, that differ from the ones used in quantum key distribution. We experimentally demonstrate in a proof-of-principle experiment the proposed oblivious transfer protocol for various channel losses by using entangled two-mode squeezed states measured with balanced homodyne detection. Our work enables the implementation of arbitrary two-party quantum cryptographic protocols with continuous-variable communication systems.

  10. The Role of Additional Pulses in Electropermeabilization Protocols

    PubMed Central

    Suárez, Cecilia; Soba, Alejandro; Maglietti, Felipe; Olaiz, Nahuel; Marshall, Guillermo

    2014-01-01

    Electropermeabilization (EP) based protocols such as those applied in medicine, food processing or environmental management, are well established and widely used. The applied voltage, as well as tissue electric conductivity, are of utmost importance for assessing final electropermeabilized area and thus EP effectiveness. Experimental results from literature report that, under certain EP protocols, consecutive pulses increase tissue electric conductivity and even the permeabilization amount. Here we introduce a theoretical model that takes into account this effect in the application of an EP-based protocol, and its validation with experimental measurements. The theoretical model describes the electric field distribution by a nonlinear Laplace equation with a variable conductivity coefficient depending on the electric field, the temperature and the quantity of pulses, and the Penne's Bioheat equation for temperature variations. In the experiments, a vegetable tissue model (potato slice) is used for measuring electric currents and tissue electropermeabilized area in different EP protocols. Experimental measurements show that, during sequential pulses and keeping constant the applied voltage, the electric current density and the blackened (electropermeabilized) area increase. This behavior can only be attributed to a rise in the electric conductivity due to a higher number of pulses. Accordingly, we present a theoretical modeling of an EP protocol that predicts correctly the increment in the electric current density observed experimentally during the addition of pulses. The model also demonstrates that the electric current increase is due to a rise in the electric conductivity, in turn induced by temperature and pulse number, with no significant changes in the electric field distribution. The EP model introduced, based on a novel formulation of the electric conductivity, leads to a more realistic description of the EP phenomenon, hopefully providing more accurate predictions of treatment outcomes. PMID:25437512

  11. Weight training in youth-growth, maturation, and safety: an evidence-based review.

    PubMed

    Malina, Robert M

    2006-11-01

    To review the effects of resistance training programs on pre- and early-pubertal youth in the context of response, potential influence on growth and maturation, and occurrence of injury. Evidence-based review. Twenty-two reports dealing with experimental resistance training protocols, excluding isometric programs, in pre- and early-pubertal youth, were reviewed in the context of subject characteristics, training protocol, responses, and occurrence of injury. Experimental programs most often used isotonic machines and free weights, 2- and 3-day protocols, and 8- and 12-week durations, with significant improvements in muscular strength during childhood and early adolescence. Strength gains were lost during detraining. Experimental resistance training programs did not influence growth in height and weight of pre- and early-adolescent youth, and changes in estimates of body composition were variable and quite small. Only 10 studies systematically monitored injuries, and only three injuries were reported. Estimated injury rates were 0.176, 0.053, and 0.055 per 100 participant-hours in the respective programs. Experimental training protocols with weights and resistance machines and with supervision and low instructor/participant ratios are relatively safe and do not negatively impact growth and maturation of pre- and early-pubertal youth.

  12. The Characteristics of Binary Spike-Time-Dependent Plasticity in HfO2-Based RRAM and Applications for Pattern Recognition

    NASA Astrophysics Data System (ADS)

    Zhou, Zheng; Liu, Chen; Shen, Wensheng; Dong, Zhen; Chen, Zhe; Huang, Peng; Liu, Lifeng; Liu, Xiaoyan; Kang, Jinfeng

    2017-04-01

    A binary spike-time-dependent plasticity (STDP) protocol based on one resistive-switching random access memory (RRAM) device was proposed and experimentally demonstrated in the fabricated RRAM array. Based on the STDP protocol, a novel unsupervised online pattern recognition system including RRAM synapses and CMOS neurons is developed. Our simulations show that the system can efficiently compete the handwritten digits recognition task, which indicates the feasibility of using the RRAM-based binary STDP protocol in neuromorphic computing systems to obtain good performance.

  13. Shortcuts to Adiabaticity in Transport of a Single Trapped Ion

    NASA Astrophysics Data System (ADS)

    An, Shuoming; Lv, Dingshun; Campo, Adolfo Del; Kim, Kihwan

    2015-05-01

    We report an experimental study on shortcuts to adiabaticity in the transport of a single 171Yb+ ion trapped in a harmonic potential. In these driving schemes, the application of a force induces a nonadiabatic dynamics in which excitations are tailored so as to preserve the ion motional state in the ground state upon completion of the process. We experimentally apply the laser induced force and realize three different protocols: (1) a transitionless driving with a counterdiabatic term out of phase with the displacement force, (2) a classical protocol assisted by counterdiabatic fields in phase with the main force, (3) and an engineered transport protocol based on the Fourier transform of the trap acceleration. We experimentally compare and discuss the robustness of these protocols under given experimental limitations such as trap frequency drifts. This work was supported by the National Basic Research Program of China under Grants No. 2011CBA00300 (No. 2011CBA00301), the National Natural Science Foundation of China 11374178, and the University of Massachusetts Boston (No. P20150000029279).

  14. BioBlocks: Programming Protocols in Biology Made Easier.

    PubMed

    Gupta, Vishal; Irimia, Jesús; Pau, Iván; Rodríguez-Patón, Alfonso

    2017-07-21

    The methods to execute biological experiments are evolving. Affordable fluid handling robots and on-demand biology enterprises are making automating entire experiments a reality. Automation offers the benefit of high-throughput experimentation, rapid prototyping, and improved reproducibility of results. However, learning to automate and codify experiments is a difficult task as it requires programming expertise. Here, we present a web-based visual development environment called BioBlocks for describing experimental protocols in biology. It is based on Google's Blockly and Scratch, and requires little or no experience in computer programming to automate the execution of experiments. The experiments can be specified, saved, modified, and shared between multiple users in an easy manner. BioBlocks is open-source and can be customized to execute protocols on local robotic platforms or remotely, that is, in the cloud. It aims to serve as a de facto open standard for programming protocols in Biology.

  15. Self-referenced continuous-variable quantum key distribution protocol

    DOE PAGES

    Soh, Daniel Beom Soo; Sarovar, Mohan; Brif, Constantin; ...

    2015-10-21

    We introduce a new continuous-variable quantum key distribution (CV-QKD) protocol, self-referenced CV-QKD, that eliminates the need for transmission of a high-power local oscillator between the communicating parties. In this protocol, each signal pulse is accompanied by a reference pulse (or a pair of twin reference pulses), used to align Alice’s and Bob’s measurement bases. The method of phase estimation and compensation based on the reference pulse measurement can be viewed as a quantum analog of intradyne detection used in classical coherent communication, which extracts the phase information from the modulated signal. We present a proof-of-principle, fiber-based experimental demonstration of themore » protocol and quantify the expected secret key rates by expressing them in terms of experimental parameters. Our analysis of the secret key rate fully takes into account the inherent uncertainty associated with the quantum nature of the reference pulse(s) and quantifies the limit at which the theoretical key rate approaches that of the respective conventional protocol that requires local oscillator transmission. The self-referenced protocol greatly simplifies the hardware required for CV-QKD, especially for potential integrated photonics implementations of transmitters and receivers, with minimum sacrifice of performance. Furthermore, it provides a pathway towards scalable integrated CV-QKD transceivers, a vital step towards large-scale QKD networks.« less

  16. Self-referenced continuous-variable quantum key distribution protocol

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Soh, Daniel Beom Soo; Sarovar, Mohan; Brif, Constantin

    We introduce a new continuous-variable quantum key distribution (CV-QKD) protocol, self-referenced CV-QKD, that eliminates the need for transmission of a high-power local oscillator between the communicating parties. In this protocol, each signal pulse is accompanied by a reference pulse (or a pair of twin reference pulses), used to align Alice’s and Bob’s measurement bases. The method of phase estimation and compensation based on the reference pulse measurement can be viewed as a quantum analog of intradyne detection used in classical coherent communication, which extracts the phase information from the modulated signal. We present a proof-of-principle, fiber-based experimental demonstration of themore » protocol and quantify the expected secret key rates by expressing them in terms of experimental parameters. Our analysis of the secret key rate fully takes into account the inherent uncertainty associated with the quantum nature of the reference pulse(s) and quantifies the limit at which the theoretical key rate approaches that of the respective conventional protocol that requires local oscillator transmission. The self-referenced protocol greatly simplifies the hardware required for CV-QKD, especially for potential integrated photonics implementations of transmitters and receivers, with minimum sacrifice of performance. Furthermore, it provides a pathway towards scalable integrated CV-QKD transceivers, a vital step towards large-scale QKD networks.« less

  17. Self-Referenced Continuous-Variable Quantum Key Distribution Protocol

    NASA Astrophysics Data System (ADS)

    Soh, Daniel B. S.; Brif, Constantin; Coles, Patrick J.; Lütkenhaus, Norbert; Camacho, Ryan M.; Urayama, Junji; Sarovar, Mohan

    2015-10-01

    We introduce a new continuous-variable quantum key distribution (CV-QKD) protocol, self-referenced CV-QKD, that eliminates the need for transmission of a high-power local oscillator between the communicating parties. In this protocol, each signal pulse is accompanied by a reference pulse (or a pair of twin reference pulses), used to align Alice's and Bob's measurement bases. The method of phase estimation and compensation based on the reference pulse measurement can be viewed as a quantum analog of intradyne detection used in classical coherent communication, which extracts the phase information from the modulated signal. We present a proof-of-principle, fiber-based experimental demonstration of the protocol and quantify the expected secret key rates by expressing them in terms of experimental parameters. Our analysis of the secret key rate fully takes into account the inherent uncertainty associated with the quantum nature of the reference pulse(s) and quantifies the limit at which the theoretical key rate approaches that of the respective conventional protocol that requires local oscillator transmission. The self-referenced protocol greatly simplifies the hardware required for CV-QKD, especially for potential integrated photonics implementations of transmitters and receivers, with minimum sacrifice of performance. As such, it provides a pathway towards scalable integrated CV-QKD transceivers, a vital step towards large-scale QKD networks.

  18. Efficient model checking of network authentication protocol based on SPIN

    NASA Astrophysics Data System (ADS)

    Tan, Zhi-hua; Zhang, Da-fang; Miao, Li; Zhao, Dan

    2013-03-01

    Model checking is a very useful technique for verifying the network authentication protocols. In order to improve the efficiency of modeling and verification on the protocols with the model checking technology, this paper first proposes a universal formalization description method of the protocol. Combined with the model checker SPIN, the method can expediently verify the properties of the protocol. By some modeling simplified strategies, this paper can model several protocols efficiently, and reduce the states space of the model. Compared with the previous literature, this paper achieves higher degree of automation, and better efficiency of verification. Finally based on the method described in the paper, we model and verify the Privacy and Key Management (PKM) authentication protocol. The experimental results show that the method of model checking is effective, which is useful for the other authentication protocols.

  19. A Range Finding Protocol to Support Design for Transcriptomics Experimentation: Examples of In-Vitro and In-Vivo Murine UV Exposure

    PubMed Central

    van Oostrom, Conny T.; Jonker, Martijs J.; de Jong, Mark; Dekker, Rob J.; Rauwerda, Han; Ensink, Wim A.; de Vries, Annemieke; Breit, Timo M.

    2014-01-01

    In transcriptomics research, design for experimentation by carefully considering biological, technological, practical and statistical aspects is very important, because the experimental design space is essentially limitless. Usually, the ranges of variable biological parameters of the design space are based on common practices and in turn on phenotypic endpoints. However, specific sub-cellular processes might only be partially reflected by phenotypic endpoints or outside the associated parameter range. Here, we provide a generic protocol for range finding in design for transcriptomics experimentation based on small-scale gene-expression experiments to help in the search for the right location in the design space by analyzing the activity of already known genes of relevant molecular mechanisms. Two examples illustrate the applicability: in-vitro UV-C exposure of mouse embryonic fibroblasts and in-vivo UV-B exposure of mouse skin. Our pragmatic approach is based on: framing a specific biological question and associated gene-set, performing a wide-ranged experiment without replication, eliminating potentially non-relevant genes, and determining the experimental ‘sweet spot’ by gene-set enrichment plus dose-response correlation analysis. Examination of many cellular processes that are related to UV response, such as DNA repair and cell-cycle arrest, revealed that basically each cellular (sub-) process is active at its own specific spot(s) in the experimental design space. Hence, the use of range finding, based on an affordable protocol like this, enables researchers to conveniently identify the ‘sweet spot’ for their cellular process of interest in an experimental design space and might have far-reaching implications for experimental standardization. PMID:24823911

  20. Engineering platform and experimental protocol for design and evaluation of a neurally-controlled powered transfemoral prosthesis.

    PubMed

    Zhang, Fan; Liu, Ming; Harper, Stephen; Lee, Michael; Huang, He

    2014-07-22

    To enable intuitive operation of powered artificial legs, an interface between user and prosthesis that can recognize the user's movement intent is desired. A novel neural-machine interface (NMI) based on neuromuscular-mechanical fusion developed in our previous study has demonstrated a great potential to accurately identify the intended movement of transfemoral amputees. However, this interface has not yet been integrated with a powered prosthetic leg for true neural control. This study aimed to report (1) a flexible platform to implement and optimize neural control of powered lower limb prosthesis and (2) an experimental setup and protocol to evaluate neural prosthesis control on patients with lower limb amputations. First a platform based on a PC and a visual programming environment were developed to implement the prosthesis control algorithms, including NMI training algorithm, NMI online testing algorithm, and intrinsic control algorithm. To demonstrate the function of this platform, in this study the NMI based on neuromuscular-mechanical fusion was hierarchically integrated with intrinsic control of a prototypical transfemoral prosthesis. One patient with a unilateral transfemoral amputation was recruited to evaluate our implemented neural controller when performing activities, such as standing, level-ground walking, ramp ascent, and ramp descent continuously in the laboratory. A novel experimental setup and protocol were developed in order to test the new prosthesis control safely and efficiently. The presented proof-of-concept platform and experimental setup and protocol could aid the future development and application of neurally-controlled powered artificial legs.

  1. Mobile Virtual Private Networking

    NASA Astrophysics Data System (ADS)

    Pulkkis, Göran; Grahn, Kaj; Mårtens, Mathias; Mattsson, Jonny

    Mobile Virtual Private Networking (VPN) solutions based on the Internet Security Protocol (IPSec), Transport Layer Security/Secure Socket Layer (SSL/TLS), Secure Shell (SSH), 3G/GPRS cellular networks, Mobile IP, and the presently experimental Host Identity Protocol (HIP) are described, compared and evaluated. Mobile VPN solutions based on HIP are recommended for future networking because of superior processing efficiency and network capacity demand features. Mobile VPN implementation issues associated with the IP protocol versions IPv4 and IPv6 are also evaluated. Mobile VPN implementation experiences are presented and discussed.

  2. Evaluating the Process of Generating a Clinical Trial Protocol

    PubMed Central

    Franciosi, Lui G.; Butterfield, Noam N.; MacLeod, Bernard A.

    2002-01-01

    The research protocol is the principal document in the conduct of a clinical trial. Its generation requires knowledge about the research problem, the potential experimental confounders, and the relevant Good Clinical Practices for conducting the trial. However, such information is not always available to authors during the writing process. A checklist of over 80 items has been developed to better understand the considerations made by authors in generating a protocol. It is based on the most cited requirements for designing and implementing the randomised controlled trial. Items are categorised according to the trial's research question, experimental design, statistics, ethics, and standard operating procedures. This quality assessment tool evaluates the extent that a generated protocol deviates from the best-planned clinical trial.

  3. Taking the Politics Out of Satellite and Space-Based Communications Protocols

    NASA Technical Reports Server (NTRS)

    Ivancic, William D.

    2006-01-01

    After many years of studies, experimentation, and deployment, large amounts of misinformation and misconceptions remain regarding applicability of various communications protocols for use in satellite and space-based networks. This paper attempts to remove much of the politics, misconceptions, and misinformation that have plagued spacebased communications protocol development and deployment. This paper provides a common vocabulary for communications; a general discussion of the requirements for various communication environments; an evaluation of tradeoffs between circuit and packet-switching technologies, and the pros and cons of various link, network, transport, application, and security protocols. Included is the applicability of protocol enhancing proxies to NASA, Department of Defense (DOD), and commercial space communication systems.

  4. Development of wide area environment accelerator operation and diagnostics method

    NASA Astrophysics Data System (ADS)

    Uchiyama, Akito; Furukawa, Kazuro

    2015-08-01

    Remote operation and diagnostic systems for particle accelerators have been developed for beam operation and maintenance in various situations. Even though fully remote experiments are not necessary, the remote diagnosis and maintenance of the accelerator is required. Considering remote-operation operator interfaces (OPIs), the use of standard protocols such as the hypertext transfer protocol (HTTP) is advantageous, because system-dependent protocols are unnecessary between the remote client and the on-site server. Here, we have developed a client system based on WebSocket, which is a new protocol provided by the Internet Engineering Task Force for Web-based systems, as a next-generation Web-based OPI using the Experimental Physics and Industrial Control System Channel Access protocol. As a result of this implementation, WebSocket-based client systems have become available for remote operation. Also, as regards practical application, the remote operation of an accelerator via a wide area network (WAN) faces a number of challenges, e.g., the accelerator has both experimental device and radiation generator characteristics. Any error in remote control system operation could result in an immediate breakdown. Therefore, we propose the implementation of an operator intervention system for remote accelerator diagnostics and support that can obviate any differences between the local control room and remote locations. Here, remote-operation Web-based OPIs, which resolve security issues, are developed.

  5. Cheating and Anti-Cheating in Gossip-Based Protocol: An Experimental Investigation

    NASA Astrophysics Data System (ADS)

    Xiao, Xin; Shi, Yuanchun; Tang, Yun; Zhang, Nan

    During recent years, there has been a rapid growth in deployment of gossip-based protocol in many multicast applications. In a typical gossip-based protocol, each node acts as dual roles of receiver and sender, independently exchanging data with its neighbors to facilitate scalability and resilience. However, most of previous work in this literature seldom considered cheating issue of end users, which is also very important in face of the fact that the mutual cooperation inherently determines overall system performance. In this paper, we investigate the dishonest behaviors in decentralized gossip-based protocol through extensive experimental study. Our original contributions come in two-fold: In the first part of cheating study, we analytically discuss two typical cheating strategies, that is, intentionally increasing subscription requests and untruthfully calculating forwarding probability, and further evaluate their negative impacts. The results indicate that more attention should be paid to defending cheating behaviors in gossip-based protocol. In the second part of anti-cheating study, we propose a receiver-driven measurement mechanism, which evaluates individual forwarding traffic from the perspective of receivers and thus identifies cheating nodes with high incoming/outgoing ratio. Furthermore, we extend our mechanism by introducing reliable factor to further improve its accuracy. The experiments under various conditions show that it performs quite well in case of serious cheating and achieves considerable performance in other cases.

  6. ProtocolNavigator: emulation-based software for the design, documentation and reproduction biological experiments.

    PubMed

    Khan, Imtiaz A; Fraser, Adam; Bray, Mark-Anthony; Smith, Paul J; White, Nick S; Carpenter, Anne E; Errington, Rachel J

    2014-12-01

    Experimental reproducibility is fundamental to the progress of science. Irreproducible research decreases the efficiency of basic biological research and drug discovery and impedes experimental data reuse. A major contributing factor to irreproducibility is difficulty in interpreting complex experimental methodologies and designs from written text and in assessing variations among different experiments. Current bioinformatics initiatives either are focused on computational research reproducibility (i.e. data analysis) or laboratory information management systems. Here, we present a software tool, ProtocolNavigator, which addresses the largely overlooked challenges of interpretation and assessment. It provides a biologist-friendly open-source emulation-based tool for designing, documenting and reproducing biological experiments. ProtocolNavigator was implemented in Python 2.7, using the wx module to build the graphical user interface. It is a platform-independent software and freely available from http://protocolnavigator.org/index.html under the GPL v2 license. © The Author 2014. Published by Oxford University Press. All rights reserved. For Permissions, please e-mail: journals.permissions@oup.com.

  7. Simulation-based Randomized Comparative Assessment of Out-of-Hospital Cardiac Arrest Resuscitation Bundle Completion by Emergency Medical Service Teams Using Standard Life Support or an Experimental Automation-assisted Approach.

    PubMed

    Choi, Bryan; Asselin, Nicholas; Pettit, Catherine C; Dannecker, Max; Machan, Jason T; Merck, Derek L; Merck, Lisa H; Suner, Selim; Williams, Kenneth A; Jay, Gregory D; Kobayashi, Leo

    2016-12-01

    Effective resuscitation of out-of-hospital cardiac arrest (OHCA) patients is challenging. Alternative resuscitative approaches using electromechanical adjuncts may improve provider performance. Investigators applied simulation to study the effect of an experimental automation-assisted, goal-directed OHCA management protocol on EMS providers' resuscitation performance relative to standard protocols and equipment. Two-provider (emergency medical technicians (EMT)-B and EMT-I/C/P) teams were randomized to control or experimental group. Each team engaged in 3 simulations: baseline simulation (standard roles); repeat simulation (standard roles); and abbreviated repeat simulation (reversed roles, i.e., basic life support provider performing ALS tasks). Control teams used standard OHCA protocols and equipment (with high-performance cardiopulmonary resuscitation training intervention); for second and third simulations, experimental teams performed chest compression, defibrillation, airway, pulmonary ventilation, vascular access, medication, and transport tasks with goal-directed protocol and resuscitation-automating devices. Videorecorders and simulator logs collected resuscitation data. Ten control and 10 experimental teams comprised 20 EMT-B's; 1 EMT-I, 8 EMT-C's, and 11 EMT-P's; study groups were not fully matched. Both groups suboptimally performed chest compressions and ventilations at baseline. For their second simulations, control teams performed similarly except for reduced on-scene time, and experimental teams improved their chest compressions (P=0.03), pulmonary ventilations (P<0.01), and medication administration (P=0.02); changes in their performance of chest compression, defibrillation, airway, and transport tasks did not attain significance against control teams' changes. Experimental teams maintained performance improvements during reversed-role simulations. Simulation-based investigation into OHCA resuscitation revealed considerable variability and improvable deficiencies in small EMS teams. Goal-directed, automation-assisted OHCA management augmented select resuscitation bundle element performance without comprehensive improvement.

  8. Protocol vulnerability detection based on network traffic analysis and binary reverse engineering.

    PubMed

    Wen, Shameng; Meng, Qingkun; Feng, Chao; Tang, Chaojing

    2017-01-01

    Network protocol vulnerability detection plays an important role in many domains, including protocol security analysis, application security, and network intrusion detection. In this study, by analyzing the general fuzzing method of network protocols, we propose a novel approach that combines network traffic analysis with the binary reverse engineering method. For network traffic analysis, the block-based protocol description language is introduced to construct test scripts, while the binary reverse engineering method employs the genetic algorithm with a fitness function designed to focus on code coverage. This combination leads to a substantial improvement in fuzz testing for network protocols. We build a prototype system and use it to test several real-world network protocol implementations. The experimental results show that the proposed approach detects vulnerabilities more efficiently and effectively than general fuzzing methods such as SPIKE.

  9. Practical quantum appointment scheduling

    NASA Astrophysics Data System (ADS)

    Touchette, Dave; Lovitz, Benjamin; Lütkenhaus, Norbert

    2018-04-01

    We propose a protocol based on coherent states and linear optics operations for solving the appointment-scheduling problem. Our main protocol leaks strictly less information about each party's input than the optimal classical protocol, even when considering experimental errors. Along with the ability to generate constant-amplitude coherent states over two modes, this protocol requires the ability to transfer these modes back-and-forth between the two parties multiple times with very low losses. The implementation requirements are thus still challenging. Along the way, we develop tools to study quantum information cost of interactive protocols in the finite regime.

  10. iLAP: a workflow-driven software for experimental protocol development, data acquisition and analysis

    PubMed Central

    2009-01-01

    Background In recent years, the genome biology community has expended considerable effort to confront the challenges of managing heterogeneous data in a structured and organized way and developed laboratory information management systems (LIMS) for both raw and processed data. On the other hand, electronic notebooks were developed to record and manage scientific data, and facilitate data-sharing. Software which enables both, management of large datasets and digital recording of laboratory procedures would serve a real need in laboratories using medium and high-throughput techniques. Results We have developed iLAP (Laboratory data management, Analysis, and Protocol development), a workflow-driven information management system specifically designed to create and manage experimental protocols, and to analyze and share laboratory data. The system combines experimental protocol development, wizard-based data acquisition, and high-throughput data analysis into a single, integrated system. We demonstrate the power and the flexibility of the platform using a microscopy case study based on a combinatorial multiple fluorescence in situ hybridization (m-FISH) protocol and 3D-image reconstruction. iLAP is freely available under the open source license AGPL from http://genome.tugraz.at/iLAP/. Conclusion iLAP is a flexible and versatile information management system, which has the potential to close the gap between electronic notebooks and LIMS and can therefore be of great value for a broad scientific community. PMID:19941647

  11. Security of modified Ping-Pong protocol in noisy and lossy channel

    PubMed Central

    Han, Yun-Guang; Yin, Zhen-Qiang; Li, Hong-Wei; Chen, Wei; Wang, Shuang; Guo, Guang-Can; Han, Zheng-Fu

    2014-01-01

    The “Ping-Pong” (PP) protocol is a two-way quantum key protocol based on entanglement. In this protocol, Bob prepares one maximally entangled pair of qubits, and sends one qubit to Alice. Then, Alice performs some necessary operations on this qubit and sends it back to Bob. Although this protocol was proposed in 2002, its security in the noisy and lossy channel has not been proven. In this report, we add a simple and experimentally feasible modification to the original PP protocol, and prove the security of this modified PP protocol against collective attacks when the noisy and lossy channel is taken into account. Simulation results show that our protocol is practical. PMID:24816899

  12. Security of modified Ping-Pong protocol in noisy and lossy channel.

    PubMed

    Han, Yun-Guang; Yin, Zhen-Qiang; Li, Hong-Wei; Chen, Wei; Wang, Shuang; Guo, Guang-Can; Han, Zheng-Fu

    2014-05-12

    The "Ping-Pong" (PP) protocol is a two-way quantum key protocol based on entanglement. In this protocol, Bob prepares one maximally entangled pair of qubits, and sends one qubit to Alice. Then, Alice performs some necessary operations on this qubit and sends it back to Bob. Although this protocol was proposed in 2002, its security in the noisy and lossy channel has not been proven. In this report, we add a simple and experimentally feasible modification to the original PP protocol, and prove the security of this modified PP protocol against collective attacks when the noisy and lossy channel is taken into account. Simulation results show that our protocol is practical.

  13. Photoacoustic imaging to assess pixel-based sO2 distributions in experimental prostate tumors.

    PubMed

    Bendinger, Alina L; Glowa, Christin; Peter, Jörg; Karger, Christian P

    2018-03-01

    A protocol for photoacoustic imaging (PAI) has been developed to assess pixel-based oxygen saturation (sO2) distributions of experimental tumor models. The protocol was applied to evaluate the dependence of PAI results on measurement settings, reproducibility of PAI, and for the characterization of the oxygenation status of experimental prostate tumor sublines (Dunning R3327-H, -HI, -AT1) implanted subcutaneously in male Copenhagen rats. The three-dimensional (3-D) PA data employing two wavelengths were used to estimate sO2 distributions. If the PA signal was sufficiently strong, the distributions were independent from signal gain, threshold, and positioning of animals. Reproducibility of sO2 distributions with respect to shape and median values was demonstrated over several days. The three tumor sublines were characterized by the shapes of their sO2 distributions and their temporal response after external changes of the oxygen supply (100% O2 or air breathing and clamping of tumor-supplying artery). The established protocol showed to be suitable for detecting temporal changes in tumor oxygenation as well as differences in oxygenation between tumor sublines. PA results were in accordance with histology for hypoxia, perfusion, and vasculature. The presented protocol for the assessment of pixel-based sO2 distributions provides more detailed information as compared to conventional region-of-interest-based analysis of PAI, especially with respect to the detection of temporal changes and tumor heterogeneity. (2018) COPYRIGHT Society of Photo-Optical Instrumentation Engineers (SPIE).

  14. Photoacoustic imaging to assess pixel-based sO2 distributions in experimental prostate tumors

    NASA Astrophysics Data System (ADS)

    Bendinger, Alina L.; Glowa, Christin; Peter, Jörg; Karger, Christian P.

    2018-03-01

    A protocol for photoacoustic imaging (PAI) has been developed to assess pixel-based oxygen saturation (sO2) distributions of experimental tumor models. The protocol was applied to evaluate the dependence of PAI results on measurement settings, reproducibility of PAI, and for the characterization of the oxygenation status of experimental prostate tumor sublines (Dunning R3327-H, -HI, -AT1) implanted subcutaneously in male Copenhagen rats. The three-dimensional (3-D) PA data employing two wavelengths were used to estimate sO2 distributions. If the PA signal was sufficiently strong, the distributions were independent from signal gain, threshold, and positioning of animals. Reproducibility of sO2 distributions with respect to shape and median values was demonstrated over several days. The three tumor sublines were characterized by the shapes of their sO2 distributions and their temporal response after external changes of the oxygen supply (100% O2 or air breathing and clamping of tumor-supplying artery). The established protocol showed to be suitable for detecting temporal changes in tumor oxygenation as well as differences in oxygenation between tumor sublines. PA results were in accordance with histology for hypoxia, perfusion, and vasculature. The presented protocol for the assessment of pixel-based sO2 distributions provides more detailed information as compared to conventional region-of-interest-based analysis of PAI, especially with respect to the detection of temporal changes and tumor heterogeneity.

  15. An Approach to Verifying Completeness and Consistency in a Rule-Based Expert System.

    DTIC Science & Technology

    1982-08-01

    peolea with the se e S knowlede base by observing en t om. W0hile thorough testing is an "samt4 Pert of V*flfyL the ooIlst4ftl and capleteness of a...physicians at Stanford’s Oncology Day Care Center on the management of patients who are on experimental treatment protocols. These protocols serve to...for oncology protocol management . Prooceedings of 7th IJCAI, pp. 876- 881, Vancouver, B.C., August 1981. I. van Melle, W. A Domain-Independent system

  16. Mutation-based learning to improve student autonomy and scientific inquiry skills in a large genetics laboratory course.

    PubMed

    Wu, Jinlu

    2013-01-01

    Laboratory education can play a vital role in developing a learner's autonomy and scientific inquiry skills. In an innovative, mutation-based learning (MBL) approach, students were instructed to redesign a teacher-designed standard experimental protocol by a "mutation" method in a molecular genetics laboratory course. Students could choose to delete, add, reverse, or replace certain steps of the standard protocol to explore questions of interest to them in a given experimental scenario. They wrote experimental proposals to address their rationales and hypotheses for the "mutations"; conducted experiments in parallel, according to both standard and mutated protocols; and then compared and analyzed results to write individual lab reports. Various autonomy-supportive measures were provided in the entire experimental process. Analyses of student work and feedback suggest that students using the MBL approach 1) spend more time discussing experiments, 2) use more scientific inquiry skills, and 3) find the increased autonomy afforded by MBL more enjoyable than do students following regimented instructions in a conventional "cookbook"-style laboratory. Furthermore, the MBL approach does not incur an obvious increase in labor and financial costs, which makes it feasible for easy adaptation and implementation in a large class.

  17. Equipment and Protocols for Quasi-Static and Dynamic Tests of Very-High-Strength Concrete (VHSC) and High-Strength High-Ductility Concrete (HSHDC)

    DTIC Science & Technology

    2016-08-01

    quasi -static mechanical properties, deformation behavior, and damage mechanisms in HSHDC and compare the behavior with VHSC. 2. Develop experimental ...using the experimental setup described in Chapter 6. The quasi -static strain rate was approximately 10-4/s. All panels tested have nominal dimensions...ER D C TR -1 6- 13 Force Protection Basing; TeCD 1a Equipment and Protocols for Quasi -Static and Dynamic Tests of Very-High-Strength

  18. Action Observation Plus Sonification. A Novel Therapeutic Protocol for Parkinson’s Patient with Freezing of Gait

    PubMed Central

    Mezzarobba, Susanna; Grassi, Michele; Pellegrini, Lorella; Catalan, Mauro; Kruger, Bjorn; Furlanis, Giovanni; Manganotti, Paolo; Bernardis, Paolo

    2018-01-01

    Freezing of gait (FoG) is a disabling symptom associated with falls, with little or no responsiveness to pharmacological treatment. Current protocols used for rehabilitation are based on the use of external sensory cues. However, cued strategies might generate an important dependence on the environment. Teaching motor strategies without cues [i.e., action observation (AO) plus Sonification] could represent an alternative/innovative approach to rehabilitation that matters most on appropriate allocation of attention and lightening cognitive load. We aimed to test the effects of a novel experimental protocol to treat patients with Parkinson’s disease (PD) and FoG, using functional, and clinical scales. The experimental protocol was based on AO plus Sonification. 12 patients were treated with 8 motor gestures. They watched eight videos showing an actor performing the same eight gestures, and then tried to repeat each gesture. Each video was composed by images and sounds of the gestures. By means of the Sonification technique, the sounds of gestures were obtained by transforming kinematic data (velocity) recorded during gesture execution, into pitch variations. The same 8 motor gestures were also used in a second group of 10 patients; which were treated with a standard protocol based on a common sensory stimulation method. All patients were tested with functional and clinical scales before, after, at 1 month, and 3 months after the treatment. Data showed that the experimental protocol have positive effects on functional and clinical tests. In comparison with the baseline evaluations, significant performance improvements were seen in the NFOG questionnaire, and the UPDRS (parts II and III). Importantly, all these improvements were consistently observed at the end, 1 month, and 3 months after treatment. No improvement effects were found in the group of patients treated with the standard protocol. These data suggest that a multisensory approach based on AO plus Sonification, with the two stimuli semantically related, could help PD patients with FoG to relearn gait movements, to reduce freezing episodes, and that these effects could be prolonged over time. PMID:29354092

  19. Securing Real-Time Sessions in an IMS-Based Architecture

    NASA Astrophysics Data System (ADS)

    Cennamo, Paolo; Fresa, Antonio; Longo, Maurizio; Postiglione, Fabio; Robustelli, Anton Luca; Toro, Francesco

    The emerging all-IP mobile network infrastructures based on 3rd Generation IP Multimedia Subsystem philosophy are characterised by radio access technology independence and ubiquitous connectivity for mobile users. Currently, great focus is being devoted to security issues since most of the security threats presently affecting the public Internet domain, and the upcoming ones as well, are going to be suffered by mobile users in the years to come. While a great deal of research activity, together with standardisation efforts and experimentations, is carried out on mechanisms for signalling protection, very few integrated frameworks for real-time multimedia data protection have been proposed in a context of IP Multimedia Subsystem, and even fewer experimental results based on testbeds are available. In this paper, after a general overview of the security issues arising in an advanced IP Multimedia Subsystem scenario, a comprehensive infrastructure for real-time multimedia data protection, based on the adoption of the Secure Real-Time Protocol, is proposed; then, the development of a testbed incorporating such functionalities, including mechanisms for key management and cryptographic context transfer, and allowing the setup of Secure Real-Time Protocol sessions is presented; finally, experimental results are provided together with quantitative assessments and comparisons of system performances for audio sessions with and without the adoption of the Secure Real-Time Protocol framework.

  20. Real-time Electrophysiology: Using Closed-loop Protocols to Probe Neuronal Dynamics and Beyond

    PubMed Central

    Linaro, Daniele; Couto, João; Giugliano, Michele

    2015-01-01

    Experimental neuroscience is witnessing an increased interest in the development and application of novel and often complex, closed-loop protocols, where the stimulus applied depends in real-time on the response of the system. Recent applications range from the implementation of virtual reality systems for studying motor responses both in mice1 and in zebrafish2, to control of seizures following cortical stroke using optogenetics3. A key advantage of closed-loop techniques resides in the capability of probing higher dimensional properties that are not directly accessible or that depend on multiple variables, such as neuronal excitability4 and reliability, while at the same time maximizing the experimental throughput. In this contribution and in the context of cellular electrophysiology, we describe how to apply a variety of closed-loop protocols to the study of the response properties of pyramidal cortical neurons, recorded intracellularly with the patch clamp technique in acute brain slices from the somatosensory cortex of juvenile rats. As no commercially available or open source software provides all the features required for efficiently performing the experiments described here, a new software toolbox called LCG5 was developed, whose modular structure maximizes reuse of computer code and facilitates the implementation of novel experimental paradigms. Stimulation waveforms are specified using a compact meta-description and full experimental protocols are described in text-based configuration files. Additionally, LCG has a command-line interface that is suited for repetition of trials and automation of experimental protocols. PMID:26132434

  1. Experimental plug and play quantum coin flipping.

    PubMed

    Pappa, Anna; Jouguet, Paul; Lawson, Thomas; Chailloux, André; Legré, Matthieu; Trinkler, Patrick; Kerenidis, Iordanis; Diamanti, Eleni

    2014-04-24

    Performing complex cryptographic tasks will be an essential element in future quantum communication networks. These tasks are based on a handful of fundamental primitives, such as coin flipping, where two distrustful parties wish to agree on a randomly generated bit. Although it is known that quantum versions of these primitives can offer information-theoretic security advantages with respect to classical protocols, a demonstration of such an advantage in a practical communication scenario has remained elusive. Here we experimentally implement a quantum coin flipping protocol that performs strictly better than classically possible over a distance suitable for communication over metropolitan area optical networks. The implementation is based on a practical plug and play system, developed by significantly enhancing a commercial quantum key distribution device. Moreover, we provide combined quantum coin flipping protocols that are almost perfectly secure against bounded adversaries. Our results offer a useful toolbox for future secure quantum communications.

  2. Experimental study on all-fiber-based unidimensional continuous-variable quantum key distribution

    NASA Astrophysics Data System (ADS)

    Wang, Xuyang; Liu, Wenyuan; Wang, Pu; Li, Yongmin

    2017-06-01

    We experimentally demonstrated an all-fiber-based unidimensional continuous-variable quantum key distribution (CV QKD) protocol and analyzed its security under collective attack in realistic conditions. A pulsed balanced homodyne detector, which could not be accessed by eavesdroppers, with phase-insensitive efficiency and electronic noise, was considered. Furthermore, a modulation method and an improved relative phase-locking technique with one amplitude modulator and one phase modulator were designed. The relative phase could be locked precisely with a standard deviation of 0.5° and a mean of almost zero. Secret key bit rates of 5.4 kbps and 700 bps were achieved for transmission fiber lengths of 30 and 50 km, respectively. The protocol, which simplified the CV QKD system and reduced the cost, displayed a performance comparable to that of a symmetrical counterpart under realistic conditions. It is expected that the developed protocol can facilitate the practical application of the CV QKD.

  3. A Mobility-Aware QoS Signaling Protocol for Ambient Networks

    NASA Astrophysics Data System (ADS)

    Jeong, Seong-Ho; Lee, Sung-Hyuck; Bang, Jongho

    Mobility-aware quality of service (QoS) signaling is crucial to provide seamless multimedia services in the ambient environment where mobile nodes may move frequently between different wireless access networks. The mobility of an IP-based node in ambient networks affects routing paths, and as a result, can have a significant impact on the operation and state management of QoS signaling protocols. In this paper, we first analyze the impact of mobility on QoS signaling protocols and how the protocols operate in mobility scenarios. We then propose an efficient mobility-aware QoS signaling protocol which can operate adaptively in ambient networks. The key features of the protocol include the fast discovery of a crossover node where the old and new paths converge or diverge due to handover and the localized state management for seamless services. Our analytical and simulation/experimental results show that the proposed/implemented protocol works better than existing protocols in the IP-based mobile environment.

  4. Experimentally feasible quantum-key-distribution scheme using qubit-like qudits and its comparison with existing qubit- and qudit-based protocols

    NASA Astrophysics Data System (ADS)

    Chau, H. F.; Wang, Qinan; Wong, Cardythy

    2017-02-01

    Recently, Chau [Phys. Rev. A 92, 062324 (2015), 10.1103/PhysRevA.92.062324] introduced an experimentally feasible qudit-based quantum-key-distribution (QKD) scheme. In that scheme, one bit of information is phase encoded in the prepared state in a 2n-dimensional Hilbert space in the form (|i > ±|j >) /√{2 } with n ≥2 . For each qudit prepared and measured in the same two-dimensional Hilbert subspace, one bit of raw secret key is obtained in the absence of transmission error. Here we show that by modifying the basis announcement procedure, the same experimental setup can generate n bits of raw key for each qudit prepared and measured in the same basis in the noiseless situation. The reason is that in addition to the phase information, each qudit also carries information on the Hilbert subspace used. The additional (n -1 ) bits of raw key comes from a clever utilization of this extra piece of information. We prove the unconditional security of this modified protocol and compare its performance with other existing provably secure qubit- and qudit-based protocols on market in the one-way classical communication setting. Interestingly, we find that for the case of n =2 , the secret key rate of this modified protocol using nondegenerate random quantum code to perform one-way entanglement distillation is equal to that of the six-state scheme.

  5. An Enhanced Reservation-Based MAC Protocol for IEEE 802.15.4 Networks

    PubMed Central

    Afonso, José A.; Silva, Helder D.; Macedo, Pedro; Rocha, Luis A.

    2011-01-01

    The IEEE 802.15.4 Medium Access Control (MAC) protocol is an enabling standard for wireless sensor networks. In order to support applications requiring dedicated bandwidth or bounded delay, it provides a reservation-based scheme named Guaranteed Time Slot (GTS). However, the GTS scheme presents some drawbacks, such as inefficient bandwidth utilization and support to a maximum of only seven devices. This paper presents eLPRT (enhanced Low Power Real Time), a new reservation-based MAC protocol that introduces several performance enhancing features in comparison to the GTS scheme. This MAC protocol builds on top of LPRT (Low Power Real Time) and includes various mechanisms designed to increase data transmission reliability against channel errors, improve bandwidth utilization and increase the number of supported devices. A motion capture system based on inertial and magnetic sensors has been used to validate the protocol. The effectiveness of the performance enhancements introduced by each of the new features is demonstrated through the provision of both simulation and experimental results. PMID:22163826

  6. Moving the Learning of Teaching Closer to Practice: Teacher Education Implications of School-Based Inquiry Teams

    ERIC Educational Resources Information Center

    Gallimore, Ronald; Ermeling, Bradley A.; Saunders, William M.; Goldenberg, Claude

    2009-01-01

    A 5-year prospective, quasi-experimental investigation demonstrated that grade-level teams in 9 Title 1 schools using an inquiry-focused protocol to solve instructional problems significantly increased achievement. Teachers applying the inquiry protocol shifted attribution of improved student performance to their teaching rather than external…

  7. Experimental Evaluation of Unicast and Multicast CoAP Group Communication

    PubMed Central

    Ishaq, Isam; Hoebeke, Jeroen; Moerman, Ingrid; Demeester, Piet

    2016-01-01

    The Internet of Things (IoT) is expanding rapidly to new domains in which embedded devices play a key role and gradually outnumber traditionally-connected devices. These devices are often constrained in their resources and are thus unable to run standard Internet protocols. The Constrained Application Protocol (CoAP) is a new alternative standard protocol that implements the same principals as the Hypertext Transfer Protocol (HTTP), but is tailored towards constrained devices. In many IoT application domains, devices need to be addressed in groups in addition to being addressable individually. Two main approaches are currently being proposed in the IoT community for CoAP-based group communication. The main difference between the two approaches lies in the underlying communication type: multicast versus unicast. In this article, we experimentally evaluate those two approaches using two wireless sensor testbeds and under different test conditions. We highlight the pros and cons of each of them and propose combining these approaches in a hybrid solution to better suit certain use case requirements. Additionally, we provide a solution for multicast-based group membership management using CoAP. PMID:27455262

  8. Mutation-Based Learning to Improve Student Autonomy and Scientific Inquiry Skills in a Large Genetics Laboratory Course

    PubMed Central

    Wu, Jinlu

    2013-01-01

    Laboratory education can play a vital role in developing a learner's autonomy and scientific inquiry skills. In an innovative, mutation-based learning (MBL) approach, students were instructed to redesign a teacher-designed standard experimental protocol by a “mutation” method in a molecular genetics laboratory course. Students could choose to delete, add, reverse, or replace certain steps of the standard protocol to explore questions of interest to them in a given experimental scenario. They wrote experimental proposals to address their rationales and hypotheses for the “mutations”; conducted experiments in parallel, according to both standard and mutated protocols; and then compared and analyzed results to write individual lab reports. Various autonomy-supportive measures were provided in the entire experimental process. Analyses of student work and feedback suggest that students using the MBL approach 1) spend more time discussing experiments, 2) use more scientific inquiry skills, and 3) find the increased autonomy afforded by MBL more enjoyable than do students following regimented instructions in a conventional “cookbook”-style laboratory. Furthermore, the MBL approach does not incur an obvious increase in labor and financial costs, which makes it feasible for easy adaptation and implementation in a large class. PMID:24006394

  9. Experimental demonstration on the deterministic quantum key distribution based on entangled photons.

    PubMed

    Chen, Hua; Zhou, Zhi-Yuan; Zangana, Alaa Jabbar Jumaah; Yin, Zhen-Qiang; Wu, Juan; Han, Yun-Guang; Wang, Shuang; Li, Hong-Wei; He, De-Yong; Tawfeeq, Shelan Khasro; Shi, Bao-Sen; Guo, Guang-Can; Chen, Wei; Han, Zheng-Fu

    2016-02-10

    As an important resource, entanglement light source has been used in developing quantum information technologies, such as quantum key distribution(QKD). There are few experiments implementing entanglement-based deterministic QKD protocols since the security of existing protocols may be compromised in lossy channels. In this work, we report on a loss-tolerant deterministic QKD experiment which follows a modified "Ping-Pong"(PP) protocol. The experiment results demonstrate for the first time that a secure deterministic QKD session can be fulfilled in a channel with an optical loss of 9 dB, based on a telecom-band entangled photon source. This exhibits a conceivable prospect of ultilizing entanglement light source in real-life fiber-based quantum communications.

  10. Experimental demonstration on the deterministic quantum key distribution based on entangled photons

    PubMed Central

    Chen, Hua; Zhou, Zhi-Yuan; Zangana, Alaa Jabbar Jumaah; Yin, Zhen-Qiang; Wu, Juan; Han, Yun-Guang; Wang, Shuang; Li, Hong-Wei; He, De-Yong; Tawfeeq, Shelan Khasro; Shi, Bao-Sen; Guo, Guang-Can; Chen, Wei; Han, Zheng-Fu

    2016-01-01

    As an important resource, entanglement light source has been used in developing quantum information technologies, such as quantum key distribution(QKD). There are few experiments implementing entanglement-based deterministic QKD protocols since the security of existing protocols may be compromised in lossy channels. In this work, we report on a loss-tolerant deterministic QKD experiment which follows a modified “Ping-Pong”(PP) protocol. The experiment results demonstrate for the first time that a secure deterministic QKD session can be fulfilled in a channel with an optical loss of 9 dB, based on a telecom-band entangled photon source. This exhibits a conceivable prospect of ultilizing entanglement light source in real-life fiber-based quantum communications. PMID:26860582

  11. DTN routing in body sensor networks with dynamic postural partitioning.

    PubMed

    Quwaider, Muhannad; Biswas, Subir

    2010-11-01

    This paper presents novel store-and-forward packet routing algorithms for Wireless Body Area Networks ( WBAN ) with frequent postural partitioning. A prototype WBAN has been constructed for experimentally characterizing on-body topology disconnections in the presence of ultra short range radio links, unpredictable RF attenuation, and human postural mobility. On-body DTN routing protocols are then developed using a stochastic link cost formulation, capturing multi-scale topological localities in human postural movements. Performance of the proposed protocols are evaluated experimentally and via simulation, and are compared with a number of existing single-copy DTN routing protocols and an on-body packet flooding mechanism that serves as a performance benchmark with delay lower-bound. It is shown that via multi-scale modeling of the spatio-temporal locality of on-body link disconnection patterns, the proposed algorithms can provide better routing performance compared to a number of existing probabilistic, opportunistic, and utility-based DTN routing protocols in the literature.

  12. In silico toxicology protocols.

    PubMed

    Myatt, Glenn J; Ahlberg, Ernst; Akahori, Yumi; Allen, David; Amberg, Alexander; Anger, Lennart T; Aptula, Aynur; Auerbach, Scott; Beilke, Lisa; Bellion, Phillip; Benigni, Romualdo; Bercu, Joel; Booth, Ewan D; Bower, Dave; Brigo, Alessandro; Burden, Natalie; Cammerer, Zoryana; Cronin, Mark T D; Cross, Kevin P; Custer, Laura; Dettwiler, Magdalena; Dobo, Krista; Ford, Kevin A; Fortin, Marie C; Gad-McDonald, Samantha E; Gellatly, Nichola; Gervais, Véronique; Glover, Kyle P; Glowienke, Susanne; Van Gompel, Jacky; Gutsell, Steve; Hardy, Barry; Harvey, James S; Hillegass, Jedd; Honma, Masamitsu; Hsieh, Jui-Hua; Hsu, Chia-Wen; Hughes, Kathy; Johnson, Candice; Jolly, Robert; Jones, David; Kemper, Ray; Kenyon, Michelle O; Kim, Marlene T; Kruhlak, Naomi L; Kulkarni, Sunil A; Kümmerer, Klaus; Leavitt, Penny; Majer, Bernhard; Masten, Scott; Miller, Scott; Moser, Janet; Mumtaz, Moiz; Muster, Wolfgang; Neilson, Louise; Oprea, Tudor I; Patlewicz, Grace; Paulino, Alexandre; Lo Piparo, Elena; Powley, Mark; Quigley, Donald P; Reddy, M Vijayaraj; Richarz, Andrea-Nicole; Ruiz, Patricia; Schilter, Benoit; Serafimova, Rositsa; Simpson, Wendy; Stavitskaya, Lidiya; Stidl, Reinhard; Suarez-Rodriguez, Diana; Szabo, David T; Teasdale, Andrew; Trejo-Martin, Alejandra; Valentin, Jean-Pierre; Vuorinen, Anna; Wall, Brian A; Watts, Pete; White, Angela T; Wichard, Joerg; Witt, Kristine L; Woolley, Adam; Woolley, David; Zwickl, Craig; Hasselgren, Catrin

    2018-07-01

    The present publication surveys several applications of in silico (i.e., computational) toxicology approaches across different industries and institutions. It highlights the need to develop standardized protocols when conducting toxicity-related predictions. This contribution articulates the information needed for protocols to support in silico predictions for major toxicological endpoints of concern (e.g., genetic toxicity, carcinogenicity, acute toxicity, reproductive toxicity, developmental toxicity) across several industries and regulatory bodies. Such novel in silico toxicology (IST) protocols, when fully developed and implemented, will ensure in silico toxicological assessments are performed and evaluated in a consistent, reproducible, and well-documented manner across industries and regulatory bodies to support wider uptake and acceptance of the approaches. The development of IST protocols is an initiative developed through a collaboration among an international consortium to reflect the state-of-the-art in in silico toxicology for hazard identification and characterization. A general outline for describing the development of such protocols is included and it is based on in silico predictions and/or available experimental data for a defined series of relevant toxicological effects or mechanisms. The publication presents a novel approach for determining the reliability of in silico predictions alongside experimental data. In addition, we discuss how to determine the level of confidence in the assessment based on the relevance and reliability of the information. Copyright © 2018 The Authors. Published by Elsevier Inc. All rights reserved.

  13. Comparison of a Stimulus Equivalence Protocol and Traditional Lecture for Teaching Single-Subject Designs

    ERIC Educational Resources Information Center

    Lovett, Sadie; Rehfeldt, Ruth Anne; Garcia, Yors; Dunning, Johnna

    2011-01-01

    This study compared the effects of a computer-based stimulus equivalence protocol to a traditional lecture format in teaching single-subject experimental design concepts to undergraduate students. Participants were assigned to either an equivalence or a lecture group, and performance on a paper-and-pencil test that targeted relations among the…

  14. Experimental high-speed network

    NASA Astrophysics Data System (ADS)

    McNeill, Kevin M.; Klein, William P.; Vercillo, Richard; Alsafadi, Yasser H.; Parra, Miguel V.; Dallas, William J.

    1993-09-01

    Many existing local area networking protocols currently applied in medical imaging were originally designed for relatively low-speed, low-volume networking. These protocols utilize small packet sizes appropriate for text based communication. Local area networks of this type typically provide raw bandwidth under 125 MHz. These older network technologies are not optimized for the low delay, high data traffic environment of a totally digital radiology department. Some current implementations use point-to-point links when greater bandwidth is required. However, the use of point-to-point communications for a total digital radiology department network presents many disadvantages. This paper describes work on an experimental multi-access local area network called XFT. The work includes the protocol specification, and the design and implementation of network interface hardware and software. The protocol specifies the Physical and Data Link layers (OSI layers 1 & 2) for a fiber-optic based token ring providing a raw bandwidth of 500 MHz. The protocol design and implementation of the XFT interface hardware includes many features to optimize image transfer and provide flexibility for additional future enhancements which include: a modular hardware design supporting easy portability to a variety of host system buses, a versatile message buffer design providing 16 MB of memory, and the capability to extend the raw bandwidth of the network to 3.0 GHz.

  15. Molecular Dynamics Simulations and Kinetic Measurements to Estimate and Predict Protein-Ligand Residence Times.

    PubMed

    Mollica, Luca; Theret, Isabelle; Antoine, Mathias; Perron-Sierra, Françoise; Charton, Yves; Fourquez, Jean-Marie; Wierzbicki, Michel; Boutin, Jean A; Ferry, Gilles; Decherchi, Sergio; Bottegoni, Giovanni; Ducrot, Pierre; Cavalli, Andrea

    2016-08-11

    Ligand-target residence time is emerging as a key drug discovery parameter because it can reliably predict drug efficacy in vivo. Experimental approaches to binding and unbinding kinetics are nowadays available, but we still lack reliable computational tools for predicting kinetics and residence time. Most attempts have been based on brute-force molecular dynamics (MD) simulations, which are CPU-demanding and not yet particularly accurate. We recently reported a new scaled-MD-based protocol, which showed potential for residence time prediction in drug discovery. Here, we further challenged our procedure's predictive ability by applying our methodology to a series of glucokinase activators that could be useful for treating type 2 diabetes mellitus. We combined scaled MD with experimental kinetics measurements and X-ray crystallography, promptly checking the protocol's reliability by directly comparing computational predictions and experimental measures. The good agreement highlights the potential of our scaled-MD-based approach as an innovative method for computationally estimating and predicting drug residence times.

  16. Gossip-Based Broadcast

    NASA Astrophysics Data System (ADS)

    Leitão, João; Pereira, José; Rodrigues, Luís

    Gossip, or epidemic, protocols have emerged as a powerful strategy to implement highly scalable and resilient reliable broadcast primitives on large scale peer-to-peer networks. Epidemic protocols are scalable because they distribute the load among all nodes in the system and resilient because they have an intrinsic level of redundancy that masks node and network failures. This chapter provides an introduction to gossip-based broadcast on large-scale unstructured peer-to-peer overlay networks: it surveys the main results in the field, discusses techniques to build and maintain the overlays that support efficient dissemination strategies, and provides an in-depth discussion and experimental evaluation of two concrete protocols, named HyParView and Plumtree.

  17. Entanglement-secured single-qubit quantum secret sharing

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Scherpelz, P.; Resch, R.; Berryrieser, D.

    In single-qubit quantum secret sharing, a secret is shared between N parties via manipulation and measurement of one qubit at a time. Each qubit is sent to all N parties in sequence; the secret is encoded in the first participant's preparation of the qubit state and the subsequent participants' choices of state rotation or measurement basis. We present a protocol for single-qubit quantum secret sharing using polarization entanglement of photon pairs produced in type-I spontaneous parametric downconversion. We investigate the protocol's security against eavesdropping attack under common experimental conditions: a lossy channel for photon transmission, and imperfect preparation of themore » initial qubit state. A protocol which exploits entanglement between photons, rather than simply polarization correlation, is more robustly secure. We implement the entanglement-based secret-sharing protocol with 87% secret-sharing fidelity, limited by the purity of the entangled state produced by our present apparatus. We demonstrate a photon-number splitting eavesdropping attack, which achieves no success against the entanglement-based protocol while showing the predicted rate of success against a correlation-based protocol.« less

  18. Megahertz-Rate Semi-Device-Independent Quantum Random Number Generators Based on Unambiguous State Discrimination

    NASA Astrophysics Data System (ADS)

    Brask, Jonatan Bohr; Martin, Anthony; Esposito, William; Houlmann, Raphael; Bowles, Joseph; Zbinden, Hugo; Brunner, Nicolas

    2017-05-01

    An approach to quantum random number generation based on unambiguous quantum state discrimination is developed. We consider a prepare-and-measure protocol, where two nonorthogonal quantum states can be prepared, and a measurement device aims at unambiguously discriminating between them. Because the states are nonorthogonal, this necessarily leads to a minimal rate of inconclusive events whose occurrence must be genuinely random and which provide the randomness source that we exploit. Our protocol is semi-device-independent in the sense that the output entropy can be lower bounded based on experimental data and a few general assumptions about the setup alone. It is also practically relevant, which we demonstrate by realizing a simple optical implementation, achieving rates of 16.5 Mbits /s . Combining ease of implementation, a high rate, and a real-time entropy estimation, our protocol represents a promising approach intermediate between fully device-independent protocols and commercial quantum random number generators.

  19. A Concurrent Multiple Negotiation Protocol Based on Colored Petri Nets.

    PubMed

    Niu, Lei; Ren, Fenghui; Zhang, Minjie; Bai, Quan

    2017-11-01

    Concurrent multiple negotiation (CMN) provides a mechanism for an agent to simultaneously conduct more than one negotiation. There may exist different interdependency relationships among these negotiations and these interdependency relationships can impact the outcomes of these negotiations. The outcomes of these concurrent negotiations contribute together for the agent to achieve an overall negotiation goal. Handling a CMN while considering interdependency relationships among multiple negotiations is a challenging research problem. This paper: 1) comprehensively highlights research problems of negotiations at concurrent negotiation level; 2) provides a graph-based CMN model with consideration of the interdependency relationships; and 3) proposes a colored Petri net-based negotiation protocol for conducting CMNs. With the proposed protocol, a CMN can be efficiently and concurrently processed and negotiation agreements can be efficiently achieved. Experimental results indicate the effectiveness and efficiency of the proposed protocol in terms of the negotiation success rate, the negotiation time and the negotiation outcome.

  20. A new rapid kindling variant for induction of cortical epileptogenesis in freely moving rats

    PubMed Central

    Morales, Juan Carlos; Álvarez-Ferradas, Carla; Roncagliolo, Manuel; Fuenzalida, Marco; Wellmann, Mario; Nualart, Francisco Javier; Bonansco, Christian

    2014-01-01

    Kindling, one of the most used models of experimental epilepsy is based on daily electrical stimulation in several brain structures. Unlike the classic or slow kindling protocols (SK), the rapid kindling types (RK) described until now require continuous stimulation at suprathreshold intensities applied directly to the same brain structure used for subsequent electrophysiological and immunohistochemical studies, usually the hippocampus. However, the cellular changes observed in these rapid protocols, such as astrogliosis and neuronal loss, could be due to experimental manipulation more than to epileptogenesis-related alterations. Here, we developed a new RK protocol in order to generate an improved model of temporal lobe epilepsy (TLE) which allows gradual progression of the epilepsy as well as obtaining an epileptic hippocampus, thus avoiding direct surgical manipulation and electric stimulation over this structure. This new protocol consists of basolateral amygdala (BLA) stimulation with 10 trains of biphasic pulses (10 s; 50 Hz) per day with 20 min-intervals, during 3 consecutive days, using a subconvulsive and subthreshold intensity, which guarantees tissue integrity. The progression of epileptic activity was evaluated in freely moving rats through electroencephalographic (EEG) recordings from cortex and amygdala, accompanied with synchronized video recordings. Moreover, we assessed the effectiveness of RK protocol and the establishment of epilepsy by evaluating cellular alterations of hippocampal slices from kindled rats. RK protocol induced convulsive states similar to SK protocols but in 3 days, with persistently lowered threshold to seizure induction and epileptogenic-dependent cellular changes in amygdala projection areas. We concluded that this novel RK protocol introduces a new variant of the chronic epileptogenesis models in freely moving rats, which is faster, highly reproducible and causes minimum cell damage with respect to that observed in other experimental models of epilepsy. PMID:25100948

  1. A new rapid kindling variant for induction of cortical epileptogenesis in freely moving rats.

    PubMed

    Morales, Juan Carlos; Alvarez-Ferradas, Carla; Roncagliolo, Manuel; Fuenzalida, Marco; Wellmann, Mario; Nualart, Francisco Javier; Bonansco, Christian

    2014-01-01

    Kindling, one of the most used models of experimental epilepsy is based on daily electrical stimulation in several brain structures. Unlike the classic or slow kindling protocols (SK), the rapid kindling types (RK) described until now require continuous stimulation at suprathreshold intensities applied directly to the same brain structure used for subsequent electrophysiological and immunohistochemical studies, usually the hippocampus. However, the cellular changes observed in these rapid protocols, such as astrogliosis and neuronal loss, could be due to experimental manipulation more than to epileptogenesis-related alterations. Here, we developed a new RK protocol in order to generate an improved model of temporal lobe epilepsy (TLE) which allows gradual progression of the epilepsy as well as obtaining an epileptic hippocampus, thus avoiding direct surgical manipulation and electric stimulation over this structure. This new protocol consists of basolateral amygdala (BLA) stimulation with 10 trains of biphasic pulses (10 s; 50 Hz) per day with 20 min-intervals, during 3 consecutive days, using a subconvulsive and subthreshold intensity, which guarantees tissue integrity. The progression of epileptic activity was evaluated in freely moving rats through electroencephalographic (EEG) recordings from cortex and amygdala, accompanied with synchronized video recordings. Moreover, we assessed the effectiveness of RK protocol and the establishment of epilepsy by evaluating cellular alterations of hippocampal slices from kindled rats. RK protocol induced convulsive states similar to SK protocols but in 3 days, with persistently lowered threshold to seizure induction and epileptogenic-dependent cellular changes in amygdala projection areas. We concluded that this novel RK protocol introduces a new variant of the chronic epileptogenesis models in freely moving rats, which is faster, highly reproducible and causes minimum cell damage with respect to that observed in other experimental models of epilepsy.

  2. Sympathetic Nerve Activity and Heart Rate Variability During Severe Hemorrhagic Shock in Sheep

    DTIC Science & Technology

    2007-01-01

    2000, Boebingen, Germany). 2.3. Experimental protocol After a steady nerve signal was obtained (verified visually and by auscultation ) the experimental...both visually and by auscultation . Automatic amplitude-based detection of sym- pathetic bursts was performed with WinCPRS software (Absolute Aliens Oy

  3. Assessment of three AC electroosmotic flow protocols for mixing in microfluidic channel.

    PubMed

    Chen, Jia-Kun; Weng, Chi-Neng; Yang, Ruey-Jen

    2009-05-07

    This study performs an experimental investigation into the micromixer capabilities of three different protocols of AC electroosmotic flow (AC EOF), namely capacitive charging (CC), Faradaic charging (FC) and asymmetric polarization (AP). The results reveal that the vortices generated by the FC protocol (the frequency is around 50-350 Hz) are stronger than those induced by the CC protocol (the frequency is higher than 350 Hz), and therefore provide an improved mixing effect. However, in the FC protocol, the frequency of the external AC voltage must be carefully controlled to avoid damaging electrodes as a result of Faradaic reactions. The experimental results indicate that the AP polarization effect (the applied voltage and frequency are V(1) = 1 V(pp) and V(2) = 20 V(pp)/5 kHz) induces more powerful vortices than either the CC protocol or the FC protocol, and therefore yields a better mixing performance. Two AP-based micromixers are fabricated with symmetric and asymmetric electrode configurations, respectively. The mixing indices achieved by the two devices after an elapsed time of 60 seconds are found to be 56.49 % and 71.77 %, respectively. This result shows that of the two devices, an asymmetric electrode configuration represents a more suitable choice for micromixer in microfluidic devices.

  4. A reconfigurable visual-programming library for real-time closed-loop cellular electrophysiology

    PubMed Central

    Biró, István; Giugliano, Michele

    2015-01-01

    Most of the software platforms for cellular electrophysiology are limited in terms of flexibility, hardware support, ease of use, or re-configuration and adaptation for non-expert users. Moreover, advanced experimental protocols requiring real-time closed-loop operation to investigate excitability, plasticity, dynamics, are largely inaccessible to users without moderate to substantial computer proficiency. Here we present an approach based on MATLAB/Simulink, exploiting the benefits of LEGO-like visual programming and configuration, combined to a small, but easily extendible library of functional software components. We provide and validate several examples, implementing conventional and more sophisticated experimental protocols such as dynamic-clamp or the combined use of intracellular and extracellular methods, involving closed-loop real-time control. The functionality of each of these examples is demonstrated with relevant experiments. These can be used as a starting point to create and support a larger variety of electrophysiological tools and methods, hopefully extending the range of default techniques and protocols currently employed in experimental labs across the world. PMID:26157385

  5. Virtual laboratories: new opportunities for collaborative water science

    NASA Astrophysics Data System (ADS)

    Ceola, Serena; Arheimer, Berit; Bloeschl, Guenter; Baratti, Emanuele; Capell, Rene; Castellarin, Attilio; Freer, Jim; Han, Dawei; Hrachowitz, Markus; Hundecha, Yeshewatesfa; Hutton, Christopher; Lindström, Goran; Montanari, Alberto; Nijzink, Remko; Parajka, Juraj; Toth, Elena; Viglione, Alberto; Wagener, Thorsten

    2015-04-01

    Reproducibility and repeatability of experiments are the fundamental prerequisites that allow researchers to validate results and share hydrological knowledge, experience and expertise in the light of global water management problems. Virtual laboratories offer new opportunities to enable these prerequisites since they allow experimenters to share data, tools and pre-defined experimental procedures (i.e. protocols). Here we present the outcomes of a first collaborative numerical experiment undertaken by five different international research groups in a virtual laboratory to address the key issues of reproducibility and repeatability. Moving from the definition of accurate and detailed experimental protocols, a rainfall-runoff model was independently applied to 15 European catchments by the research groups and model results were collectively examined through a web-based discussion. We found that a detailed modelling protocol was crucial to ensure the comparability and reproducibility of the proposed experiment across groups. Our results suggest that sharing comprehensive and precise protocols and running the experiments within a controlled environment (e.g. virtual laboratory) is as fundamental as sharing data and tools for ensuring experiment repeatability and reproducibility across the broad scientific community and thus advancing hydrology in a more coherent way.

  6. Experimental quantum fingerprinting with weak coherent pulses

    PubMed Central

    Xu, Feihu; Arrazola, Juan Miguel; Wei, Kejin; Wang, Wenyuan; Palacios-Avila, Pablo; Feng, Chen; Sajeed, Shihan; Lütkenhaus, Norbert; Lo, Hoi-Kwong

    2015-01-01

    Quantum communication holds the promise of creating disruptive technologies that will play an essential role in future communication networks. For example, the study of quantum communication complexity has shown that quantum communication allows exponential reductions in the information that must be transmitted to solve distributed computational tasks. Recently, protocols that realize this advantage using optical implementations have been proposed. Here we report a proof-of-concept experimental demonstration of a quantum fingerprinting system that is capable of transmitting less information than the best-known classical protocol. Our implementation is based on a modified version of a commercial quantum key distribution system using off-the-shelf optical components over telecom wavelengths, and is practical for messages as large as 100 Mbits, even in the presence of experimental imperfections. Our results provide a first step in the development of experimental quantum communication complexity. PMID:26515586

  7. Experimental quantum fingerprinting with weak coherent pulses.

    PubMed

    Xu, Feihu; Arrazola, Juan Miguel; Wei, Kejin; Wang, Wenyuan; Palacios-Avila, Pablo; Feng, Chen; Sajeed, Shihan; Lütkenhaus, Norbert; Lo, Hoi-Kwong

    2015-10-30

    Quantum communication holds the promise of creating disruptive technologies that will play an essential role in future communication networks. For example, the study of quantum communication complexity has shown that quantum communication allows exponential reductions in the information that must be transmitted to solve distributed computational tasks. Recently, protocols that realize this advantage using optical implementations have been proposed. Here we report a proof-of-concept experimental demonstration of a quantum fingerprinting system that is capable of transmitting less information than the best-known classical protocol. Our implementation is based on a modified version of a commercial quantum key distribution system using off-the-shelf optical components over telecom wavelengths, and is practical for messages as large as 100 Mbits, even in the presence of experimental imperfections. Our results provide a first step in the development of experimental quantum communication complexity.

  8. Experimental quantum fingerprinting with weak coherent pulses

    NASA Astrophysics Data System (ADS)

    Xu, Feihu; Arrazola, Juan Miguel; Wei, Kejin; Wang, Wenyuan; Palacios-Avila, Pablo; Feng, Chen; Sajeed, Shihan; Lütkenhaus, Norbert; Lo, Hoi-Kwong

    2015-10-01

    Quantum communication holds the promise of creating disruptive technologies that will play an essential role in future communication networks. For example, the study of quantum communication complexity has shown that quantum communication allows exponential reductions in the information that must be transmitted to solve distributed computational tasks. Recently, protocols that realize this advantage using optical implementations have been proposed. Here we report a proof-of-concept experimental demonstration of a quantum fingerprinting system that is capable of transmitting less information than the best-known classical protocol. Our implementation is based on a modified version of a commercial quantum key distribution system using off-the-shelf optical components over telecom wavelengths, and is practical for messages as large as 100 Mbits, even in the presence of experimental imperfections. Our results provide a first step in the development of experimental quantum communication complexity.

  9. Active SAmpling Protocol (ASAP) to Optimize Individual Neurocognitive Hypothesis Testing: A BCI-Inspired Dynamic Experimental Design.

    PubMed

    Sanchez, Gaëtan; Lecaignard, Françoise; Otman, Anatole; Maby, Emmanuel; Mattout, Jérémie

    2016-01-01

    The relatively young field of Brain-Computer Interfaces has promoted the use of electrophysiology and neuroimaging in real-time. In the meantime, cognitive neuroscience studies, which make extensive use of functional exploration techniques, have evolved toward model-based experiments and fine hypothesis testing protocols. Although these two developments are mostly unrelated, we argue that, brought together, they may trigger an important shift in the way experimental paradigms are being designed, which should prove fruitful to both endeavors. This change simply consists in using real-time neuroimaging in order to optimize advanced neurocognitive hypothesis testing. We refer to this new approach as the instantiation of an Active SAmpling Protocol (ASAP). As opposed to classical (static) experimental protocols, ASAP implements online model comparison, enabling the optimization of design parameters (e.g., stimuli) during the course of data acquisition. This follows the well-known principle of sequential hypothesis testing. What is radically new, however, is our ability to perform online processing of the huge amount of complex data that brain imaging techniques provide. This is all the more relevant at a time when physiological and psychological processes are beginning to be approached using more realistic, generative models which may be difficult to tease apart empirically. Based upon Bayesian inference, ASAP proposes a generic and principled way to optimize experimental design adaptively. In this perspective paper, we summarize the main steps in ASAP. Using synthetic data we illustrate its superiority in selecting the right perceptual model compared to a classical design. Finally, we briefly discuss its future potential for basic and clinical neuroscience as well as some remaining challenges.

  10. Compact Modbus TCP/IP protocol for data acquisition systems based on limited hardware resources

    NASA Astrophysics Data System (ADS)

    Bai, Q.; Jin, B.; Wang, D.; Wang, Y.; Liu, X.

    2018-04-01

    The Modbus TCP/IP has been a standard industry communication protocol and widely utilized for establishing sensor-cloud platforms on the Internet. However, numerous existing data acquisition systems built on traditional single-chip microcontrollers without sufficient resources cannot support it, because the complete Modbus TCP/IP protocol always works dependent on a full operating system which occupies abundant hardware resources. Hence, a compact Modbus TCP/IP protocol is proposed in this work to make it run efficiently and stably even on a resource-limited hardware platform. Firstly, the Modbus TCP/IP protocol stack is analyzed and the refined protocol suite is rebuilt by streamlining the typical TCP/IP suite. Then, specific implementation of every hierarchical layer is respectively presented in detail according to the protocol structure. Besides, the compact protocol is implemented in a traditional microprocessor to validate the feasibility of the scheme. Finally, the performance of the proposed scenario is assessed. The experimental results demonstrate that message packets match the frame format of Modbus TCP/IP protocol and the average bandwidth reaches to 1.15 Mbps. The compact protocol operates stably even based on a traditional microcontroller with only 4-kB RAM and 12-MHz system clock, and no communication congestion or frequent packet loss occurs.

  11. Quantum Private Comparison Protocol with Linear Optics

    NASA Astrophysics Data System (ADS)

    Luo, Qing-bin; Yang, Guo-wu; She, Kun; Li, Xiaoyu

    2016-12-01

    In this paper, we propose an innovative quantum private comparison(QPC) protocol based on partial Bell-state measurement from the view of linear optics, which enabling two parties to compare the equality of their private information with the help of a semi-honest third party. Partial Bell-state measurement has been realized by using only linear optical elements in experimental measurement-device-independent quantum key distribution(MDI-QKD) schemes, which makes us believe that our protocol can be realized in the near future. The security analysis shows that the participants will not leak their private information.

  12. Continuous-variable measurement-device-independent quantum key distribution with photon subtraction

    NASA Astrophysics Data System (ADS)

    Ma, Hong-Xin; Huang, Peng; Bai, Dong-Yun; Wang, Shi-Yu; Bao, Wan-Su; Zeng, Gui-Hua

    2018-04-01

    It has been found that non-Gaussian operations can be applied to increase and distill entanglement between Gaussian entangled states. We show the successful use of the non-Gaussian operation, in particular, photon subtraction operation, on the continuous-variable measurement-device-independent quantum key distribution (CV-MDI-QKD) protocol. The proposed method can be implemented based on existing technologies. Security analysis shows that the photon subtraction operation can remarkably increase the maximal transmission distance of the CV-MDI-QKD protocol, which precisely make up for the shortcoming of the original CV-MDI-QKD protocol, and one-photon subtraction operation has the best performance. Moreover, the proposed protocol provides a feasible method for the experimental implementation of the CV-MDI-QKD protocol.

  13. Symmetrically private information retrieval based on blind quantum computing

    NASA Astrophysics Data System (ADS)

    Sun, Zhiwei; Yu, Jianping; Wang, Ping; Xu, Lingling

    2015-05-01

    Universal blind quantum computation (UBQC) is a new secure quantum computing protocol which allows a user Alice who does not have any sophisticated quantum technology to delegate her computing to a server Bob without leaking any privacy. Using the features of UBQC, we propose a protocol to achieve symmetrically private information retrieval, which allows a quantum limited Alice to query an item from Bob with a fully fledged quantum computer; meanwhile, the privacy of both parties is preserved. The security of our protocol is based on the assumption that malicious Alice has no quantum computer, which avoids the impossibility proof of Lo. For the honest Alice, she is almost classical and only requires minimal quantum resources to carry out the proposed protocol. Therefore, she does not need any expensive laboratory which can maintain the coherence of complicated quantum experimental setups.

  14. Experimentally induced hyperchloremic and DL-lactic acidosis in calves: an attempt to study the effects of oral rehydration on acid-base status.

    PubMed

    Schwedhelm, L; Kirchner, D; Klaus, B; Bachmann, L

    2013-04-01

    Many diarrheic calves suffer from metabolic acidosis, which is commonly treated by oral rehydration therapy. Oral rehydration solutions can be prepared in water, milk, or milk replacer. Therefore, the aim of the study was to verify dietary effects of water- or milk replacer-based oral rehydration solutions on parameters of acid-base balance in calves with experimentally induced hyperchloremic and dl-lactate acidosis. In 12 calves, hyperchloremic or dl-lactate acidosis was induced by HCl or dl-lactic acid infusions according to protocols outlined in previous literature. Immediately after induction, the calves were fed with milk replacer or water- or milk replacer-based oral rehydration solutions, or remained fasting, respectively. Blood samples were taken to monitor acid-base status over an experimental period of 4h. Using the protocols, all calves revealed a manifest hyperchloremic or dl-lactate acidosis. Because of high infusion volumes, plasma volume was expanded and effects of feeding regimens on blood parameters were rare. Unexpected clinical aberrations occurred after repeated induction of dl-lactate acidosis: all calves developed a thrombophlebitis of the jugular vein, whereas HCl infusion had no effect on endothelium. Induction of acidosis via infusion is not suitable to study dietary effects. A protocol to induce acidosis and dehydration simultaneously is required to duplicate the metabolic conditions of diarrheic calves. In further investigations, attention should be focused on effects of d-lactate or its metabolites on endothelial tissue. Copyright © 2013 American Dairy Science Association. Published by Elsevier Inc. All rights reserved.

  15. A clinical pathway for the postoperative management of hypocalcemia after pediatric thyroidectomy reduces blood draws.

    PubMed

    Patel, Neha A; Bly, Randall A; Adams, Seth; Carlin, Kristen; Parikh, Sanjay R; Dahl, John P; Manning, Scott

    2018-02-01

    Postoperative calcium management is challenging following pediatric thyroidectomy given potential limitations in self-reporting symptoms and compliance with phlebotomy. A protocol was created at our tertiary children's institution utilizing intraoperative parathyroid hormone (PTH) levels to guide electrolyte management during hospitalization. The objective of this study was to determine the effect of a new thyroidectomy postoperative management protocol on two primary outcomes: (1) the number of postoperative calcium blood draws and (2) the length of hospital stay. Institutional review board approved retrospective study (2010-2016). Consecutive pediatric total thyroidectomy and completion thyroidectomy ± neck dissection cases from 1/1/2010 through 8/5/2016 at a single tertiary children's institution were retrospectively reviewed before and after initiation of a new management protocol. All cases after 2/1/2014 comprised the experimental group (post-protocol implementation). The pre-protocol control group consisted of cases prior to 2/1/2014. Multivariable linear and Poisson regression models were used to compare the control and experimental groups for outcome measure of number of calcium lab draws and hospital length of stay. 53 patients were included (n = 23, control group; n = 30 experimental group). The median age was 15 years. 41 patients (77.4%) were female. Postoperative calcium draws decreased from a mean of 5.2 to 3.6 per day post-protocol implementation (Rate Ratio = 0.70, p < .001), adjusting for covariates. The mean number of total inpatient calcium draws before protocol initiation was 13.3 (±13.20) compared to 7.2 (±4.25) in the post-protocol implementation group. Length of stay was 2.1 days in the control group and 1.8 days post-protocol implementation (p = .29). Patients who underwent concurrent neck dissection had a longer mean length of stay of 2.32 days compared to 1.66 days in those patients who did not undergo a neck dissection (p = .02). Hypocalcemia was also associated with a longer mean length of stay of 2.41 days compared to 1.60 days in patients who did not develop hypocalcemia (p < .01). The number of calcium blood draws was significantly reduced after introduction of a standardized protocol based on intraoperative PTH levels. The hospital length of stay did not change. Adoption of a standardized postoperative protocol based on intraoperative PTH levels may reduce the number of blood draws in children undergoing thyroidectomy. Copyright © 2017 Elsevier B.V. All rights reserved.

  16. Focus on Quantum Memory

    NASA Astrophysics Data System (ADS)

    Brennen, Gavin; Giacobino, Elisabeth; Simon, Christoph

    2015-05-01

    Quantum memories are essential for quantum information processing and long-distance quantum communication. The field has recently seen a lot of progress, and the present focus issue offers a glimpse of these developments, showing both experimental and theoretical results from many of the leading groups around the world. On the experimental side, it shows work on cold gases, warm vapors, rare-earth ion doped crystals and single atoms. On the theoretical side there are in-depth studies of existing memory protocols, proposals for new protocols including approaches based on quantum error correction, and proposals for new applications of quantum storage. Looking forward, we anticipate many more exciting results in this area.

  17. Cell-based quantification of biomarkers from an ultra-fast microfluidic immunofluorescent staining: application to human breast cancer cell lines

    NASA Astrophysics Data System (ADS)

    Migliozzi, D.; Nguyen, H. T.; Gijs, M. A. M.

    2018-02-01

    Immunohistochemistry (IHC) is one of the main techniques currently used in the clinics for biomarker characterization. It consists in colorimetric labeling with specific antibodies followed by microscopy analysis. The results are then used for diagnosis and therapeutic targeting. Well-known drawbacks of such protocols are their limited accuracy and precision, which prevent the clinicians from having quantitative and robust IHC results. With our work, we combined rapid microfluidic immunofluorescent staining with efficient image-based cell segmentation and signal quantification to increase the robustness of both experimental and analytical protocols. The experimental protocol is very simple and based on fast-fluidic-exchange in a microfluidic chamber created on top of the formalin-fixed-paraffin-embedded (FFPE) slide by clamping it a silicon chip with a polydimethyl siloxane (PDMS) sealing ring. The image-processing protocol is based on enhancement and subsequent thresholding of the local contrast of the obtained fluorescence image. As a case study, given that the human epidermal growth factor receptor 2 (HER2) protein is often used as a biomarker for breast cancer, we applied our method to HER2+ and HER2- cell lines. We report very fast (5 minutes) immunofluorescence staining of both HER2 and cytokeratin (a marker used to define the tumor region) on FFPE slides. The image-processing program can segment cells correctly and give a cell-based quantitative immunofluorescent signal. With this method, we found a reproducible well-defined separation for the HER2-to-cytokeratin ratio for positive and negative control samples.

  18. Continuous-variable quantum key distribution based on a plug-and-play dual-phase-modulated coherent-states protocol

    NASA Astrophysics Data System (ADS)

    Huang, Duan; Huang, Peng; Wang, Tao; Li, Huasheng; Zhou, Yingming; Zeng, Guihua

    2016-09-01

    We propose and experimentally demonstrate a continuous-variable quantum key distribution (CV-QKD) protocol using dual-phase-modulated coherent states. We show that the modulation scheme of our protocol works equivalently to that of the Gaussian-modulated coherent-states (GMCS) protocol, but shows better experimental feasibility in the plug-and-play configuration. Besides, it waives the necessity of propagation of a local oscillator (LO) between legitimate users and generates a real local LO for quantum measurement. Our protocol is proposed independent of the one-way GMCS QKD without sending a LO [Opt. Lett. 40, 3695 (2015), 10.1364/OL.40.003695; Phys. Rev. X 5, 041009 (2015), 10.1103/PhysRevX.5.041009; Phys. Rev. X 5, 041010 (2015), 10.1103/PhysRevX.5.041010]. In those recent works, the system stability will suffer the impact of polarization drifts induced by environmental perturbations, and two independent frequency-locked laser sources are necessary to achieve reliable coherent detection. In the proposed protocol, these previous problems can be resolved. We derive the security bounds for our protocol against collective attacks, and we also perform a proof-of-principle experiment to confirm the utility of our proposal in real-life applications. Such an efficient scheme provides a way of removing the security loopholes associated with the transmitting LO, which have been a notoriously hard problem in continuous-variable quantum communication.

  19. Protocol for Cohesionless Sample Preparation for Physical Experimentation

    DTIC Science & Technology

    2016-05-01

    protocol for specimen preparation that will enable the use of soil strength curves based on expedient field classification testing (e.g., grain-size...void ratio and relative compaction, which compares field compaction to a laboratory maximum density. Gradation charts for the two materials used in...the failure stress. Ring shear testing was performed using the GCTS Residual-Ring Shear System SRS-150 in order to measure the peak torsional

  20. FDA approved drugs complexed to their targets: evaluating pose prediction accuracy of docking protocols.

    PubMed

    Bohari, Mohammed H; Sastry, G Narahari

    2012-09-01

    Efficient drug discovery programs can be designed by utilizing existing pools of knowledge from the already approved drugs. This can be achieved in one way by repositioning of drugs approved for some indications to newer indications. Complex of drug to its target gives fundamental insight into molecular recognition and a clear understanding of putative binding site. Five popular docking protocols, Glide, Gold, FlexX, Cdocker and LigandFit have been evaluated on a dataset of 199 FDA approved drug-target complexes for their accuracy in predicting the experimental pose. Performance for all the protocols is assessed at default settings, with root mean square deviation (RMSD) between the experimental ligand pose and the docked pose of less than 2.0 Å as the success criteria in predicting the pose. Glide (38.7 %) is found to be the most accurate in top ranked pose and Cdocker (58.8 %) in top RMSD pose. Ligand flexibility is a major bottleneck in failure of docking protocols to correctly predict the pose. Resolution of the crystal structure shows an inverse relationship with the performance of docking protocol. All the protocols perform optimally when a balanced type of hydrophilic and hydrophobic interaction or dominant hydrophilic interaction exists. Overall in 16 different target classes, hydrophobic interactions dominate in the binding site and maximum success is achieved for all the docking protocols in nuclear hormone receptor class while performance for the rest of the classes varied based on individual protocol.

  1. Secure Publish-Subscribe Protocols for Heterogeneous Medical Wireless Body Area Networks

    PubMed Central

    Picazo-Sanchez, Pablo; Tapiador, Juan E.; Peris-Lopez, Pedro; Suarez-Tangil, Guillermo

    2014-01-01

    Security and privacy issues in medical wireless body area networks (WBANs) constitute a major unsolved concern because of the challenges posed by the scarcity of resources in WBAN devices and the usability restrictions imposed by the healthcare domain. In this paper, we describe a WBAN architecture based on the well-known publish-subscribe paradigm. We present two protocols for publishing data and sending commands to a sensor that guarantee confidentiality and fine-grained access control. Both protocols are based on a recently proposed ciphertext policy attribute-based encryption (CP-ABE) scheme that is lightweight enough to be embedded into wearable sensors. We show how sensors can implement lattice-based access control (LBAC) policies using this scheme, which are highly appropriate for the eHealth domain. We report experimental results with a prototype implementation demonstrating the suitability of our proposed solution. PMID:25460814

  2. Performance of a docking/molecular dynamics protocol for virtual screening of nutlin-class inhibitors of Mdmx.

    PubMed

    Bharatham, Nagakumar; Finch, Kristin E; Min, Jaeki; Mayasundari, Anand; Dyer, Michael A; Guy, R Kiplin; Bashford, Donald

    2017-06-01

    A virtual screening protocol involving docking and molecular dynamics has been tested against the results of fluorescence polarization assays testing the potency of a series of compounds of the nutlin class for inhibition of the interaction between p53 and Mdmx, an interaction identified as a driver of certain cancers. The protocol uses a standard docking method (AutoDock) with a cutoff based on the AutoDock score (ADscore), followed by molecular dynamics simulation with a cutoff based on root-mean-square-deviation (RMSD) from the docked pose. An analysis of the experimental and computational results shows modest performance of ADscore alone, but dramatically improved performance when RMSD is also used. Published by Elsevier Inc.

  3. Continuous variable quantum key distribution with modulated entangled states.

    PubMed

    Madsen, Lars S; Usenko, Vladyslav C; Lassen, Mikael; Filip, Radim; Andersen, Ulrik L

    2012-01-01

    Quantum key distribution enables two remote parties to grow a shared key, which they can use for unconditionally secure communication over a certain distance. The maximal distance depends on the loss and the excess noise of the connecting quantum channel. Several quantum key distribution schemes based on coherent states and continuous variable measurements are resilient to high loss in the channel, but are strongly affected by small amounts of channel excess noise. Here we propose and experimentally address a continuous variable quantum key distribution protocol that uses modulated fragile entangled states of light to greatly enhance the robustness to channel noise. We experimentally demonstrate that the resulting quantum key distribution protocol can tolerate more noise than the benchmark set by the ideal continuous variable coherent state protocol. Our scheme represents a very promising avenue for extending the distance for which secure communication is possible.

  4. Secret Key Generation via a Modified Quantum Secret Sharing Protocol

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Smith IV, Amos M; Evans, Philip G; Lawrie, Benjamin J

    We present and experimentally show a novel protocol for distributing secret information between two and only two parties in a N-party single-qubit Quantum Secret Sharing (QSS) system. We demonstrate this new algorithm with N = 3 active parties over 6km of telecom. ber. Our experimental device is based on the Clavis2 Quantum Key Distribution (QKD) system built by ID Quantique but is generalizable to any implementation. We show that any two out of the N parties can build secret keys based on partial information from each other and with collaboration from the remaining N > 2 parties. This algorithm allowsmore » for the creation of two-party secret keys were standard QSS does not and signicantly reduces the number of resources needed to implement QKD on a highly connected network such as the electrical grid.« less

  5. Practical device-independent quantum cryptography via entropy accumulation.

    PubMed

    Arnon-Friedman, Rotem; Dupuis, Frédéric; Fawzi, Omar; Renner, Renato; Vidick, Thomas

    2018-01-31

    Device-independent cryptography goes beyond conventional quantum cryptography by providing security that holds independently of the quality of the underlying physical devices. Device-independent protocols are based on the quantum phenomena of non-locality and the violation of Bell inequalities. This high level of security could so far only be established under conditions which are not achievable experimentally. Here we present a property of entropy, termed "entropy accumulation", which asserts that the total amount of entropy of a large system is the sum of its parts. We use this property to prove the security of cryptographic protocols, including device-independent quantum key distribution, while achieving essentially optimal parameters. Recent experimental progress, which enabled loophole-free Bell tests, suggests that the achieved parameters are technologically accessible. Our work hence provides the theoretical groundwork for experimental demonstrations of device-independent cryptography.

  6. A Gossip-based Energy Efficient Protocol for Robust In-network Aggregation in Wireless Sensor Networks

    NASA Astrophysics Data System (ADS)

    Fauji, Shantanu

    We consider the problem of energy efficient and fault tolerant in--network aggregation for wireless sensor networks (WSNs). In-network aggregation is the process of aggregation while collecting data from sensors to the base station. This process should be energy efficient due to the limited energy at the sensors and tolerant to the high failure rates common in sensor networks. Tree based in--network aggregation protocols, although energy efficient, are not robust to network failures. Multipath routing protocols are robust to failures to a certain degree but are not energy efficient due to the overhead in the maintenance of multiple paths. We propose a new protocol for in-network aggregation in WSNs, which is energy efficient, achieves high lifetime, and is robust to the changes in the network topology. Our protocol, gossip--based protocol for in-network aggregation (GPIA) is based on the spreading of information via gossip. GPIA is not only adaptive to failures and changes in the network topology, but is also energy efficient. Energy efficiency of GPIA comes from all the nodes being capable of selective message reception and detecting convergence of the aggregation early. We experimentally show that GPIA provides significant improvement over some other competitors like the Ridesharing, Synopsis Diffusion and the pure version of gossip. GPIA shows ten fold, five fold and two fold improvement over the pure gossip, the synopsis diffusion and Ridesharing protocols in terms of network lifetime, respectively. Further, GPIA retains gossip's robustness to failures and improves upon the accuracy of synopsis diffusion and Ridesharing.

  7. A shorter and more specific oral sensitization-based experimental model of food allergy in mice.

    PubMed

    Bailón, Elvira; Cueto-Sola, Margarita; Utrilla, Pilar; Rodríguez-Ruiz, Judith; Garrido-Mesa, Natividad; Zarzuelo, Antonio; Xaus, Jordi; Gálvez, Julio; Comalada, Mònica

    2012-07-31

    Cow's milk protein allergy (CMPA) is one of the most prevalent human food-borne allergies, particularly in children. Experimental animal models have become critical tools with which to perform research on new therapeutic approaches and on the molecular mechanisms involved. However, oral food allergen sensitization in mice requires several weeks and is usually associated with unspecific immune responses. To overcome these inconveniences, we have developed a new food allergy model that takes only two weeks while retaining the main characters of allergic response to food antigens. The new model is characterized by oral sensitization of weaned Balb/c mice with 5 doses of purified cow's milk protein (CMP) plus cholera toxin (CT) for only two weeks and posterior challenge with an intraperitoneal administration of the allergen at the end of the sensitization period. In parallel, we studied a conventional protocol that lasts for seven weeks, and also the non-specific effects exerted by CT in both protocols. The shorter protocol achieves a similar clinical score as the original food allergy model without macroscopically affecting gut morphology or physiology. Moreover, the shorter protocol caused an increased IL-4 production and a more selective antigen-specific IgG1 response. Finally, the extended CT administration during the sensitization period of the conventional protocol is responsible for the exacerbated immune response observed in that model. Therefore, the new model presented here allows a reduction not only in experimental time but also in the number of animals required per experiment while maintaining the features of conventional allergy models. We propose that the new protocol reported will contribute to advancing allergy research. Copyright © 2012 Elsevier B.V. All rights reserved.

  8. Protocol for Reliability Assessment of Structural Health Monitoring Systems Incorporating Model-assisted Probability of Detection (MAPOD) Approach

    DTIC Science & Technology

    2011-09-01

    a quality evaluation with limited data, a model -based assessment must be...that affect system performance, a multistage approach to system validation, a modeling and experimental methodology for efficiently addressing a ...affect system performance, a multistage approach to system validation, a modeling and experimental methodology for efficiently addressing a wide range

  9. An efficacious oral health care protocol for immunocompromised patients.

    PubMed

    Solomon, C S; Shaikh, A B; Arendorf, T M

    1995-01-01

    A twice-weekly oral and perioral examination was provided to 120 patients receiving antineoplastic therapy. Sixty patients were monitored while following the traditional hospital oral care protocol (chlorhexidine, hydrogen peroxide, sodium bicarbonate, thymol glycol, benzocaine mouthrinse, and nystatin). The mouth care protocol was then changed (experimental protocol = chlorhexidine, benzocaine lozenges, amphotericin B lozenges), and patients were monitored until the sample size matched that of the hospital mouth care regime. There was a statistically significant reduction in oral complications upon introduction and maintenance of the experimental protocol.

  10. Translating evidence-based protocol of wound drain management for total joint arthroplasty into practice: A quasi-experimental study.

    PubMed

    Tsang, Lap Fung; Cheng, Hang Cheong; Ho, Hon Shuen; Hsu, Yung Chak; Chow, Chiu Man; Law, Heung Wah; Fong, Lup Chau; Leung, Lok Ming; Kong, Ivy Ching Yan; Chan, Chi Wai; Sham, Alice So Yuen

    2016-05-01

    Although various drains have long been used in total joint replacement, evidence suggests inconsistent practice exists in the use of drainage systems including intermittently applying suction or free of drainage suction, and variations in the optimal timing for wound drain removal. A comprehensive systematic review of available evidence up to 2013 was conducted in a previous study and a protocol was adapted for clinical application according to the summary of the retrieved information (Tsang, 2015). To determine if the protocol could reduce blood loss and blood transfusion after operation and to develop a record form so as to enhance communication of drainage record amongst surgeons and nurses. A quasi-experimental time-series design was undertaken. In the conventional group, surgeons ordered free drainage if the drain output was more than 300 ml. The time of removal of the drain was based on their professional judgement. In the protocol group the method of drainage was dependant of the drainage output as was the timing of the removal of the drain. A standardized record form was developed to guide operating room and orthopaedic ward nurses to manage the drainage system. The drain was removed significantly earlier in the protocol group. Blood loss rate at the first hour of post-operation was extremely low in the protocol group due to clamping effect. Blood loss in volume during the first three hours in the protocol group was significantly lower than that in the conventional group. Only in 11.1% and 4% of cases was it necessary to clamp at the three and four hour post-operative hours. No clamping was required at the two and eight hour postoperative period. There was no significant difference in blood loss during the removal of the drain and during blood transfusion, which was required for patients upon removal of the drain in the two groups. This is the first clinical study to develop an evidence-based protocol to manage wound drain effectively in Hong Kong. Total blood loss and blood transfusions were not significantly different between the conventional and protocol groups. A standard documentation document is beneficial to enhance communication between doctors and nurses as well as to monitor and observe drainage effectively. Copyright © 2016 Elsevier Ltd. All rights reserved.

  11. Visibility-Based Hypothesis Testing Using Higher-Order Optical Interference

    NASA Astrophysics Data System (ADS)

    Jachura, Michał; Jarzyna, Marcin; Lipka, Michał; Wasilewski, Wojciech; Banaszek, Konrad

    2018-03-01

    Many quantum information protocols rely on optical interference to compare data sets with efficiency or security unattainable by classical means. Standard implementations exploit first-order coherence between signals whose preparation requires a shared phase reference. Here, we analyze and experimentally demonstrate the binary discrimination of visibility hypotheses based on higher-order interference for optical signals with a random relative phase. This provides a robust protocol implementation primitive when a phase lock is unavailable or impractical. With the primitive cost quantified by the total detected optical energy, optimal operation is typically reached in the few-photon regime.

  12. Heralded quantum repeater based on the scattering of photons off single emitters using parametric down-conversion source.

    PubMed

    Song, Guo-Zhu; Wu, Fang-Zhou; Zhang, Mei; Yang, Guo-Jian

    2016-06-28

    Quantum repeater is the key element in quantum communication and quantum information processing. Here, we investigate the possibility of achieving a heralded quantum repeater based on the scattering of photons off single emitters in one-dimensional waveguides. We design the compact quantum circuits for nonlocal entanglement generation, entanglement swapping, and entanglement purification, and discuss the feasibility of our protocols with current experimental technology. In our scheme, we use a parametric down-conversion source instead of ideal single-photon sources to realize the heralded quantum repeater. Moreover, our protocols can turn faulty events into the detection of photon polarization, and the fidelity can reach 100% in principle. Our scheme is attractive and scalable, since it can be realized with artificial solid-state quantum systems. With developed experimental technique on controlling emitter-waveguide systems, the repeater may be very useful in long-distance quantum communication.

  13. Heralded quantum repeater based on the scattering of photons off single emitters using parametric down-conversion source

    PubMed Central

    Song, Guo-Zhu; Wu, Fang-Zhou; Zhang, Mei; Yang, Guo-Jian

    2016-01-01

    Quantum repeater is the key element in quantum communication and quantum information processing. Here, we investigate the possibility of achieving a heralded quantum repeater based on the scattering of photons off single emitters in one-dimensional waveguides. We design the compact quantum circuits for nonlocal entanglement generation, entanglement swapping, and entanglement purification, and discuss the feasibility of our protocols with current experimental technology. In our scheme, we use a parametric down-conversion source instead of ideal single-photon sources to realize the heralded quantum repeater. Moreover, our protocols can turn faulty events into the detection of photon polarization, and the fidelity can reach 100% in principle. Our scheme is attractive and scalable, since it can be realized with artificial solid-state quantum systems. With developed experimental technique on controlling emitter-waveguide systems, the repeater may be very useful in long-distance quantum communication. PMID:27350159

  14. Wet Lab Accelerator: A Web-Based Application Democratizing Laboratory Automation for Synthetic Biology.

    PubMed

    Bates, Maxwell; Berliner, Aaron J; Lachoff, Joe; Jaschke, Paul R; Groban, Eli S

    2017-01-20

    Wet Lab Accelerator (WLA) is a cloud-based tool that allows a scientist to conduct biology via robotic control without the need for any programming knowledge. A drag and drop interface provides a convenient and user-friendly method of generating biological protocols. Graphically developed protocols are turned into programmatic instruction lists required to conduct experiments at the cloud laboratory Transcriptic. Prior to the development of WLA, biologists were required to write in a programming language called "Autoprotocol" in order to work with Transcriptic. WLA relies on a new abstraction layer we call "Omniprotocol" to convert the graphical experimental description into lower level Autoprotocol language, which then directs robots at Transcriptic. While WLA has only been tested at Transcriptic, the conversion of graphically laid out experimental steps into Autoprotocol is generic, allowing extension of WLA into other cloud laboratories in the future. WLA hopes to democratize biology by bringing automation to general biologists.

  15. Experimental bit commitment based on quantum communication and special relativity.

    PubMed

    Lunghi, T; Kaniewski, J; Bussières, F; Houlmann, R; Tomamichel, M; Kent, A; Gisin, N; Wehner, S; Zbinden, H

    2013-11-01

    Bit commitment is a fundamental cryptographic primitive in which Bob wishes to commit a secret bit to Alice. Perfectly secure bit commitment between two mistrustful parties is impossible through asynchronous exchange of quantum information. Perfect security is however possible when Alice and Bob split into several agents exchanging classical and quantum information at times and locations suitably chosen to satisfy specific relativistic constraints. Here we report on an implementation of a bit commitment protocol using quantum communication and special relativity. Our protocol is based on [A. Kent, Phys. Rev. Lett. 109, 130501 (2012)] and has the advantage that it is practically feasible with arbitrary large separations between the agents in order to maximize the commitment time. By positioning agents in Geneva and Singapore, we obtain a commitment time of 15 ms. A security analysis considering experimental imperfections and finite statistics is presented.

  16. Mobile phone-based clinical guidance for rural health providers in India.

    PubMed

    Gautham, Meenakshi; Iyengar, M Sriram; Johnson, Craig W

    2015-12-01

    There are few tried and tested mobile technology applications to enhance and standardize the quality of health care by frontline rural health providers in low-resource settings. We developed a media-rich, mobile phone-based clinical guidance system for management of fevers, diarrhoeas and respiratory problems by rural health providers. Using a randomized control design, we field tested this application with 16 rural health providers and 128 patients at two rural/tribal sites in Tamil Nadu, Southern India. Protocol compliance for both groups, phone usability, acceptability and patient feedback for the experimental group were evaluated. Linear mixed-model analyses showed statistically significant improvements in protocol compliance in the experimental group. Usability and acceptability among patients and rural health providers were very high. Our results indicate that mobile phone-based, media-rich procedural guidance applications have significant potential for achieving consistently standardized quality of care by diverse frontline rural health providers, with patient acceptance. © The Author(s) 2014.

  17. Experimental extraction of secure correlations from a noisy private state.

    PubMed

    Dobek, K; Karpiński, M; Demkowicz-Dobrzański, R; Banaszek, K; Horodecki, P

    2011-01-21

    We report experimental generation of a noisy entangled four-photon state that exhibits a separation between the secure key contents and distillable entanglement, a hallmark feature of the recently established quantum theory of private states. The privacy analysis, based on the full tomographic reconstruction of the prepared state, is utilized in a proof-of-principle key generation. The inferiority of distillation-based strategies to extract the key is exposed by an implementation of an entanglement distillation protocol for the produced state.

  18. A Lightweight Protocol for Secure Video Streaming

    PubMed Central

    Morkevicius, Nerijus; Bagdonas, Kazimieras

    2018-01-01

    The Internet of Things (IoT) introduces many new challenges which cannot be solved using traditional cloud and host computing models. A new architecture known as fog computing is emerging to address these technological and security gaps. Traditional security paradigms focused on providing perimeter-based protections and client/server point to point protocols (e.g., Transport Layer Security (TLS)) are no longer the best choices for addressing new security challenges in fog computing end devices, where energy and computational resources are limited. In this paper, we present a lightweight secure streaming protocol for the fog computing “Fog Node-End Device” layer. This protocol is lightweight, connectionless, supports broadcast and multicast operations, and is able to provide data source authentication, data integrity, and confidentiality. The protocol is based on simple and energy efficient cryptographic methods, such as Hash Message Authentication Codes (HMAC) and symmetrical ciphers, and uses modified User Datagram Protocol (UDP) packets to embed authentication data into streaming data. Data redundancy could be added to improve reliability in lossy networks. The experimental results summarized in this paper confirm that the proposed method efficiently uses energy and computational resources and at the same time provides security properties on par with the Datagram TLS (DTLS) standard. PMID:29757988

  19. A Lightweight Protocol for Secure Video Streaming.

    PubMed

    Venčkauskas, Algimantas; Morkevicius, Nerijus; Bagdonas, Kazimieras; Damaševičius, Robertas; Maskeliūnas, Rytis

    2018-05-14

    The Internet of Things (IoT) introduces many new challenges which cannot be solved using traditional cloud and host computing models. A new architecture known as fog computing is emerging to address these technological and security gaps. Traditional security paradigms focused on providing perimeter-based protections and client/server point to point protocols (e.g., Transport Layer Security (TLS)) are no longer the best choices for addressing new security challenges in fog computing end devices, where energy and computational resources are limited. In this paper, we present a lightweight secure streaming protocol for the fog computing "Fog Node-End Device" layer. This protocol is lightweight, connectionless, supports broadcast and multicast operations, and is able to provide data source authentication, data integrity, and confidentiality. The protocol is based on simple and energy efficient cryptographic methods, such as Hash Message Authentication Codes (HMAC) and symmetrical ciphers, and uses modified User Datagram Protocol (UDP) packets to embed authentication data into streaming data. Data redundancy could be added to improve reliability in lossy networks. The experimental results summarized in this paper confirm that the proposed method efficiently uses energy and computational resources and at the same time provides security properties on par with the Datagram TLS (DTLS) standard.

  20. Experimental adaptive quantum tomography of two-qubit states

    NASA Astrophysics Data System (ADS)

    Struchalin, G. I.; Pogorelov, I. A.; Straupe, S. S.; Kravtsov, K. S.; Radchenko, I. V.; Kulik, S. P.

    2016-01-01

    We report an experimental realization of adaptive Bayesian quantum state tomography for two-qubit states. Our implementation is based on the adaptive experimental design strategy proposed in the work by Huszár and Houlsby [F. Huszár and N. M. T. Houlsby, Phys. Rev. A 85, 052120 (2012)., 10.1103/PhysRevA.85.052120] and provides an optimal measurement approach in terms of the information gain. We address the practical questions which one faces in any experimental application: the influence of technical noise and the behavior of the tomographic algorithm for an easy-to-implement class of factorized measurements. In an experiment with polarization states of entangled photon pairs, we observe a lower instrumental noise floor and superior reconstruction accuracy for nearly pure states of the adaptive protocol compared to a nonadaptive protocol. At the same time, we show that for the mixed states, the restriction to factorized measurements results in no advantage for adaptive measurements, so general measurements have to be used.

  1. Non-adiabatic quantum state preparation and quantum state transport in chains of Rydberg atoms

    NASA Astrophysics Data System (ADS)

    Ostmann, Maike; Minář, Jiří; Marcuzzi, Matteo; Levi, Emanuele; Lesanovsky, Igor

    2017-12-01

    Motivated by recent progress in the experimental manipulation of cold atoms in optical lattices, we study three different protocols for non-adiabatic quantum state preparation and state transport in chains of Rydberg atoms. The protocols we discuss are based on the blockade mechanism between atoms which, when excited to a Rydberg state, interact through a van der Waals potential, and rely on single-site addressing. Specifically, we discuss protocols for efficient creation of an antiferromagnetic GHZ state, a class of matrix product states including a so-called Rydberg crystal and for the state transport of a single-qubit quantum state between two ends of a chain of atoms. We identify system parameters allowing for the operation of the protocols on timescales shorter than the lifetime of the Rydberg states while yielding high fidelity output states. We discuss the effect of positional disorder on the resulting states and comment on limitations due to other sources of noise such as radiative decay of the Rydberg states. The proposed protocols provide a testbed for benchmarking the performance of quantum information processing platforms based on Rydberg atoms.

  2. How to customize a bona fide psychotherapy for generalized anxiety disorder? A two-arms, patient blinded, ABAB crossed-therapist randomized clinical implementation trial design [IMPLEMENT 2.0].

    PubMed

    Flückiger, Christoph; Wolfer, Christine; Held, Judith; Hilpert, Peter; Rubel, Julian; Allemand, Mathias; Zinbarg, Richard E; Vîslă, Andreea

    2018-04-03

    Bona fide psychotherapy approaches are effective treatments for generalized anxiety disorder (GAD) compared to no-treatment conditions. Treatment manuals and protocols allow a relatively high degree of freedom for the way therapists implement these overall treatment packages and there is a systematic lack of knowledge on how therapists should customize these treatments. The present study experimentally examines two implementation strategies of customizing a bona fide psychotherapy approach based on a 16 session time-limited cognitive-behavioral therapy (CBT) protocol and their relation to the post-session and ultimate treatment outcomes. This trial contrasts two different implementation strategies of how to customize the in-session structure of a manual-based CBT-protocol for GAD. The patients will be randomly assigned to two implementation conditions: (1) a systematic focus on subtle changes lasting from 7 to 20 min at the check-in phase of every psychotherapy session and (2) a state-of-the-art (SOTA) check-in phase lasting several minutes mainly focused on the session goals. Potential therapist effects will be examined based on an ABAB crossed-therapist design. Treatment outcomes will be assessed at the following times: post-session outcomes, treatment outcome at post assessment and 6- as well as 12-month follow-up. The proposed randomized clinical implementation trial addresses the clinically relevant question of how to customize a bona fide psychotherapy protocol experimentally contrasting two implementation strategies. Through the development and testing of the proposed implementation design, this trial has the potential to inform therapists about efficacious implementation strategies of how to customize a manual-based treatment protocol in respect to the timing of the in-session structure. This trial was registered at ClinicalTrials.gov ( NCT03079336 ) at March 14, 2017.

  3. Collective attacks and unconditional security in continuous variable quantum key distribution.

    PubMed

    Grosshans, Frédéric

    2005-01-21

    We present here an information theoretic study of Gaussian collective attacks on the continuous variable key distribution protocols based on Gaussian modulation of coherent states. These attacks, overlooked in previous security studies, give a finite advantage to the eavesdropper in the experimentally relevant lossy channel, but are not powerful enough to reduce the range of the reverse reconciliation protocols. Secret key rates are given for the ideal case where Bob performs optimal collective measurements, as well as for the realistic cases where he performs homodyne or heterodyne measurements. We also apply the generic security proof of Christiandl et al. to obtain unconditionally secure rates for these protocols.

  4. REFOLDdb: a new and sustainable gateway to experimental protocols for protein refolding.

    PubMed

    Mizutani, Hisashi; Sugawara, Hideaki; Buckle, Ashley M; Sangawa, Takeshi; Miyazono, Ken-Ichi; Ohtsuka, Jun; Nagata, Koji; Shojima, Tomoki; Nosaki, Shohei; Xu, Yuqun; Wang, Delong; Hu, Xiao; Tanokura, Masaru; Yura, Kei

    2017-04-24

    More than 7000 papers related to "protein refolding" have been published to date, with approximately 300 reports each year during the last decade. Whilst some of these papers provide experimental protocols for protein refolding, a survey in the structural life science communities showed a necessity for a comprehensive database for refolding techniques. We therefore have developed a new resource - "REFOLDdb" that collects refolding techniques into a single, searchable repository to help researchers develop refolding protocols for proteins of interest. We based our resource on the existing REFOLD database, which has not been updated since 2009. We redesigned the data format to be more concise, allowing consistent representations among data entries compared with the original REFOLD database. The remodeled data architecture enhances the search efficiency and improves the sustainability of the database. After an exhaustive literature search we added experimental refolding protocols from reports published 2009 to early 2017. In addition to this new data, we fully converted and integrated existing REFOLD data into our new resource. REFOLDdb contains 1877 entries as of March 17 th , 2017, and is freely available at http://p4d-info.nig.ac.jp/refolddb/ . REFOLDdb is a unique database for the life sciences research community, providing annotated information for designing new refolding protocols and customizing existing methodologies. We envisage that this resource will find wide utility across broad disciplines that rely on the production of pure, active, recombinant proteins. Furthermore, the database also provides a useful overview of the recent trends and statistics in refolding technology development.

  5. Experimental purification of single qubits.

    PubMed

    Ricci, M; De Martini, F; Cerf, N J; Filip, R; Fiurásek, J; Macchiavello, C

    2004-10-22

    We report the experimental realization of the purification protocol for single qubits sent through a depolarizing channel. The qubits are associated with polarization states of single photons and the protocol is achieved by means of passive linear optical elements. The present approach may represent a convenient alternative to the distillation and error correction protocols of quantum information.

  6. Experimental investigation of practical unforgeable quantum money

    NASA Astrophysics Data System (ADS)

    Bozzio, Mathieu; Orieux, Adeline; Trigo Vidarte, Luis; Zaquine, Isabelle; Kerenidis, Iordanis; Diamanti, Eleni

    2018-01-01

    Wiesner's unforgeable quantum money scheme is widely celebrated as the first quantum information application. Based on the no-cloning property of quantum mechanics, this scheme allows for the creation of credit cards used in authenticated transactions offering security guarantees impossible to achieve by classical means. However, despite its central role in quantum cryptography, its experimental implementation has remained elusive because of the lack of quantum memories and of practical verification techniques. Here, we experimentally implement a quantum money protocol relying on classical verification that rigorously satisfies the security condition for unforgeability. Our system exploits polarization encoding of weak coherent states of light and operates under conditions that ensure compatibility with state-of-the-art quantum memories. We derive working regimes for our system using a security analysis taking into account all practical imperfections. Our results constitute a major step towards a real-world realization of this milestone protocol.

  7. A sorting system with automated gates permits individual operant experiments with mice from a social home cage.

    PubMed

    Winter, York; Schaefers, Andrea T U

    2011-03-30

    Behavioral experiments based on operant procedures can be time-consuming for small amounts of data. While individual testing and handling of animals can influence attention, emotion, and behavior, and interfere with experimental outcome, many operant protocols require individual testing. We developed an RFID-technology- and transponder-based sorting system that allows removing the human factor for longer-term experiments. Identity detectors and automated gates route mice individually from their social home cage to an adjacent operant compartment with 24/7 operation. CD1-mice learnt quickly to individually pass through the sorting system. At no time did more than a single mouse enter the operant compartment. After 3 days of adjusting to the sorting system, groups of 4 mice completed about 50 experimental trials per day in the operant compartment without experimenter intervention. The automated sorting system eliminates handling, isolation, and disturbance of the animals, eliminates experimenter-induced variability, saves experimenter time, and is financially economical. It makes possible a new approach for high-throughput experimentation, and is a viable tool for increasing quality and efficiency of many behavioral and neurobiological investigations. It can connect a social home cage, through individual sorting automation, to diverse setups including classical operant chambers, mazes, or arenas with video-based behavior classification. Such highly automated systems will permit efficient high-throughput screening even for transgenic animals with only subtle neurological or psychiatric symptoms where elaborate or longer-term protocols are required for behavioral diagnosis. Copyright © 2011 Elsevier B.V. All rights reserved.

  8. An Integrated In Silico Method to Discover Novel Rock1 Inhibitors: Multi- Complex-Based Pharmacophore, Molecular Dynamics Simulation and Hybrid Protocol Virtual Screening.

    PubMed

    Chen, Haining; Li, Sijia; Hu, Yajiao; Chen, Guo; Jiang, Qinglin; Tong, Rongsheng; Zang, Zhihe; Cai, Lulu

    2016-01-01

    Rho-associated, coiled-coil containing protein kinase 1 (ROCK1) is an important regulator of focal adhesion, actomyosin contraction and cell motility. In this manuscript, a combination of the multi-complex-based pharmacophore (MCBP), molecular dynamics simulation and a hybrid protocol of a virtual screening method, comprised of multipharmacophore- based virtual screening (PBVS) and ensemble docking-based virtual screening (DBVS) methods were used for retrieving novel ROCK1 inhibitors from the natural products database embedded in the ZINC database. Ten hit compounds were selected from the hit compounds, and five compounds were tested experimentally. Thus, these results may provide valuable information for further discovery of more novel ROCK1 inhibitors.

  9. [Pharmacogenomics in neuro-oncology].

    PubMed

    Riese-Jorda, H H; Baez, J M

    Chemotherapy protocols for treatment of brain tumors use toxic molecules for killing cancer cells in a similar way that protocols for treating other cancers. Therefore, secondary effects and poor response are the major handicaps. Technological developments based on pharmacogenomics and pharmacoproteomics will predict response and toxicity giving rise to a personalized medicine. However, there are only few studies that correlate chemotherapeutical molecules for brain tumor treatment and prediction of response and toxicity. The development of new technologies based on high-density microarrays allows the progressive identification of genes whose presence will predict the efficacy of therapeutic protocols. Once identified, specific equipments based on low-density arrays will detect exclusively in an easy and fast way the presence of genes in order to predict patient's response and avoid toxicity. Other more sophisticated techniques at present still at an experimental step based on proteomics as MALDI (Matrix-Assisted Laser Desorption Ionization) and SELDI (Surface-Enhanced Laser Desorption Ionization) will allow the identification of proteins that could predict response and toxicity.

  10. On the vulnerability of basic quantum key distribution protocols and three protocols stable to attack with 'blinding' of avalanche photodetectors

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Molotkov, S. N., E-mail: sergei.molotkov@gmail.com

    2012-05-15

    The fundamental quantum mechanics prohibitions on the measurability of quantum states allow secure key distribution between spatially remote users to be performed. Experimental and commercial implementations of quantum cryptography systems, however, use components that exist at the current technology level, in particular, one-photon avalanche photodetectors. These detectors are subject to the blinding effect. It was shown that all the known basic quantum key distribution protocols and systems based on them are vulnerable to attacks with blinding of photodetectors. In such attacks, an eavesdropper knows all the key transferred, does not produce errors at the reception side, and remains undetected. Threemore » protocols of quantum key distribution stable toward such attacks are suggested. The security of keys and detection of eavesdropping attempts are guaranteed by the internal structure of protocols themselves rather than additional technical improvements.« less

  11. Noninvasive measurement of dynamic correlation functions

    NASA Astrophysics Data System (ADS)

    Uhrich, Philipp; Castrignano, Salvatore; Uys, Hermann; Kastner, Michael

    2017-08-01

    The measurement of dynamic correlation functions of quantum systems is complicated by measurement backaction. To facilitate such measurements we introduce a protocol, based on weak ancilla-system couplings, that is applicable to arbitrary (pseudo)spin systems and arbitrary equilibrium or nonequilibrium initial states. Different choices of the coupling operator give access to the real and imaginary parts of the dynamic correlation function. This protocol reduces disturbances due to the early-time measurements to a minimum, and we quantify the deviation of the measured correlation functions from the theoretical, unitarily evolved ones. Implementations of the protocol in trapped ions and other experimental platforms are discussed. For spin-1 /2 models and single-site observables we prove that measurement backaction can be avoided altogether, allowing for the use of ancilla-free protocols.

  12. No information flow using statistical fluctuations and quantum cryptography

    NASA Astrophysics Data System (ADS)

    Larsson, Jan-Åke

    2004-04-01

    The communication protocol of Home and Whitaker [

    Phys. Rev. A 67, 022306 (2003)
    ] is examined in some detail, and found to work equally well using a separable state. The protocol is in fact completely classical, based on postselection of suitable experimental runs. The quantum-cryptography protocol proposed in the same publication is also examined, and this protocol uses entanglement, a strictly quantum property of the system. An individual eavesdropping attack on each qubit pair would be detected by the security test proposed in the mentioned paper. However, the key is provided by groups of qubits, and there exists a coherent attack, internal to these groups, that will go unnoticed in that security test. A modified test is proposed here that will ensure security, even against such a coherent attack.

  13. Multivariate Analysis of High Through-Put Adhesively Bonded Single Lap Joints: Experimental and Workflow Protocols

    DTIC Science & Technology

    2016-06-01

    unlimited. v List of Tables Table 1 Single-lap-joint experimental parameters ..............................................7 Table 2 Survey ...Joints: Experimental and Workflow Protocols by Robert E Jensen, Daniel C DeSchepper, and David P Flanagan Approved for...TR-7696 ● JUNE 2016 US Army Research Laboratory Multivariate Analysis of High Through-Put Adhesively Bonded Single Lap Joints: Experimental

  14. An approach to standardization of urine sediment analysis via suggestion of a common manual protocol.

    PubMed

    Ko, Dae-Hyun; Ji, Misuk; Kim, Sollip; Cho, Eun-Jung; Lee, Woochang; Yun, Yeo-Min; Chun, Sail; Min, Won-Ki

    2016-01-01

    The results of urine sediment analysis have been reported semiquantitatively. However, as recent guidelines recommend quantitative reporting of urine sediment, and with the development of automated urine sediment analyzers, there is an increasing need for quantitative analysis of urine sediment. Here, we developed a protocol for urine sediment analysis and quantified the results. Based on questionnaires, various reports, guidelines, and experimental results, we developed a protocol for urine sediment analysis. The results of this new protocol were compared with those obtained with a standardized chamber and an automated sediment analyzer. Reference intervals were also estimated using new protocol. We developed a protocol with centrifugation at 400 g for 5 min, with the average concentration factor of 30. The correlation between quantitative results of urine sediment analysis, the standardized chamber, and the automated sediment analyzer were generally good. The conversion factor derived from the new protocol showed a better fit with the results of manual count than the default conversion factor in the automated sediment analyzer. We developed a protocol for manual urine sediment analysis to quantitatively report the results. This protocol may provide a mean for standardization of urine sediment analysis.

  15. Artificial neuron operations and spike-timing-dependent plasticity using memristive devices for brain-inspired computing

    NASA Astrophysics Data System (ADS)

    Marukame, Takao; Nishi, Yoshifumi; Yasuda, Shin-ichi; Tanamoto, Tetsufumi

    2018-04-01

    The use of memristive devices for creating artificial neurons is promising for brain-inspired computing from the viewpoints of computation architecture and learning protocol. We present an energy-efficient multiplier accumulator based on a memristive array architecture incorporating both analog and digital circuitries. The analog circuitry is used to full advantage for neural networks, as demonstrated by the spike-timing-dependent plasticity (STDP) in fabricated AlO x /TiO x -based metal-oxide memristive devices. STDP protocols for controlling periodic analog resistance with long-range stability were experimentally verified using a variety of voltage amplitudes and spike timings.

  16. Stochastic Characterization of Communication Network Latency for Wide Area Grid Control Applications.

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Ameme, Dan Selorm Kwami; Guttromson, Ross

    This report characterizes communications network latency under various network topologies and qualities of service (QoS). The characterizations are probabilistic in nature, allowing deeper analysis of stability for Internet Protocol (IP) based feedback control systems used in grid applications. The work involves the use of Raspberry Pi computers as a proxy for a controlled resource, and an ns-3 network simulator on a Linux server to create an experimental platform (testbed) that can be used to model wide-area grid control network communications in smart grid. Modbus protocol is used for information transport, and Routing Information Protocol is used for dynamic route selectionmore » within the simulated network.« less

  17. A Generic Communication Protocol for Remote Laboratories: an Implementation on e-lab

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Henriques, Rafael B.; Fernandes, H.; Duarte, Andre S.

    2015-07-01

    The remote laboratories at IST (Instituto Superior Tecnico), e-lab, serve as a valuable tool for education and training based on remote control technologies. Due to the high number and increase of remotely operated experiments a generic protocol was developed to perform the communication between the software driver and the respective experimental setup in an easier and more unified way. The training in these fields of students and personnel can take advantage of such infrastructure with the purpose of deploying new experiments in a faster way. More than 10 experiments using the generic protocol are available on-line in a 24 xmore » 7 way. (authors)« less

  18. Mutation-Based Learning to Improve Student Autonomy and Scientific Inquiry Skills in a Large Genetics Laboratory Course

    ERIC Educational Resources Information Center

    Wu, Jinlu

    2013-01-01

    Laboratory education can play a vital role in developing a learner's autonomy and scientific inquiry skills. In an innovative, mutation-based learning (MBL) approach, students were instructed to redesign a teacher-designed standard experimental protocol by a "mutation" method in a molecular genetics laboratory course. Students could…

  19. Automatic CT simulation optimization for radiation therapy: A general strategy.

    PubMed

    Li, Hua; Yu, Lifeng; Anastasio, Mark A; Chen, Hsin-Chen; Tan, Jun; Gay, Hiram; Michalski, Jeff M; Low, Daniel A; Mutic, Sasa

    2014-03-01

    In radiation therapy, x-ray computed tomography (CT) simulation protocol specifications should be driven by the treatment planning requirements in lieu of duplicating diagnostic CT screening protocols. The purpose of this study was to develop a general strategy that allows for automatically, prospectively, and objectively determining the optimal patient-specific CT simulation protocols based on radiation-therapy goals, namely, maintenance of contouring quality and integrity while minimizing patient CT simulation dose. The authors proposed a general prediction strategy that provides automatic optimal CT simulation protocol selection as a function of patient size and treatment planning task. The optimal protocol is the one that delivers the minimum dose required to provide a CT simulation scan that yields accurate contours. Accurate treatment plans depend on accurate contours in order to conform the dose to actual tumor and normal organ positions. An image quality index, defined to characterize how simulation scan quality affects contour delineation, was developed and used to benchmark the contouring accuracy and treatment plan quality within the predication strategy. A clinical workflow was developed to select the optimal CT simulation protocols incorporating patient size, target delineation, and radiation dose efficiency. An experimental study using an anthropomorphic pelvis phantom with added-bolus layers was used to demonstrate how the proposed prediction strategy could be implemented and how the optimal CT simulation protocols could be selected for prostate cancer patients based on patient size and treatment planning task. Clinical IMRT prostate treatment plans for seven CT scans with varied image quality indices were separately optimized and compared to verify the trace of target and organ dosimetry coverage. Based on the phantom study, the optimal image quality index for accurate manual prostate contouring was 4.4. The optimal tube potentials for patient sizes of 38, 43, 48, 53, and 58 cm were 120, 140, 140, 140, and 140 kVp, respectively, and the corresponding minimum CTDIvol for achieving the optimal image quality index 4.4 were 9.8, 32.2, 100.9, 241.4, and 274.1 mGy, respectively. For patients with lateral sizes of 43-58 cm, 120-kVp scan protocols yielded up to 165% greater radiation dose relative to 140-kVp protocols, and 140-kVp protocols always yielded a greater image quality index compared to the same dose-level 120-kVp protocols. The trace of target and organ dosimetry coverage and the γ passing rates of seven IMRT dose distribution pairs indicated the feasibility of the proposed image quality index for the predication strategy. A general strategy to predict the optimal CT simulation protocols in a flexible and quantitative way was developed that takes into account patient size, treatment planning task, and radiation dose. The experimental study indicated that the optimal CT simulation protocol and the corresponding radiation dose varied significantly for different patient sizes, contouring accuracy, and radiation treatment planning tasks.

  20. A gossip based information fusion protocol for distributed frequent itemset mining

    NASA Astrophysics Data System (ADS)

    Sohrabi, Mohammad Karim

    2018-07-01

    The computational complexity, huge memory space requirement, and time-consuming nature of frequent pattern mining process are the most important motivations for distribution and parallelization of this mining process. On the other hand, the emergence of distributed computational and operational environments, which causes the production and maintenance of data on different distributed data sources, makes the parallelization and distribution of the knowledge discovery process inevitable. In this paper, a gossip based distributed itemset mining (GDIM) algorithm is proposed to extract frequent itemsets, which are special types of frequent patterns, in a wireless sensor network environment. In this algorithm, local frequent itemsets of each sensor are extracted using a bit-wise horizontal approach (LHPM) from the nodes which are clustered using a leach-based protocol. Heads of clusters exploit a gossip based protocol in order to communicate each other to find the patterns which their global support is equal to or more than the specified support threshold. Experimental results show that the proposed algorithm outperforms the best existing gossip based algorithm in term of execution time.

  1. E-novo: an automated workflow for efficient structure-based lead optimization.

    PubMed

    Pearce, Bradley C; Langley, David R; Kang, Jia; Huang, Hongwei; Kulkarni, Amit

    2009-07-01

    An automated E-Novo protocol designed as a structure-based lead optimization tool was prepared through Pipeline Pilot with existing CHARMm components in Discovery Studio. A scaffold core having 3D binding coordinates of interest is generated from a ligand-bound protein structural model. Ligands of interest are generated from the scaffold using an R-group fragmentation/enumeration tool within E-Novo, with their cores aligned. The ligand side chains are conformationally sampled and are subjected to core-constrained protein docking, using a modified CHARMm-based CDOCKER method to generate top poses along with CDOCKER energies. In the final stage of E-Novo, a physics-based binding energy scoring function ranks the top ligand CDOCKER poses using a more accurate Molecular Mechanics-Generalized Born with Surface Area method. Correlation of the calculated ligand binding energies with experimental binding affinities were used to validate protocol performance. Inhibitors of Src tyrosine kinase, CDK2 kinase, beta-secretase, factor Xa, HIV protease, and thrombin were used to test the protocol using published ligand crystal structure data within reasonably defined binding sites. In-house Respiratory Syncytial Virus inhibitor data were used as a more challenging test set using a hand-built binding model. Least squares fits for all data sets suggested reasonable validation of the protocol within the context of observed ligand binding poses. The E-Novo protocol provides a convenient all-in-one structure-based design process for rapid assessment and scoring of lead optimization libraries.

  2. Immunosuppression for in vivo research: state-of-the-art protocols and experimental approaches

    PubMed Central

    Diehl, Rita; Ferrara, Fabienne; Müller, Claudia; Dreyer, Antje Y; McLeod, Damian D; Fricke, Stephan; Boltze, Johannes

    2017-01-01

    Almost every experimental treatment strategy using non-autologous cell, tissue or organ transplantation is tested in small and large animal models before clinical translation. Because these strategies require immunosuppression in most cases, immunosuppressive protocols are a key element in transplantation experiments. However, standard immunosuppressive protocols are often applied without detailed knowledge regarding their efficacy within the particular experimental setting and in the chosen model species. Optimization of such protocols is pertinent to the translation of experimental results to human patients and thus warrants further investigation. This review summarizes current knowledge regarding immunosuppressive drug classes as well as their dosages and application regimens with consideration of species-specific drug metabolization and side effects. It also summarizes contemporary knowledge of novel immunomodulatory strategies, such as the use of mesenchymal stem cells or antibodies. Thus, this review is intended to serve as a state-of-the-art compendium for researchers to refine applied experimental immunosuppression and immunomodulation strategies to enhance the predictive value of preclinical transplantation studies. PMID:27721455

  3. Comparison of IPSM 1990 photon dosimetry code of practice with IAEA TRS‐398 and AAPM TG‐51.

    PubMed Central

    Henríquez, Francisco Cutanda

    2009-01-01

    Several codes of practice for photon dosimetry are currently used around the world, supported by different organizations. A comparison of IPSM 1990 with both IAEA TRS‐398 and AAPM TG‐51 has been performed. All three protocols are based on the calibration of ionization chambers in terms of standards of absorbed dose to water, as it is the case with other modern codes of practice. This comparison has been carried out for photon beams of nominal energies: 4 MV, 6 MV, 8 MV, 10 MV and 18 MV. An NE 2571 graphite ionization chamber was used in this study, cross‐calibrated against an NE 2611A Secondary Standard, calibrated in the National Physical Laboratory (NPL). Absolute dose in reference conditions was obtained using each of these three protocols including: beam quality indices, beam quality conversion factors both theoretical and NPL experimental ones, correction factors for influence quantities and absolute dose measurements. Each protocol recommendations have been strictly followed. Uncertainties have been obtained according to the ISO Guide to the Expression of Uncertainty in Measurement. Absorbed dose obtained according to all three protocols agree within experimental uncertainty. The largest difference between absolute dose results for two protocols is obtained for the highest energy: 0.7% between IPSM 1990 and IAEA TRS‐398 using theoretical beam quality conversion factors. PACS number: 87.55.tm

  4. No information flow using statistical fluctuations and quantum cryptography

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Larsson, Jan-Aake

    2004-04-01

    The communication protocol of Home and Whitaker [Phys. Rev. A 67, 022306 (2003)] is examined in some detail, and found to work equally well using a separable state. The protocol is in fact completely classical, based on postselection of suitable experimental runs. The quantum-cryptography protocol proposed in the same publication is also examined, and this protocol uses entanglement, a strictly quantum property of the system. An individual eavesdropping attack on each qubit pair would be detected by the security test proposed in the mentioned paper. However, the key is provided by groups of qubits, and there exists a coherent attack,more » internal to these groups, that will go unnoticed in that security test. A modified test is proposed here that will ensure security, even against such a coherent attack.« less

  5. Profiling optimization for big data transfer over dedicated channels

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Yun, D.; Wu, Qishi; Rao, Nageswara S

    The transfer of big data is increasingly supported by dedicated channels in high-performance networks, where transport protocols play an important role in maximizing applicationlevel throughput and link utilization. The performance of transport protocols largely depend on their control parameter settings, but it is prohibitively time consuming to conduct an exhaustive search in a large parameter space to find the best set of parameter values. We propose FastProf, a stochastic approximation-based transport profiler, to quickly determine the optimal operational zone of a given data transfer protocol/method over dedicated channels. We implement and test the proposed method using both emulations based onmore » real-life performance measurements and experiments over physical connections with short (2 ms) and long (380 ms) delays. Both the emulation and experimental results show that FastProf significantly reduces the profiling overhead while achieving a comparable level of end-to-end throughput performance with the exhaustive search-based approach.« less

  6. Quantum random oracle model for quantum digital signature

    NASA Astrophysics Data System (ADS)

    Shang, Tao; Lei, Qi; Liu, Jianwei

    2016-10-01

    The goal of this work is to provide a general security analysis tool, namely, the quantum random oracle (QRO), for facilitating the security analysis of quantum cryptographic protocols, especially protocols based on quantum one-way function. QRO is used to model quantum one-way function and different queries to QRO are used to model quantum attacks. A typical application of quantum one-way function is the quantum digital signature, whose progress has been hampered by the slow pace of the experimental realization. Alternatively, we use the QRO model to analyze the provable security of a quantum digital signature scheme and elaborate the analysis procedure. The QRO model differs from the prior quantum-accessible random oracle in that it can output quantum states as public keys and give responses to different queries. This tool can be a test bed for the cryptanalysis of more quantum cryptographic protocols based on the quantum one-way function.

  7. Everything should be as simple as possible, but no simpler: towards a protocol for accumulating evidence regarding the active content of health behaviour change interventions.

    PubMed

    Peters, Gjalt-Jorn Ygram; de Bruin, Marijn; Crutzen, Rik

    2015-01-01

    There is a need to consolidate the evidence base underlying our toolbox of methods of behaviour change. Recent efforts to this effect have conducted meta-regressions on evaluations of behaviour change interventions, deriving each method's effectiveness from its association to intervention effect size. However, there are a range of issues that raise concern about whether this approach is actually furthering or instead obstructing the advancement of health psychology theories and the quality of health behaviour change interventions. Using examples from theory, the literature and data from previous meta-analyses, these concerns and their implications are explained and illustrated. An iterative protocol for evidence base accumulation is proposed that integrates evidence derived from both experimental and applied behaviour change research, and combines theory development in experimental settings with theory testing in applied real-life settings. As evidence gathered in this manner accumulates, a cumulative science of behaviour change can develop.

  8. Everything should be as simple as possible, but no simpler: towards a protocol for accumulating evidence regarding the active content of health behaviour change interventions

    PubMed Central

    Peters, Gjalt-Jorn Ygram; de Bruin, Marijn; Crutzen, Rik

    2015-01-01

    There is a need to consolidate the evidence base underlying our toolbox of methods of behaviour change. Recent efforts to this effect have conducted meta-regressions on evaluations of behaviour change interventions, deriving each method's effectiveness from its association to intervention effect size. However, there are a range of issues that raise concern about whether this approach is actually furthering or instead obstructing the advancement of health psychology theories and the quality of health behaviour change interventions. Using examples from theory, the literature and data from previous meta-analyses, these concerns and their implications are explained and illustrated. An iterative protocol for evidence base accumulation is proposed that integrates evidence derived from both experimental and applied behaviour change research, and combines theory development in experimental settings with theory testing in applied real-life settings. As evidence gathered in this manner accumulates, a cumulative science of behaviour change can develop. PMID:25793484

  9. Sampling and measurement protocols for long-term silvicultural studies on the Penobscot Experimental Forest

    Treesearch

    Justin D. Waskiewicz; Laura S. Kenefic; Nicole S. Rogers; Joshua J. Puhlick; John C. Brissette; Richard J. Dionne

    2015-01-01

    The U.S. Forest Service, Northern Research Station has been conducting research on the silviculture of northern conifers on the Penobscot Experimental Forest (PEF) in Maine since 1950. Formal study plans provide guidance and specifications for the experimental treatments, but documentation is also needed to ensure consistency in data collection and sampling protocols....

  10. SACFIR: SDN-Based Application-Aware Centralized Adaptive Flow Iterative Reconfiguring Routing Protocol for WSNs.

    PubMed

    Aslam, Muhammad; Hu, Xiaopeng; Wang, Fan

    2017-12-13

    Smart reconfiguration of a dynamic networking environment is offered by the central control of Software-Defined Networking (SDN). Centralized SDN-based management architectures are capable of retrieving global topology intelligence and decoupling the forwarding plane from the control plane. Routing protocols developed for conventional Wireless Sensor Networks (WSNs) utilize limited iterative reconfiguration methods to optimize environmental reporting. However, the challenging networking scenarios of WSNs involve a performance overhead due to constant periodic iterative reconfigurations. In this paper, we propose the SDN-based Application-aware Centralized adaptive Flow Iterative Reconfiguring (SACFIR) routing protocol with the centralized SDN iterative solver controller to maintain the load-balancing between flow reconfigurations and flow allocation cost. The proposed SACFIR's routing protocol offers a unique iterative path-selection algorithm, which initially computes suitable clustering based on residual resources at the control layer and then implements application-aware threshold-based multi-hop report transmissions on the forwarding plane. The operation of the SACFIR algorithm is centrally supervised by the SDN controller residing at the Base Station (BS). This paper extends SACFIR to SDN-based Application-aware Main-value Centralized adaptive Flow Iterative Reconfiguring (SAMCFIR) to establish both proactive and reactive reporting. The SAMCFIR transmission phase enables sensor nodes to trigger direct transmissions for main-value reports, while in the case of SACFIR, all reports follow computed routes. Our SDN-enabled proposed models adjust the reconfiguration period according to the traffic burden on sensor nodes, which results in heterogeneity awareness, load-balancing and application-specific reconfigurations of WSNs. Extensive experimental simulation-based results show that SACFIR and SAMCFIR yield the maximum scalability, network lifetime and stability period when compared to existing routing protocols.

  11. SACFIR: SDN-Based Application-Aware Centralized Adaptive Flow Iterative Reconfiguring Routing Protocol for WSNs

    PubMed Central

    Hu, Xiaopeng; Wang, Fan

    2017-01-01

    Smart reconfiguration of a dynamic networking environment is offered by the central control of Software-Defined Networking (SDN). Centralized SDN-based management architectures are capable of retrieving global topology intelligence and decoupling the forwarding plane from the control plane. Routing protocols developed for conventional Wireless Sensor Networks (WSNs) utilize limited iterative reconfiguration methods to optimize environmental reporting. However, the challenging networking scenarios of WSNs involve a performance overhead due to constant periodic iterative reconfigurations. In this paper, we propose the SDN-based Application-aware Centralized adaptive Flow Iterative Reconfiguring (SACFIR) routing protocol with the centralized SDN iterative solver controller to maintain the load-balancing between flow reconfigurations and flow allocation cost. The proposed SACFIR’s routing protocol offers a unique iterative path-selection algorithm, which initially computes suitable clustering based on residual resources at the control layer and then implements application-aware threshold-based multi-hop report transmissions on the forwarding plane. The operation of the SACFIR algorithm is centrally supervised by the SDN controller residing at the Base Station (BS). This paper extends SACFIR to SDN-based Application-aware Main-value Centralized adaptive Flow Iterative Reconfiguring (SAMCFIR) to establish both proactive and reactive reporting. The SAMCFIR transmission phase enables sensor nodes to trigger direct transmissions for main-value reports, while in the case of SACFIR, all reports follow computed routes. Our SDN-enabled proposed models adjust the reconfiguration period according to the traffic burden on sensor nodes, which results in heterogeneity awareness, load-balancing and application-specific reconfigurations of WSNs. Extensive experimental simulation-based results show that SACFIR and SAMCFIR yield the maximum scalability, network lifetime and stability period when compared to existing routing protocols. PMID:29236031

  12. Quality control for quantitative multicenter whole-body PET/MR studies: A NEMA image quality phantom study with three current PET/MR systems

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Boellaard, Ronald, E-mail: r.boellaard@vumc.nl; European Association of Nuclear Medicine Research Ltd., Vienna 1060; European Association of Nuclear Medicine Physics Committee, Vienna 1060

    2015-10-15

    Purpose: Integrated positron emission tomography/magnetic resonance (PET/MR) systems derive the PET attenuation correction (AC) from dedicated MR sequences. While MR-AC performs reasonably well in clinical patient imaging, it may fail for phantom-based quality control (QC). The authors assess the applicability of different protocols for PET QC in multicenter PET/MR imaging. Methods: The National Electrical Manufacturers Association NU 2 2007 image quality phantom was imaged on three combined PET/MR systems: a Philips Ingenuity TF PET/MR, a Siemens Biograph mMR, and a GE SIGNA PET/MR (prototype) system. The phantom was filled according to the EANM FDG-PET/CT guideline 1.0 and scanned for 5more » min over 1 bed. Two MR-AC imaging protocols were tested: standard clinical procedures and a dedicated protocol for phantom tests. Depending on the system, the dedicated phantom protocol employs a two-class (water and air) segmentation of the MR data or a CT-based template. Differences in attenuation- and SUV recovery coefficients (RC) are reported. PET/CT-based simulations were performed to simulate the various artifacts seen in the AC maps (μ-map) and their impact on the accuracy of phantom-based QC. Results: Clinical MR-AC protocols caused substantial errors and artifacts in the AC maps, resulting in underestimations of the reconstructed PET activity of up to 27%, depending on the PET/MR system. Using dedicated phantom MR-AC protocols, PET bias was reduced to −8%. Mean and max SUV RC met EARL multicenter PET performance specifications for most contrast objects, but only when using the dedicated phantom protocol. Simulations confirmed the bias in experimental data to be caused by incorrect AC maps resulting from the use of clinical MR-AC protocols. Conclusions: Phantom-based quality control of PET/MR systems in a multicenter, multivendor setting may be performed with sufficient accuracy, but only when dedicated phantom acquisition and processing protocols are used for attenuation correction.« less

  13. Streamlined Genome Sequence Compression using Distributed Source Coding

    PubMed Central

    Wang, Shuang; Jiang, Xiaoqian; Chen, Feng; Cui, Lijuan; Cheng, Samuel

    2014-01-01

    We aim at developing a streamlined genome sequence compression algorithm to support alternative miniaturized sequencing devices, which have limited communication, storage, and computation power. Existing techniques that require heavy client (encoder side) cannot be applied. To tackle this challenge, we carefully examined distributed source coding theory and developed a customized reference-based genome compression protocol to meet the low-complexity need at the client side. Based on the variation between source and reference, our protocol will pick adaptively either syndrome coding or hash coding to compress subsequences of changing code length. Our experimental results showed promising performance of the proposed method when compared with the state-of-the-art algorithm (GRS). PMID:25520552

  14. Experimental protocol for high-fidelity heralded photon-to-atom quantum state transfer.

    PubMed

    Kurz, Christoph; Schug, Michael; Eich, Pascal; Huwer, Jan; Müller, Philipp; Eschner, Jürgen

    2014-11-21

    A quantum network combines the benefits of quantum systems regarding secure information transmission and calculational speed-up by employing quantum coherence and entanglement to store, transmit and process information. A promising platform for implementing such a network are atom-based quantum memories and processors, interconnected by photonic quantum channels. A crucial building block in this scenario is the conversion of quantum states between single photons and single atoms through controlled emission and absorption. Here we present an experimental protocol for photon-to-atom quantum state conversion, whereby the polarization state of an absorbed photon is mapped onto the spin state of a single absorbing atom with >95% fidelity, while successful conversion is heralded by a single emitted photon. Heralded high-fidelity conversion without affecting the converted state is a main experimental challenge, in order to make the transferred information reliably available for further operations. We record >80 s(-1) successful state transfer events out of 18,000 s(-1) repetitions.

  15. EXPERIMENTAL PROTOCOL FOR DETERMINING PROTOLYSIS REACTION RATE CONSTANTS

    EPA Science Inventory

    An experimental protocol to determine photolysis rates of chemicals which photolyze relatively rapidly in the gas phase has been developed. This procedure provides a basis for evaluating the relative importance of one atmospheric reaction pathway (i.e., photolysis) for organic su...

  16. Computer-Based Techniques for Collection of Pulmonary Function Variables during Rest and Exercise.

    DTIC Science & Technology

    1991-03-01

    routinely Included in experimental protocols involving hyper- and hypobaric excursions. Unfortunately, the full potential of those tests Is often not...for a Pulmonary Function data acquisition system that has proven useful in the hyperbaric research laboratory. It illustrates how computers can

  17. Practical decoy state for quantum key distribution

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Ma Xiongfeng; Qi Bing; Zhao Yi

    2005-07-15

    Decoy states have recently been proposed as a useful method for substantially improving the performance of quantum key distribution (QKD). Here, we present a general theory of the decoy state protocol based on only two decoy states and one signal state. We perform optimization on the choice of intensities of the two decoy states and the signal state. Our result shows that a decoy state protocol with only two types of decoy states - the vacuum and a weak decoy state - asymptotically approaches the theoretical limit of the most general type of decoy state protocol (with an infinite numbermore » of decoy states). We also present a one-decoy-state protocol. Moreover, we provide estimations on the effects of statistical fluctuations and suggest that, even for long-distance (larger than 100 km) QKD, our two-decoy-state protocol can be implemented with only a few hours of experimental data. In conclusion, decoy state quantum key distribution is highly practical.« less

  18. Supervised versus unsupervised technology-based levodopa monitoring in Parkinson's disease: an intrasubject comparison.

    PubMed

    Lopane, Giovanna; Mellone, Sabato; Corzani, Mattia; Chiari, Lorenzo; Cortelli, Pietro; Calandra-Buonaura, Giovanna; Contin, Manuela

    2018-06-01

    We aimed to assess the intrasubject reproducibility of a technology-based levodopa (LD) therapeutic monitoring protocol administered in supervised versus unsupervised conditions in patients with Parkinson's disease (PD). The study design was pilot, intrasubject, single center, open and prospective. Twenty patients were recruited. Patients performed a standardized monitoring protocol instrumented by an ad hoc embedded platform after their usual first morning LD dose in two different randomized ambulatory sessions: one under a physician's supervision, the other self-administered. The protocol is made up of serial motor and non-motor tests, including alternate finger tapping, Timed Up and Go test, and measurement of blood pressure. Primary motor outcomes included comparisons of intrasubject LD subacute motor response patterns over the 3-h test in the two experimental conditions. Secondary outcomes were the number of intrasession serial test repetitions due to technical or handling errors and patients' satisfaction with the unsupervised LD monitoring protocol. Intrasubject LD motor response patterns were concordant between the two study sessions in all patients but one. Platform handling problems averaged 4% of total planned serial tests for both sessions. Ninety-five percent of patients were satisfied with the self-administered LD monitoring protocol. To our knowledge, this study is the first to explore the potential of unsupervised technology-based objective motor and non-motor tasks to monitor subacute LD dosing effects in PD patients. The results are promising for future telemedicine applications.

  19. Gaussification and entanglement distillation of continuous-variable systems: a unifying picture.

    PubMed

    Campbell, Earl T; Eisert, Jens

    2012-01-13

    Distillation of entanglement using only Gaussian operations is an important primitive in quantum communication, quantum repeater architectures, and distributed quantum computing. Existing distillation protocols for continuous degrees of freedom are only known to converge to a Gaussian state when measurements yield precisely the vacuum outcome. In sharp contrast, non-Gaussian states can be deterministically converted into Gaussian states while preserving their second moments, albeit by usually reducing their degree of entanglement. In this work-based on a novel instance of a noncommutative central limit theorem-we introduce a picture general enough to encompass the known protocols leading to Gaussian states, and new classes of protocols including multipartite distillation. This gives the experimental option of balancing the merits of success probability against entanglement produced.

  20. Prebreathe Protocol for Extravehicular Activity Technical Consultation Report

    NASA Technical Reports Server (NTRS)

    Ross, Jerry; Duncan, Michael

    2008-01-01

    In the performance of EVA by that National Aeronautics and Space Administration (NASA) astronauts, there exists a risk of DCS as the suit pressure is reduced to 4.3 pounds per square inch, absolute (psia) from the International Space Station (ISS) pressure of 14.7 psia. Several DCS-preventive procedures have been developed and implemented. Each of these procedures involve the use of oxygen (O2) prebreathe to effectively washout tissue nitrogen (N2).The management of the ISS Programs convened an expert independent peer review Team to conduct a review of the Decompression Sickness (DCS) risks associated with the Extra Vehicular Activity (EVA) Campout Prebreathe (PB) protocol for its consideration for use on future missions. The major findings and recommendations of the expert panel are: There is no direct experimental data to confirm the potential DCS risks of the Campout PB protocol. However, based on model data, statistical probability, physiology, and information derived from similar PB protocols, there is no compelling evidence to suggest that the Campout PB protocol is less safe than the other NASA approved PB protocols.

  1. Hard real-time closed-loop electrophysiology with the Real-Time eXperiment Interface (RTXI)

    PubMed Central

    George, Ansel; Dorval, Alan D.; Christini, David J.

    2017-01-01

    The ability to experimentally perturb biological systems has traditionally been limited to static pre-programmed or operator-controlled protocols. In contrast, real-time control allows dynamic probing of biological systems with perturbations that are computed on-the-fly during experimentation. Real-time control applications for biological research are available; however, these systems are costly and often restrict the flexibility and customization of experimental protocols. The Real-Time eXperiment Interface (RTXI) is an open source software platform for achieving hard real-time data acquisition and closed-loop control in biological experiments while retaining the flexibility needed for experimental settings. RTXI has enabled users to implement complex custom closed-loop protocols in single cell, cell network, animal, and human electrophysiology studies. RTXI is also used as a free and open source, customizable electrophysiology platform in open-loop studies requiring online data acquisition, processing, and visualization. RTXI is easy to install, can be used with an extensive range of external experimentation and data acquisition hardware, and includes standard modules for implementing common electrophysiology protocols. PMID:28557998

  2. Refinement of NMR structures using implicit solvent and advanced sampling techniques.

    PubMed

    Chen, Jianhan; Im, Wonpil; Brooks, Charles L

    2004-12-15

    NMR biomolecular structure calculations exploit simulated annealing methods for conformational sampling and require a relatively high level of redundancy in the experimental restraints to determine quality three-dimensional structures. Recent advances in generalized Born (GB) implicit solvent models should make it possible to combine information from both experimental measurements and accurate empirical force fields to improve the quality of NMR-derived structures. In this paper, we study the influence of implicit solvent on the refinement of protein NMR structures and identify an optimal protocol of utilizing these improved force fields. To do so, we carry out structure refinement experiments for model proteins with published NMR structures using full NMR restraints and subsets of them. We also investigate the application of advanced sampling techniques to NMR structure refinement. Similar to the observations of Xia et al. (J.Biomol. NMR 2002, 22, 317-331), we find that the impact of implicit solvent is rather small when there is a sufficient number of experimental restraints (such as in the final stage of NMR structure determination), whether implicit solvent is used throughout the calculation or only in the final refinement step. The application of advanced sampling techniques also seems to have minimal impact in this case. However, when the experimental data are limited, we demonstrate that refinement with implicit solvent can substantially improve the quality of the structures. In particular, when combined with an advanced sampling technique, the replica exchange (REX) method, near-native structures can be rapidly moved toward the native basin. The REX method provides both enhanced sampling and automatic selection of the most native-like (lowest energy) structures. An optimal protocol based on our studies first generates an ensemble of initial structures that maximally satisfy the available experimental data with conventional NMR software using a simplified force field and then refines these structures with implicit solvent using the REX method. We systematically examine the reliability and efficacy of this protocol using four proteins of various sizes ranging from the 56-residue B1 domain of Streptococcal protein G to the 370-residue Maltose-binding protein. Significant improvement in the structures was observed in all cases when refinement was based on low-redundancy restraint data. The proposed protocol is anticipated to be particularly useful in early stages of NMR structure determination where a reliable estimate of the native fold from limited data can significantly expedite the overall process. This refinement procedure is also expected to be useful when redundant experimental data are not readily available, such as for large multidomain biomolecules and in solid-state NMR structure determination.

  3. Anesthetics and analgesics in experimental traumatic brain injury: Selection based on experimental objectives

    PubMed Central

    Rowe, Rachel K.; Harrison, Jordan L.; Thomas, Theresa C.; Pauly, James R.; Adelson, P. David; Lifshitz, Jonathan

    2013-01-01

    The use of animal modeling in traumatic brain injury (TBI) research is justified by the lack of sufficiently comprehensive in vitro and computer modeling that incorporates all components of the neurovascular unit. Valid animal modeling of TBI requires accurate replication of both the mechanical forces and secondary injury conditions observed in human patients. Regulatory requirements for animal modeling emphasize the administration of appropriate anesthetics and analgesics unless withholding these drugs is scientifically justified. The objective of this review is to present scientific justification for standardizing the use of anesthetics and analgesics, within a study, when modeling TBI in order to preserve study validity. Evidence for the interference of anesthetics and analgesics in the natural course of brain injury calls for consistent consideration of pain management regimens when conducting TBI research. Anesthetics administered at the time of or shortly after induction of brain injury can alter cognitive, motor, and histological outcomes following TBI. A consistent anesthesia protocol based on experimental objectives within each individual study is imperative when conducting TBI studies to control for the confounding effects of anesthesia on outcome parameters. Experimental studies that replicate the clinical condition are essential to gain further understanding and evaluate possible treatments for TBI. However, with animal models of TBI it is essential that investigators assure a uniform drug delivery protocol that minimizes confounding variables, while minimizing pain and suffering. PMID:23877609

  4. Recasting a traditional laboratory practical as a "Design-your-own protocol" to teach a universal research skill.

    PubMed

    Whitworth, David E

    2016-07-08

    Laboratory-based practical classes are a common feature of life science teaching, during which students learn how to perform experiments and generate/interpret data. Practical classes are typically instructional, concentrating on providing topic- and technique-specific skills, however to produce research-capable graduates it is also important to develop generic practical skills. To provide an opportunity for students to develop the skills needed to create bespoke protocols for experimental benchwork, a traditional practical was repurposed. Students were given a list of available resources and an experimental goal, and directed to create a bench protocol to achieve the aim (measuring the iron in hemoglobin). In a series of teaching events students received feedback from staff, and peers prototyped the protocols, before protocols were finally implemented. Graduates highlighted this exercise as one of the most important of their degrees, primarily because of the clear relevance of the skills acquired to professional practice. The exercise exemplifies a range of pedagogic principles, but arguably its most important innovation is that it repurposed a pre-existing practical. This had the benefits of automatically providing scaffolding to direct the students' thought processes, while retaining the advantages of a "discovery learning" exercise, and allowing facile adoption of the approach across the sector. © 2016 by The International Union of Biochemistry and Molecular Biology, 44(4):377-380, 2016. © 2016 The International Union of Biochemistry and Molecular Biology.

  5. Examination of an interventionist-led HIV intervention among criminal justice-involved female prisoners

    PubMed Central

    Havens, Jennifer R.; Leukefeld, Carl G.; Oser, Carrie B.; Staton-Tindall, Michele; Knudsen, Hannah K.; Mooney, Jennifer; Duvall, Jamieson L.; Clarke, Jennifer G.; Frisman, Linda; Surratt, Hilary L.; Inciardi, James A.

    2009-01-01

    The purpose of this study was to examine the implementation, adherence and protocol fidelity for the Reducing Risky Relationships for HIV (RRR-HIV) study. The RRR-HIV study is a phase III trial of a randomized intervention to reduce human immunodeficiency virus (HIV) risk behaviors among incarcerated women in four US states: Connecticut, Delaware, Kentucky and Rhode Island. The intervention consists of five interventionist-led prison-based group sessions and a sixth individual community-based session. Data on adherence, implementation, acceptability and fidelity of the intervention were obtained from forms completed after the five prison-based sessions by both the interventionist and participant. Data from the sixth session were collected by the interventionist. Of the 363 women recruited to date, 173 (47.6%) have been randomly allocated to the experimental RRR intervention, of which implementation measures were available for 162 (93.6%). Almost three-quarters of women attended all five sessions, each of which lasted a median of 90 minutes, indicating successful implementation of the protocol across multiple study sites. Interventionists and participants alike reported that all of the topics for each session were discussed, suggesting adherence to the protocol. In addition, protocol interventionists indicated that more than 95% of the women were engaged/involved, interested, and understood the materials presented, indicating high levels of acceptability among the participants and fidelity to the intervention protocols. The majority of participants also answered all of the post-test questions correctly, which is another strong indicator of the fidelity to the intervention. Results suggest that the RRR-HIV study has been successfully implemented across multiple study sites. Adherence to the protocol, as well as protocol fidelity and acceptability, were also strong, which is essential to establish prior to examining outcome data. PMID:20090928

  6. Experimentally superposing two pure states with partial prior knowledge

    NASA Astrophysics Data System (ADS)

    Li, Keren; Long, Guofei; Katiyar, Hemant; Xin, Tao; Feng, Guanru; Lu, Dawei; Laflamme, Raymond

    2017-02-01

    Superposition, arguably the most fundamental property of quantum mechanics, lies at the heart of quantum information science. However, how to create the superposition of any two unknown pure states remains as a daunting challenge. Recently, it was proved that such a quantum protocol does not exist if the two input states are completely unknown, whereas a probabilistic protocol is still available with some prior knowledge about the input states [M. Oszmaniec et al., Phys. Rev. Lett. 116, 110403 (2016), 10.1103/PhysRevLett.116.110403]. The knowledge is that both of the two input states have nonzero overlaps with some given referential state. In this work, we experimentally realize the probabilistic protocol of superposing two pure states in a three-qubit nuclear magnetic resonance system. We demonstrate the feasibility of the protocol by preparing a families of input states, and the average fidelity between the prepared state and expected superposition state is over 99%. Moreover, we experimentally illustrate the limitation of the protocol that it is likely to fail or yields very low fidelity, if the nonzero overlaps are approaching zero. Our experimental implementation can be extended to more complex situations and other quantum systems.

  7. 40 CFR 792.120 - Protocol.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... the test system. (8) A description of the experimental design, including methods for the control of... 40 Protection of Environment 31 2010-07-01 2010-07-01 true Protocol. 792.120 Section 792.120... at which the study is being conducted. (4) The proposed experimental start and termination dates. (5...

  8. The importance of communication in promoting voluntary participation in an experimental trial: A qualitative study based on the assessment of the gamma-interferon test for the diagnosis of bovine tuberculosis in France

    PubMed Central

    Dufour, Barbara; Praud, Anne

    2017-01-01

    Understanding the factors leading each stakeholder to participate in an experimental trial is a key element for improving trial set-up and for identifying selection bias in statistical analyses. An experimental protocol, validated by the European Commission, was developed in France to assess the ability of the gamma-interferon test in terms of accuracy to replace the second intradermal skin test in cases of suspected bovine tuberculosis. Implemented between 2013 and 2015, this experimental trial was based on voluntary participation. To determine and understand the motivation or reluctance of farmers to take part in this trial, we carried out a sociological survey in France. Our study was based on semi-structured interviews with the farmers and other stakeholders involved. The analysis of findings demonstrated that shortening the lock-up period during tuberculosis suspicion, following the use of a gamma-interferon test, was an important aim and a genuine challenge for the animal health stakeholders. However, some farmers did not wish to continue the trial because it could potentially have drastic consequences for them. Moreover, misunderstandings and confusion concerning the objectives and consequences of the trial led stakeholders to reject it forcefully. Based on our results, we offer some recommendations: clear and appropriate communication tools should be prepared to explain the protocol and its aims. In addition, these types of animal health trials should be designed with the stakeholders’ interests in mind. This study provides a better understanding of farmer motivations and stakeholder influences on trial participation and outcomes. The findings can be used to help design trials so that they promote participation by farmers and by all animal health stakeholders in general. PMID:28973018

  9. A General Small-Scale Reactor To Enable Standardization and Acceleration of Photocatalytic Reactions.

    PubMed

    Le, Chi Chip; Wismer, Michael K; Shi, Zhi-Cai; Zhang, Rui; Conway, Donald V; Li, Guoqing; Vachal, Petr; Davies, Ian W; MacMillan, David W C

    2017-06-28

    Photocatalysis for organic synthesis has experienced an exponential growth in the past 10 years. However, the variety of experimental procedures that have been reported to perform photon-based catalyst excitation has hampered the establishment of general protocols to convert visible light into chemical energy. To address this issue, we have designed an integrated photoreactor for enhanced photon capture and catalyst excitation. Moreover, the evaluation of this new reactor in eight photocatalytic transformations that are widely employed in medicinal chemistry settings has confirmed significant performance advantages of this optimized design while enabling a standardized protocol.

  10. Increasing play-based commenting in children with autism spectrum disorder using a novel script-frame procedure.

    PubMed

    Groskreutz, Mark P; Peters, Amy; Groskreutz, Nicole C; Higbee, Thomas S

    2015-01-01

    Children with developmental disabilities may engage in less frequent and more repetitious language than peers with typical development. Scripts have been used to increase communication by teaching one or more specific statements and then fading the scripts. In the current study, preschoolers with developmental disabilities experienced a novel script-frame protocol and learned to make play-related comments about toys. After the script-frame protocol, commenting occurred in the absence of scripts, with untrained play activities, and included untrained comments. © Society for the Experimental Analysis of Behavior.

  11. Robust Distant Entanglement Generation Using Coherent Multiphoton Scattering

    NASA Astrophysics Data System (ADS)

    Chan, Ching-Kit; Sham, L. J.

    2013-02-01

    We describe a protocol to entangle two qubits at a distance by using resonance fluorescence. The scheme makes use of the postselection of large and distinguishable fluorescence signals corresponding to entangled and unentangled qubit states and has the merits of both high success probability and high entanglement fidelity owing to the multiphoton nature. Our result shows that the entanglement generation is robust against photon fluctuations in the fluorescence signals for a wide range of driving fields. We also demonstrate that this new protocol has an average entanglement duration within the decoherence time of corresponding qubit systems, based on current experimental photon efficiency.

  12. Robust distant entanglement generation using coherent multiphoton scattering.

    PubMed

    Chan, Ching-Kit; Sham, L J

    2013-02-15

    We describe a protocol to entangle two qubits at a distance by using resonance fluorescence. The scheme makes use of the postselection of large and distinguishable fluorescence signals corresponding to entangled and unentangled qubit states and has the merits of both high success probability and high entanglement fidelity owing to the multiphoton nature. Our result shows that the entanglement generation is robust against photon fluctuations in the fluorescence signals for a wide range of driving fields. We also demonstrate that this new protocol has an average entanglement duration within the decoherence time of corresponding qubit systems, based on current experimental photon efficiency.

  13. Investigating the Effects of the Interaction Intensity in a Weak Measurement.

    PubMed

    Piacentini, Fabrizio; Avella, Alessio; Gramegna, Marco; Lussana, Rudi; Villa, Federica; Tosi, Alberto; Brida, Giorgio; Degiovanni, Ivo Pietro; Genovese, Marco

    2018-05-03

    Measurements are crucial in quantum mechanics, for fundamental research as well as for applicative fields like quantum metrology, quantum-enhanced measurements and other quantum technologies. In the recent years, weak-interaction-based protocols like Weak Measurements and Protective Measurements have been experimentally realized, showing peculiar features leading to surprising advantages in several different applications. In this work we analyze the validity range for such measurement protocols, that is, how the interaction strength affects the weak value extraction, by measuring different polarization weak values on heralded single photons. We show that, even in the weak interaction regime, the coupling intensity limits the range of weak values achievable, setting a threshold on the signal amplification effect exploited in many weak measurement based experiments.

  14. In silico simulations of experimental protocols for cardiac modeling.

    PubMed

    Carro, Jesus; Rodriguez, Jose Felix; Pueyo, Esther

    2014-01-01

    A mathematical model of the AP involves the sum of different transmembrane ionic currents and the balance of intracellular ionic concentrations. To each ionic current corresponds an equation involving several effects. There are a number of model parameters that must be identified using specific experimental protocols in which the effects are considered as independent. However, when the model complexity grows, the interaction between effects becomes increasingly important. Therefore, model parameters identified considering the different effects as independent might be misleading. In this work, a novel methodology consisting in performing in silico simulations of the experimental protocol and then comparing experimental and simulated outcomes is proposed for parameter model identification and validation. The potential of the methodology is demonstrated by validating voltage-dependent L-type calcium current (ICaL) inactivation in recently proposed human ventricular AP models with different formulations. Our results show large differences between ICaL inactivation as calculated from the model equation and ICaL inactivation from the in silico simulations due to the interaction between effects and/or to the experimental protocol. Our results suggest that, when proposing any new model formulation, consistency between such formulation and the corresponding experimental data that is aimed at being reproduced needs to be first verified considering all involved factors.

  15. Experimental realization of an entanglement access network and secure multi-party computation

    NASA Astrophysics Data System (ADS)

    Chang, X.-Y.; Deng, D.-L.; Yuan, X.-X.; Hou, P.-Y.; Huang, Y.-Y.; Duan, L.-M.

    2016-07-01

    To construct a quantum network with many end users, it is critical to have a cost-efficient way to distribute entanglement over different network ends. We demonstrate an entanglement access network, where the expensive resource, the entangled photon source at the telecom wavelength and the core communication channel, is shared by many end users. Using this cost-efficient entanglement access network, we report experimental demonstration of a secure multiparty computation protocol, the privacy-preserving secure sum problem, based on the network quantum cryptography.

  16. Experimental realization of an entanglement access network and secure multi-party computation

    NASA Astrophysics Data System (ADS)

    Chang, Xiuying; Deng, Donglin; Yuan, Xinxing; Hou, Panyu; Huang, Yuanyuan; Duan, Luming; Department of Physics, University of Michigan Collaboration; CenterQuantum Information in Tsinghua University Team

    2017-04-01

    To construct a quantum network with many end users, it is critical to have a cost-efficient way to distribute entanglement over different network ends. We demonstrate an entanglement access network, where the expensive resource, the entangled photon source at the telecom wavelength and the core communication channel, is shared by many end users. Using this cost-efficient entanglement access network, we report experimental demonstration of a secure multiparty computation protocol, the privacy-preserving secure sum problem, based on the network quantum cryptography.

  17. Shortcuts to adiabaticity by counterdiabatic driving for trapped-ion displacement in phase space

    PubMed Central

    An, Shuoming; Lv, Dingshun; del Campo, Adolfo; Kim, Kihwan

    2016-01-01

    The application of adiabatic protocols in quantum technologies is severely limited by environmental sources of noise and decoherence. Shortcuts to adiabaticity by counterdiabatic driving constitute a powerful alternative that speed up time-evolution while mimicking adiabatic dynamics. Here we report the experimental implementation of counterdiabatic driving in a continuous variable system, a shortcut to the adiabatic transport of a trapped ion in phase space. The resulting dynamics is equivalent to a ‘fast-motion video' of the adiabatic trajectory. The robustness of this protocol is shown to surpass that of competing schemes based on classical local controls and Fourier optimization methods. Our results demonstrate that shortcuts to adiabaticity provide a robust speedup of quantum protocols of wide applicability in quantum technologies. PMID:27669897

  18. Experimental Quantum Coin Tossing

    NASA Astrophysics Data System (ADS)

    Molina-Terriza, G.; Vaziri, A.; Ursin, R.; Zeilinger, A.

    2005-01-01

    In this Letter we present the first implementation of a quantum coin-tossing protocol. This protocol belongs to a class of “two-party” cryptographic problems, where the communication partners distrust each other. As with a number of such two-party protocols, the best implementation of the quantum coin tossing requires qutrits, resulting in a higher security than using qubits. In this way, we have also performed the first complete quantum communication protocol with qutrits. In our experiment the two partners succeeded to remotely toss a row of coins using photons entangled in the orbital angular momentum. We also show the experimental bounds of a possible cheater and the ways of detecting him.

  19. Quantum fingerprinting with coherent states and a constant mean number of photons

    NASA Astrophysics Data System (ADS)

    Arrazola, Juan Miguel; Lütkenhaus, Norbert

    2014-06-01

    We present a protocol for quantum fingerprinting that is ready to be implemented with current technology and is robust to experimental errors. The basis of our scheme is an implementation of the signal states in terms of a coherent state in a superposition of time-bin modes. Experimentally, this requires only the ability to prepare coherent states of low amplitude and to interfere them in a balanced beam splitter. The states used in the protocol are arbitrarily close in trace distance to states of O (log2n) qubits, thus exhibiting an exponential separation in abstract communication complexity compared to the classical case. The protocol uses a number of optical modes that is proportional to the size n of the input bit strings but a total mean photon number that is constant and independent of n. Given the expended resources, our protocol achieves a task that is provably impossible using classical communication only. In fact, even in the presence of realistic experimental errors and loss, we show that there exist a large range of input sizes for which our quantum protocol transmits an amount of information that can be more than two orders of magnitude smaller than a classical fingerprinting protocol.

  20. Sampling the Soils around a Residence Containing Lead-Based Paints: An X-Ray Fluorescence Experiment

    ERIC Educational Resources Information Center

    Bachofer, Steven J.

    2008-01-01

    Sampling experiments utilizing field portable instruments are instructional since students collect data following regulatory protocols, evaluate it, and begin to recognize their civic responsibilities upon collecting useful data. A lead-in-soil experiment educated students on a prevalent exposure pathway. The experimental site was a pre-1950…

  1. Virtual hybrid test control of sinuous crack

    NASA Astrophysics Data System (ADS)

    Jailin, Clément; Carpiuc, Andreea; Kazymyrenko, Kyrylo; Poncelet, Martin; Leclerc, Hugo; Hild, François; Roux, Stéphane

    2017-05-01

    The present study aims at proposing a new generation of experimental protocol for analysing crack propagation in quasi brittle materials. The boundary conditions are controlled in real-time to conform to a predefined crack path. Servo-control is achieved through a full-field measurement technique to determine the pre-set fracture path and a simple predictor model based on linear elastic fracture mechanics to prescribe the boundary conditions on the fly so that the actual crack path follows at best the predefined trajectory. The final goal is to identify, for instance, non-local damage models involving internal lengths. The validation of this novel procedure is performed via a virtual test-case based on an enriched damage model with an internal length scale, a prior chosen sinusoidal crack path and a concrete sample. Notwithstanding the fact that the predictor model selected for monitoring the test is a highly simplified picture of the targeted constitutive law, the proposed protocol exhibits a much improved sensitivity to the sought parameters such as internal lengths as assessed from the comparison with other available experimental tests.

  2. An Individualized, Perception-Based Protocol to Investigate Human Physiological Responses to Cooling

    PubMed Central

    Coolbaugh, Crystal L.; Bush, Emily C.; Galenti, Elizabeth S.; Welch, E. Brian; Towse, Theodore F.

    2018-01-01

    Cold exposure, a known stimulant of the thermogenic effects of brown adipose tissue (BAT), is the most widely used method to study BAT physiology in adult humans. Recently, individualized cooling has been recommended to standardize the physiological cold stress applied across participants, but critical experimental details remain unclear. The purpose of this work was to develop a detailed methodology for an individualized, perception-based protocol to investigate human physiological responses to cooling. Participants were wrapped in two water-circulating blankets and fitted with skin temperature probes to estimate BAT activity and peripheral vasoconstriction. We created a thermoesthesia graphical user interface (tGUI) to continuously record the subject's perception of cooling and shivering status during the cooling protocol. The protocol began with a 15 min thermoneutral phase followed by a series of 10 min cooling phases and concluded when sustained shivering (>1 min duration) occurred. Researchers used perception of cooling feedback (tGUI ratings) to manually adjust and personalize the water temperature at each cooling phase. Blanket water temperatures were recorded continuously during the protocol. Twelve volunteers (ages: 26.2 ± 1.4 years; 25% female) completed a feasibility study to evaluate the proposed protocol. Water temperature, perception of cooling, and shivering varied considerably across participants in response to cooling. Mean clavicle skin temperature, a surrogate measure of BAT activity, decreased (−0.99°C, 95% CI: −1.7 to −0.25°C, P = 0.16) after the cooling protocol, but an increase in supraclavicular skin temperature was observed in 4 participants. A strong positive correlation was also found between thermoesthesia and peripheral vasoconstriction (ρ = 0.84, P < 0.001). The proposed individualized, perception-based protocol therefore has potential to investigate the physiological responses to cold stress applied across populations with varying age, sex, body composition, and cold sensitivity characteristics. PMID:29593558

  3. Towards ethically improved animal experimentation in the study of animal reproduction.

    PubMed

    Blache, D; Martin, G B; Maloney, S K

    2008-07-01

    The ethics of animal-based research is a continuing area of debate, but ethical research protocols do not prevent scientific progress. In this paper, we argue that our current knowledge of the factors that affect reproductive processes provides researchers with a solid foundation upon which they can conduct more ethical research and simultaneously produce data of higher quality. We support this argument by showing how a deep understanding of the genetics, nutrition and temperament of our experimental animals can improve compliance with two of the '3 Rs', reduction and refinement, simply by offering better control over the variance in our experimental model. The outcome is a better experimental design, on both ethical and scientific grounds.

  4. Overstretching of B-DNA with various pulling protocols: Appearance of structural polymorphism and S-DNA

    NASA Astrophysics Data System (ADS)

    Garai, Ashok; Mogurampelly, Santosh; Bag, Saientan; Maiti, Prabal K.

    2017-12-01

    We report a structural polymorphism of the S-DNA when a canonical B-DNA is stretched under different pulling protocols and provide a fundamental molecular understanding of the DNA stretching mechanism. Extensive all atom molecular dynamics simulations reveal a clear formation of S-DNA when the B-DNA is stretched along the 3' directions of the opposite strands (OS3) and is characterized by the changes in the number of H-bonds, entropy, and free energy. Stretching along the 5' directions of the opposite strands (OS5) leads to force induced melting form of the DNA. Interestingly, stretching along the opposite ends of the same strand leads to a coexistence of both the S- and melted M-DNA structures. We also do the structural characterization of the S-DNA by calculating various helical parameters. We find that the S-DNA has a twist of ˜10° which corresponds to a helical repeat length of ˜36 base pairs in close agreement with the previous experimental results. Moreover, we find that the free energy barrier between the canonical and overstretched states of DNA is higher for the same termini pulling protocol in comparison to all other protocols considered in this work. Overall, our observations not only reconcile with the available experimental results qualitatively but also enhance the understanding of different overstretched DNA structures.

  5. [Study protocol of a prevention of recurrent suicidal behaviour program based on case management (PSyMAC)].

    PubMed

    Sáiz, Pilar A; Rodríguez-Revuelta, Julia; González-Blanco, Leticia; Burón, Patricia; Al-Halabí, Susana; Garrido, Marlen; García-Alvarez, Leticia; García-Portilla, Paz; Bobes, Julio

    2014-01-01

    Prevention of suicidal behaviour is a public health priority in the European Union. A previous suicide attempt is the best risk predictor for future attempts, as well as completed suicides. The primary aim of this article is to describe a controlled study protocol designed for prevention of recurrent suicidal behaviour that proposes case management, and includes a psychoeducation program, as compared with the standard intervention (PSyMAC). Patients admitted from January 2011 to June 2013 to the emergency room of the Hospital Universitario Central de Asturias were evaluated using a protocol including sociodemographic, psychiatric, and psychosocial assessment. Patients were randomly assigned to either a group receiving continuous case management including participation in a psychoeducation program (experimental group), or a control group receiving standard care. The primary objective is to examine whether or not the period of time until recurrent suicidal behaviour in the experimental group is significantly different from that of the control group. PSyMAC proposes low cost and easily adaptable interventions to the usual clinical setting that can help to compensate the shortcoming of specific action protocols and suicidal behaviour prevention programs in our country. The evaluation of PSyMAC results will determine their real effectivity as a case-magament program to reduce suicidal risk. Copyright © 2013 SEP y SEPB. Published by Elsevier España. All rights reserved.

  6. Design and Evaluation of Complex Moving HIFU Treatment Protocols

    NASA Astrophysics Data System (ADS)

    Kargl, Steven G.; Andrew, Marilee A.; Kaczkowski, Peter J.; Brayman, Andrew A.; Crum, Lawrence A.

    2005-03-01

    The use of moving high-intensity focused ultrasound (HIFU) treatment protocols is of interest in achieving efficient formation of large-volume thermal lesions in tissue. Judicious protocol design is critical in order to avoid collateral damage to healthy tissues outside the treatment zone. A KZK-BHTE model, extended to simulate multiple, moving scans in tissue, is used to investigate protocol design considerations. Prediction and experimental observations are presented which 1) validate the model, 2) illustrate how to assess the effects of acoustic nonlinearity, and 3) demonstrate how to assess and control collateral damage such as prefocal lesion formation and lesion formation resulting from thermal conduction without direct HIFU exposure. Experimental data consist of linear and circular scan protocols delivered over a range of exposure regimes in ex vivo bovine liver.

  7. Lightweight and confidential data discovery and dissemination for wireless body area networks.

    PubMed

    He, Daojing; Chan, Sammy; Zhang, Yan; Yang, Haomiao

    2014-03-01

    As a special sensor network, a wireless body area network (WBAN) provides an economical solution to real-time monitoring and reporting of patients' physiological data. After a WBAN is deployed, it is sometimes necessary to disseminate data into the network through wireless links to adjust configuration parameters of body sensors or distribute management commands and queries to sensors. A number of such protocols have been proposed recently, but they all focus on how to ensure reliability and overlook security vulnerabilities. Taking into account the unique features and application requirements of a WBAN, this paper presents the design, implementation, and evaluation of a secure, lightweight, confidential, and denial-of-service-resistant data discovery and dissemination protocol for WBANs to ensure the data items disseminated are not altered or tampered. Based on multiple one-way key hash chains, our protocol provides instantaneous authentication and can tolerate node compromise. Besides the theoretical analysis that demonstrates the security and performance of the proposed protocol, this paper also reports the experimental evaluation of our protocol in a network of resource-limited sensor nodes, which shows its efficiency in practice. In particular, extensive security analysis shows that our protocol is provably secure.

  8. Boron neutron capture therapy (BNCT) for the treatment of liver metastases: biodistribution studies of boron compounds in an experimental model.

    PubMed

    Garabalino, Marcela A; Monti Hughes, Andrea; Molinari, Ana J; Heber, Elisa M; Pozzi, Emiliano C C; Cardoso, Jorge E; Colombo, Lucas L; Nievas, Susana; Nigg, David W; Aromando, Romina F; Itoiz, Maria E; Trivillin, Verónica A; Schwint, Amanda E

    2011-03-01

    We previously demonstrated the therapeutic efficacy of different boron neutron capture therapy (BNCT) protocols in an experimental model of oral cancer. BNCT is based on the selective accumulation of (10)B carriers in a tumor followed by neutron irradiation. Within the context of exploring the potential therapeutic efficacy of BNCT for the treatment of liver metastases, the aim of the present study was to perform boron biodistribution studies in an experimental model of liver metastases in rats. Different boron compounds and administration conditions were assayed to determine which administration protocols would potentially be therapeutically useful in in vivo BNCT studies at the RA-3 nuclear reactor. A total of 70 BDIX rats were inoculated in the liver with syngeneic colon cancer cells DHD/K12/TRb to induce the development of subcapsular tumor nodules. Fourteen days post-inoculation, the animals were used for biodistribution studies. We evaluated a total of 11 administration protocols for the boron compounds boronophenylalanine (BPA) and GB-10 (Na(2)(10)B(10)H(10)), alone or combined at different dose levels and employing different administration routes. Tumor, normal tissue, and blood samples were processed for boron measurement by atomic emission spectroscopy. Six protocols proved potentially useful for BNCT studies in terms of absolute boron concentration in tumor and preferential uptake of boron by tumor tissue. Boron concentration values in tumor and normal tissues in the liver metastases model show it would be feasible to reach therapeutic BNCT doses in tumor without exceeding radiotolerance in normal tissue at the thermal neutron facility at RA-3. © Springer-Verlag 2010

  9. Boron Neutron Capture Therapy (BCNT) for the Treatment of Liver Metastases: Biodistribution Studies of Boron Compounds in an Experimental Model

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Marcela A. Garabalino; Andrea Monti Hughes; Ana J. Molinari

    2011-03-01

    Abstract We previously demonstrated the therapeutic efficacy of different boron neutron capture therapy (BNCT) protocols in an experimental model of oral cancer. BNCT is based on the selective accumulation of 10B carriers in a tumor followed by neutron irradiation. Within the context of exploring the potential therapeutic efficacy of BNCT for the treatment of liver metastases, the aim of the present study was to perform boron biodistribution studies in an experimental model of liver metastases in rats. Different boron compounds and administration conditions were assayed to determine which administration protocols would potentially be therapeutically useful in in vivo BNCT studiesmore » at the RA-3 nuclear reactor. A total of 70 BDIX rats were inoculated in the liver with syngeneic colon cancer cells DHD/K12/TRb to induce the development of subcapsular tumor nodules. Fourteen days post-inoculation, the animals were used for biodistribution studies. We evaluated a total of 11 administration protocols for the boron compounds boronophenylalanine (BPA) and GB-10 (Na210B10H10), alone or combined at different dose levels and employing different administration routes. Tumor, normal tissue, and blood samples were processed for boron measurement by atomic emission spectroscopy. Six protocols proved potentially useful for BNCT studies in terms of absolute boron concentration in tumor and preferential uptake of boron by tumor tissue. Boron concentration values in tumor and normal tissues in the liver metastases model show it would be feasible to reach therapeutic BNCT doses in tumor without exceeding radiotolerance in normal tissue at the thermal neutron facility at RA-3.« less

  10. Minimizing irreversible losses in quantum systems by local counterdiabatic driving

    PubMed Central

    Sels, Dries; Polkovnikov, Anatoli

    2017-01-01

    Counterdiabatic driving protocols have been proposed [Demirplak M, Rice SA (2003) J Chem Phys A 107:9937–9945; Berry M (2009) J Phys A Math Theor 42:365303] as a means to make fast changes in the Hamiltonian without exciting transitions. Such driving in principle allows one to realize arbitrarily fast annealing protocols or implement fast dissipationless driving, circumventing standard adiabatic limitations requiring infinitesimally slow rates. These ideas were tested and used both experimentally and theoretically in small systems, but in larger chaotic systems, it is known that exact counterdiabatic protocols do not exist. In this work, we develop a simple variational approach allowing one to find the best possible counterdiabatic protocols given physical constraints, like locality. These protocols are easy to derive and implement both experimentally and numerically. We show that, using these approximate protocols, one can drastically suppress heating and increase fidelity of quantum annealing protocols in complex many-particle systems. In the fast limit, these protocols provide an effective dual description of adiabatic dynamics, where the coupling constant plays the role of time and the counterdiabatic term plays the role of the Hamiltonian. PMID:28461472

  11. Establishing the first institutional animal care and use committee in Egypt.

    PubMed

    Fahmy, Sohair R; Gaafar, Khadiga

    2016-04-09

    Although animal research ethics committees (AREC) are well established in Western countries, this field is weakly developed and its concept is poorly understood in the Middle East and North Africa region. Our main objective was to introduce the concept and requirements of ethical approaches in dealing with experimental animal in research and teaching in Egypt. Due to its very recent inception, Cairo University, Faculty of Science IACUC decided to operate in accordance with Guide for the Care and Use of Laboratory Animals 8th Edition 2011 (the Guide) since Egypt has not yet compiled its own guide. Fifty protocols were reviewed in 2013-2014. Only ten protocols were reviewed in 2013, but in 2014, forty protocols were reviewed. In 2013 all protocols were approved and in 2014, number of approvals were 35, the number of deferrals were 4, and one refused protocol. Master's theses (MSc) research protocols constituted the majority of the total reviewed protocols. This is attributed to the decision of the Board of the Faculty of Science, Cairo University in September, 2013 that the approval of the IACUC is mandatory before conducting any research involving animals or theses registration. The first IACUC was established in the Cairo University, Faculty of Science, since 2012. The challenges encountered by the committee were diverse, such as the absence of laws that control the use of animal models in scientific research, lack of guidelines (protocols for experimental animals in research) and, mandatory ethical approval for any experimental animal research.

  12. Failure of antiarrhythmic drugs to prevent experimental reperfusion ventricular fibrillation.

    PubMed

    Naito, M; Michelson, E L; Kmetzo, J J; Kaplinsky, E; Dreifus, L S

    1981-01-01

    Ninety-nine adult mongrel dogs underwent acute ligation of the proximal left anterior descending coronary artery. Thirty minutes later, the occlusion was released to evaluate the effectiveness of five antiarrhythmic protocols in eliminating reperfusion ventricular fibrillation. The five protocols included: protocol 1 --i.v. lidocaine, preligation and prerelease (n = 19); protocol 2 -- i.v. lidocaine, prereperfusion only (n = 22); protocol 3 -- chronic, oral, daily amiodarone for 2 weeks preligation (n = 19); protocol 4 -- i.v. procainamide, preligation and prereperfusion (n = 21); and protocol 5 -- i.v. verapamil, prereperfusion (n = 18). Each regimen was evaluated with respect to the incidence of reperfusion ventricular fibrillation in dogs that survived to reperfusion, and the results were compared to 77 control dogs that underwent identical coronary artery occlusion and release procedures without drug therapy. The incidence of reperfusion ventricular fibrillation was as follows: protocol 1 -- seven of 15 dogs (47%); protocol 2 -- six of 18 (33%); protocol 3 -- 11 of 16 dogs (69%); protocol 4 -- eight of 17 dogs (47%); and protocol 5 -- 10 of 17 dogs (59%), compared with 36 of 60 (60%) in control dogs. Using chi-square analysis, protocol 2 was beneficial (p < 0.05). The dogs were then stratified into high- and low-risk subgroups based on the arrhythmic events of the antecedent coronary artery ligation periods, and predictive risk indexes for the occurrence of reperfusion ventricular fibrillation were developed. the Mantel-Haenszel method of statistical analysis revealed that none of these protocols resulted in a statistically significant reduction in the incidence of reperfusion ventricular fibrillation. Thus, use of these predictive indexes plus appropriate statistical methods has revealed, unexpectedly, limitations in the efficacy of a spectrum of antiarrhythmic agents in preventing reperfusion ventricular fibrillation.

  13. Comprehensive predictions of target proteins based on protein-chemical interaction using virtual screening and experimental verifications.

    PubMed

    Kobayashi, Hiroki; Harada, Hiroko; Nakamura, Masaomi; Futamura, Yushi; Ito, Akihiro; Yoshida, Minoru; Iemura, Shun-Ichiro; Shin-Ya, Kazuo; Doi, Takayuki; Takahashi, Takashi; Natsume, Tohru; Imoto, Masaya; Sakakibara, Yasubumi

    2012-04-05

    Identification of the target proteins of bioactive compounds is critical for elucidating the mode of action; however, target identification has been difficult in general, mostly due to the low sensitivity of detection using affinity chromatography followed by CBB staining and MS/MS analysis. We applied our protocol of predicting target proteins combining in silico screening and experimental verification for incednine, which inhibits the anti-apoptotic function of Bcl-xL by an unknown mechanism. One hundred eighty-two target protein candidates were computationally predicted to bind to incednine by the statistical prediction method, and the predictions were verified by in vitro binding of incednine to seven proteins, whose expression can be confirmed in our cell system.As a result, 40% accuracy of the computational predictions was achieved successfully, and we newly found 3 incednine-binding proteins. This study revealed that our proposed protocol of predicting target protein combining in silico screening and experimental verification is useful, and provides new insight into a strategy for identifying target proteins of small molecules.

  14. Experimental determination of the effective point of measurement of cylindrical ionization chambers for high-energy photon and electron beams.

    PubMed

    Huang, Yanxiao; Willomitzer, Christian; Zakaria, Golam Abu; Hartmann, Guenther H

    2010-01-01

    Measurements of depth-dose curves in water phantom using a cylindrical ionization chamber require that its effective point of measurement is located at the measuring depth. Recommendations for the position of the effective point of measurement with respect to the central axis valid for high-energy electron and photon beams are given in dosimetry protocols. According to these protocols, the use of a constant shift P(eff) is currently recommended. However, this is still based on a very limited set of experimental results. It is therefore expected that an improved knowledge of the exact position of the effective point of measurement will further improve the accuracy of dosimetry. Recent publications have revealed that the position of the effective point of measurement is indeed varying with beam energy, field size and also with chamber geometry. The aim of this study is to investigate whether the shift of P(eff) can be taken to be constant and independent from the beam energy. An experimental determination of the effective point of measurement is presented based on a comparison between cylindrical chambers and a plane-parallel chamber using conventional dosimetry equipment. For electron beams, the determination is based on the comparison of halfvalue depth R(50) between the cylindrical chamber of interest and a well guarded plane-parallel Roos chamber. For photon beams, the depth of dose maximum, d(max), the depth of 80% dose, d(80), and the dose parameter PDD(10) were used. It was again found that the effective point of measurement for both, electron and photon beams Dosimetry, depends on the beam energy. The deviation from a constant value remains very small for photons, whereas significant deviations were found for electrons. It is therefore concluded that use of a single upstream shift value from the centre of the cylindrical chamber as recommended in current dosimetry protocols is adequate for photons, however inadequate for accurate electron beam dosimetry.

  15. Pharmacology-based toxicity assessment: towards quantitative risk prediction in humans.

    PubMed

    Sahota, Tarjinder; Danhof, Meindert; Della Pasqua, Oscar

    2016-05-01

    Despite ongoing efforts to better understand the mechanisms underlying safety and toxicity, ~30% of the attrition in drug discovery and development is still due to safety concerns. Changes in current practice regarding the assessment of safety and toxicity are required to reduce late stage attrition and enable effective development of novel medicines. This review focuses on the implications of empirical evidence generation for the evaluation of safety and toxicity during drug development. A shift in paradigm is needed to (i) ensure that pharmacological concepts are incorporated into the evaluation of safety and toxicity; (ii) facilitate the integration of historical evidence and thereby the translation of findings across species as well as between in vitro and in vivo experiments and (iii) promote the use of experimental protocols tailored to address specific safety and toxicity questions. Based on historical examples, we highlight the challenges for the early characterisation of the safety profile of a new molecule and discuss how model-based methodologies can be applied for the design and analysis of experimental protocols. Issues relative to the scientific rationale are categorised and presented as a hierarchical tree describing the decision-making process. Focus is given to four different areas, namely, optimisation, translation, analytical construct and decision criteria. From a methodological perspective, the relevance of quantitative methods for estimation and extrapolation of risk from toxicology and safety pharmacology experimental protocols, such as points of departure and potency, is discussed in light of advancements in population and Bayesian modelling techniques (e.g. non-linear mixed effects modelling). Their use in the evaluation of pharmacokinetics (PK) and pharmacokinetic-pharmacodynamic relationships (PKPD) has enabled great insight into the dose rationale for medicines in humans, both in terms of efficacy and adverse events. Comparable benefits can be anticipated for the assessment of safety and toxicity profile of novel molecules. © The Author 2016. Published by Oxford University Press on behalf of the UK Environmental Mutagen Society. All rights reserved. For permissions, please e-mail: journals.permissions@oup.com.

  16. A Passive Testing Approach for Protocols in Wireless Sensor Networks

    PubMed Central

    Che, Xiaoping; Maag, Stephane; Tan, Hwee-Xian; Tan, Hwee-Pink; Zhou, Zhangbing

    2015-01-01

    Smart systems are today increasingly developed with the number of wireless sensor devices drastically increasing. They are implemented within several contexts throughout our environment. Thus, sensed data transported in ubiquitous systems are important, and the way to carry them must be efficient and reliable. For that purpose, several routing protocols have been proposed for wireless sensor networks (WSN). However, one stage that is often neglected before their deployment is the conformance testing process, a crucial and challenging step. Compared to active testing techniques commonly used in wired networks, passive approaches are more suitable to the WSN environment. While some works propose to specify the protocol with state models or to analyze them with simulators and emulators, we here propose a logic-based approach for formally specifying some functional requirements of a novel WSN routing protocol. We provide an algorithm to evaluate these properties on collected protocol execution traces. Further, we demonstrate the efficiency and suitability of our approach by its application into common WSN functional properties, as well as specific ones designed from our own routing protocol. We provide relevant testing verdicts through a real indoor testbed and the implementation of our protocol. Furthermore, the flexibility, genericity and practicability of our approach have been proven by the experimental results. PMID:26610495

  17. A Passive Testing Approach for Protocols in Wireless Sensor Networks.

    PubMed

    Che, Xiaoping; Maag, Stephane; Tan, Hwee-Xian; Tan, Hwee-Pink; Zhou, Zhangbing

    2015-11-19

    Smart systems are today increasingly developed with the number of wireless sensor devices drastically increasing. They are implemented within several contexts throughout our environment. Thus, sensed data transported in ubiquitous systems are important, and the way to carry them must be efficient and reliable. For that purpose, several routing protocols have been proposed for wireless sensor networks (WSN). However, one stage that is often neglected before their deployment is the conformance testing process, a crucial and challenging step. Compared to active testing techniques commonly used in wired networks, passive approaches are more suitable to the WSN environment. While some works propose to specify the protocol with state models or to analyze them with simulators and emulators, we here propose a logic-based approach for formally specifying some functional requirements of a novel WSN routing protocol. We provide an algorithm to evaluate these properties on collected protocol execution traces. Further, we demonstrate the efficiency and suitability of our approach by its application into common WSN functional properties, as well as specific ones designed from our own routing protocol. We provide relevant testing verdicts through a real indoor testbed and the implementation of our protocol. Furthermore, the flexibility, genericity and practicability of our approach have been proven by the experimental results.

  18. Novel Hybrid Virtual Screening Protocol Based on Molecular Docking and Structure-Based Pharmacophore for Discovery of Methionyl-tRNA Synthetase Inhibitors as Antibacterial Agents

    PubMed Central

    Liu, Chi; He, Gu; Jiang, Qinglin; Han, Bo; Peng, Cheng

    2013-01-01

    Methione tRNA synthetase (MetRS) is an essential enzyme involved in protein biosynthesis in all living organisms and is a potential antibacterial target. In the current study, the structure-based pharmacophore (SBP)-guided method has been suggested to generate a comprehensive pharmacophore of MetRS based on fourteen crystal structures of MetRS-inhibitor complexes. In this investigation, a hybrid protocol of a virtual screening method, comprised of pharmacophore model-based virtual screening (PBVS), rigid and flexible docking-based virtual screenings (DBVS), is used for retrieving new MetRS inhibitors from commercially available chemical databases. This hybrid virtual screening approach was then applied to screen the Specs (202,408 compounds) database, a structurally diverse chemical database. Fifteen hit compounds were selected from the final hits and shifted to experimental studies. These results may provide important information for further research of novel MetRS inhibitors as antibacterial agents. PMID:23839093

  19. Deterministic generation of remote entanglement with active quantum feedback

    DOE PAGES

    Martin, Leigh; Motzoi, Felix; Li, Hanhan; ...

    2015-12-10

    We develop and study protocols for deterministic remote entanglement generation using quantum feedback, without relying on an entangling Hamiltonian. In order to formulate the most effective experimentally feasible protocol, we introduce the notion of average-sense locally optimal feedback protocols, which do not require real-time quantum state estimation, a difficult component of real-time quantum feedback control. We use this notion of optimality to construct two protocols that can deterministically create maximal entanglement: a semiclassical feedback protocol for low-efficiency measurements and a quantum feedback protocol for high-efficiency measurements. The latter reduces to direct feedback in the continuous-time limit, whose dynamics can bemore » modeled by a Wiseman-Milburn feedback master equation, which yields an analytic solution in the limit of unit measurement efficiency. Our formalism can smoothly interpolate between continuous-time and discrete-time descriptions of feedback dynamics and we exploit this feature to derive a superior hybrid protocol for arbitrary nonunit measurement efficiency that switches between quantum and semiclassical protocols. Lastly, we show using simulations incorporating experimental imperfections that deterministic entanglement of remote superconducting qubits may be achieved with current technology using the continuous-time feedback protocol alone.« less

  20. Limitations in electrophysiological model development and validation caused by differences between simulations and experimental protocols.

    PubMed

    Carro, Jesús; Rodríguez-Matas, José F; Monasterio, Violeta; Pueyo, Esther

    2017-10-01

    Models of ion channel dynamics are usually built by fitting isolated cell experimental values of individual parameters while neglecting the interaction between them. Another shortcoming regards the estimation of ionic current conductances, which is often based on quantification of Action Potential (AP)-derived markers. Although this procedure reduces the uncertainty in the calculation of conductances, many studies evaluate electrophysiological AP-derived markers from single cell simulations, whereas experimental measurements are obtained from tissue preparations. In this work, we explore the limitations of these approaches to estimate ion channel dynamics and maximum current conductances and how they could be overcome by using multiscale simulations of experimental protocols. Four human ventricular cell models, namely ten Tusscher and Panfilov (2006), Grandi et al. (2010), O'Hara et al. (2011), and Carro et al. (2011), were used. Two problems involving scales from ion channels to tissue were investigated: 1) characterization of L-type calcium voltage-dependent inactivation I Ca,L ; 2) identification of major ionic conductance contributors to steady-state AP markers, including APD 90 , APD 75 , APD 50 , APD 25 , Triangulation and maximal and minimal values of V and dV/dt during the AP (V max , V min , dV/dt max , dV/dt min ). Our results show that: 1) I Ca,L inactivation characteristics differed significantly when calculated from model equations and from simulations reproducing the experimental protocols. 2) Large differences were found in the ionic currents contributors to APD 25 , Triangulation, V max , dV/dt max and dV/dt min between single cells and 1D-tissue. When proposing any new model formulation, or evaluating an existing model, consistency between simulated and experimental data should be verified considering all involved effects and scales. Copyright © 2016 Elsevier Ltd. All rights reserved.

  1. Comparison of calculation and experiment implicates significant electrostatic contributions to the binding stability of barnase and barstar.

    PubMed

    Dong, Feng; Vijayakumar, M; Zhou, Huan-Xiang

    2003-07-01

    The contributions of electrostatic interactions to the binding stability of barnase and barstar were studied by the Poisson-Boltzmann model with three different protocols: a), the dielectric boundary specified as the van der Waals (vdW) surface of the protein along with a protein dielectric constant (epsilon (p)) of 4; b), the dielectric boundary specified as the molecular (i.e., solvent-exclusion (SE)) surface along with epsilon (p) = 4; and c), "SE + epsilon (p) = 20." The "vdW + epsilon (p) = 4" and "SE + epsilon (p) = 20" protocols predicted an overall electrostatic stabilization whereas the "SE + epsilon (p) = 4" protocol predicted an overall electrostatic destabilization. The "vdW + epsilon (p) = 4" protocol was most consistent with experiment. It quantitatively reproduced the observed effects of 17 mutations neutralizing charged residues lining the binding interface and the measured coupling energies of six charge pairs across the interface and reasonably rationalized the experimental ionic strength and pH dependences of the binding constant. In contrast, the "SE + epsilon (p) = 4" protocol predicted significantly larger coupling energies of charge pairs whereas the "SE + epsilon (p) = 20" protocol did not predict any pH dependence. This study calls for further scrutiny of the different Poisson-Boltzmann protocols and demonstrates potential danger in drawing conclusions on electrostatic contributions based on a particular calculation protocol.

  2. An improved method for growing neurons: Comparison with standard protocols.

    PubMed

    Pozzi, Diletta; Ban, Jelena; Iseppon, Federico; Torre, Vincent

    2017-03-15

    Since different culturing parameters - such as media composition or cell density - lead to different experimental results, it is important to define the protocol used for neuronal cultures. The vital role of astrocytes in maintaining homeostasis of neurons - both in vivo and in vitro - is well established: the majority of improved culturing conditions for primary dissociated neuronal cultures rely on astrocytes. Our culturing protocol is based on a novel serum-free preparation of astrocyte - conditioned medium (ACM). We compared the proposed ACM culturing method with other two commonly used methods Neurobasal/B27- and FBS- based media. We performed morphometric characterization by immunocytochemistry and functional analysis by calcium imaging for all three culture methods at 1, 7, 14 and 60days in vitro (DIV). ACM-based cultures gave the best results for all tested criteria, i.e. growth cone's size and shape, neuronal outgrowth and branching, network activity and synchronization, maturation and long-term survival. The differences were more pronounced when compared with FBS-based medium. Neurobasal/B27 cultures were comparable to ACM for young cultures (DIV1), but not for culturing times longer than DIV7. ACM-based cultures showed more robust neuronal outgrowth at DIV1. At DIV7 and 60, the activity of neuronal network grown in ACM had a more vigorous spontaneous electrical activity and a higher degree of synchronization. We propose our ACM-based culture protocol as an improved and more suitable method for both short- and long-term neuronal cultures. Copyright © 2017 Elsevier B.V. All rights reserved.

  3. An energy-efficient MAC protocol using dynamic queue management for delay-tolerant mobile sensor networks.

    PubMed

    Li, Jie; Li, Qiyue; Qu, Yugui; Zhao, Baohua

    2011-01-01

    Conventional MAC protocols for wireless sensor network perform poorly when faced with a delay-tolerant mobile network environment. Characterized by a highly dynamic and sparse topology, poor network connectivity as well as data delay-tolerance, delay-tolerant mobile sensor networks exacerbate the severe power constraints and memory limitations of nodes. This paper proposes an energy-efficient MAC protocol using dynamic queue management (EQ-MAC) for power saving and data queue management. Via data transfers initiated by the target sink and the use of a dynamic queue management strategy based on priority, EQ-MAC effectively avoids untargeted transfers, increases the chance of successful data transmission, and makes useful data reach the target terminal in a timely manner. Experimental results show that EQ-MAC has high energy efficiency in comparison with a conventional MAC protocol. It also achieves a 46% decrease in packet drop probability, 79% increase in system throughput, and 25% decrease in mean packet delay.

  4. An Energy-Efficient MAC Protocol Using Dynamic Queue Management for Delay-Tolerant Mobile Sensor Networks

    PubMed Central

    Li, Jie; Li, Qiyue; Qu, Yugui; Zhao, Baohua

    2011-01-01

    Conventional MAC protocols for wireless sensor network perform poorly when faced with a delay-tolerant mobile network environment. Characterized by a highly dynamic and sparse topology, poor network connectivity as well as data delay-tolerance, delay-tolerant mobile sensor networks exacerbate the severe power constraints and memory limitations of nodes. This paper proposes an energy-efficient MAC protocol using dynamic queue management (EQ-MAC) for power saving and data queue management. Via data transfers initiated by the target sink and the use of a dynamic queue management strategy based on priority, EQ-MAC effectively avoids untargeted transfers, increases the chance of successful data transmission, and makes useful data reach the target terminal in a timely manner. Experimental results show that EQ-MAC has high energy efficiency in comparison with a conventional MAC protocol. It also achieves a 46% decrease in packet drop probability, 79% increase in system throughput, and 25% decrease in mean packet delay. PMID:22319385

  5. A smart checkpointing scheme for improving the reliability of clustering routing protocols.

    PubMed

    Min, Hong; Jung, Jinman; Kim, Bongjae; Cho, Yookun; Heo, Junyoung; Yi, Sangho; Hong, Jiman

    2010-01-01

    In wireless sensor networks, system architectures and applications are designed to consider both resource constraints and scalability, because such networks are composed of numerous sensor nodes with various sensors and actuators, small memories, low-power microprocessors, radio modules, and batteries. Clustering routing protocols based on data aggregation schemes aimed at minimizing packet numbers have been proposed to meet these requirements. In clustering routing protocols, the cluster head plays an important role. The cluster head collects data from its member nodes and aggregates the collected data. To improve reliability and reduce recovery latency, we propose a checkpointing scheme for the cluster head. In the proposed scheme, backup nodes monitor and checkpoint the current state of the cluster head periodically. We also derive the checkpointing interval that maximizes reliability while using the same amount of energy consumed by clustering routing protocols that operate without checkpointing. Experimental comparisons with existing non-checkpointing schemes show that our scheme reduces both energy consumption and recovery latency.

  6. A Smart Checkpointing Scheme for Improving the Reliability of Clustering Routing Protocols

    PubMed Central

    Min, Hong; Jung, Jinman; Kim, Bongjae; Cho, Yookun; Heo, Junyoung; Yi, Sangho; Hong, Jiman

    2010-01-01

    In wireless sensor networks, system architectures and applications are designed to consider both resource constraints and scalability, because such networks are composed of numerous sensor nodes with various sensors and actuators, small memories, low-power microprocessors, radio modules, and batteries. Clustering routing protocols based on data aggregation schemes aimed at minimizing packet numbers have been proposed to meet these requirements. In clustering routing protocols, the cluster head plays an important role. The cluster head collects data from its member nodes and aggregates the collected data. To improve reliability and reduce recovery latency, we propose a checkpointing scheme for the cluster head. In the proposed scheme, backup nodes monitor and checkpoint the current state of the cluster head periodically. We also derive the checkpointing interval that maximizes reliability while using the same amount of energy consumed by clustering routing protocols that operate without checkpointing. Experimental comparisons with existing non-checkpointing schemes show that our scheme reduces both energy consumption and recovery latency. PMID:22163389

  7. Experimental and numerical analysis of penetration/removal response of endodontic instrument made of single crystal Cu-based SMA: comparison with NiTi SMA instruments

    NASA Astrophysics Data System (ADS)

    Vincent, M.; Xolin, P.; Gevrey, A.-M.; Thiebaud, F.; Engels-Deutsch, M.; Ben Zineb, T.

    2017-04-01

    This paper presents an experimental and numerical study showing that single crystal shape memory alloy (SMA) Cu-based endodontic instruments can lead to equivalent mechanical performances compared to NiTi-based instruments besides their interesting biological properties. Following a previous finite element analysis (FEA) of single crystal CuAlBe endodontic instruments (Vincent et al 2015 J. Mater. Eng. Perform. 24 4128-39), prototypes with the determined geometrical parameters were machined and experimentally characterized in continuous rotation during a penetration/removal (P/R) protocol in artificial canals. The obtained mechanical responses were compared to responses of NiTi endodontic files in the same conditions. In addition, FEA was conducted and compared with the experimental results to validate the adopted modeling and to evaluate the local quantities inside the instrument as the stress state and the distribution of volume fraction of martensite. The obtained results highlight that single crystal CuAlBe SMA prototypes show equivalent mechanical responses to its NiTi homologous prototypes in the same P/R experimental conditions.

  8. Experimental demonstration of an OpenFlow based software-defined optical network employing packet, fixed and flexible DWDM grid technologies on an international multi-domain testbed.

    PubMed

    Channegowda, M; Nejabati, R; Rashidi Fard, M; Peng, S; Amaya, N; Zervas, G; Simeonidou, D; Vilalta, R; Casellas, R; Martínez, R; Muñoz, R; Liu, L; Tsuritani, T; Morita, I; Autenrieth, A; Elbers, J P; Kostecki, P; Kaczmarek, P

    2013-03-11

    Software defined networking (SDN) and flexible grid optical transport technology are two key technologies that allow network operators to customize their infrastructure based on application requirements and therefore minimizing the extra capital and operational costs required for hosting new applications. In this paper, for the first time we report on design, implementation & demonstration of a novel OpenFlow based SDN unified control plane allowing seamless operation across heterogeneous state-of-the-art optical and packet transport domains. We verify and experimentally evaluate OpenFlow protocol extensions for flexible DWDM grid transport technology along with its integration with fixed DWDM grid and layer-2 packet switching.

  9. Loaded hip thrust-based PAP protocol effects on acceleration and sprint performance of handball players.

    PubMed

    Dello Iacono, Antonio; Padulo, Johnny; Seitz, Laurent D

    2018-06-01

    This study aimed to investigate the acute effects of two barbell hip thrust-based (BHT) post-activation potentiation (PAP) protocols on subsequent sprint performance. Using a crossover design, eighteen handball athletes performed maximal 15-m sprints before and 15s, 4min and 8min after two experimental protocols consisting of BHT loaded with either 50% or 85% 1RM (50PAP and 85PAP, respectively), in order to profile the transient PAP effects. The resulting sprint performances were significantly impaired at 15s only after the 85PAP protocol, which induced likely and very likely greater decreases compared to the 50PAP. At 4min and 8min, significant improvements and very likely beneficial effects were observed in the 10m and 15m performances following both protocols. Significant differences were found when comparing the two PAPs over time; the results suggested very likely greater performance improvements in 10m following the 85PAP after 4min and 8min, and possible greater performance improvements in 15m after 4min. Positive correlations between BHT 1RMs values and the greatest individual PAP responses on sprint performance were found. This investigation showed that both moderate and intensive BHT exercises can induce a PAP response, but the effects may differ according to the recovery following the potentiating stimulus and the individual`s strength level.

  10. Experimental aspect of solid-state nuclear magnetic resonance studies of biomaterials such as bones.

    PubMed

    Singh, Chandan; Rai, Ratan Kumar; Sinha, Neeraj

    2013-01-01

    Solid-state nuclear magnetic resonance (SSNMR) spectroscopy is increasingly becoming a popular technique to probe micro-structural details of biomaterial such as bone with pico-meter resolution. Due to high-resolution structural details probed by SSNMR methods, handling of bone samples and experimental protocol are very crucial aspects of study. We present here first report of the effect of various experimental protocols and handling methods of bone samples on measured SSNMR parameters. Various popular SSNMR experiments were performed on intact cortical bone sample collected from fresh animal, immediately after removal from animal systems, and results were compared with bone samples preserved in different conditions. We find that the best experimental conditions for SSNMR parameters of bones correspond to preservation at -20 °C and in 70% ethanol solution. Various other SSNMR parameters were compared corresponding to different experimental conditions. Our study has helped in finding best experimental protocol for SSNMR studies of bone. This study will be of further help in the application of SSNMR studies on large bone disease related animal model systems for statistically significant results. © 2013 Elsevier Inc. All rights reserved.

  11. Experimental demonstration of polarization encoding quantum key distribution system based on intrinsically stable polarization-modulated units.

    PubMed

    Wang, Jindong; Qin, Xiaojuan; Jiang, Yinzhu; Wang, Xiaojing; Chen, Liwei; Zhao, Feng; Wei, Zhengjun; Zhang, Zhiming

    2016-04-18

    A proof-of-principle demonstration of a one-way polarization encoding quantum key distribution (QKD) system is demonstrated. This approach can automatically compensate for birefringence and phase drift. This is achieved by constructing intrinsically stable polarization-modulated units (PMUs) to perform the encoding and decoding, which can be used with four-state protocol, six-state protocol, and the measurement-device-independent (MDI) scheme. A polarization extinction ratio of about 30 dB was maintained for several hours over a 50 km optical fiber without any adjustments to our setup, which evidences its potential for use in practical applications.

  12. Virioplankton 'pegylation': use of PEG (polyethylene glycol) to concentrate and purify viruses in pelagic ecosystems.

    PubMed

    Colombet, J; Robin, A; Lavie, L; Bettarel, Y; Cauchie, H M; Sime-Ngando, T

    2007-12-01

    We have described the use of Polyethylene glycol (PEG) for the precipitation of natural communities of aquatic viruses, and its comparison with the usual concentration method based on ultracentrifugation. Experimental samples were obtained from different freshwater ecosystems whose trophic status varied. Based on transmission electron microscope observations and counting of phage-shaped particles, our results showed that the greatest recovery efficiency for all ecosystems was obtained when we used the PEG protocol. On average, this protocol allowed the recovery of >2-fold more viruses, compared to ultracentrifugation. In addition, the diversity of virioplankton, based on genomic size profiling using pulsed field gel electrophoresis, was higher and better discriminated when we used the PEG method. We conclude that pegylation offers a valid, simple and cheaper alternative method to ultracentrifugation, for the concentration and the purification of pelagic viruses.

  13. The effectiveness of a web-based brief alcohol intervention in reducing heavy drinking among adolescents aged 15 to 20 years with a low educational background: study protocol for a randomized controlled trial.

    PubMed

    Voogt, Carmen V; Poelen, Evelien A P; Lemmers, Lex A C J; Engels, Rutger C M E

    2012-06-15

    The serious negative health consequences of heavy drinking among adolescents is cause for concern, especially among adolescents aged 15 to 20 years with a low educational background. In the Netherlands, there is a lack of alcohol prevention programs directed to the drinking patterns of this specific target group. The study described in this protocol will test the effectiveness of a web-based brief alcohol intervention that aims to reduce alcohol use among heavy drinking adolescents aged 15 to 20 years with a low educational background. The effectiveness of the What Do You Drink (WDYD) web-based brief alcohol intervention will be tested among 750 low-educated, heavy drinking adolescents. It will use a two-arm parallel group cluster randomized controlled trial. Classes of adolescents from educational institutions will be randomly assigned to either the experimental (n = 375: web-based brief alcohol intervention) or control condition (n = 375: no intervention). Primary outcomes measures will be: 1) the percentage of participants who drink within the normative limits of the Dutch National Health Council for low-risk drinking, 2) reductions in mean weekly alcohol consumption, and 3) frequency of binge drinking. The secondary outcome measures include the alcohol-related cognitions, attitudes, self-efficacy, and subjective norms, which will be measured at baseline and at one and six months after the intervention. This study protocol presents the study design of a two-arm parallel-group randomized controlled trial to evaluate the effectiveness of the WDYD web-based brief alcohol intervention. We hypothesized a reduction in mean weekly alcohol consumption and in the frequency of binge drinking in the experimental condition, resulting from the web-based brief alcohol intervention, compared to the control condition. Netherlands Trial Register NTR2971.

  14. Using the Intervention Mapping protocol to develop a family-based intervention for improving lifestyle habits among overweight and obese children: study protocol for a quasi-experimental trial.

    PubMed

    Stea, Tonje Holte; Haugen, Tommy; Berntsen, Sveinung; Guttormsen, Vigdis; Øverby, Nina Cecilie; Haraldstad, Kristin; Meland, Eivind; Abildsnes, Eirik

    2016-10-18

    In light of the high prevalence of childhood overweight and obesity, there is a need of developing effective prevention programs to address the rising prevalence and the concomitant health consequences. The main aim of the present study is to systematically develop and implement a tailored family-based intervention for improving lifestyle habits among overweight and obese children, aged 6-10 years old, enhancing parental self-efficacy, family engagement and parent-child interaction. A subsidiary aim of the intervention study is to reduce the prevalence of overweight and obesity among those participating in the intervention study. The Intervention Mapping protocol was used to develop a tailored family-based intervention for improving lifestyle habits among overweight and obese children. In order to gather information on local opportunities and barriers, interviews with key stakeholders and a 1-year pilot study was conducted. The main study has used a quasi-experimental controlled design. Locally based Healthy Life Centers and Public Health Clinics are responsible for recruiting families and conducting the intervention. The effect of the study will be measured both at completion of the 6 months intervention study and 6 and 18 months after the intervention period. An ecological approach was used as a basis for developing the intervention. The behavioral models and educational strategies include individual family counselling meetings, workshops focusing on regulation of family life, nutrition courses, and physical activity groups providing tailored information and practical learning sessions. Parents will be educated on how to use these strategies at home, to further support their children in improving their behaviors. A systematic and evidence-based approach was used for development of this family-based intervention study targeting overweight and obese children, 6-10 years old. This program, if feasible and effective, may be adjusted to local contexts and implemented in all municipal health care institutions in Norway. NCT02247219 . Prospectively registered on October 26, 2014.

  15. Non-local classical optical correlation and implementing analogy of quantum teleportation

    PubMed Central

    Sun, Yifan; Song, Xinbing; Qin, Hongwei; Zhang, Xiong; Yang, Zhenwei; Zhang, Xiangdong

    2015-01-01

    This study reports an experimental realization of non-local classical optical correlation from the Bell's measurement used in tests of quantum non-locality. Based on such a classical Einstein–Podolsky–Rosen optical correlation, a classical analogy has been implemented to the true meaning of quantum teleportation. In the experimental teleportation protocol, the initial teleported information can be unknown to anyone and the information transfer can happen over arbitrary distances. The obtained results give novel insight into quantum physics and may open a new field of applications in quantum information. PMID:25779977

  16. Experimental realization of an entanglement access network and secure multi-party computation

    PubMed Central

    Chang, X.-Y.; Deng, D.-L.; Yuan, X.-X.; Hou, P.-Y.; Huang, Y.-Y.; Duan, L.-M.

    2016-01-01

    To construct a quantum network with many end users, it is critical to have a cost-efficient way to distribute entanglement over different network ends. We demonstrate an entanglement access network, where the expensive resource, the entangled photon source at the telecom wavelength and the core communication channel, is shared by many end users. Using this cost-efficient entanglement access network, we report experimental demonstration of a secure multiparty computation protocol, the privacy-preserving secure sum problem, based on the network quantum cryptography. PMID:27404561

  17. A protocol for rat in vitro fertilization during conventional laboratory working hours.

    PubMed

    Aoto, Toshihiro; Takahashi, Ri-ichi; Ueda, Masatsugu

    2011-12-01

    In vitro fertilization (IVF) is a valuable technique for the propagation of experimental animals. IVF has typically been used in mice to rapidly expand breeding colonies and create large numbers of embryos. However, applications of IVF in rat breeding experiments have stalled due to the inconvenient laboratory work schedules imposed by current IVF protocols for this species. Here, we developed a new rat IVF protocol that consists of experimental steps performed during common laboratory working hours. Our protocol can be completed within 12 h by shortening the period of sperm capacitation from 5 to 1 h and the fertilization time from 10 to 8 h in human tubal fluid (HTF) medium. This new protocol generated an excellent birth rate and was applicable not only to closed colony rat strains, such as Wistar, Long-Evans, and Sprague-Dawley (SD), but also to the inbred Lewis strain. Moreover, Wistar and Long-Evans embryos prepared by this protocol were successfully frozen by vitrification and later successfully thawed and resuscitated. This protocol is practical and can be easily adopted by laboratory workers.

  18. Security proof of a three-state quantum-key-distribution protocol without rotational symmetry

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Fung, C.-H.F.; Lo, H.-K.

    2006-10-15

    Standard security proofs of quantum-key-distribution (QKD) protocols often rely on symmetry arguments. In this paper, we prove the security of a three-state protocol that does not possess rotational symmetry. The three-state QKD protocol we consider involves three qubit states, where the first two states |0{sub z}> and |1{sub z}> can contribute to key generation, and the third state |+>=(|0{sub z}>+|1{sub z}>)/{radical}(2) is for channel estimation. This protocol has been proposed and implemented experimentally in some frequency-based QKD systems where the three states can be prepared easily. Thus, by founding on the security of this three-state protocol, we prove that thesemore » QKD schemes are, in fact, unconditionally secure against any attacks allowed by quantum mechanics. The main task in our proof is to upper bound the phase error rate of the qubits given the bit error rates observed. Unconditional security can then be proved not only for the ideal case of a single-photon source and perfect detectors, but also for the realistic case of a phase-randomized weak coherent light source and imperfect threshold detectors. Our result in the phase error rate upper bound is independent of the loss in the channel. Also, we compare the three-state protocol with the Bennett-Brassard 1984 (BB84) protocol. For the single-photon source case, our result proves that the BB84 protocol strictly tolerates a higher quantum bit error rate than the three-state protocol, while for the coherent-source case, the BB84 protocol achieves a higher key generation rate and secure distance than the three-state protocol when a decoy-state method is used.« less

  19. Neonatal corticosterone administration in rodents as a tool to investigate the maternal programming of emotional and immune domains.

    PubMed

    Macrì, Simone

    2017-02-01

    Neonatal experiences exert persistent influences on individual development. These influences encompass numerous domains including emotion, cognition, reactivity to external stressors and immunity. The comprehensive nature of the neonatal programming of individual phenotype is reverberated in the large amount of experimental data collected by many authors in several scientific fields: biomedicine, evolutionary and molecular biology. These data support the view that variations in precocious environmental conditions may calibrate the individual phenotype at many different levels. Environmental influences have been traditionally addressed through experimental paradigms entailing the modification of the neonatal environment and the multifactorial (e.g. behaviour, endocrinology, cellular and molecular biology) analysis of the developing individual's phenotype. These protocols suggested that the role of the mother in mediating the offspring's phenotype is often associated with the short-term effects of environmental manipulations on dam's physiology. Specifically, environmental manipulations may induce fluctuations in maternal corticosteroids (corticosterone in rodents) which, in turn, are translated to the offspring through lactation. Herein, I propose that this mother-offspring transfer mechanism can be leveraged to devise experimental protocols based on the exogenous administration of corticosterone during lactation. To support this proposition, I refer to a series of studies in which these protocols have been adopted to investigate the neonatal programming of individual phenotype at the level of emotional and immune regulations. While these paradigms cannot replace traditional studies, I suggest that they can be considered a valid complement.

  20. Experimental Optimal Single Qubit Purification in an NMR Quantum Information Processor

    PubMed Central

    Hou, Shi-Yao; Sheng, Yu-Bo; Feng, Guan-Ru; Long, Gui-Lu

    2014-01-01

    High quality single qubits are the building blocks in quantum information processing. But they are vulnerable to environmental noise. To overcome noise, purification techniques, which generate qubits with higher purities from qubits with lower purities, have been proposed. Purifications have attracted much interest and been widely studied. However, the full experimental demonstration of an optimal single qubit purification protocol proposed by Cirac, Ekert and Macchiavello [Phys. Rev. Lett. 82, 4344 (1999), the CEM protocol] more than one and half decades ago, still remains an experimental challenge, as it requires more complicated networks and a higher level of precision controls. In this work, we design an experiment scheme that realizes the CEM protocol with explicit symmetrization of the wave functions. The purification scheme was successfully implemented in a nuclear magnetic resonance quantum information processor. The experiment fully demonstrated the purification protocol, and showed that it is an effective way of protecting qubits against errors and decoherence. PMID:25358758

  1. Reduction of relative centrifugation force within injectable platelet-rich-fibrin (PRF) concentrates advances patients' own inflammatory cells, platelets and growth factors: the first introduction to the low speed centrifugation concept.

    PubMed

    Choukroun, J; Ghanaati, S

    2018-02-01

    The aim of this study was to analyze systematically the influence of the relative centrifugation force (RCF) on leukocytes, platelets and growth factor release within fluid platelet-rich fibrin matrices (PRF). Systematically using peripheral blood from six healthy volunteers, the RCF was reduced four times for each of the three experimental protocols (I-III) within the spectrum (710-44 g), while maintaining a constant centrifugation time. Flow cytometry was applied to determine the platelets and leukocyte number. The growth factor concentration was quantified 1 and 24 h after clotting using ELISA. Reducing RCF in accordance with protocol-II (177 g) led to a significantly higher platelets and leukocytes numbers compared to protocol-I (710 g). Protocol-III (44 g) showed a highly significant increase of leukocytes and platelets number in comparison to -I and -II. The growth factors' concentration of VEGF and TGF-β1 was significantly higher in protocol-II compared to -I, whereas protocol-III exhibited significantly higher growth factor concentration compared to protocols-I and -II. These findings were observed among 1 and 24 h after clotting, as well as the accumulated growth factor concentration over 24 h. Based on the results, it has been demonstrated that it is possible to enrich PRF-based fluid matrices with leukocytes, platelets and growth factors by means of a single alteration of the centrifugation settings within the clinical routine. We postulate that the so-called low speed centrifugation concept (LSCC) selectively enriches leukocytes, platelets and growth factors within fluid PRF-based matrices. Further studies are needed to evaluate the effect of cell and growth factor enrichment on wound healing and tissue regeneration while comparing blood concentrates gained by high and low RCF.

  2. SNMP-SI: A Network Management Tool Based on Slow Intelligence System Approach

    NASA Astrophysics Data System (ADS)

    Colace, Francesco; de Santo, Massimo; Ferrandino, Salvatore

    The last decade has witnessed an intense spread of computer networks that has been further accelerated with the introduction of wireless networks. Simultaneously with, this growth has increased significantly the problems of network management. Especially in small companies, where there is no provision of personnel assigned to these tasks, the management of such networks is often complex and malfunctions can have significant impacts on their businesses. A possible solution is the adoption of Simple Network Management Protocol. Simple Network Management Protocol (SNMP) is a standard protocol used to exchange network management information. It is part of the Transmission Control Protocol/Internet Protocol (TCP/IP) protocol suite. SNMP provides a tool for network administrators to manage network performance, find and solve network problems, and plan for network growth. SNMP has a big disadvantage: its simple design means that the information it deals with is neither detailed nor well organized enough to deal with the expanding modern networking requirements. Over the past years much efforts has been given to improve the lack of Simple Network Management Protocol and new frameworks has been developed: A promising approach involves the use of Ontology. This is the starting point of this paper where a novel approach to the network management based on the use of the Slow Intelligence System methodologies and Ontology based techniques is proposed. Slow Intelligence Systems is a general-purpose systems characterized by being able to improve performance over time through a process involving enumeration, propagation, adaptation, elimination and concentration. Therefore, the proposed approach aims to develop a system able to acquire, according to an SNMP standard, information from the various hosts that are in the managed networks and apply solutions in order to solve problems. To check the feasibility of this model first experimental results in a real scenario are showed.

  3. Status and trends monitoring of riparian and aquatic habitat in the Olympic Experimental State Forest: Monitoring protocols

    Treesearch

    Teodora Minkova; Alex D. Foster

    2017-01-01

    Presented here are the monitoring protocols for the Status and Trends Monitoring of Riparian and Aquatic Habitats project in the Olympic Experimental State Forest (OESF). The procedures yield the empirical data needed to address key uncertainties regarding the integration of timber production and habitat conservation across landscapes and assess progress toward...

  4. Space, time, and host evolution facilitate coexistence of competing bacteriophages: theory and experiment.

    PubMed

    Coberly, L Caitlin; Wei, Wei; Sampson, Koffi Y; Millstein, Jack; Wichman, Holly A; Krone, Stephen M

    2009-04-01

    We present a joint experimental/theoretical investigation into the roles of spatial structure and time in the competition between two pathogens for a single host. We suggest a natural mechanism by which competing pathogens can coexist when host evolution and competitive dynamics occur on similar timescales. Our experimental system consisted of a single bacterial host species and two competing bacteriophage strains grown on agar plates, with a serial transfer of samples of the bacteriophage population to fresh host populations after each incubation cycle. The experiments included two incubation times and two transfer protocols that either maintained or disrupted the spatial structure of the viruses at each transfer. The same bacteriophage acted as the dominant competitor under both transfer protocols. A striking difference between the treatments is that the weak competitor was able to persist in the long-incubation experiments but not in the short-incubation experiments. Mathematical and experimental evidence suggest that coexistence is due to the appearance of resistant mutant host cells that provide a transient "spatiotemporal refuge" for the weaker competitor. Our mathematical model is individual based, captures the stochastic spatial dynamics down to the level of individual cells, and helps to explain the differences in behavior under the various experimental conditions.

  5. Establishment of a novel experimental protocol for drug-induced seizure liability screening based on a locomotor activity assay in zebrafish.

    PubMed

    Koseki, Naoteru; Deguchi, Jiro; Yamashita, Akihito; Miyawaki, Izuru; Funabashi, Hitoshi

    2014-08-01

    As drug-induced seizures have severe impact on drug development, evaluating seizure induction potential of candidate drugs at the early stages of drug discovery is important. A novel assay system using zebrafish has attracted interest as a high throughput toxicological in vivo assay system, and we tried to establish an experimental method for drug-induced seizure liability on the basis of locomotor activity in zebrafish. We monitored locomotor activity at high-speed movement (> 20 mm/sec) for 60 min immediately after exposure, and assessed seizure liability potential in some drugs using locomotor activity. However this experimental procedure was not sufficient for predicting seizures because the potential of several drugs with demonstrated seizure potential in mammals was not detected. We, therefore, added other parameters for locomotor activity such as extending exposure time or conducting flashlight stimulation (10 Hz) which is a known seizure induction stimulus, and these additional parameters improved seizure potential detection in some drugs. The validation study using the improved methodology was used to assess 52 commercially available drugs, and the prediction rate was approximately 70%. The experimental protocol established in this present study is considered useful for seizure potential screening during early stages of drug discovery.

  6. Polarization entanglement purification of nonlocal microwave photons based on the cross-Kerr effect in circuit QED

    NASA Astrophysics Data System (ADS)

    Zhang, Hao; Liu, Qian; Xu, Xu-Sheng; Xiong, Jun; Alsaedi, Ahmed; Hayat, Tasawar; Deng, Fu-Guo

    2017-11-01

    Microwave photons have become very important qubits in quantum communication, as the first quantum satellite has been launched successfully. Therefore, it is a necessary and meaningful task for ensuring the high security and efficiency of microwave-based quantum communication in practice. Here, we present an original polarization entanglement purification protocol for nonlocal microwave photons based on the cross-Kerr effect in circuit quantum electrodynamics (QED). Our protocol can solve the problem that the purity of maximally entangled states used for constructing quantum channels will decrease due to decoherence from environment noise. This task is accomplished by means of the polarization parity-check quantum nondemolition (QND) detector, the bit-flipping operation, and the linear microwave elements. The QND detector is composed of several cross-Kerr effect systems which can be realized by coupling two superconducting transmission line resonators to a superconducting molecule with the N -type level structure. We give the applicable experimental parameters of QND measurement system in circuit QED and analyze the fidelities. Our protocol has good applications in long-distance quantum communication assisted by microwave photons in the future, such as satellite quantum communication.

  7. The Spanish Version of the Unified Protocol for Transdiagnostic Treatment of Emotional Disorders in Adolescents (UP-A) Adapted as a School-Based Anxiety and Depression Prevention Program: Study Protocol for a Cluster Randomized Controlled Trial.

    PubMed

    García-Escalera, Julia; Valiente, Rosa M; Chorot, Paloma; Ehrenreich-May, Jill; Kennedy, Sarah M; Sandín, Bonifacio

    2017-08-21

    Anxiety and depression are common, impairing conditions that evidence high comorbidity rates in adolescence. The Unified Protocol for Transdiagnostic Treatment of Emotional Disorders in Adolescents (UP-A) is one of the few existing resources aimed at applying transdiagnostic treatment principles to target core dysfunctions associated with both anxiety and depression within a single protocol. To our knowledge, this is the first study examining the efficacy of the UP-A adapted as a universal preventive intervention program. The primary aim of this study is to examine whether the Spanish version of the UP-A is more effective than a waitlist (WL) control group in reducing and preventing symptoms of anxiety and depression when employed as a universal, classroom-based preventive intervention. The secondary aim is to investigate changes in a broad range of secondary outcome measures, including negative and positive affect, anxiety sensitivity, emotional avoidance, top problems ratings, school grades, depression and anxiety-related interference, self-esteem, life satisfaction, quality of life, conduct problems, hyperactivity/inattention symptoms, peer problems, prosocial behavior, school adjustment, and discipline problems. Other aims are to assess a range of possible predictors of intervention effects and to examine the feasibility and the acceptability of implementing UP-A in a prevention group format and in a school setting. A cluster, randomized, WL, controlled trial design with classroom as the unit of randomization was used in this study. Five classes including a total of 152 adolescents were randomized to the experimental or WL control groups. Participants in the experimental group received 9 55-minute sessions delivered by advanced doctoral and masters students in clinical psychology. The WL control group will receive the intervention once the 3-month follow-up assessment is completed. We have recruited participants to the cluster randomized controlled trial (RCT) and have conducted the intervention with the experimental group. We expect the WL control group to complete the intervention in July 2017. Data analysis will take place during the second semester of 2017. We expect the experimental group to outperform the WL control group at post-intervention and 3-month follow-up. We also expect the WL control group to show improvements in primary and secondary outcome measures after receiving the intervention. Results will have implications for researchers, families, and education providers. Clinicaltrials.gov NCT03123991; https://clinicaltrials.gov/ct2/show/NCT03123991 (Archived by WebCite at http://www.webcitation.org/6qp7GIzcR). ©Julia García-Escalera, Rosa M Valiente, Paloma Chorot, Jill Ehrenreich-May, Sarah M Kennedy, Bonifacio Sandín. Originally published in JMIR Research Protocols (http://www.researchprotocols.org), 21.08.2017.

  8. Inspection of care: Findings from an innovative demonstration

    PubMed Central

    Morris, John N.; Sherwood, Clarence C.; Dreyer, Paul

    1989-01-01

    In this article, information is presented concerning the efficacy of a sample-based approach to completing inspection of care reviews of Medicaid-supported nursing home residents. Massachusetts nursing homes were randomly assigned to full (the control group) or sample (the experimental group) review conditions. The primary research focus was to determine whether the proportion of facilities found to be deficient (based on quality of care and level of care criteria) in the experimental sample was comparable to the proportion in the control sample. The findings supported such a hypothesis: Deficient facilities appear to be equally identifiable using the random or full-sampling protocols, and the process can be completed with a considerable savings of surveyor time. PMID:10313458

  9. Advertisement-Based Energy Efficient Medium Access Protocols for Wireless Sensor Networks

    NASA Astrophysics Data System (ADS)

    Ray, Surjya Sarathi

    One of the main challenges that prevents the large-scale deployment of Wireless Sensor Networks (WSNs) is providing the applications with the required quality of service (QoS) given the sensor nodes' limited energy supplies. WSNs are an important tool in supporting applications ranging from environmental and industrial monitoring, to battlefield surveillance and traffic control, among others. Most of these applications require sensors to function for long periods of time without human intervention and without battery replacement. Therefore, energy conservation is one of the main goals for protocols for WSNs. Energy conservation can be performed in different layers of the protocol stack. In particular, as the medium access control (MAC) layer can access and control the radio directly, large energy savings is possible through intelligent MAC protocol design. To maximize the network lifetime, MAC protocols for WSNs aim to minimize idle listening of the sensor nodes, packet collisions, and overhearing. Several approaches such as duty cycling and low power listening have been proposed at the MAC layer to achieve energy efficiency. In this thesis, I explore the possibility of further energy savings through the advertisement of data packets in the MAC layer. In the first part of my research, I propose Advertisement-MAC or ADV-MAC, a new MAC protocol for WSNs that utilizes the concept of advertising for data contention. This technique lets nodes listen dynamically to any desired transmission and sleep during transmissions not of interest. This minimizes the energy lost in idle listening and overhearing while maintaining an adaptive duty cycle to handle variable loads. Additionally, ADV-MAC enables energy efficient MAC-level multicasting. An analytical model for the packet delivery ratio and the energy consumption of the protocol is also proposed. The analytical model is verified with simulations and is used to choose an optimal value of the advertisement period. Simulations show that the optimized ADV-MAC provides substantial energy gains (50% to 70% less than other MAC protocols for WSNs such as T-MAC and S-MAC for the scenarios investigated) while faring as well as T-MAC in terms of packet delivery ratio and latency. Although ADV-MAC provides substantial energy gains over S-MAC and T-MAC, it is not optimal in terms of energy savings because contention is done twice -- once in the Advertisement Period and once in the Data Period. In the next part of my research, the second contention in the Data Period is eliminated and the advantages of contention-based and TDMA-based protocols are combined to form Advertisement based Time-division Multiple Access (ATMA), a distributed TDMA-based MAC protocol for WSNs. ATMA utilizes the bursty nature of the traffic to prevent energy waste through advertisements and reservations for data slots. Extensive simulations and qualitative analysis show that with bursty traffic, ATMA outperforms contention-based protocols (S-MAC, T-MAC and ADV-MAC), a TDMA based protocol (TRAMA) and hybrid protocols (Z-MAC and IEEE 802.15.4). ATMA provides energy reductions of up to 80%, while providing the best packet delivery ratio (close to 100%) and latency among all the investigated protocols. Simulations alone cannot reflect many of the challenges faced by real implementations of MAC protocols, such as clock-drift, synchronization, imperfect physical layers, and irregular interference from other transmissions. Such issues may cripple a protocol that otherwise performs very well in software simulations. Hence, to validate my research, I conclude with a hardware implementation of the ATMA protocol on SORA (Software Radio), developed by Microsoft Research Asia. SORA is a reprogrammable Software Defined Radio (SDR) platform that satisfies the throughput and timing requirements of modern wireless protocols while utilizing the rich general purpose PC development environment. Experimental results obtained from the hardware implementation of ATMA closely mirror the simulation results obtained for a single hop network with 4 nodes.

  10. A combined experimental and theoretical spectroscopic protocol for determination of the structure of heterogeneous catalysts: developing the information content of the resonance Raman spectra of M1 MoVO x .

    PubMed

    Kubas, Adam; Noak, Johannes; Trunschke, Annette; Schlögl, Robert; Neese, Frank; Maganas, Dimitrios

    2017-09-01

    Absorption and multiwavelength resonance Raman spectroscopy are widely used to investigate the electronic structure of transition metal centers in coordination compounds and extended solid systems. In combination with computational methodologies that have predictive accuracy, they define powerful protocols to study the spectroscopic response of catalytic materials. In this work, we study the absorption and resonance Raman spectra of the M1 MoVO x catalyst. The spectra were calculated by time-dependent density functional theory (TD-DFT) in conjunction with the independent mode displaced harmonic oscillator model (IMDHO), which allows for detailed bandshape predictions. For this purpose cluster models with up to 9 Mo and V metallic centers are considered to represent the bulk structure of MoVO x . Capping hydrogens were used to achieve valence saturation at the edges of the cluster models. The construction of model structures was based on a thorough bonding analysis which involved conventional DFT and local coupled cluster (DLPNO-CCSD(T)) methods. Furthermore the relationship of cluster topology to the computed spectral features is discussed in detail. It is shown that due to the local nature of the involved electronic transitions, band assignment protocols developed for molecular systems can be applied to describe the calculated spectral features of the cluster models as well. The present study serves as a reference for future applications of combined experimental and computational protocols in the field of solid-state heterogeneous catalysis.

  11. Functional genomics platform for pooled screening and mammalian genetic interaction maps

    PubMed Central

    Kampmann, Martin; Bassik, Michael C.; Weissman, Jonathan S.

    2014-01-01

    Systematic genetic interaction maps in microorganisms are powerful tools for identifying functional relationships between genes and defining the function of uncharacterized genes. We have recently implemented this strategy in mammalian cells as a two-stage approach. First, genes of interest are robustly identified in a pooled genome-wide screen using complex shRNA libraries. Second, phenotypes for all pairwise combinations of hit genes are measured in a double-shRNA screen and used to construct a genetic interaction map. Our protocol allows for rapid pooled screening under various conditions without a requirement for robotics, in contrast to arrayed approaches. Each stage of the protocol can be implemented in ~2 weeks, with additional time for analysis and generation of reagents. We discuss considerations for screen design, and present complete experimental procedures as well as a full computational analysis suite for identification of hits in pooled screens and generation of genetic interaction maps. While the protocols outlined here were developed for our original shRNA-based approach, they can be applied more generally, including to CRISPR-based approaches. PMID:24992097

  12. A randomized controlled pilot study feasibility of a tablet-based guided audio-visual relaxation intervention for reducing stress and pain in adults with sickle cell disease.

    PubMed

    Ezenwa, Miriam O; Yao, Yingwei; Engeland, Christopher G; Molokie, Robert E; Wang, Zaijie Jim; Suarez, Marie L; Wilkie, Diana J

    2016-06-01

    To test feasibility of a guided audio-visual relaxation intervention protocol for reducing stress and pain in adults with sickle cell disease. Sickle cell pain is inadequately controlled using opioids, necessitating further intervention such as guided relaxation to reduce stress and pain. Attention-control, randomized clinical feasibility pilot study with repeated measures. Randomized to guided relaxation or control groups, all patients recruited between 2013-2014 during clinical visits, completed stress and pain measures via a Galaxy Internet-enabled Android tablet at the Baseline visit (pre/post intervention), 2-week posttest visit and also daily at home between the two visits. Experimental group patients were asked to use a guided relaxation intervention at the Baseline visit and at least once daily for 2 weeks. Control group patients engaged in a recorded sickle cell discussion at the Baseline visit. Data were analysed using linear regression with bootstrapping. At baseline, 27/28 of consented patients completed the study protocol. Group comparison showed that guided relaxation significantly reduced current stress and pain. At the 2-week posttest, 24/27 of patients completed the study, all of whom reported liking the study. Patients completed tablet-based measures on 71% of study days (69% in control group, 72% in experiment group). At the 2-week posttest, the experimental group had significantly lower composite pain index scores, but the two groups did not differ significantly on stress intensity. This study protocol appears feasible. The tablet-based guided relaxation intervention shows promise for reducing sickle cell pain and warrants a larger efficacy trial. The ClinicalTrials.gov Identifier is: NCT02501447. © 2016 John Wiley & Sons Ltd.

  13. Optimization and evaluation of T7 based RNA linear amplification protocols for cDNA microarray analysis

    PubMed Central

    Zhao, Hongjuan; Hastie, Trevor; Whitfield, Michael L; Børresen-Dale, Anne-Lise; Jeffrey, Stefanie S

    2002-01-01

    Background T7 based linear amplification of RNA is used to obtain sufficient antisense RNA for microarray expression profiling. We optimized and systematically evaluated the fidelity and reproducibility of different amplification protocols using total RNA obtained from primary human breast carcinomas and high-density cDNA microarrays. Results Using an optimized protocol, the average correlation coefficient of gene expression of 11,123 cDNA clones between amplified and unamplified samples is 0.82 (0.85 when a virtual array was created using repeatedly amplified samples to minimize experimental variation). Less than 4% of genes show changes in expression level by 2-fold or greater after amplification compared to unamplified samples. Most changes due to amplification are not systematic both within one tumor sample and between different tumors. Amplification appears to dampen the variation of gene expression for some genes when compared to unamplified poly(A)+ RNA. The reproducibility between repeatedly amplified samples is 0.97 when performed on the same day, but drops to 0.90 when performed weeks apart. The fidelity and reproducibility of amplification is not affected by decreasing the amount of input total RNA in the 0.3–3 micrograms range. Adding template-switching primer, DNA ligase, or column purification of double-stranded cDNA does not improve the fidelity of amplification. The correlation coefficient between amplified and unamplified samples is higher when total RNA is used as template for both experimental and reference RNA amplification. Conclusion T7 based linear amplification reproducibly generates amplified RNA that closely approximates original sample for gene expression profiling using cDNA microarrays. PMID:12445333

  14. Scheme for Implementing Teleporting an Arbitrary Tripartite Entangled State in Cavity QED

    NASA Astrophysics Data System (ADS)

    Wang, Xue-Wen; Peng, Zhao-Hui

    2009-10-01

    We propose to teleport an arbitrary tripartite entangled state in cavity QED. In this scheme, the five-qubit Brown state is chosen as the quantum channel. It has been shown that the teleportation protocol can be completed perfectly with two different measurement methods. In the future, our scheme might be realizable based on present experimental technology.

  15. Design and creation of an experimental program of advanced training in reconstructive microsurgery.

    PubMed

    Lorenzo, Andrés R; Alvarez, Angel; Garcia-Barreiro, Juan; Centeno, Alberto; Lopez, Eduardo; Martelo, Francisco

    2006-01-01

    In this study, we design an experimental protocol for the purpose of enhancing performance in training in microsurgery. It is based on five free tissue transfer exercises in rat (epigastric cutaneous flap, saphenous fasciocutaneous flap, epigastric neurovascular flap, saphenous muscular flap, and hindlimb replantation), which simulate the principal clinical procedures of reconstructive microsurgery. The first part of the study consists of an anatomical review of the flaps of 5 rats and in the second part we have carried out the free transfer of flaps on 25 rats divided into 5 groups. To differentiate between them, we have created a mathematical function, referred to as difficulty in a microsurgical exercise, which has enabled us to establish a scale of progression for training, ranging form the easiest to the most difficult. As a conclusion, we believe that this protocol is a useful instrument as it allows for a more precise assessment of microsurgical capacity due to enhanced accuracy in the reproduction of global procedures and the fact that the quantification of progress in training is based on clinical monitoring after 7 days. (c) 2006 Wiley-Liss, Inc. Microsurgery, 2006.

  16. Precision genome editing using CRISPR-Cas9 and linear repair templates in C. elegans.

    PubMed

    Paix, Alexandre; Folkmann, Andrew; Seydoux, Geraldine

    2017-05-15

    The ability to introduce targeted edits in the genome of model organisms is revolutionizing the field of genetics. State-of-the-art methods for precision genome editing use RNA-guided endonucleases to create double-strand breaks (DSBs) and DNA templates containing the edits to repair the DSBs. Following this strategy, we have developed a protocol to create precise edits in the C. elegans genome. The protocol takes advantage of two innovations to improve editing efficiency: direct injection of CRISPR-Cas9 ribonucleoprotein complexes and use of linear DNAs with short homology arms as repair templates. The protocol requires no cloning or selection, and can be used to generate base and gene-size edits in just 4days. Point mutations, insertions, deletions and gene replacements can all be created using the same experimental pipeline. Copyright © 2017 The Authors. Published by Elsevier Inc. All rights reserved.

  17. A double fluorescence staining protocol to determine the cross-sectional area of myofibers using image analysis

    NASA Technical Reports Server (NTRS)

    Mozdziak, P. E.; Fassel, T. A.; Schultz, E.; Greaser, M. L.; Cassens, R. G.

    1996-01-01

    A double fluorescence staining protocol was developed to facilitate computer based image analysis. Myofibers from experimentally treated (irradiated) and control growing turkey skeletal muscle were labeled with the anti-myosin antibody MF-20 and detected using fluorescein-5-isothiocyanate (FITC). Extracellular material was stained with concanavalin A (ConA)-Texas red. The cross-sectional area of the myofibers was determined by calculating the number of pixels (0.83 mu m(2)) overlying each myofiber after subtracting the ConA-Texas red image from the MF-20-FITC image for each region of interest. As expected, myofibers in the irradiated muscle were smaller (P < 0.05) than those in the non-irradiated muscle. This double fluorescence staining protocol combined with image analysis is accurate and less labor-intensive than classical procedures for determining the cross-sectional area of myofibers.

  18. Experimental opto-mechanics with levitated nanoparticles: towards quantum control and thermodynamic cycles (Presentation Recording)

    NASA Astrophysics Data System (ADS)

    Kiesel, Nikolai; Blaser, Florian; Delic, Uros; Grass, David; Dechant, Andreas; Lutz, Eric; Bathaee, Marzieh; Aspelmeyer, Markus

    2015-08-01

    Combining optical levitation and cavity optomechanics constitutes a promising approach to prepare and control the motional quantum state of massive objects (>10^9 amu). This, in turn, would represent a completely new type of light-matter interface and has, for example, been predicted to enable experimental tests of macrorealistic models or of non-Newtonian gravity at small length scales. Such ideas have triggered significant experimental efforts to realizing such novel systems. To this end, we have recently successfully demonstrated cavity-cooling of a levitated sub-micron silica particle in a classical regime at a pressure of approximately 1mbar. Access to higher vacuum of approx. 10^-6 mbar has been demonstrated using 3D-feedback cooling in optical tweezers without cavity-coupling. Here we will illustrate our strategy towards trapping, 3D-cooling and quantum control of nanoparticles in ultra-high vacuum using cavity-based feedback cooling methods and clean particle loading with hollow-core photonic crystal fibers. We will also discuss the current experimental progress both in 3D-cavity cooling and HCPCF-based transport of nanoparticles. As yet another application of cavity-controlled levitated nanoparticles we will show how to implement a thermodynamic Sterling cycle operating in the underdamped regime. We present optimized protocols with respect to efficiency at maximum power in this little explored regime. We also show that the excellent level of control in our system will allow reproducing all relevant features of such optimized protocols. In a next step, this will enable studies of thermodynamics cycles in a regime where the quantization of the mechanical motion becomes relevant.

  19. Comparison of Calculation and Experiment Implicates Significant Electrostatic Contributions to the Binding Stability of Barnase and Barstar

    PubMed Central

    Dong, Feng; Vijayakumar, M.; Zhou, Huan-Xiang

    2003-01-01

    The contributions of electrostatic interactions to the binding stability of barnase and barstar were studied by the Poisson-Boltzmann model with three different protocols: a), the dielectric boundary specified as the van der Waals (vdW) surface of the protein along with a protein dielectric constant (ɛp) of 4; b), the dielectric boundary specified as the molecular (i.e., solvent-exclusion (SE)) surface along with ɛp = 4; and c), “SE + ɛp = 20.” The “vdW + ɛp = 4” and “SE + ɛp = 20” protocols predicted an overall electrostatic stabilization whereas the “SE + ɛp = 4” protocol predicted an overall electrostatic destabilization. The “vdW + ɛp = 4” protocol was most consistent with experiment. It quantitatively reproduced the observed effects of 17 mutations neutralizing charged residues lining the binding interface and the measured coupling energies of six charge pairs across the interface and reasonably rationalized the experimental ionic strength and pH dependences of the binding constant. In contrast, the “SE + ɛp = 4” protocol predicted significantly larger coupling energies of charge pairs whereas the “SE + ɛp = 20” protocol did not predict any pH dependence. This study calls for further scrutiny of the different Poisson-Boltzmann protocols and demonstrates potential danger in drawing conclusions on electrostatic contributions based on a particular calculation protocol. PMID:12829463

  20. Architecture Design and Experimental Platform Demonstration of Optical Network based on OpenFlow Protocol

    NASA Astrophysics Data System (ADS)

    Xing, Fangyuan; Wang, Honghuan; Yin, Hongxi; Li, Ming; Luo, Shenzi; Wu, Chenguang

    2016-02-01

    With the extensive application of cloud computing and data centres, as well as the constantly emerging services, the big data with the burst characteristic has brought huge challenges to optical networks. Consequently, the software defined optical network (SDON) that combines optical networks with software defined network (SDN), has attracted much attention. In this paper, an OpenFlow-enabled optical node employed in optical cross-connect (OXC) and reconfigurable optical add/drop multiplexer (ROADM), is proposed. An open source OpenFlow controller is extended on routing strategies. In addition, the experiment platform based on OpenFlow protocol for software defined optical network, is designed. The feasibility and availability of the OpenFlow-enabled optical nodes and the extended OpenFlow controller are validated by the connectivity test, protection switching and load balancing experiments in this test platform.

  1. Practical quantum retrieval games

    NASA Astrophysics Data System (ADS)

    Arrazola, Juan Miguel; Karasamanis, Markos; Lütkenhaus, Norbert

    2016-06-01

    Complex cryptographic protocols are often constructed from simpler building blocks. In order to advance quantum cryptography, it is important to study practical building blocks that can be used to develop new protocols. An example is quantum retrieval games (QRGs), which have broad applicability and have already been used to construct quantum money schemes. In this work, we introduce a general construction of quantum retrieval games based on the hidden matching problem and show how they can be implemented in practice using available technology. More precisely, we provide a general method to construct (1-out-of-k ) QRGs, proving that their cheating probabilities decrease exponentially in k . In particular, we define QRGs based on coherent states of light, which can be implemented even in the presence of experimental imperfections. Our results constitute a tool in the arsenal of the practical quantum cryptographer.

  2. Experimental temporal quantum steering

    PubMed Central

    Bartkiewicz, Karol; Černoch, Antonín; Lemr, Karel; Miranowicz, Adam; Nori, Franco

    2016-01-01

    Temporal steering is a form of temporal correlation between the initial and final state of a quantum system. It is a temporal analogue of the famous Einstein-Podolsky-Rosen (spatial) steering. We demonstrate, by measuring the photon polarization, that temporal steering allows two parties to verify if they have been interacting with the same particle, even if they have no information about what happened with the particle in between the measurements. This is the first experimental study of temporal steering. We also performed experimental tests, based on the violation of temporal steering inequalities, of the security of two quantum key distribution protocols against individual attacks. Thus, these results can lead to applications for secure quantum communications and quantum engineering. PMID:27901121

  3. Cyber-physical experiments on the efficiency of swimming protocols

    NASA Astrophysics Data System (ADS)

    Wei, Nathaniel; Floryan, Daniel; van Buren, Tyler; Smits, Alexander

    2016-11-01

    We present results from experiments on a biologically inspired cyber-physical system, composed of a two-dimensional heaving and pitching rigid airfoil attached to a six component load cell, mounted to a traverse that can move along a water channel. A feedback controller, influenced by the apparatus of Mackowski and Williamson, introduces the effects of a fictional drag force specified by a virtual body profile and drives the traverse accordingly. Free-swimming protocols using the force-feedback system are compared with similar motions on a motionless traverse. The propulsive efficiency of burst-and-coast kinematics is also considered. Of particular interest are (1) the implementation of the cyber-physical control system with respect to the accessible experimental parameter space, (2) the impact of force-based streamwise actuation on experimental data, and (3) the effects of burst-and-coast motions on propulsive efficiency. The work was supported by the Office of Naval Research (ONR) under MURI Grant N00014-14-1-0533.

  4. PubSearch and PubFetch: a simple management system for semiautomated retrieval and annotation of biological information from the literature.

    PubMed

    Yoo, Danny; Xu, Iris; Berardini, Tanya Z; Rhee, Seung Yon; Narayanasamy, Vijay; Twigger, Simon

    2006-03-01

    For most systems in biology, a large body of literature exists that describes the complexity of the system based on experimental results. Manual review of this literature to extract targeted information into biological databases is difficult and time consuming. To address this problem, we developed PubSearch and PubFetch, which store literature, keyword, and gene information in a relational database, index the literature with keywords and gene names, and provide a Web user interface for annotating the genes from experimental data found in the associated literature. A set of protocols is provided in this unit for installing, populating, running, and using PubSearch and PubFetch. In addition, we provide support protocols for performing controlled vocabulary annotations. Intended users of PubSearch and PubFetch are database curators and biology researchers interested in tracking the literature and capturing information about genes of interest in a more effective way than with conventional spreadsheets and lab notebooks.

  5. Mindfulness-based intervention for teenagers with cancer: study protocol for a randomized controlled trial.

    PubMed

    Malboeuf-Hurtubise, Catherine; Achille, Marie; Sultan, Serge; Vadnais, Majorie

    2013-05-10

    Individuals living with cancer must learn to face not only the physical symptoms of their condition, but also the anxiety and uncertainty related to the progression of the disease, the anticipation of physical and emotional pain related to illness and treatment, the significant changes implied in living with cancer, as well as the fear of recurrence after remission. Mindfulness-based meditation constitutes a promising option to alleviate these manifestations. This article presents the rationale and protocol development for a research project aimed at evaluating the effects of a mindfulness-based meditation intervention on quality of life, sleep, and mood in adolescents with cancer compared to a control group. A prospective, longitudinal, experimental design involving three time points (baseline, post-intervention, and follow-up) and two groups (experimental and control) was developed for this project. Participants will be assigned randomly to either group. Eligible participants are adolescents aged 11 to 18 years with a diagnosis of cancer, with no specific selection/exclusion based on type, stage, or trajectory of cancer. A final sample size of 28 participants is targeted. Adolescents in the experimental group will be completing the mindfulness meditation intervention, taught by two trained therapists. The intervention will comprise of eight weekly sessions, lasting 90 min each. Once the follow-up assessment is completed by the experimental group, wait-list controls will be offered to complete the mindfulness-based program. Intra-group analyses will serve to evaluate the impact of the mindfulness-based meditation intervention on quality of life, sleep, and mood pre-post intervention, as well as follow-up. Analyses will also be used to carry out inter-group comparisons between the experimental group and the wait-list controls. Voluntary participation, risk of attrition, and the small sample size are potential limitations of this project. In spite of possible limitations, this project will be one among very few aimed at improving quality of life, sleep, and mood in adolescents living with cancer, will evaluate the potential benefits of such a practice on both psychological and physical health of youth with cancer, and help in creating mindfulness-based intervention programs, in order to provide the necessary psychological help to adolescents living with cancer. NCT01783418.

  6. Mindfulness-based intervention for teenagers with cancer: study protocol for a randomized controlled trial

    PubMed Central

    2013-01-01

    Background Individuals living with cancer must learn to face not only the physical symptoms of their condition, but also the anxiety and uncertainty related to the progression of the disease, the anticipation of physical and emotional pain related to illness and treatment, the significant changes implied in living with cancer, as well as the fear of recurrence after remission. Mindfulness-based meditation constitutes a promising option to alleviate these manifestations. Methods/Design This article presents the rationale and protocol development for a research project aimed at evaluating the effects of a mindfulness-based meditation intervention on quality of life, sleep, and mood in adolescents with cancer compared to a control group. A prospective, longitudinal, experimental design involving three time points (baseline, post-intervention, and follow-up) and two groups (experimental and control) was developed for this project. Participants will be assigned randomly to either group. Eligible participants are adolescents aged 11 to 18 years with a diagnosis of cancer, with no specific selection/exclusion based on type, stage, or trajectory of cancer. A final sample size of 28 participants is targeted. Adolescents in the experimental group will be completing the mindfulness meditation intervention, taught by two trained therapists. The intervention will comprise of eight weekly sessions, lasting 90 min each. Once the follow-up assessment is completed by the experimental group, wait-list controls will be offered to complete the mindfulness-based program. Intra-group analyses will serve to evaluate the impact of the mindfulness-based meditation intervention on quality of life, sleep, and mood pre-post intervention, as well as follow-up. Analyses will also be used to carry out inter-group comparisons between the experimental group and the wait-list controls. Voluntary participation, risk of attrition, and the small sample size are potential limitations of this project. In spite of possible limitations, this project will be one among very few aimed at improving quality of life, sleep, and mood in adolescents living with cancer, will evaluate the potential benefits of such a practice on both psychological and physical health of youth with cancer, and help in creating mindfulness-based intervention programs, in order to provide the necessary psychological help to adolescents living with cancer. Trial registration Trial registration number: NCT01783418 PMID:23663534

  7. Protocols for efficient simulations of long-time protein dynamics using coarse-grained CABS model.

    PubMed

    Jamroz, Michal; Kolinski, Andrzej; Kmiecik, Sebastian

    2014-01-01

    Coarse-grained (CG) modeling is a well-acknowledged simulation approach for getting insight into long-time scale protein folding events at reasonable computational cost. Depending on the design of a CG model, the simulation protocols vary from highly case-specific-requiring user-defined assumptions about the folding scenario-to more sophisticated blind prediction methods for which only a protein sequence is required. Here we describe the framework protocol for the simulations of long-term dynamics of globular proteins, with the use of the CABS CG protein model and sequence data. The simulations can start from a random or a selected (e.g., native) structure. The described protocol has been validated using experimental data for protein folding model systems-the prediction results agreed well with the experimental results.

  8. Metabolomics Workbench: An international repository for metabolomics data and metadata, metabolite standards, protocols, tutorials and training, and analysis tools

    PubMed Central

    Sud, Manish; Fahy, Eoin; Cotter, Dawn; Azam, Kenan; Vadivelu, Ilango; Burant, Charles; Edison, Arthur; Fiehn, Oliver; Higashi, Richard; Nair, K. Sreekumaran; Sumner, Susan; Subramaniam, Shankar

    2016-01-01

    The Metabolomics Workbench, available at www.metabolomicsworkbench.org, is a public repository for metabolomics metadata and experimental data spanning various species and experimental platforms, metabolite standards, metabolite structures, protocols, tutorials, and training material and other educational resources. It provides a computational platform to integrate, analyze, track, deposit and disseminate large volumes of heterogeneous data from a wide variety of metabolomics studies including mass spectrometry (MS) and nuclear magnetic resonance spectrometry (NMR) data spanning over 20 different species covering all the major taxonomic categories including humans and other mammals, plants, insects, invertebrates and microorganisms. Additionally, a number of protocols are provided for a range of metabolite classes, sample types, and both MS and NMR-based studies, along with a metabolite structure database. The metabolites characterized in the studies available on the Metabolomics Workbench are linked to chemical structures in the metabolite structure database to facilitate comparative analysis across studies. The Metabolomics Workbench, part of the data coordinating effort of the National Institute of Health (NIH) Common Fund's Metabolomics Program, provides data from the Common Fund's Metabolomics Resource Cores, metabolite standards, and analysis tools to the wider metabolomics community and seeks data depositions from metabolomics researchers across the world. PMID:26467476

  9. Experimental Demonstration of a Cheap and Accurate Phase Estimation

    DOE PAGES

    Rudinger, Kenneth; Kimmel, Shelby; Lobser, Daniel; ...

    2017-05-11

    We demonstrate an experimental implementation of robust phase estimation (RPE) to learn the phase of a single-qubit rotation on a trapped Yb + ion qubit. Here, we show this phase can be estimated with an uncertainty below 4 × 10 -4 rad using as few as 176 total experimental samples, and our estimates exhibit Heisenberg scaling. Unlike standard phase estimation protocols, RPE neither assumes perfect state preparation and measurement, nor requires access to ancillae. We crossvalidate the results of RPE with the more resource-intensive protocol of gate set tomography.

  10. Fractional optical cryptographic protocol for data containers in a noise-free multiuser environment

    NASA Astrophysics Data System (ADS)

    Jaramillo, Alexis; Barrera, John Fredy; Zea, Alejandro Vélez; Torroba, Roberto

    2018-03-01

    Optical encryption systems have great potential for flexible and high-performance data protection, making them an area of rapid development. However, most approaches present two main issues, namely, the presence of speckle noise, and the degree of security they offer. Here we introduce an experimental implementation of an optical encrypting protocol that tackles these issues by taking advantage of recent developments in the field. These developments include the introduction of information containers for noise free information retrieval, the use of multiplexing to allow for a multiple user environment and an architecture based on the Joint fractional Fourier transform that allows increased degrees of freedom and simplifies the experimental requirements. Thus, data handling via QR code containers involving multiple users processed in a fractional joint transform correlator produce coded information with increased security and ease of use. In this way, we can guarantee that only the user with the correct combination of encryption key and security parameters can achieve noise free information after deciphering. We analyze the performance of the system when the order of the fractional Fourier transform is changed during decryption. We show experimental results that confirm the validity of our proposal.

  11. ISPyB: an information management system for synchrotron macromolecular crystallography.

    PubMed

    Delagenière, Solange; Brenchereau, Patrice; Launer, Ludovic; Ashton, Alun W; Leal, Ricardo; Veyrier, Stéphanie; Gabadinho, José; Gordon, Elspeth J; Jones, Samuel D; Levik, Karl Erik; McSweeney, Seán M; Monaco, Stéphanie; Nanao, Max; Spruce, Darren; Svensson, Olof; Walsh, Martin A; Leonard, Gordon A

    2011-11-15

    Individual research groups now analyze thousands of samples per year at synchrotron macromolecular crystallography (MX) resources. The efficient management of experimental data is thus essential if the best possible experiments are to be performed and the best possible data used in downstream processes in structure determination pipelines. Information System for Protein crystallography Beamlines (ISPyB), a Laboratory Information Management System (LIMS) with an underlying data model allowing for the integration of analyses down-stream of the data collection experiment was developed to facilitate such data management. ISPyB is now a multisite, generic LIMS for synchrotron-based MX experiments. Its initial functionality has been enhanced to include improved sample tracking and reporting of experimental protocols, the direct ranking of the diffraction characteristics of individual samples and the archiving of raw data and results from ancillary experiments and post-experiment data processing protocols. This latter feature paves the way for ISPyB to play a central role in future macromolecular structure solution pipelines and validates the application of the approach used in ISPyB to other experimental techniques, such as biological solution Small Angle X-ray Scattering and spectroscopy, which have similar sample tracking and data handling requirements.

  12. Feasibility and Emotional Impact of Experimentally Extending Sleep in Short-Sleeping Adolescents.

    PubMed

    Van Dyk, Tori R; Zhang, Nanhua; Catlin, Perry A; Cornist, Kaylin; McAlister, Shealan; Whitacre, Catharine; Beebe, Dean W

    2017-09-01

    Published experimental sleep manipulation protocols for adolescents have been limited to the summer, limiting causal conclusions about how short sleep affects them on school nights, when they are most likely to restrict their sleep. This study assesses the feasibility and emotional impact of a school-night sleep manipulation protocol to test the effects of lengthening sleep in habitually short-sleeping adolescents. High school students aged 14-18 years who habitually slept 5-7 hours on school nights participated in a 5-week experimental sleep manipulation protocol. Participants completed a baseline week followed in randomized counterbalanced order by two experimental conditions lasting 2 weeks each: prescribed habitual sleep (HAB; sleep time set to match baseline) and sleep extension (EXT; 1.5-hour increase in time in bed from HAB). All sleep was obtained at home, monitored with actigraphy. Data on adherence, protocol acceptability, mood and behavior were collected at the end of each condition. Seventy-six adolescents enrolled in the study, with 54 retained through all 5 weeks. Compared to HAB, during EXT, participants averaged an additional 72.6 minutes/night of sleep (p < .001) and had reduced symptoms of sleepiness, anger, vigor, fatigue, and confusion (p < .05). The large majority of parents (98%) and adolescents (100%) said they would "maybe" or "definitely" recommend the study to another family. An experimental, school-night sleep manipulation protocol can be feasibly implemented which directly tests the potential protective effects of lengthening sleep. Many short-sleeping adolescents would benefit emotionally from sleeping longer, supporting public health efforts to promote adolescent sleep on school nights. © Sleep Research Society 2017. Published by Oxford University Press on behalf of the Sleep Research Society. All rights reserved. For permissions, please e-mail journals.permissions@oup.com.

  13. Analysis of the contribution of experimental bias, experimental noise, and inter-subject biological variability on the assessment of developmental trajectories in diffusion MRI studies of the brain.

    PubMed

    Sadeghi, Neda; Nayak, Amritha; Walker, Lindsay; Okan Irfanoglu, M; Albert, Paul S; Pierpaoli, Carlo

    2015-04-01

    Metrics derived from the diffusion tensor, such as fractional anisotropy (FA) and mean diffusivity (MD) have been used in many studies of postnatal brain development. A common finding of previous studies is that these tensor-derived measures vary widely even in healthy populations. This variability can be due to inherent inter-individual biological differences as well as experimental noise. Moreover, when comparing different studies, additional variability can be introduced by different acquisition protocols. In this study we examined scans of 61 individuals (aged 4-22 years) from the NIH MRI study of normal brain development. Two scans were collected with different protocols (low and high resolution). Our goal was to separate the contributions of biological variability and experimental noise to the overall measured variance, as well as to assess potential systematic effects related to the use of different protocols. We analyzed FA and MD in seventeen regions of interest. We found that biological variability for both FA and MD varies widely across brain regions; biological variability is highest for FA in the lateral part of the splenium and body of the corpus callosum along with the cingulum and the superior longitudinal fasciculus, and for MD in the optic radiations and the lateral part of the splenium. These regions with high inter-individual biological variability are the most likely candidates for assessing genetic and environmental effects in the developing brain. With respect to protocol-related effects, the lower resolution acquisition resulted in higher MD and lower FA values for the majority of regions compared with the higher resolution protocol. However, the majority of the regions did not show any age-protocol interaction, indicating similar trajectories were obtained irrespective of the protocol used. Published by Elsevier Inc.

  14. Experimental demonstration of bandwidth on demand (BoD) provisioning based on time scheduling in software-defined multi-domain optical networks

    NASA Astrophysics Data System (ADS)

    Zhao, Yongli; Li, Yajie; Wang, Xinbo; Chen, Bowen; Zhang, Jie

    2016-09-01

    A hierarchical software-defined networking (SDN) control architecture is designed for multi-domain optical networks with the Open Daylight (ODL) controller. The OpenFlow-based Control Virtual Network Interface (CVNI) protocol is deployed between the network orchestrator and the domain controllers. Then, a dynamic bandwidth on demand (BoD) provisioning solution is proposed based on time scheduling in software-defined multi-domain optical networks (SD-MDON). Shared Risk Link Groups (SRLG)-disjoint routing schemes are adopted to separate each tenant for reliability. The SD-MDON testbed is built based on the proposed hierarchical control architecture. Then the proposed time scheduling-based BoD (Ts-BoD) solution is experimentally demonstrated on the testbed. The performance of the Ts-BoD solution is evaluated with respect to blocking probability, resource utilization, and lightpath setup latency.

  15. Protection of autonomous microgrids using agent-based distributed communication

    DOE PAGES

    Cintuglu, Mehmet H.; Ma, Tan; Mohammed, Osama A.

    2016-04-06

    This study presents a real-time implementation of autonomous microgrid protection using agent-based distributed communication. Protection of an autonomous microgrid requires special considerations compared to large scale distribution net-works due to the presence of power converters and relatively low inertia. In this work, we introduce a practical overcurrent and a frequency selectivity method to overcome conventional limitations. The proposed overcurrent scheme defines a selectivity mechanism considering the remedial action scheme (RAS) of the microgrid after a fault instant based on feeder characteristics and the location of the intelligent electronic devices (IEDs). A synchrophasor-based online frequency selectivity approach is proposed to avoidmore » pulse loading effects in low inertia microgrids. Experimental results are presented for verification of the pro-posed schemes using a laboratory based microgrid. The setup was composed of actual generation units and IEDs using IEC 61850 protocol. The experimental results were in excellent agreement with the proposed protection scheme.« less

  16. Protection of autonomous microgrids using agent-based distributed communication

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Cintuglu, Mehmet H.; Ma, Tan; Mohammed, Osama A.

    This study presents a real-time implementation of autonomous microgrid protection using agent-based distributed communication. Protection of an autonomous microgrid requires special considerations compared to large scale distribution net-works due to the presence of power converters and relatively low inertia. In this work, we introduce a practical overcurrent and a frequency selectivity method to overcome conventional limitations. The proposed overcurrent scheme defines a selectivity mechanism considering the remedial action scheme (RAS) of the microgrid after a fault instant based on feeder characteristics and the location of the intelligent electronic devices (IEDs). A synchrophasor-based online frequency selectivity approach is proposed to avoidmore » pulse loading effects in low inertia microgrids. Experimental results are presented for verification of the pro-posed schemes using a laboratory based microgrid. The setup was composed of actual generation units and IEDs using IEC 61850 protocol. The experimental results were in excellent agreement with the proposed protection scheme.« less

  17. Continuous variable quantum key distribution: finite-key analysis of composable security against coherent attacks.

    PubMed

    Furrer, F; Franz, T; Berta, M; Leverrier, A; Scholz, V B; Tomamichel, M; Werner, R F

    2012-09-07

    We provide a security analysis for continuous variable quantum key distribution protocols based on the transmission of two-mode squeezed vacuum states measured via homodyne detection. We employ a version of the entropic uncertainty relation for smooth entropies to give a lower bound on the number of secret bits which can be extracted from a finite number of runs of the protocol. This bound is valid under general coherent attacks, and gives rise to keys which are composably secure. For comparison, we also give a lower bound valid under the assumption of collective attacks. For both scenarios, we find positive key rates using experimental parameters reachable today.

  18. Experimental realization of equiangular three-state quantum key distribution

    PubMed Central

    Schiavon, Matteo; Vallone, Giuseppe; Villoresi, Paolo

    2016-01-01

    Quantum key distribution using three states in equiangular configuration combines a security threshold comparable with the one of the Bennett-Brassard 1984 protocol and a quantum bit error rate (QBER) estimation that does not need to reveal part of the key. We implement an entanglement-based version of the Renes 2004 protocol, using only passive optic elements in a linear scheme for the positive-operator valued measure (POVM), generating an asymptotic secure key rate of more than 10 kbit/s, with a mean QBER of 1.6%. We then demonstrate its security in the case of finite key and evaluate the key rate for both collective and general attacks. PMID:27465643

  19. Histomorphometric assessment of bone necrosis produced by two cryosurgery protocols using liquid nitrogen: an experimental study on rat femurs.

    PubMed

    Costa, Fábio Wildson Gurgel; Brito, Gerly Anne de Castro; Pessoa, Rosana Maria Andrade; Studart-Soares, Eduardo Costa

    2011-01-01

    The aim of this study was to evaluate the effects of liquid nitrogen cryosurgery on the femoral diaphysis of rats. The femoral diaphyses of 42 Wistar rats were exposed to three local and sequential applications of liquid nitrogen for 1 or 2 min, intercalated with periods of 5 min of passive thawing. The animals were sacrificed after 1, 2, 4 and 12 weeks and the specimens obtained were processed and analyzed histomorphometrically. The depth and extent of peak bone necrosis were 124.509 µm and 2087.094 µm for the 1-min protocol, respectively, and 436.424 µm and 12046.426 µm for the 2-min protocol. Peak necrosis was observed in the second experimental week with both cryotherapy protocols. The present results indicate that the 2-min protocol produced more marked bone necrosis than the 1-min protocol. Although our results cannot be entirely extrapolated to clinical practice, they contribute to the understanding of the behavior of bone tissue submitted to different cycles of liquid nitrogen freezing and may serve as a basis for new studies.

  20. Targeting young drinkers online: the effectiveness of a web-based brief alcohol intervention in reducing heavy drinking among college students: study protocol of a two-arm parallel group randomized controlled trial.

    PubMed

    Voogt, Carmen V; Poelen, Evelien A P; Kleinjan, Marloes; Lemmers, Lex A C J; Engels, Rutger C M E

    2011-04-14

    The prevalence of heavy drinking among college students and its associated health related consequences highlights an urgent need for alcohol prevention programs targeting 18 to 24 year olds. Nevertheless, current alcohol prevention programs in the Netherlands pay surprisingly little attention to the drinking patterns of this specific age group. The study described in this protocol will test the effectiveness of a web-based brief alcohol intervention that is aimed at reducing alcohol use among heavy drinking college students aged 18 to 24 years old. The effectiveness of the What Do You Drink web-based brief alcohol intervention will be tested among 908 heavy drinking college students in a two-arm parallel group randomized controlled trial. Participants will be allocated at random to either the experimental (N=454: web-based brief alcohol intervention) or control condition (N=454: no intervention). The primary outcome measure will be the percentage of participants who drink within the normative limits of the Dutch National Health Council for low-risk drinking. These limits specify that, for heavy alcohol use, the mean consumption cannot exceed 14 or 21 glasses of standard alcohol units per week for females and males, respectively, while for binge drinking, the consumption cannot exceed five or more glasses of standard alcohol units on one drinking occasion at least once per week within one month and six months after the intervention. Reductions in mean weekly alcohol consumption and frequency of binge drinking are also primary outcome measures. Weekly Ecological Momentary Assessment will measure alcohol-related cognitions, that is, attitudes, self-efficacy, subjective norms and alcohol expectancies, which will be included as the secondary outcome measures. This study protocol describes the two-arm parallel group randomized controlled trial developed to evaluate the effectiveness of a web-based brief alcohol intervention. We expect a reduction of mean weekly alcohol consumption and frequency of binge drinking in the experimental condition compared to the control condition as a direct result of the intervention. If the website is effective, it will be implemented in alcohol prevention initiatives, which will facilitate the implementation of the protocol. Netherlands Trial Register NTR2665.

  1. Cure Cycle Design Methodology for Fabricating Reactive Resin Matrix Fiber Reinforced Composites: A Protocol for Producing Void-free Quality Laminates

    NASA Technical Reports Server (NTRS)

    Hou, Tan-Hung

    2014-01-01

    For the fabrication of resin matrix fiber reinforced composite laminates, a workable cure cycle (i.e., temperature and pressure profiles as a function of processing time) is needed and is critical for achieving void-free laminate consolidation. Design of such a cure cycle is not trivial, especially when dealing with reactive matrix resins. An empirical "trial and error" approach has been used as common practice in the composite industry. Such an approach is not only costly, but also ineffective at establishing the optimal processing conditions for a specific resin/fiber composite system. In this report, a rational "processing science" based approach is established, and a universal cure cycle design protocol is proposed. Following this protocol, a workable and optimal cure cycle can be readily and rationally designed for most reactive resin systems in a cost effective way. This design protocol has been validated through experimental studies of several reactive polyimide composites for a wide spectrum of usage that has been documented in the previous publications.

  2. Serial Interface through Stream Protocol on EPICS Platform for Distributed Control and Monitoring

    NASA Astrophysics Data System (ADS)

    Das Gupta, Arnab; Srivastava, Amit K.; Sunil, S.; Khan, Ziauddin

    2017-04-01

    Remote operation of any equipment or device is implemented in distributed systems in order to control and proper monitoring of process values. For such remote operations, Experimental Physics and Industrial Control System (EPICS) is used as one of the important software tool for control and monitoring of a wide range of scientific parameters. A hardware interface is developed for implementation of EPICS software so that different equipment such as data converters, power supplies, pump controllers etc. could be remotely operated through stream protocol. EPICS base was setup on windows as well as Linux operating system for control and monitoring while EPICS modules such as asyn and stream device were used to interface the equipment with standard RS-232/RS-485 protocol. Stream Device protocol communicates with the serial line with an interface to asyn drivers. Graphical user interface and alarm handling were implemented with Motif Editor and Display Manager (MEDM) and Alarm Handler (ALH) command line channel access utility tools. This paper will describe the developed application which was tested with different equipment and devices serially interfaced to the PCs on a distributed network.

  3. Global warming potential estimates for the C1-C3 hydrochlorofluorocarbons (HCFCs) included in the Kigali Amendment to the Montreal Protocol

    NASA Astrophysics Data System (ADS)

    Papanastasiou, Dimitrios K.; Beltrone, Allison; Marshall, Paul; Burkholder, James B.

    2018-05-01

    Hydrochlorofluorocarbons (HCFCs) are ozone depleting substances and potent greenhouse gases that are controlled under the Montreal Protocol. However, the majority of the 274 HCFCs included in Annex C of the protocol do not have reported global warming potentials (GWPs) which are used to guide the phaseout of HCFCs and the future phase down of hydrofluorocarbons (HFCs). In this study, GWPs for all C1-C3 HCFCs included in Annex C are reported based on estimated atmospheric lifetimes and theoretical methods used to calculate infrared absorption spectra. Atmospheric lifetimes were estimated from a structure activity relationship (SAR) for OH radical reactivity and estimated O(1D) reactivity and UV photolysis loss processes. The C1-C3 HCFCs display a wide range of lifetimes (0.3 to 62 years) and GWPs (5 to 5330, 100-year time horizon) dependent on their molecular structure and the H-atom content of the individual HCFC. The results from this study provide estimated policy-relevant GWP metrics for the HCFCs included in the Montreal Protocol in the absence of experimentally derived metrics.

  4. Biodistribution of the boron carriers boronophenylalanine (BPA) and/or decahydrodecaborate (GB-10) for Boron Neutron Capture Therapy (BNCT) in an experimental model of lung metastases.

    PubMed

    Trivillin, V A; Garabalino, M A; Colombo, L L; González, S J; Farías, R O; Monti Hughes, A; Pozzi, E C C; Bortolussi, S; Altieri, S; Itoiz, M E; Aromando, R F; Nigg, D W; Schwint, A E

    2014-06-01

    BNCT was proposed for the treatment of diffuse, non-resectable tumors in the lung. We performed boron biodistribution studies with 5 administration protocols employing the boron carriers BPA and/or GB-10 in an experimental model of disseminated lung metastases in rats. All 5 protocols were non-toxic and showed preferential tumor boron uptake versus lung. Absolute tumor boron concentration values were therapeutically useful (25-76ppm) for 3 protocols. Dosimetric calculations indicate that BNCT at RA-3 would be potentially therapeutic without exceeding radiotolerance in the lung. © 2013 Published by Elsevier Ltd.

  5. Biodistribution of the boron carriers boronophenylalanine (BPA) and/or decahydrodecaborate (GB-10) for Boron Neutron Capture Therapy (BNCT) in an experimental model of lung metastases

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    D.W. Nigg; Various Others

    BNCT was proposed for the treatment of diffuse, non-resectable tumors in the lung. We performed boron biodistribution studies with 5 administration protocols employing the boron carriers BPA and/or GB-10 in an experimental model of disseminated lung metastases in rats. All 5 protocols were non-toxic and showed preferential tumor boron uptake versus lung. Absolute tumor boron concentration values were therapeutically useful (25–76 ppm) for 3 protocols. Dosimetric calculations indicate that BNCT at RA-3 would be potentially therapeutic without exceeding radiotolerance in the lung.

  6. The Effects of Two Self-Regulation Interventions to Increase Self-Efficacy and Group Exercise Behavior in Fitness Clubs

    PubMed Central

    Middelkamp, Jan; van Rooijen, Maaike; Wolfhagen, Peter; Steenbergen, Bert

    2016-01-01

    Studies on the adoption and maintenance of group exercise behavior are scarce. The objective of this study is to test two self-efficacy based interventions to increase barrier self-efficacy and group exercise behavior. In total 122 participants (Mage 42.02 yr.; SD 12.29; 67% females) were recruited and randomly assigned to one control and two experimental groups. The control group was limited to participate in one virtual group exercise program only (group 1). The first experimental group was able to self-set their activities and participate in multiple group exercise programs (group 2). The second experimental group received an additional monthly coaching protocol to manage self-set goals (group 3). A validated scale for barrier self-efficacy was used, group exercise sessions were measured and drop-out rates were registered. An ANOVA indicated that mean amount of sessions of group 1 and 3, and 2 and 3 differed significantly (p < 0.05) in 12 weeks. Descriptive statistics demonstrate mean group exercise sessions over the total of 12 weeks of 2.74 (SD 4.65) in the control group; 4.75 (SD 6.08) in the first experimental group, and 12.25 (SD 9.07) for the second experimental group. Regression analysis indicated that self-efficacy at 8-weeks explained the highest variance in overall group exercise sessions (R2 = 0.18; p < 0.05). Overall drop-out rates were 88% in group 1, 78% in group 2 and 48% in group 3. The results showed that group exercise behavior can significantly be improved by a coaching protocol on self-set goals. Future research should address the effectiveness of self-set activities and self-set goals for a longer period of time and in other types of exercise programs. Key points Approximately 144 million individuals exercise in fitness clubs worldwide. About 50% participate in at least one group exercise program and 23% participate only in group exercise classes with instructor. Research on attendance and exercise behavior in fitness clubs is limited but there are strong indications that the frequencies are low. This study demonstrates that group exercise behavior in fitness clubs can be improved significantly by a coaching protocol on self-set goals based on tenets of self-efficacy theory. PMID:27274676

  7. Computation of transmitted and received B1 fields in magnetic resonance imaging.

    PubMed

    Milles, Julien; Zhu, Yue Min; Chen, Nan-Kuei; Panych, Lawrence P; Gimenez, Gérard; Guttmann, Charles R G

    2006-05-01

    Computation of B1 fields is a key issue for determination and correction of intensity nonuniformity in magnetic resonance images. This paper presents a new method for computing transmitted and received B1 fields. Our method combines a modified MRI acquisition protocol and an estimation technique based on the Levenberg-Marquardt algorithm and spatial filtering. It enables accurate estimation of transmitted and received B1 fields for both homogeneous and heterogeneous objects. The method is validated using numerical simulations and experimental data from phantom and human scans. The experimental results are in agreement with theoretical expectations.

  8. Peer-led diabetes self-management programme for community-dwelling older people in China: study protocol for a quasi-experimental design.

    PubMed

    Shen, Huixia; Edwards, Helen; Courtney, Mary; McDowell, Jan; Wu, Ming

    2012-12-01

    A protocol for a new peer-led self-management programme for community-dwelling older people with diabetes in Shanghai, China. The increasing prevalence of type 2 diabetes poses major public health challenges. Appropriate education programmes could help people with diabetes to achieve self-management and better health outcomes. Providing education programmes to the fast growing number of people with diabetes present a real challenge to Chinese healthcare system, which is strained for personnel and funding shortages. Empirical literature and expert opinions suggest that peer education programmes are promising. Quasi-experimental. This study is a non-equivalent control group design (protocol approved in January, 2008). A total of 190 people, with 95 participants in each group, will be recruited from two different, but similar, communities. The programme, based on Social Cognitive Theory, will consist of basic diabetes instruction and social support and self-efficacy enhancing group activities. Basic diabetes instruction sessions will be delivered by health professionals, whereas social support and self-efficacy enhancing group activities will be led by peer leaders. Outcome variables include: self-efficacy, social support, self-management behaviours, depressive status, quality of life and healthcare utilization, which will be measured at baseline, 4 and 12 weeks. This theory-based programme tailored to Chinese patients has potential for improving diabetes self-management and subsequent health outcomes. In addition, the delivery mode, through involvement of peer leaders and existing community networks, is especially promising considering healthcare resource shortage in China. © 2012 Blackwell Publishing Ltd.

  9. Alternative Computational Protocols for Supercharging Protein Surfaces for Reversible Unfolding and Retention of Stability

    PubMed Central

    Der, Bryan S.; Kluwe, Christien; Miklos, Aleksandr E.; Jacak, Ron; Lyskov, Sergey; Gray, Jeffrey J.; Georgiou, George; Ellington, Andrew D.; Kuhlman, Brian

    2013-01-01

    Reengineering protein surfaces to exhibit high net charge, referred to as “supercharging”, can improve reversibility of unfolding by preventing aggregation of partially unfolded states. Incorporation of charged side chains should be optimized while considering structural and energetic consequences, as numerous mutations and accumulation of like-charges can also destabilize the native state. A previously demonstrated approach deterministically mutates flexible polar residues (amino acids DERKNQ) with the fewest average neighboring atoms per side chain atom (AvNAPSA). Our approach uses Rosetta-based energy calculations to choose the surface mutations. Both protocols are available for use through the ROSIE web server. The automated Rosetta and AvNAPSA approaches for supercharging choose dissimilar mutations, raising an interesting division in surface charging strategy. Rosetta-supercharged variants of GFP (RscG) ranging from −11 to −61 and +7 to +58 were experimentally tested, and for comparison, we re-tested the previously developed AvNAPSA-supercharged variants of GFP (AscG) with +36 and −30 net charge. Mid-charge variants demonstrated ∼3-fold improvement in refolding with retention of stability. However, as we pushed to higher net charges, expression and soluble yield decreased, indicating that net charge or mutational load may be limiting factors. Interestingly, the two different approaches resulted in GFP variants with similar refolding properties. Our results show that there are multiple sets of residues that can be mutated to successfully supercharge a protein, and combining alternative supercharge protocols with experimental testing can be an effective approach for charge-based improvement to refolding. PMID:23741319

  10. [The battery of tests for behavioral phenotyping of aging animals in the experiment].

    PubMed

    Gorina, Ya V; Komleva, Yu K; Lopatina, O L; Volkova, V V; Chernykh, A I; Shabalova, A A; Semenchukov, A A; Olovyannikova, R Ya; Salmina, A B

    2017-01-01

    The purpose of the study was to develop a battery of tests to study social and cognitive impairments for behavioral phenotyping of aging experimental animals with physiological neurodegeneration. Object of the study were outbred CD1 mice in the following groups: 1st group - 12-month old male mice (physiological aging); 2nd group - 2-month old male mice (control group). Social recognition test, elevated plus maze test (EPM), open field test, light-dark box test, and Fear conditioning protocol were used to estimate the neurological status of experimental animals. We found that aging male mice in a contrast to young ones have demonstrated lower social interest to female mice in the social recognition task. EPM and light-dark box tests showed increased level of anxiety in the group of aged mice comparing to the control group. Fear conditioning protocol revealed impairment of associative learning and memory in the group of aged mice, particularly, fear memory consolidation was dramatically suppressed. Analysis of behavioral factors, social interactions and anxiety level in the experimental mice has confirmed age-related neurodegeneration in the 1st group. We found that the most informative approach to identifying neurological impairments in aging mice (social interaction deficit, limitation of interests, increased level of anxiety) should be based on the open field test light-dark box test, and Fear conditioning protocol. Such combination allows obtaining new data on behavioral alterations in the age-associated of neurodegeneration and to develop novel therapeutic strategies for the treatment of age-related brain pathology.

  11. Simple 2.5 GHz time-bin quantum key distribution

    NASA Astrophysics Data System (ADS)

    Boaron, Alberto; Korzh, Boris; Houlmann, Raphael; Boso, Gianluca; Rusca, Davide; Gray, Stuart; Li, Ming-Jun; Nolan, Daniel; Martin, Anthony; Zbinden, Hugo

    2018-04-01

    We present a 2.5 GHz quantum key distribution setup with the emphasis on a simple experimental realization. It features a three-state time-bin protocol based on a pulsed diode laser and a single intensity modulator. Implementing an efficient one-decoy scheme and finite-key analysis, we achieve record breaking secret key rates of 1.5 kbps over 200 km of standard optical fibers.

  12. Guidelines for experimental design protocol and validation procedure for the measurement of heat resistance of microorganisms in milk.

    PubMed

    Condron, Robin; Farrokh, Choreh; Jordan, Kieran; McClure, Peter; Ross, Tom; Cerf, Olivier

    2015-01-02

    Studies on the heat resistance of dairy pathogens are a vital part of assessing the safety of dairy products. However, harmonized methodology for the study of heat resistance of food pathogens is lacking, even though there is a need for such harmonized experimental design protocols and for harmonized validation procedures for heat treatment studies. Such an approach is of particular importance to allow international agreement on appropriate risk management of emerging potential hazards for human and animal health. This paper is working toward establishment of a harmonized protocol for the study of the heat resistance of pathogens, identifying critical issues for establishment of internationally agreed protocols, including a harmonized framework for reporting and interpretation of heat inactivation studies of potentially pathogenic microorganisms. Copyright © 2014 Elsevier B.V. All rights reserved.

  13. Defining standardized protocols for determining the efficacy of a postmilking teat disinfectant following experimental exposure of teats to mastitis pathogens.

    PubMed

    Schukken, Y H; Rauch, B J; Morelli, J

    2013-04-01

    The objective of this paper was to define standardized protocols for determining the efficacy of a postmilking teat disinfectant following experimental exposure of teats to both Staphylococcus aureus and Streptococcus agalactiae. The standardized protocols describe the selection of cows and herds and define the critical points in performing experimental exposure, performing bacterial culture, evaluating the culture results, and finally performing statistical analyses and reporting of the results. The protocols define both negative control and positive control trials. For negative control trials, the protocol states that an efficacy of reducing new intramammary infections (IMI) of at least 40% is required for a teat disinfectant to be considered effective. For positive control trials, noninferiority to a control disinfectant with a published efficacy of reducing new IMI of at least 70% is required. Sample sizes for both negative and positive control trials are calculated. Positive control trials are expected to require a large trial size. Statistical analysis methods are defined and, in the proposed methods, the rate of IMI may be analyzed using generalized linear mixed models. The efficacy of the test product can be evaluated while controlling for important covariates and confounders in the trial. Finally, standards for reporting are defined and reporting considerations are discussed. The use of the defined protocol is shown through presentation of the results of a recent trial of a test product against a negative control. Copyright © 2013 American Dairy Science Association. Published by Elsevier Inc. All rights reserved.

  14. An operational open-end file transfer protocol for mobile satellite communications

    NASA Technical Reports Server (NTRS)

    Wang, Charles; Cheng, Unjeng; Yan, Tsun-Yee

    1988-01-01

    This paper describes an operational open-end file transfer protocol which includes the connecting procedure, data transfer, and relinquishment procedure for mobile satellite communications. The protocol makes use of the frame level and packet level formats of the X.25 standard for the data link layer and network layer, respectively. The structure of a testbed for experimental simulation of this protocol over a mobile fading channel is also introduced.

  15. Reliability of Vibrating Mesh Technology.

    PubMed

    Gowda, Ashwin A; Cuccia, Ann D; Smaldone, Gerald C

    2017-01-01

    For delivery of inhaled aerosols, vibrating mesh systems are more efficient than jet nebulizers are and do not require added gas flow. We assessed the reliability of a vibrating mesh nebulizer (Aerogen Solo, Aerogen Ltd, Galway Ireland) suitable for use in mechanical ventilation. An initial observational study was performed with 6 nebulizers to determine run time and efficiency using normal saline and distilled water. Nebulizers were run until cessation of aerosol production was noted, with residual volume and run time recorded. Three controllers were used to assess the impact of the controller on nebulizer function. Following the observational study, a more detailed experimental protocol was performed using 20 nebulizers. For this analysis, 2 controllers were used, and time to cessation of aerosol production was noted. Gravimetric techniques were used to measure residual volume. Total nebulization time and residual volume were recorded. Failure was defined as premature cessation of aerosol production represented by residual volume of > 10% of the nebulizer charge. In the initial observational protocol, an unexpected sporadic failure rate was noted of 25% in 55 experimental runs. In the experimental protocol, a failure rate was noted of 30% in 40 experimental runs. Failed runs in the experimental protocol exhibited a wide range of retained volume averaging ± SD 36 ± 21.3% compared with 3.2 ± 1.5% (P = .001) in successful runs. Small but significant differences existed in nebulization time between controllers. Aerogen Solo nebulization was often randomly interrupted with a wide range of retained volumes. Copyright © 2017 by Daedalus Enterprises.

  16. Subconscious Visual Cues during Movement Execution Allow Correct Online Choice Reactions

    PubMed Central

    Leukel, Christian; Lundbye-Jensen, Jesper; Christensen, Mark Schram; Gollhofer, Albert; Nielsen, Jens Bo; Taube, Wolfgang

    2012-01-01

    Part of the sensory information is processed by our central nervous system without conscious perception. Subconscious processing has been shown to be capable of triggering motor reactions. In the present study, we asked the question whether visual information, which is not consciously perceived, could influence decision-making in a choice reaction task. Ten healthy subjects (28±5 years) executed two different experimental protocols. In the Motor reaction protocol, a visual target cue was shown on a computer screen. Depending on the displayed cue, subjects had to either complete a reaching movement (go-condition) or had to abort the movement (stop-condition). The cue was presented with different display durations (20–160 ms). In the second Verbalization protocol, subjects verbalized what they experienced on the screen. Again, the cue was presented with different display durations. This second protocol tested for conscious perception of the visual cue. The results of this study show that subjects achieved significantly more correct responses in the Motor reaction protocol than in the Verbalization protocol. This difference was only observed at the very short display durations of the visual cue. Since correct responses in the Verbalization protocol required conscious perception of the visual information, our findings imply that the subjects performed correct motor responses to visual cues, which they were not conscious about. It is therefore concluded that humans may reach decisions based on subconscious visual information in a choice reaction task. PMID:23049749

  17. [Virtual environment: assistance in nursing care for the deaf based on the protocol of primary care].

    PubMed

    Rodrigues, Silvia Cristina Martini; Damião, Gardênia Costa

    2014-08-01

    Presenting a Virtual Environment (VE) based on the Protocol of Treatment of Hypertension and Diabetes Mellitus type 2, used in Primary Care for evaluation of dietary habits in nursing consultations. An experimental study applied by two nurses and a nurse manager, in a sample of 30 deaf patients aged between 30 and 60 years. The environment was built in Visual Basic NET and offered eight screens about feeding containing food pictures, videos in Libras (Brazilian sign language) and audio. The analysis of the VE was done through questionnaires applied to patients and professionals by the Poisson statistical test. The VE shows the possible diagnostics in red, yellow, green and blue colors, depending on the degree of patients' need. The environment obtained excellent acceptance by patients and nurses, allowing great interaction between them, even without an interpreter. The time in consultation was reduced to 15 minutes, with the preservation of patient privacy.

  18. A self-paced motor imagery based brain-computer interface for robotic wheelchair control.

    PubMed

    Tsui, Chun Sing Louis; Gan, John Q; Hu, Huosheng

    2011-10-01

    This paper presents a simple self-paced motor imagery based brain-computer interface (BCI) to control a robotic wheelchair. An innovative control protocol is proposed to enable a 2-class self-paced BCI for wheelchair control, in which the user makes path planning and fully controls the wheelchair except for the automatic obstacle avoidance based on a laser range finder when necessary. In order for the users to train their motor imagery control online safely and easily, simulated robot navigation in a specially designed environment was developed. This allowed the users to practice motor imagery control with the core self-paced BCI system in a simulated scenario before controlling the wheelchair. The self-paced BCI can then be applied to control a real robotic wheelchair using a protocol similar to that controlling the simulated robot. Our emphasis is on allowing more potential users to use the BCI controlled wheelchair with minimal training; a simple 2-class self paced system is adequate with the novel control protocol, resulting in a better transition from offline training to online control. Experimental results have demonstrated the usefulness of the online practice under the simulated scenario, and the effectiveness of the proposed self-paced BCI for robotic wheelchair control.

  19. A Mirror Therapy-Based Action Observation Protocol to Improve Motor Learning After Stroke.

    PubMed

    Harmsen, Wouter J; Bussmann, Johannes B J; Selles, Ruud W; Hurkmans, Henri L P; Ribbers, Gerard M

    2015-07-01

    Mirror therapy is a priming technique to improve motor function of the affected arm after stroke. To investigate whether a mirror therapy-based action observation (AO) protocol contributes to motor learning of the affected arm after stroke. A total of 37 participants in the chronic stage after stroke were randomly allocated to the AO or control observation (CO) group. Participants were instructed to perform an upper-arm reaching task as fast and as fluently as possible. All participants trained the upper-arm reaching task with their affected arm alternated with either AO or CO. Participants in the AO group observed mirrored video tapes of reaching movements performed by their unaffected arm, whereas participants in the CO group observed static photographs of landscapes. The experimental condition effect was investigated by evaluating the primary outcome measure: movement time (in seconds) of the reaching movement, measured by accelerometry. Movement time decreased significantly in both groups: 18.3% in the AO and 9.1% in the CO group. Decrease in movement time was significantly more in the AO compared with the CO group (mean difference = 0.14 s; 95% confidence interval = 0.02, 0.26; P = .026). The present study showed that a mirror therapy-based AO protocol contributes to motor learning after stroke. © The Author(s) 2014.

  20. Quantitative metabolomics of the thermophilic methylotroph Bacillus methanolicus.

    PubMed

    Carnicer, Marc; Vieira, Gilles; Brautaset, Trygve; Portais, Jean-Charles; Heux, Stephanie

    2016-06-01

    The gram-positive bacterium Bacillus methanolicus MGA3 is a promising candidate for methanol-based biotechnologies. Accurate determination of intracellular metabolites is crucial for engineering this bacteria into an efficient microbial cell factory. Due to the diversity of chemical and cell properties, an experimental protocol validated on B. methanolicus is needed. Here a systematic evaluation of different techniques for establishing a reliable basis for metabolome investigations is presented. Metabolome analysis was focused on metabolites closely linked with B. methanolicus central methanol metabolism. As an alternative to cold solvent based procedures, a solvent-free quenching strategy using stainless steel beads cooled to -20 °C was assessed. The precision, the consistency of the measurements, and the extent of metabolite leakage from quenched cells were evaluated in procedures with and without cell separation. The most accurate and reliable performance was provided by the method without cell separation, as significant metabolite leakage occurred in the procedures based on fast filtration. As a biological test case, the best protocol was used to assess the metabolome of B. methanolicus grown in chemostat on methanol at two different growth rates and its validity was demonstrated. The presented protocol is a first and helpful step towards developing reliable metabolomics data for thermophilic methylotroph B. methanolicus. This will definitely help for designing an efficient methylotrophic cell factory.

  1. Generation and customization of biosynthetic excitable tissues for electrophysiological studies and cell-based therapies.

    PubMed

    Nguyen, Hung X; Kirkton, Robert D; Bursac, Nenad

    2018-05-01

    We describe a two-stage protocol to generate electrically excitable and actively conducting cell networks with stable and customizable electrophysiological phenotypes. Using this method, we have engineered monoclonally derived excitable tissues as a robust and reproducible platform to investigate how specific ion channels and mutations affect action potential (AP) shape and conduction. In the first stage of the protocol, we combine computational modeling, site-directed mutagenesis, and electrophysiological techniques to derive optimal sets of mammalian and/or prokaryotic ion channels that produce specific AP shape and conduction characteristics. In the second stage of the protocol, selected ion channels are stably expressed in unexcitable human cells by means of viral or nonviral delivery, followed by flow cytometry or antibiotic selection to purify the desired phenotype. This protocol can be used with traditional heterologous expression systems or primary excitable cells, and application of this method to primary fibroblasts may enable an alternative approach to cardiac cell therapy. Compared with existing methods, this protocol generates a well-defined, relatively homogeneous electrophysiological phenotype of excitable cells that facilitates experimental and computational studies of AP conduction and can decrease arrhythmogenic risk upon cell transplantation. Although basic cell culture and molecular biology techniques are sufficient to generate excitable tissues using the described protocol, experience with patch-clamp techniques is required to characterize and optimize derived cell populations.

  2. Electro-mechanical probe positioning system for large volume plasma device

    NASA Astrophysics Data System (ADS)

    Sanyasi, A. K.; Sugandhi, R.; Srivastava, P. K.; Srivastav, Prabhakar; Awasthi, L. M.

    2018-05-01

    An automated electro-mechanical system for the positioning of plasma diagnostics has been designed and implemented in a Large Volume Plasma Device (LVPD). The system consists of 12 electro-mechanical assemblies, which are orchestrated using the Modbus communication protocol on 4-wire RS485 communications to meet the experimental requirements. Each assembly has a lead screw-based mechanical structure, Wilson feed-through-based vacuum interface, bipolar stepper motor, micro-controller-based stepper drive, and optical encoder for online positioning correction of probes. The novelty of the system lies in the orchestration of multiple drives on a single interface, fabrication and installation of the system for a large experimental device like the LVPD, in-house developed software, and adopted architectural practices. The paper discusses the design, description of hardware and software interfaces, and performance results in LVPD.

  3. RaptorX server: a resource for template-based protein structure modeling.

    PubMed

    Källberg, Morten; Margaryan, Gohar; Wang, Sheng; Ma, Jianzhu; Xu, Jinbo

    2014-01-01

    Assigning functional properties to a newly discovered protein is a key challenge in modern biology. To this end, computational modeling of the three-dimensional atomic arrangement of the amino acid chain is often crucial in determining the role of the protein in biological processes. We present a community-wide web-based protocol, RaptorX server ( http://raptorx.uchicago.edu ), for automated protein secondary structure prediction, template-based tertiary structure modeling, and probabilistic alignment sampling.Given a target sequence, RaptorX server is able to detect even remotely related template sequences by means of a novel nonlinear context-specific alignment potential and probabilistic consistency algorithm. Using the protocol presented here it is thus possible to obtain high-quality structural models for many target protein sequences when only distantly related protein domains have experimentally solved structures. At present, RaptorX server can perform secondary and tertiary structure prediction of a 200 amino acid target sequence in approximately 30 min.

  4. Accuracy of binding mode prediction with a cascadic stochastic tunneling method.

    PubMed

    Fischer, Bernhard; Basili, Serena; Merlitz, Holger; Wenzel, Wolfgang

    2007-07-01

    We investigate the accuracy of the binding modes predicted for 83 complexes of the high-resolution subset of the ASTEX/CCDC receptor-ligand database using the atomistic FlexScreen approach with a simple forcefield-based scoring function. The median RMS deviation between experimental and predicted binding mode was just 0.83 A. Over 80% of the ligands dock within 2 A of the experimental binding mode, for 60 complexes the docking protocol locates the correct binding mode in all of ten independent simulations. Most docking failures arise because (a) the experimental structure clashed in our forcefield and is thus unattainable in the docking process or (b) because the ligand is stabilized by crystal water. 2007 Wiley-Liss, Inc.

  5. Development, implementation, and experimentation of parametric routing protocol for sensor networks

    NASA Astrophysics Data System (ADS)

    Nassr, Matthew S.; Jun, Jangeun; Eidenbenz, Stephan J.; Frigo, Janette R.; Hansson, Anders A.; Mielke, Angela M.; Smith, Mark C.

    2006-09-01

    The development of a scalable and reliable routing protocol for sensor networks is traced from a theoretical beginning to positive simulation results to the end of verification experiments in large and heavily loaded networks. Design decisions and explanations as well as implementation hurdles are presented to give a complete picture of protocol development. Additional software and hardware is required to accurately test the performance of our protocol in field experiments. In addition, the developed protocol is tested in TinyOS on Mica2 motes against well-established routing protocols frequently used in sensor networks. Our protocol proves to outperform the standard (MINTRoute) and the trivial (Gossip) in a variety of different scenarios.

  6. Free-Space Quantum Key Distribution using Polarization Entangled Photons

    NASA Astrophysics Data System (ADS)

    Kurtsiefer, Christian

    2007-06-01

    We report on a complete experimental implementation of a quantum key distribution protocol through a free space link using polarization-entangled photon pairs from a compact parametric down-conversion source [1]. Based on a BB84-equivalent protocol, we generated without interruption over 10 hours a secret key free-space optical link distance of 1.5 km with a rate up to 950 bits per second after error correction and privacy amplification. Our system is based on two time stamp units and relies on no specific hardware channel for coincidence identification besides an IP link. For that, initial clock synchronization with an accuracy of better than 2 ns is achieved, based on a conventional NTP protocol and a tiered cross correlation of time tags on both sides. Time tags are used to servo a local clock, allowing a streamed measurement on correctly identified photon pairs. Contrary to the majority of quantum key distribution systems, this approach does not require a trusted large-bandwidth random number generator, but integrates that into the physical key generation process. We discuss our current progress of implementing a key distribution via an atmospherical link during daylight conditions, and possible attack scenarios on a physical timing information side channel to a entanglement-based key distribution system. [1] I. Marcikic, A. Lamas-Linares, C. Kurtsiefer, Appl. Phys. Lett. 89, 101122 (2006).

  7. The MaxQuant computational platform for mass spectrometry-based shotgun proteomics.

    PubMed

    Tyanova, Stefka; Temu, Tikira; Cox, Juergen

    2016-12-01

    MaxQuant is one of the most frequently used platforms for mass-spectrometry (MS)-based proteomics data analysis. Since its first release in 2008, it has grown substantially in functionality and can be used in conjunction with more MS platforms. Here we present an updated protocol covering the most important basic computational workflows, including those designed for quantitative label-free proteomics, MS1-level labeling and isobaric labeling techniques. This protocol presents a complete description of the parameters used in MaxQuant, as well as of the configuration options of its integrated search engine, Andromeda. This protocol update describes an adaptation of an existing protocol that substantially modifies the technique. Important concepts of shotgun proteomics and their implementation in MaxQuant are briefly reviewed, including different quantification strategies and the control of false-discovery rates (FDRs), as well as the analysis of post-translational modifications (PTMs). The MaxQuant output tables, which contain information about quantification of proteins and PTMs, are explained in detail. Furthermore, we provide a short version of the workflow that is applicable to data sets with simple and standard experimental designs. The MaxQuant algorithms are efficiently parallelized on multiple processors and scale well from desktop computers to servers with many cores. The software is written in C# and is freely available at http://www.maxquant.org.

  8. An artificial-intelligence technique for qualitatively deriving enzyme kinetic mechanisms from initial-velocity measurements and its application to hexokinase.

    PubMed Central

    Garfinkel, L; Cohen, D M; Soo, V W; Garfinkel, D; Kulikowski, C A

    1989-01-01

    We have developed a computer method based on artificial-intelligence techniques for qualitatively analysing steady-state initial-velocity enzyme kinetic data. We have applied our system to experiments on hexokinase from a variety of sources: yeast, ascites and muscle. Our system accepts qualitative stylized descriptions of experimental data, infers constraints from the observed data behaviour and then compares the experimentally inferred constraints with corresponding theoretical model-based constraints. It is desirable to have large data sets which include the results of a variety of experiments. Human intervention is needed to interpret non-kinetic information, differences in conditions, etc. Different strategies were used by the several experimenters whose data was studied to formulate mechanisms for their enzyme preparations, including different methods (product inhibitors or alternate substrates), different experimental protocols (monitoring enzyme activity differently), or different experimental conditions (temperature, pH or ionic strength). The different ordered and rapid-equilibrium mechanisms proposed by these experimenters were generally consistent with their data. On comparing the constraints derived from the several experimental data sets, they are found to be in much less disagreement than the mechanisms published, and some of the disagreement can be ascribed to different experimental conditions (especially ionic strength). PMID:2690819

  9. Effects of Guided Written Disclosure Protocol on mood states and psychological symptoms among parents of off-therapy acute lymphoblastic leukemia children.

    PubMed

    Martino, Maria Luisa; Freda, Maria Francesca; Camera, Flavia

    2013-06-01

    This study assesses the effects of Guided Written Disclosure Protocol on psychological distress in mothers and fathers of off-therapy acute lymphoblastic leukemia children. An experimental group participated in the writing intervention with a control group subject only to test-taking standards. The Symptom Questionnaire and Profile of Mood States were administered at baseline, post-intervention, and follow-up. Guided Written Disclosure Protocol had significant effects on the progressive reduction of anxiety, depression, somatic symptoms, hostility, tension-anxiety, and fatigue-inertia within the experimental group. However, the control group distress levels tended to worsen over time. The mediating role of emotional processing was highlighted.

  10. Nonpainful wide-area compression inhibits experimental pain.

    PubMed

    Honigman, Liat; Bar-Bachar, Ofrit; Yarnitsky, David; Sprecher, Elliot; Granovsky, Yelena

    2016-09-01

    Compression therapy, a well-recognized treatment for lymphoedema and venous disorders, pressurizes limbs and generates massive non-noxious afferent sensory barrages. The aim of this study was to study whether such afferent activity has an analgesic effect when applied on the lower limbs, hypothesizing that larger compression areas will induce stronger analgesic effects, and whether this effect correlates with conditioned pain modulation (CPM). Thirty young healthy subjects received painful heat and pressure stimuli (47°C for 30 seconds, forearm; 300 kPa for 15 seconds, wrist) before and during 3 compression protocols of either SMALL (up to ankles), MEDIUM (up to knees), or LARGE (up to hips) compression areas. Conditioned pain modulation (heat pain conditioned by noxious cold water) was tested before and after each compression protocol. The LARGE protocol induced more analgesia for heat than the SMALL protocol (P < 0.001). The analgesic effect interacted with gender (P = 0.015). The LARGE protocol was more efficient for females, whereas the MEDIUM protocol was more efficient for males. Pressure pain was reduced by all protocols (P < 0.001) with no differences between protocols and no gender effect. Conditioned pain modulation was more efficient than the compression-induced analgesia. For the LARGE protocol, precompression CPM efficiency positively correlated with compression-induced analgesia. Large body area compression exerts an area-dependent analgesic effect on experimental pain stimuli. The observed correlation with pain inhibition in response to robust non-noxious sensory stimulation may suggest that compression therapy shares similar mechanisms with inhibitory pain modulation assessed through CPM.

  11. Assessing the welfare of laboratory mice in their home environment using animal-based measures--a benchmarking tool.

    PubMed

    Spangenberg, Elin M F; Keeling, Linda J

    2016-02-01

    Welfare problems in laboratory mice can be a consequence of an ongoing experiment, or a characteristic of a particular genetic line, but in some cases, such as breeding animals, they are most likely to be a result of the design and management of the home cage. Assessment of the home cage environment is commonly performed using resource-based measures, like access to nesting material. However, animal-based measures (related to the health status and behaviour of the animals) can be used to assess the current welfare of animals regardless of the inputs applied (i.e. the resources or management). The aim of this study was to design a protocol for assessing the welfare of laboratory mice using only animal-based measures. The protocol, to be used as a benchmarking tool, assesses mouse welfare in the home cage and does not contain parameters related to experimental situations. It is based on parameters corresponding to the 12 welfare criteria established by the Welfare Quality® project. Selection of animal-based measures was performed by scanning existing published, web-based and informal protocols, and by choosing parameters that matched these criteria, were feasible in practice and, if possible, were already validated indicators of mouse welfare. The parameters should identify possible animal welfare problems and enable assessment directly in an animal room during cage cleaning procedures, without the need for extra equipment. Thermal comfort behaviours and positive emotional states are areas where more research is needed to find valid, reliable and feasible animal-based measures. © The Author(s) 2015.

  12. The effect of repeated laser stimuli to ink-marked skin on skin temperature-recommendations for a safe experimental protocol in humans.

    PubMed

    Madden, Victoria J; Catley, Mark J; Grabherr, Luzia; Mazzola, Francesca; Shohag, Mohammad; Moseley, G Lorimer

    2016-01-01

    Background. Nd:YAP laser is widely used to investigate the nociceptive and pain systems, generating perpetual and laser-evoked neurophysiological responses. A major procedural concern for the use of Nd:YAP laser stimuli in experimental research is the risk of skin damage. The absorption of Nd:YAP laser stimuli is greater in darker skin, or in pale skin that has been darkened with ink, prompting some ethics boards to refuse approval to experimenters wishing to track stimulus location by marking the skin with ink. Some research questions, however, require laser stimuli to be delivered at particular locations or within particular zones, a requirement that is very difficult to achieve if marking the skin is not possible. We thoroughly searched the literature for experimental evidence and protocol recommendations for safe delivery of Nd:YAP laser stimuli over marked skin, but found nothing. Methods. We designed an experimental protocol to define safe parameters for the use of Nd:YAP laser stimuli over skin that has been marked with black dots, and used thermal imaging to assess the safety of the procedure at the forearm and the back. Results. Using thermal imaging and repeated laser stimulation to ink-marked skin, we demonstrated that skin temperature did not increase progressively across the course of the experiment, and that the small change in temperature seen at the forearm was reversed during the rest periods between blocks. Furthermore, no participant experienced skin damage due to the procedure. Conclusion. This protocol offers parameters for safe, confident and effective experimentation using repeated Nd:YAP laser on skin marked with ink, thus paving the way for investigations that depend on it.

  13. A Comprehensive Comparison of Multiparty Secure Additions with Differential Privacy

    PubMed Central

    Goryczka, Slawomir; Xiong, Li

    2016-01-01

    This paper considers the problem of secure data aggregation (mainly summation) in a distributed setting, while ensuring differential privacy of the result. We study secure multiparty addition protocols using well known security schemes: Shamir’s secret sharing, perturbation-based, and various encryptions. We supplement our study with our new enhanced encryption scheme EFT, which is efficient and fault tolerant. Differential privacy of the final result is achieved by either distributed Laplace or Geometric mechanism (respectively DLPA or DGPA), while approximated differential privacy is achieved by diluted mechanisms. Distributed random noise is generated collectively by all participants, which draw random variables from one of several distributions: Gamma, Gauss, Geometric, or their diluted versions. We introduce a new distributed privacy mechanism with noise drawn from the Laplace distribution, which achieves smaller redundant noise with efficiency. We compare complexity and security characteristics of the protocols with different differential privacy mechanisms and security schemes. More importantly, we implemented all protocols and present an experimental comparison on their performance and scalability in a real distributed environment. Based on the evaluations, we identify our security scheme and Laplace DLPA as the most efficient for secure distributed data aggregation with privacy. PMID:28919841

  14. Optimized quantum sensing with a single electron spin using real-time adaptive measurements.

    PubMed

    Bonato, C; Blok, M S; Dinani, H T; Berry, D W; Markham, M L; Twitchen, D J; Hanson, R

    2016-03-01

    Quantum sensors based on single solid-state spins promise a unique combination of sensitivity and spatial resolution. The key challenge in sensing is to achieve minimum estimation uncertainty within a given time and with high dynamic range. Adaptive strategies have been proposed to achieve optimal performance, but their implementation in solid-state systems has been hindered by the demanding experimental requirements. Here, we realize adaptive d.c. sensing by combining single-shot readout of an electron spin in diamond with fast feedback. By adapting the spin readout basis in real time based on previous outcomes, we demonstrate a sensitivity in Ramsey interferometry surpassing the standard measurement limit. Furthermore, we find by simulations and experiments that adaptive protocols offer a distinctive advantage over the best known non-adaptive protocols when overhead and limited estimation time are taken into account. Using an optimized adaptive protocol we achieve a magnetic field sensitivity of 6.1 ± 1.7 nT Hz(-1/2) over a wide range of 1.78 mT. These results open up a new class of experiments for solid-state sensors in which real-time knowledge of the measurement history is exploited to obtain optimal performance.

  15. Optimized quantum sensing with a single electron spin using real-time adaptive measurements

    NASA Astrophysics Data System (ADS)

    Bonato, C.; Blok, M. S.; Dinani, H. T.; Berry, D. W.; Markham, M. L.; Twitchen, D. J.; Hanson, R.

    2016-03-01

    Quantum sensors based on single solid-state spins promise a unique combination of sensitivity and spatial resolution. The key challenge in sensing is to achieve minimum estimation uncertainty within a given time and with high dynamic range. Adaptive strategies have been proposed to achieve optimal performance, but their implementation in solid-state systems has been hindered by the demanding experimental requirements. Here, we realize adaptive d.c. sensing by combining single-shot readout of an electron spin in diamond with fast feedback. By adapting the spin readout basis in real time based on previous outcomes, we demonstrate a sensitivity in Ramsey interferometry surpassing the standard measurement limit. Furthermore, we find by simulations and experiments that adaptive protocols offer a distinctive advantage over the best known non-adaptive protocols when overhead and limited estimation time are taken into account. Using an optimized adaptive protocol we achieve a magnetic field sensitivity of 6.1 ± 1.7 nT Hz-1/2 over a wide range of 1.78 mT. These results open up a new class of experiments for solid-state sensors in which real-time knowledge of the measurement history is exploited to obtain optimal performance.

  16. Minutiae Matching with Privacy Protection Based on the Combination of Garbled Circuit and Homomorphic Encryption

    PubMed Central

    Li, Mengxing; Zhao, Jian; Yang, Mei; Kang, Lijun; Wu, Lili

    2014-01-01

    Biometrics plays an important role in authentication applications since they are strongly linked to holders. With an increasing growth of e-commerce and e-government, one can expect that biometric-based authentication systems are possibly deployed over the open networks in the near future. However, due to its openness, the Internet poses a great challenge to the security and privacy of biometric authentication. Biometric data cannot be revoked, so it is of paramount importance that biometric data should be handled in a secure way. In this paper we present a scheme achieving privacy-preserving fingerprint authentication between two parties, in which fingerprint minutiae matching algorithm is completed in the encrypted domain. To improve the efficiency, we exploit homomorphic encryption as well as garbled circuits to design the protocol. Our goal is to provide protection for the security of template in storage and data privacy of two parties in transaction. The experimental results show that the proposed authentication protocol runs efficiently. Therefore, the protocol can run over open networks and help to alleviate the concerns on security and privacy of biometric applications over the open networks. PMID:24711729

  17. Minutiae matching with privacy protection based on the combination of garbled circuit and homomorphic encryption.

    PubMed

    Li, Mengxing; Feng, Quan; Zhao, Jian; Yang, Mei; Kang, Lijun; Wu, Lili

    2014-01-01

    Biometrics plays an important role in authentication applications since they are strongly linked to holders. With an increasing growth of e-commerce and e-government, one can expect that biometric-based authentication systems are possibly deployed over the open networks in the near future. However, due to its openness, the Internet poses a great challenge to the security and privacy of biometric authentication. Biometric data cannot be revoked, so it is of paramount importance that biometric data should be handled in a secure way. In this paper we present a scheme achieving privacy-preserving fingerprint authentication between two parties, in which fingerprint minutiae matching algorithm is completed in the encrypted domain. To improve the efficiency, we exploit homomorphic encryption as well as garbled circuits to design the protocol. Our goal is to provide protection for the security of template in storage and data privacy of two parties in transaction. The experimental results show that the proposed authentication protocol runs efficiently. Therefore, the protocol can run over open networks and help to alleviate the concerns on security and privacy of biometric applications over the open networks.

  18. A Comprehensive Comparison of Multiparty Secure Additions with Differential Privacy.

    PubMed

    Goryczka, Slawomir; Xiong, Li

    2017-01-01

    This paper considers the problem of secure data aggregation (mainly summation) in a distributed setting, while ensuring differential privacy of the result. We study secure multiparty addition protocols using well known security schemes: Shamir's secret sharing, perturbation-based, and various encryptions. We supplement our study with our new enhanced encryption scheme EFT, which is efficient and fault tolerant. Differential privacy of the final result is achieved by either distributed Laplace or Geometric mechanism (respectively DLPA or DGPA), while approximated differential privacy is achieved by diluted mechanisms. Distributed random noise is generated collectively by all participants, which draw random variables from one of several distributions: Gamma, Gauss, Geometric, or their diluted versions. We introduce a new distributed privacy mechanism with noise drawn from the Laplace distribution, which achieves smaller redundant noise with efficiency. We compare complexity and security characteristics of the protocols with different differential privacy mechanisms and security schemes. More importantly, we implemented all protocols and present an experimental comparison on their performance and scalability in a real distributed environment. Based on the evaluations, we identify our security scheme and Laplace DLPA as the most efficient for secure distributed data aggregation with privacy.

  19. Systematic Exploitation of Multiple Receptor Conformations for Virtual Ligand Screening

    PubMed Central

    Bottegoni, Giovanni; Rocchia, Walter; Rueda, Manuel; Abagyan, Ruben; Cavalli, Andrea

    2011-01-01

    The role of virtual ligand screening in modern drug discovery is to mine large chemical collections and to prioritize for experimental testing a comparatively small and diverse set of compounds with expected activity against a target. Several studies have pointed out that the performance of virtual ligand screening can be improved by taking into account receptor flexibility. Here, we systematically assess how multiple crystallographic receptor conformations, a powerful way of discretely representing protein plasticity, can be exploited in screening protocols to separate binders from non-binders. Our analyses encompass 36 targets of pharmaceutical relevance and are based on actual molecules with reported activity against those targets. The results suggest that an ensemble receptor-based protocol displays a stronger discriminating power between active and inactive molecules as compared to its standard single rigid receptor counterpart. Moreover, such a protocol can be engineered not only to enrich a higher number of active compounds, but also to enhance their chemical diversity. Finally, some clear indications can be gathered on how to select a subset of receptor conformations that is most likely to provide the best performance in a real life scenario. PMID:21625529

  20. Glycerolized Reticular Dermis as a New Human Acellular Dermal Matrix: An Exploratory Study

    PubMed Central

    Ferrando, Pietro Maria; Balmativola, Davide; Cambieri, Irene; Scalzo, Maria Stella; Bergallo, Massimiliano; Annaratone, Laura; Casarin, Stefania; Fumagalli, Mara; Stella, Maurizio; Sapino, Anna; Castagnoli, Carlotta

    2016-01-01

    Human Acellular Dermal Matrices (HADM) are employed in various reconstructive surgery procedures as scaffolds for autologous tissue regeneration. The aim of this project was to develop a new type of HADM for clinical use, composed of glycerolized reticular dermis decellularized through incubation and tilting in Dulbecco’s Modified Eagle’s Medium (DMEM). This manufacturing method was compared with a decellularization procedure already described in the literature, based on the use of sodium hydroxide (NaOH), on samples from 28 donors. Cell viability was assessed using an MTT assay and microbiological monitoring was performed on all samples processed after each step. Two surgeons evaluated the biomechanical characteristics of grafts of increasing thickness. The effects of the different decellularization protocols were assessed by means of histological examination and immunohistochemistry, and residual DNA after decellularization was quantified using a real-time TaqMan MGB probe. Finally, we compared the results of DMEM based decellularization protocol on reticular dermis derived samples with the results of the same protocol applied on papillary dermis derived grafts. Our experimental results indicated that the use of glycerolized reticular dermis after 5 weeks of treatment with DMEM results in an HADM with good handling and biocompatibility properties. PMID:26918526

  1. Selection for production-related traits in Pelargonium zonale: improved design and analysis make all the difference

    PubMed Central

    Molenaar, Heike; Glawe, Martin; Boehm, Robert; Piepho, Hans-Peter

    2017-01-01

    Ornamental plant variety improvement is limited by current phenotyping approaches and neglected use of experimental designs. The present study was conducted to show the benefits of using an experimental design and corresponding analysis in ornamental breeding regarding simulated response to selection in Pelargonium zonale for production-related traits. This required establishment of phenotyping protocols for root formation and stem cutting counts, with which 974 genotypes were assessed in a two-phase experimental design. The present paper evaluates this protocol. The possibility of varietal improvement through indirect selection on secondary traits such as branch count and flower count was assessed by genetic correlations. Simulated response to selection varied greatly, depending on the genotypic variances of the breeding population and traits. A varietal improvement of over 20% is possible for stem cutting count, root formation, branch count and flower count. In contrast, indirect selection of stem cutting count by branch count or flower count was found to be ineffective. The established phenotypic protocols and two-phase experimental designs are valuable tools for breeding of P. zonale. PMID:28243453

  2. Selection for production-related traits in Pelargonium zonale: improved design and analysis make all the difference.

    PubMed

    Molenaar, Heike; Glawe, Martin; Boehm, Robert; Piepho, Hans-Peter

    2017-01-01

    Ornamental plant variety improvement is limited by current phenotyping approaches and neglected use of experimental designs. The present study was conducted to show the benefits of using an experimental design and corresponding analysis in ornamental breeding regarding simulated response to selection in Pelargonium zonale for production-related traits. This required establishment of phenotyping protocols for root formation and stem cutting counts, with which 974 genotypes were assessed in a two-phase experimental design. The present paper evaluates this protocol. The possibility of varietal improvement through indirect selection on secondary traits such as branch count and flower count was assessed by genetic correlations. Simulated response to selection varied greatly, depending on the genotypic variances of the breeding population and traits. A varietal improvement of over 20% is possible for stem cutting count, root formation, branch count and flower count. In contrast, indirect selection of stem cutting count by branch count or flower count was found to be ineffective. The established phenotypic protocols and two-phase experimental designs are valuable tools for breeding of P. zonale .

  3. Quantum dense key distribution

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Degiovanni, I.P.; Ruo Berchera, I.; Castelletto, S.

    2004-03-01

    This paper proposes a protocol for quantum dense key distribution. This protocol embeds the benefits of a quantum dense coding and a quantum key distribution and is able to generate shared secret keys four times more efficiently than the Bennet-Brassard 1984 protocol. We hereinafter prove the security of this scheme against individual eavesdropping attacks, and we present preliminary experimental results, showing its feasibility.

  4. EASE (Experimental Assembly of Structures in EVA) overview of selected results

    NASA Technical Reports Server (NTRS)

    Akin, David L.

    1987-01-01

    Experimental Assembly of Structures in EVA (EASE) objectives, experimental protocol, neutral buoyancy simulation, task time distribution, assembly task performance, metabolic rate/biomedical readouts are summarized. This presentation is shown in charts, figures, and graphs.

  5. Criminal Investigation Program Report

    DTIC Science & Technology

    1988-10-31

    Periodontal Resident for his paper "The Presence of Nicotine on Root Surfaces of Periodontally Diseased Teeth in Smokers" The paper based on Protocol #87-20...Closed Root 87-23 Planing with a Conventional Approach. (C) 31 1987 Evaluation of the Apical Seal Produced by Injected 87-32 Thermoplasticized Gutta...Freeze-Dried Bone. (0) 35 1988 Evaluation of Osseointegration of Titanium Dental 88-11 Implants in Micro Swine. (0) 36 1988 Experimental Periodontitis

  6. Indoor radon regulation using tabulated values of temporal radon variation.

    PubMed

    Tsapalov, Andrey; Kovler, Konstantin

    2018-03-01

    Mass measurements of indoor radon concentrations have been conducted for about 30 years. In most of the countries, a national reference/action/limit level is adopted, limiting the annual average indoor radon (AAIR) concentration. However, until now, there is no single and generally accepted international protocol for determining the AAIR with a known confidence interval, based on measurements of different durations. Obviously, as the duration of measurements increases, the uncertainty of the AAIR estimation decreases. The lack of the information about the confidence interval of the determined AAIR level does not allow correct comparison with the radon reference level. This greatly complicates development of an effective indoor radon measurement protocol and strategy. The paper proposes a general principle of indoor radon regulation, based on the simple criteria widely used in metrology, and introduces a new parameter - coefficient of temporal radon variation K V (t) that depends on the measurement duration and determines the uncertainty of the AAIR. An algorithm for determining K V (t) based on the results of annual continuous radon monitoring in experimental rooms is proposed. Included are indoor radon activity concentrations and equilibrium equivalent concentration (EEC) of radon progeny. The monitoring was conducted in 10 selected experimental rooms located in 7 buildings, mainly in the Moscow region (Russia), from 2006 to 2013. The experimental and tabulated values of K V (t) and also the values of the coefficient of temporal EEC variation depending on the mode and duration of the measurements were obtained. The recommendations to improve the efficiency and reliability of indoor radon regulation are given. The importance of taking into account the geological factors is discussed. The representativity of the results of the study is estimated and the approach for their verification is proposed. Copyright © 2017 Elsevier Ltd. All rights reserved.

  7. Effectiveness of a multicomponent school based intervention to reduce bullying among adolescents in Chandigarh, North India: A quasi-experimental study protocol.

    PubMed

    Rana, Monica; Gupta, Madhu; Malhi, Prahbhjot; Grover, Sandeep; Kaur, Manmeet

    2018-02-05

    Bullying perpetration and victimization is associated with significant academic, psychosocial and health related problems among adolescents. There is a need to develop effective interventions to prevent bullying among adolescents, especially in low and middle income countries. This paper presents the study protocol to develop, and evaluate the effect of multi-component school based prevention program for bullying in India. Quasi-experimental study. The study will be conducted among 846 students of grade 7 th and 8 th in the intervention and control schools in Chandigarh, Union Territory, North India. A government and a private school will be selected purposively in each of the intervention and control arm. The intervention is based on socio-ecological model, and will be administered at individual, relationship (parents and teachers) and school level. The primary study outcome will be the proportion of students experiencing any kind of bullying (bullying, victimization, or both), in each study arm. The effectiveness of the intervention will be measured by performing difference in difference analysis and generalized estimating equations. Bullying is an aggressive behaviour with significant morbidities, including psychological or physical trauma, affecting individuals not only in their adolescence, but also later in their adulthood. This quasi-experimental study is expected to provide evidence on whether multi-component bullying prevention intervention program, can reduce the burden of bullying perpetration and victimization among school adolescents in India. The results of the study will add in the exiting literature on bullying intervention program, especially, from the low middle-income countries, as there are limited studies available on this topic in these countries.

  8. An in fiber experimental approach to photonic quantum digital signatures that does not require quantum memory

    NASA Astrophysics Data System (ADS)

    Collins, Robert J.; Donaldon, Ross J.; Dunjko, Vedran; Wallden, Petros; Clarke, Patrick J.; Andersson, Erika; Jeffers, John; Buller, Gerald S.

    2014-10-01

    Classical digital signatures are commonly used in e-mail, electronic financial transactions and other forms of electronic communications to ensure that messages have not been tampered with in transit, and that messages are transferrable. The security of commonly used classical digital signature schemes relies on the computational difficulty of inverting certain mathematical functions. However, at present, there are no such one-way functions which have been proven to be hard to invert. With enough computational resources certain implementations of classical public key cryptosystems can be, and have been, broken with current technology. It is nevertheless possible to construct information-theoretically secure signature schemes, including quantum digital signature schemes. Quantum signature schemes can be made information theoretically secure based on the laws of quantum mechanics, while classical comparable protocols require additional resources such as secret communication and a trusted authority. Early demonstrations of quantum digital signatures required quantum memory, rendering them impractical at present. Our present implementation is based on a protocol that does not require quantum memory. It also uses the new technique of unambiguous quantum state elimination, Here we report experimental results for a test-bed system, recorded with a variety of different operating parameters, along with a discussion of aspects of the system security.

  9. Effects of a peer support programme for youth social services employees experiencing potentially traumatic events: a protocol for a prospective cohort study

    PubMed Central

    Guay, Stephane; Tremblay, Nicole; Goncalves, Jane; Bilodeau, Henriette; Geoffrion, Steve

    2017-01-01

    Introduction The use of peer support programmes to help workers experiencing potentially traumatic events (PTE) has increased in high-risk organisations in the last decades. However, the scientific evidence of its effectiveness is still very limited. This paper aims to describe the protocol of a prospective cohort study that assesses the efficacy of a peer support programme among youth social services employees exposed to a PTE at work on psychological well-being, work functioning and needs of support. Methods and analysis This is a mixed-methods prospective study that will examine workers' evolution four times over a 12-month period in Canada. This study involves: (1) quantitative data obtained through self-administrated questionnaires among 222 workers, and (2) qualitative in-depth interviews with a subsample of 45 workers. This study will compare findings from a cohort who received the support of a peer following a PTE (peer support–experimental protocol) as part of the experimental protocol of the Montreal Youth Social Services-University Institute (MYSS-UI), the second group of workers did not ask for the peer support (no peer support-experimental protocol) but was part of MYSS-UI, and the third group received standard organisational support from the Monteregie Youth Social Services (MYSS) (standard organisational protocol). Ethics and dissemination The protocol and informed consent form complied with the ethics guidelines of the MYSS-UI. The Research Ethics Board of MYSS-UI and MYSS reviewed and accepted the protocol as required. The results of the study will be published in peer-reviewed journals, presented at research and general public conferences, disseminated via a public report for the institute that funded the project and for all workers. Results of this study will influence decision making regarding intervention policies following PTE and peer support interventions may be expanded throughout the youth social services in Canada and worldwide. PMID:28647721

  10. cuRRBS: simple and robust evaluation of enzyme combinations for reduced representation approaches.

    PubMed

    Martin-Herranz, Daniel E; Ribeiro, António J M; Krueger, Felix; Thornton, Janet M; Reik, Wolf; Stubbs, Thomas M

    2017-11-16

    DNA methylation is an important epigenetic modification in many species that is critical for development, and implicated in ageing and many complex diseases, such as cancer. Many cost-effective genome-wide analyses of DNA modifications rely on restriction enzymes capable of digesting genomic DNA at defined sequence motifs. There are hundreds of restriction enzyme families but few are used to date, because no tool is available for the systematic evaluation of restriction enzyme combinations that can enrich for certain sites of interest in a genome. Herein, we present customised Reduced Representation Bisulfite Sequencing (cuRRBS), a novel and easy-to-use computational method that solves this problem. By computing the optimal enzymatic digestions and size selection steps required, cuRRBS generalises the traditional MspI-based Reduced Representation Bisulfite Sequencing (RRBS) protocol to all restriction enzyme combinations. In addition, cuRRBS estimates the fold-reduction in sequencing costs and provides a robustness value for the personalised RRBS protocol, allowing users to tailor the protocol to their experimental needs. Moreover, we show in silico that cuRRBS-defined restriction enzymes consistently out-perform MspI digestion in many biological systems, considering both CpG and CHG contexts. Finally, we have validated the accuracy of cuRRBS predictions for single and double enzyme digestions using two independent experimental datasets. © The Author(s) 2017. Published by Oxford University Press on behalf of Nucleic Acids Research.

  11. Protocols Utilizing Constant pH Molecular Dynamics to Compute pH-Dependent Binding Free Energies

    PubMed Central

    2015-01-01

    In protein–ligand binding, the electrostatic environments of the two binding partners may vary significantly in bound and unbound states, which may lead to protonation changes upon binding. In cases where ligand binding results in a net uptake or release of protons, the free energy of binding is pH-dependent. Nevertheless, conventional free energy calculations and molecular docking protocols typically do not rigorously account for changes in protonation that may occur upon ligand binding. To address these shortcomings, we present a simple methodology based on Wyman’s binding polynomial formalism to account for the pH dependence of binding free energies and demonstrate its use on cucurbit[7]uril (CB[7]) host–guest systems. Using constant pH molecular dynamics and a reference binding free energy that is taken either from experiment or from thermodynamic integration computations, the pH-dependent binding free energy is determined. This computational protocol accurately captures the large pKa shifts observed experimentally upon CB[7]:guest association and reproduces experimental binding free energies at different levels of pH. We show that incorrect assignment of fixed protonation states in free energy computations can give errors of >2 kcal/mol in these host–guest systems. Use of the methods presented here avoids such errors, thus suggesting their utility in computing proton-linked binding free energies for protein–ligand complexes. PMID:25134690

  12. Improved protocols for the study of urinary electrolyte excretion and blood pressure in rodents: use of gel food and stepwise changes in diet composition.

    PubMed

    Nizar, Jonathan M; Bouby, Nadine; Bankir, Lise; Bhalla, Vivek

    2018-06-01

    Many experimental protocols in rodents require the comparison of groups that are fed different diets. Changes in dietary electrolyte and/or fat content can influence food intake, which can potentially introduce bias or confound the results. Unpalatable diets slow growth or cause weight loss, which is exacerbated by housing the animals in individual metabolic cages or by surgery. For balance studies in mice, small changes in body weight and food intake and low urinary flow can amplify these challenges. Powder food can be administered as gel with the addition of a desired amount of water, electrolytes, drugs (if any), and a small amount of agar. We describe here how the use of gel food to vary water, Na, K, and fat content can reduce weight loss and improve reproducibility of intake, urinary excretion, and blood pressure in rodents. In addition, mild food restriction reduces the interindividual variability and intergroup differences in food intake and associated variables, thus improving the statistical power of an experiment. Finally, we also demonstrate the advantages of using gel food for weight-based drug dosing. These protocols can improve the accuracy and reproducibility of experimental data where dietary manipulations are needed and are especially advisable in rodent studies related to water balance, obesity, and blood pressure.

  13. Open source software to control Bioflo bioreactors.

    PubMed

    Burdge, David A; Libourel, Igor G L

    2014-01-01

    Bioreactors are designed to support highly controlled environments for growth of tissues, cell cultures or microbial cultures. A variety of bioreactors are commercially available, often including sophisticated software to enhance the functionality of the bioreactor. However, experiments that the bioreactor hardware can support, but that were not envisioned during the software design cannot be performed without developing custom software. In addition, support for third party or custom designed auxiliary hardware is often sparse or absent. This work presents flexible open source freeware for the control of bioreactors of the Bioflo product family. The functionality of the software includes setpoint control, data logging, and protocol execution. Auxiliary hardware can be easily integrated and controlled through an integrated plugin interface without altering existing software. Simple experimental protocols can be entered as a CSV scripting file, and a Python-based protocol execution model is included for more demanding conditional experimental control. The software was designed to be a more flexible and free open source alternative to the commercially available solution. The source code and various auxiliary hardware plugins are publicly available for download from https://github.com/LibourelLab/BiofloSoftware. In addition to the source code, the software was compiled and packaged as a self-installing file for 32 and 64 bit windows operating systems. The compiled software will be able to control a Bioflo system, and will not require the installation of LabVIEW.

  14. Open Source Software to Control Bioflo Bioreactors

    PubMed Central

    Burdge, David A.; Libourel, Igor G. L.

    2014-01-01

    Bioreactors are designed to support highly controlled environments for growth of tissues, cell cultures or microbial cultures. A variety of bioreactors are commercially available, often including sophisticated software to enhance the functionality of the bioreactor. However, experiments that the bioreactor hardware can support, but that were not envisioned during the software design cannot be performed without developing custom software. In addition, support for third party or custom designed auxiliary hardware is often sparse or absent. This work presents flexible open source freeware for the control of bioreactors of the Bioflo product family. The functionality of the software includes setpoint control, data logging, and protocol execution. Auxiliary hardware can be easily integrated and controlled through an integrated plugin interface without altering existing software. Simple experimental protocols can be entered as a CSV scripting file, and a Python-based protocol execution model is included for more demanding conditional experimental control. The software was designed to be a more flexible and free open source alternative to the commercially available solution. The source code and various auxiliary hardware plugins are publicly available for download from https://github.com/LibourelLab/BiofloSoftware. In addition to the source code, the software was compiled and packaged as a self-installing file for 32 and 64 bit windows operating systems. The compiled software will be able to control a Bioflo system, and will not require the installation of LabVIEW. PMID:24667828

  15. Metabolomics Workbench: An international repository for metabolomics data and metadata, metabolite standards, protocols, tutorials and training, and analysis tools.

    PubMed

    Sud, Manish; Fahy, Eoin; Cotter, Dawn; Azam, Kenan; Vadivelu, Ilango; Burant, Charles; Edison, Arthur; Fiehn, Oliver; Higashi, Richard; Nair, K Sreekumaran; Sumner, Susan; Subramaniam, Shankar

    2016-01-04

    The Metabolomics Workbench, available at www.metabolomicsworkbench.org, is a public repository for metabolomics metadata and experimental data spanning various species and experimental platforms, metabolite standards, metabolite structures, protocols, tutorials, and training material and other educational resources. It provides a computational platform to integrate, analyze, track, deposit and disseminate large volumes of heterogeneous data from a wide variety of metabolomics studies including mass spectrometry (MS) and nuclear magnetic resonance spectrometry (NMR) data spanning over 20 different species covering all the major taxonomic categories including humans and other mammals, plants, insects, invertebrates and microorganisms. Additionally, a number of protocols are provided for a range of metabolite classes, sample types, and both MS and NMR-based studies, along with a metabolite structure database. The metabolites characterized in the studies available on the Metabolomics Workbench are linked to chemical structures in the metabolite structure database to facilitate comparative analysis across studies. The Metabolomics Workbench, part of the data coordinating effort of the National Institute of Health (NIH) Common Fund's Metabolomics Program, provides data from the Common Fund's Metabolomics Resource Cores, metabolite standards, and analysis tools to the wider metabolomics community and seeks data depositions from metabolomics researchers across the world. © The Author(s) 2015. Published by Oxford University Press on behalf of Nucleic Acids Research.

  16. Device Oriented Project Controller

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Dalesio, Leo; Kraimer, Martin

    2013-11-20

    This proposal is directed at the issue of developing control systems for very large HEP projects. A de-facto standard in accelerator control is the Experimental Physics and Industrial Control System (EPICS), which has been applied successfully to many physics projects. EPICS is a channel based system that requires that each channel of each device be configured and controlled. In Phase I, the feasibility of a device oriented extension to the distributed channel database was demonstrated by prototyping a device aware version of an EPICS I/O controller that functions with the current version of the channel access communication protocol. Extensions havemore » been made to the grammar to define the database. Only a multi-stage position controller with limit switches was developed in the demonstration, but the grammar should support a full range of functional record types. In phase II, a full set of record types will be developed to support all existing record types, a set of process control functions for closed loop control, and support for experimental beam line control. A tool to configure these records will be developed. A communication protocol will be developed or extensions will be made to Channel Access to support introspection of components of a device. Performance bench marks will be made on both communication protocol and the database. After these records and performance tests are under way, a second of the grammar will be undertaken.« less

  17. Lasting improvements in left spatial neglect following a protocol combining neck-muscle vibration and voluntary arm movements: a case-study.

    PubMed

    Ceyte, Hadrien; Beis, Jean-Marie; Simon, Mathilde; Rémy, Ariane; Anxionnat, René; Paysant, Jean; Caudron, Sébastien

    2018-01-22

    Beyond promising experimental results of sensory passive stimulations in spatial cognition disorders, some questions still remain regarding interests of these stimulations during the daily activities in neglect. The aim of this case-study was to evaluate the effects of a protocol combining left neck-muscle vibration with daily simple movements, like arm pointing movements, on perceptivo-locomotor deficits in a left spatial neglect patient. Two neuropsychological tests, one subjective straight-ahead pointing (SSA) test and one wheelchair navigation test were carried out before the combination protocol, immediately after, 1 h later, and 24 h later. The results showed a reduction of neglect spatial bias following the protocol lasted at least 24 h in all the tests (except for the SSA test due to the unavailability of the pointing device). The range of improvements in the symptoms of spatial neglect suggests that this therapeutic intervention based on the combining neck-muscle vibration to voluntary arm movements could be a useful treatment for this condition. One of future investigation axes should be the development of a vibratory tool in order to facilitate the combining this proprioceptive stimulation to daily activities. Implications for rehabilitation Spatial neglect is a perplexing neuropsychological syndrome, affecting different domains of spatial cognition and impacting also the functional domain. The treatments based on neck-muscle vibration are simple to use, non-invasive and requires none active participation of patient. A therapeutic intervention based on the combining left neck-muscle vibration and voluntary arm movements in a left-spatial-neglect show a lasting reduction of symptoms especially in daily activities. The combination of treatments based on the Bottom-Up approach opens innovative perspectives in rehabilitation.

  18. Of taps and toilets: quasi-experimental protocol for evaluating community-demand-driven projects.

    PubMed

    Pattanayak, Subhrendu K; Poulos, Christine; Yang, Jui-Chen; Patil, Sumeet R; Wendland, Kelly J

    2009-09-01

    Sustainable and equitable access to safe water and adequate sanitation are widely acknowledged as vital, yet neglected, development goals. Water supply and sanitation (WSS) policies are justified because of the usual efficiency criteria, but also major equity concerns. Yet, to date there are few scientific impact evaluations showing that WSS policies are effective in delivering social welfare outcomes. This lack of an evaluation culture is partly because WSS policies are characterized by diverse mechanisms, broad goals and the increasing importance of decentralized delivery, and partly because programme administrators are unaware of appropriate methods. We describe a protocol for a quasi-experimental evaluation of a community-demand-driven programme for water and sanitation in rural India, which addresses several evaluation challenges. After briefly reviewing policy and implementation issues in the sector, we describe key features of our protocol, including control group identification, pre-post measurement, programme theory, sample sufficiency and robust indicators. At its core, our protocol proposes to combine propensity score matching and difference-in-difference estimation. We conclude by briefly summarizing how quasi-experimental impact evaluations can address key issues in WSS policy design and when such evaluations are needed.

  19. Analysis of practical backoff protocols for contention resolution with multiple servers

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Goldberg, L.A.; MacKenzie, P.D.

    Backoff protocols are probably the most widely used protocols for contention resolution in multiple access channels. In this paper, we analyze the stochastic behavior of backoff protocols for contention resolution among a set of clients and servers, each server being a multiple access channel that deals with contention like an Ethernet channel. We use the standard model in which each client generates requests for a given server according to a Bemoulli distribution with a specified mean. The client-server request rate of a system is the maximum over all client-server pairs (i, j) of the sum of all request rates associatedmore » with either client i or server j. Our main result is that any superlinear polynomial backoff protocol is stable for any multiple-server system with a sub-unit client-server request rate. We confirm the practical relevance of our result by demonstrating experimentally that the average waiting time of requests is very small when such a system is run with reasonably few clients and reasonably small request rates such as those that occur in actual ethernets. Our result is the first proof of stability for any backoff protocol for contention resolution with multiple servers. Our result is also the first proof that any weakly acknowledgment based protocol is stable for contention resolution with multiple servers and such high request rates. Two special cases of our result are of interest. Hastad, Leighton and Rogoff have shown that for a single-server system with a sub-unit client-server request rate any modified superlinear polynomial backoff protocol is stable. These modified backoff protocols are similar to standard backoff protocols but require more random bits to implement. The special case of our result in which there is only one server extends the result of Hastad, Leighton and Rogoff to standard (practical) backoff protocols. Finally, our result applies to dynamic routing in optical networks.« less

  20. A model-guided symbolic execution approach for network protocol implementations and vulnerability detection.

    PubMed

    Wen, Shameng; Meng, Qingkun; Feng, Chao; Tang, Chaojing

    2017-01-01

    Formal techniques have been devoted to analyzing whether network protocol specifications violate security policies; however, these methods cannot detect vulnerabilities in the implementations of the network protocols themselves. Symbolic execution can be used to analyze the paths of the network protocol implementations, but for stateful network protocols, it is difficult to reach the deep states of the protocol. This paper proposes a novel model-guided approach to detect vulnerabilities in network protocol implementations. Our method first abstracts a finite state machine (FSM) model, then utilizes the model to guide the symbolic execution. This approach achieves high coverage of both the code and the protocol states. The proposed method is implemented and applied to test numerous real-world network protocol implementations. The experimental results indicate that the proposed method is more effective than traditional fuzzing methods such as SPIKE at detecting vulnerabilities in the deep states of network protocol implementations.

  1. Modeling and docking antibody structures with Rosetta

    PubMed Central

    Weitzner, Brian D.; Jeliazkov, Jeliazko R.; Lyskov, Sergey; Marze, Nicholas; Kuroda, Daisuke; Frick, Rahel; Adolf-Bryfogle, Jared; Biswas, Naireeta; Dunbrack, Roland L.; Gray, Jeffrey J.

    2017-01-01

    We describe Rosetta-based computational protocols for predicting the three-dimensional structure of an antibody from sequence (RosettaAntibody) and then docking the antibody to protein antigens (SnugDock). Antibody modeling leverages canonical loop conformations to graft large segments from experimentally-determined structures as well as (1) energetic calculations to minimize loops, (2) docking methodology to refine the VL–VH relative orientation, and (3) de novo prediction of the elusive complementarity determining region (CDR) H3 loop. To alleviate model uncertainty, antibody–antigen docking resamples CDR loop conformations and can use multiple models to represent an ensemble of conformations for the antibody, the antigen or both. These protocols can be run fully-automated via the ROSIE web server (http://rosie.rosettacommons.org/) or manually on a computer with user control of individual steps. For best results, the protocol requires roughly 1,000 CPU-hours for antibody modeling and 250 CPU-hours for antibody–antigen docking. Tasks can be completed in under a day by using public supercomputers. PMID:28125104

  2. Multiple Object Based RFID System Using Security Level

    NASA Astrophysics Data System (ADS)

    Kim, Jiyeon; Jung, Jongjin; Ryu, Ukjae; Ko, Hoon; Joe, Susan; Lee, Yongjun; Kim, Boyeon; Chang, Yunseok; Lee, Kyoonha

    2007-12-01

    RFID systems are increasingly applied for operational convenience in wide range of industries and individual life. However, it is uneasy for a person to control many tags because common RFID systems have the restriction that a tag used to identify just a single object. In addition, RFID systems can make some serious problems in violation of privacy and security because of their radio frequency communication. In this paper, we propose a multiple object RFID tag which can keep multiple object identifiers for different applications in a same tag. The proposed tag allows simultaneous access for their pair applications. We also propose an authentication protocol for multiple object tag to prevent serious problems of security and privacy in RFID applications. Especially, we focus on efficiency of the authentication protocol by considering security levels of applications. In the proposed protocol, the applications go through different authentication procedures according to security level of the object identifier stored in the tag. We implemented the proposed RFID scheme and made experimental results about efficiency and stability for the scheme.

  3. Design and assessment of engineered CRISPR-Cpf1 and its use for genome editing.

    PubMed

    Li, Bin; Zeng, Chunxi; Dong, Yizhou

    2018-05-01

    Cpf1, a CRISPR endonuclease discovered in Prevotella and Francisella 1 bacteria, offers an alternative platform for CRISPR-based genome editing beyond the commonly used CRISPR-Cas9 system originally discovered in Streptococcus pyogenes. This protocol enables the design of engineered CRISPR-Cpf1 components, both CRISPR RNAs (crRNAs) to guide the endonuclease and Cpf1 mRNAs to express the endonuclease protein, and provides experimental procedures for effective genome editing using this system. We also describe quantification of genome-editing activity and off-target effects of the engineered CRISPR-Cpf1 in human cell lines using both T7 endonuclease I (T7E1) assay and targeted deep sequencing. This protocol enables rapid construction and identification of engineered crRNAs and Cpf1 mRNAs to enhance genome-editing efficiency using the CRISPR-Cpf1 system, as well as assessment of target specificity within 2 months. This protocol may also be appropriate for fine-tuning other types of CRISPR systems.

  4. Design and Implementation of a MAC Protocol for Timely and Reliable Delivery of Command and Data in Dynamic Wireless Sensor Networks

    PubMed Central

    Oh, Hoon; Van Vinh, Phan

    2013-01-01

    This paper proposes and implements a new TDMA-based MAC protocol for providing timely and reliable delivery of data and command for monitoring and control networks. In this kind of network, sensor nodes are required to sense data from the monitoring environment periodically and then send the data to a sink. The sink determines whether the environment is safe or not by analyzing the acquired data. Sometimes, a command or control message is sent from the sink to a particular node or a group of nodes to execute the services or request further interested data. The proposed MAC protocol enables bidirectional communication, controls active and sleep modes of a sensor node to conserve energy, and addresses the problem of load unbalancing between the nodes near a sink and the other nodes. It can improve reliability of communication significantly while extending network lifetime. These claims are supported by the experimental results. PMID:24084116

  5. Design and implementation of a MAC protocol for timely and reliable delivery of command and data in dynamic wireless sensor networks.

    PubMed

    Oh, Hoon; Van Vinh, Phan

    2013-09-30

    This paper proposes and implements a new TDMA-based MAC protocol for providing timely and reliable delivery of data and command for monitoring and control networks. In this kind of network, sensor nodes are required to sense data from the monitoring environment periodically and then send the data to a sink. The sink determines whether the environment is safe or not by analyzing the acquired data. Sometimes, a command or control message is sent from the sink to a particular node or a group of nodes to execute the services or request further interested data. The proposed MAC protocol enables bidirectional communication, controls active and sleep modes of a sensor node to conserve energy, and addresses the problem of load unbalancing between the nodes near a sink and the other nodes. It can improve reliability of communication significantly while extending network lifetime. These claims are supported by the experimental results.

  6. Predicting thermal history a-priori for magnetic nanoparticle hyperthermia of internal carcinoma

    NASA Astrophysics Data System (ADS)

    Dhar, Purbarun; Sirisha Maganti, Lakshmi

    2017-08-01

    This article proposes a simplistic and realistic method where a direct analytical expression can be derived for the temperature field within a tumour during magnetic nanoparticle hyperthermia. The approximated analytical expression for thermal history within the tumour is derived based on the lumped capacitance approach and considers all therapy protocols and parameters. The present method is simplistic and provides an easy framework for estimating hyperthermia protocol parameters promptly. The model has been validated with respect to several experimental reports on animal models such as mice/rabbit/hamster and human clinical trials. It has been observed that the model is able to accurately estimate the thermal history within the carcinoma during the hyperthermia therapy. The present approach may find implications in a-priori estimation of the thermal history in internal tumours for optimizing magnetic hyperthermia treatment protocols with respect to the ablation time, tumour size, magnetic drug concentration, field strength, field frequency, nanoparticle material and size, tumour location, and so on.

  7. Computational Biology Methods for Characterization of Pluripotent Cells.

    PubMed

    Araúzo-Bravo, Marcos J

    2016-01-01

    Pluripotent cells are a powerful tool for regenerative medicine and drug discovery. Several techniques have been developed to induce pluripotency, or to extract pluripotent cells from different tissues and biological fluids. However, the characterization of pluripotency requires tedious, expensive, time-consuming, and not always reliable wet-lab experiments; thus, an easy, standard quality-control protocol of pluripotency assessment remains to be established. Here to help comes the use of high-throughput techniques, and in particular, the employment of gene expression microarrays, which has become a complementary technique for cellular characterization. Research has shown that the transcriptomics comparison with an Embryonic Stem Cell (ESC) of reference is a good approach to assess the pluripotency. Under the premise that the best protocol is a computer software source code, here I propose and explain line by line a software protocol coded in R-Bioconductor for pluripotency assessment based on the comparison of transcriptomics data of pluripotent cells with an ESC of reference. I provide advice for experimental design, warning about possible pitfalls, and guides for results interpretation.

  8. Finite-key analysis for the 1-decoy state QKD protocol

    NASA Astrophysics Data System (ADS)

    Rusca, Davide; Boaron, Alberto; Grünenfelder, Fadri; Martin, Anthony; Zbinden, Hugo

    2018-04-01

    It has been shown that in the asymptotic case of infinite-key length, the 2-decoy state Quantum Key Distribution (QKD) protocol outperforms the 1-decoy state protocol. Here, we present a finite-key analysis of the 1-decoy method. Interestingly, we find that for practical block sizes of up to 108 bits, the 1-decoy protocol achieves for almost all experimental settings higher secret key rates than the 2-decoy protocol. Since using only one decoy is also easier to implement, we conclude that it is the best choice for QKD, in most common practical scenarios.

  9. Experimental Greenberger-Horne-Zeilinger-Type Six-Photon Quantum Nonlocality.

    PubMed

    Zhang, Chao; Huang, Yun-Feng; Wang, Zhao; Liu, Bi-Heng; Li, Chuan-Feng; Guo, Guang-Can

    2015-12-31

    Quantum nonlocality gives us deeper insight into quantum physics. In addition, quantum nonlocality has been further recognized as an essential resource for device-independent quantum information processing in recent years. Most experiments of nonlocality are performed using a photonic system. However, until now, photonic experiments of nonlocality have involved at most four photons. Here, for the first time, we experimentally demonstrate the six-photon quantum nonlocality in an all-versus-nothing manner based on a high-fidelity (88.4%) six-photon Greenberger-Horne-Zeilinger state. Our experiment pushes multiphoton nonlocality studies forward to the six-photon region and might provide a larger photonic system for device-independent quantum information protocols.

  10. Binding free energy calculations between bovine β-lactoglobulin and four fatty acids using the MMGBSA method.

    PubMed

    Bello, Martiniano

    2014-10-01

    The bovine dairy protein β-lactoglobulin (βlg) is a promiscuous protein that has the ability to bind several hydrophobic ligands. In this study, based on known experimental data, the dynamic interaction mechanism between bovine βlg and four fatty acids was investigated by a protocol combining molecular dynamics (MD) simulations and molecular mechanics generalized Born surface area (MMGBSA) binding free energy calculations. Energetic analyses revealed binding free energy trends that corroborated known experimental findings; larger ligand size corresponded to greater binding affinity. Finally, binding free energy decomposition provided detailed information about the key residues stabilizing the complex. © 2014 Wiley Periodicals, Inc.

  11. An Experimental and Finite Element Protocol to Investigate the Transport of Neutral and Charged Solutes across Articular Cartilage.

    PubMed

    Arbabi, Vahid; Pouran, Behdad; Zadpoor, Amir A; Weinans, Harrie

    2017-04-23

    Osteoarthritis (OA) is a debilitating disease that is associated with degeneration of articular cartilage and subchondral bone. Degeneration of articular cartilage impairs its load-bearing function substantially as it experiences tremendous chemical degradation, i.e. proteoglycan loss and collagen fibril disruption. One promising way to investigate chemical damage mechanisms during OA is to expose the cartilage specimens to an external solute and monitor the diffusion of the molecules. The degree of cartilage damage (i.e. concentration and configuration of essential macromolecules) is associated with collisional energy loss of external solutes while moving across articular cartilage creates different diffusion characteristics compared to healthy cartilage. In this study, we introduce a protocol, which consists of several steps and is based on previously developed experimental micro-Computed Tomography (micro-CT) and finite element modeling. The transport of charged and uncharged iodinated molecules is first recorded using micro-CT, which is followed by applying biphasic-solute and multiphasic finite element models to obtain diffusion coefficients and fixed charge densities across cartilage zones.

  12. Achieving High Throughput for Data Transfer over ATM Networks

    NASA Technical Reports Server (NTRS)

    Johnson, Marjory J.; Townsend, Jeffrey N.

    1996-01-01

    File-transfer rates for ftp are often reported to be relatively slow, compared to the raw bandwidth available in emerging gigabit networks. While a major bottleneck is disk I/O, protocol issues impact performance as well. Ftp was developed and optimized for use over the TCP/IP protocol stack of the Internet. However, TCP has been shown to run inefficiently over ATM. In an effort to maximize network throughput, data-transfer protocols can be developed to run over UDP or directly over IP, rather than over TCP. If error-free transmission is required, techniques for achieving reliable transmission can be included as part of the transfer protocol. However, selected image-processing applications can tolerate a low level of errors in images that are transmitted over a network. In this paper we report on experimental work to develop a high-throughput protocol for unreliable data transfer over ATM networks. We attempt to maximize throughput by keeping the communications pipe full, but still keep packet loss under five percent. We use the Bay Area Gigabit Network Testbed as our experimental platform.

  13. Studies of acid-base homeostasis during simulated weightlessness: Application of the water immersion model to man

    NASA Technical Reports Server (NTRS)

    Epstein, M.

    1975-01-01

    The effects of water immersion on acid-base homeostasis were investigated under carefully controlled conditions. Studies of renal acidification were carried out on seven healthy male subjects, each consuming a diet containing 150 meq sodium and 100 meq potassium. Control and immersion studies were carried out on each subject on the fourth and sixth days, respectively, of dietary equilibration, by which time all subjects had achieved sodium balance. The experimental protocols on study days were similar (except for the amount of water administered).

  14. Design and Fabrication of N-Alkyl-Polyethylenimine-Stabilized Iron Oxide Nanoclusters for Gene Delivery

    PubMed Central

    Liu, Gang; Wang, Zhiyong; Lee, Seulki; Ai, Hua; Chen, Xiaoyuan

    2013-01-01

    With the rapid development of nanotechnology, inorganic magnetic nanoparticles, especially iron oxide nanoparticles (IOs), have emerged as great vehicles for biomedical diagnostic and therapeutic applications. In order to rationally design IO-based gene delivery nanovectors, surface modification is essential and determines the loading and release of the gene of interest. Here we highlight the basic concepts and applications of nonviral gene delivery vehicles based on low molecular weight N-alkyl polyethylenimine-stabilized IOs. The experimental protocols related to these topics are described in this chapter. PMID:22568910

  15. 40 CFR 160.120 - Protocol.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... system. (8) A description of the experimental design, including methods for the control of bias. (9... being conducted. (4) The proposed experimental start and termination dates. (5) Justification for...

  16. 40 CFR 160.120 - Protocol.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... system. (8) A description of the experimental design, including methods for the control of bias. (9... being conducted. (4) The proposed experimental start and termination dates. (5) Justification for...

  17. 40 CFR 160.120 - Protocol.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... system. (8) A description of the experimental design, including methods for the control of bias. (9... being conducted. (4) The proposed experimental start and termination dates. (5) Justification for...

  18. 40 CFR 160.120 - Protocol.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... system. (8) A description of the experimental design, including methods for the control of bias. (9... being conducted. (4) The proposed experimental start and termination dates. (5) Justification for...

  19. 40 CFR 160.120 - Protocol.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... system. (8) A description of the experimental design, including methods for the control of bias. (9... being conducted. (4) The proposed experimental start and termination dates. (5) Justification for...

  20. Extended Theories of Gravitation. Observation Protocols and Experimental Tests

    NASA Astrophysics Data System (ADS)

    Fatibene, Lorenzo; Ferraris, Marco; Francaviglia, Mauro; Magnano, Guido

    2013-09-01

    Within the framework of extended theories of gravitation we shall discuss physical equivalences among different formalisms and classical tests. As suggested by the Ehlers-Pirani-Schild framework, the conformal invariance will be preserved and its effect on observational protocols discussed. Accordingly, we shall review standard tests showing how Palatini f(R)-theories naturally passes solar system tests. Observation protocols will be discussed in this wider framework.

  1. Controlling for confounding variables in MS-omics protocol: why modularity matters.

    PubMed

    Smith, Rob; Ventura, Dan; Prince, John T

    2014-09-01

    As the field of bioinformatics research continues to grow, more and more novel techniques are proposed to meet new challenges and improvements upon solutions to long-standing problems. These include data processing techniques and wet lab protocol techniques. Although the literature is consistently thorough in experimental detail and variable-controlling rigor for wet lab protocol techniques, bioinformatics techniques tend to be less described and less controlled. As the validation or rejection of hypotheses rests on the experiment's ability to isolate and measure a variable of interest, we urge the importance of reducing confounding variables in bioinformatics techniques during mass spectrometry experimentation. © The Author 2013. Published by Oxford University Press. For Permissions, please email: journals.permissions@oup.com.

  2. Free-space quantum key distribution at night

    NASA Astrophysics Data System (ADS)

    Buttler, William T.; Hughes, Richard J.; Kwiat, Paul G.; Lamoreaux, Steve K.; Luther, Gabriel G.; Morgan, George L.; Nordholt, Jane E.; Peterson, C. Glen; Simmons, Charles M.

    1998-07-01

    An experimental free-space quantum key distribution (QKD) system has been tested over an outdoor optical path of approximately 1 km under nighttime conditions at Los Alamos National Laboratory. This system employs the Bennett 92 protocol; here we give a brief overview of this protocol, and describe our experimental implementation of it. An analysis of the system efficiency is presented as well as a description of our error detection protocol, which employs a 2D parity check scheme. Finally, the susceptibility of this system to eavesdropping by various techniques is determined, and the effectiveness of privacy amplification procedures is discussed. Our conclusions are that free-space QKD is both effective and secure; possible applications include the rekeying of satellites in low earth orbit.

  3. Generation of Oligodendrogenic Spinal Neural Progenitor Cells From Human Induced Pluripotent Stem Cells.

    PubMed

    Khazaei, Mohamad; Ahuja, Christopher S; Fehlings, Michael G

    2017-08-14

    This unit describes protocols for the efficient generation of oligodendrogenic neural progenitor cells (o-NPCs) from human induced pluripotent stem cells (hiPSCs). Specifically, detailed methods are provided for the maintenance and differentiation of hiPSCs, human induced pluripotent stem cell-derived neural progenitor cells (hiPS-NPCs), and human induced pluripotent stem cell-oligodendrogenic neural progenitor cells (hiPSC-o-NPCs) with the final products being suitable for in vitro experimentation or in vivo transplantation. Throughout, cell exposure to growth factors and patterning morphogens has been optimized for both concentration and timing, based on the literature and empirical experience, resulting in a robust and highly efficient protocol. Using this derivation procedure, it is possible to obtain millions of oligodendrogenic-NPCs within 40 days of initial cell plating which is substantially shorter than other protocols for similar cell types. This protocol has also been optimized to use translationally relevant human iPSCs as the parent cell line. The resultant cells have been extensively characterized both in vitro and in vivo and express key markers of an oligodendrogenic lineage. © 2017 by John Wiley & Sons, Inc. Copyright © 2017 John Wiley and Sons, Inc.

  4. Nonpainful wide-area compression inhibits experimental pain

    PubMed Central

    Honigman, Liat; Bar-Bachar, Ofrit; Yarnitsky, David; Sprecher, Elliot; Granovsky, Yelena

    2016-01-01

    Abstract Compression therapy, a well-recognized treatment for lymphoedema and venous disorders, pressurizes limbs and generates massive non-noxious afferent sensory barrages. The aim of this study was to study whether such afferent activity has an analgesic effect when applied on the lower limbs, hypothesizing that larger compression areas will induce stronger analgesic effects, and whether this effect correlates with conditioned pain modulation (CPM). Thirty young healthy subjects received painful heat and pressure stimuli (47°C for 30 seconds, forearm; 300 kPa for 15 seconds, wrist) before and during 3 compression protocols of either SMALL (up to ankles), MEDIUM (up to knees), or LARGE (up to hips) compression areas. Conditioned pain modulation (heat pain conditioned by noxious cold water) was tested before and after each compression protocol. The LARGE protocol induced more analgesia for heat than the SMALL protocol (P < 0.001). The analgesic effect interacted with gender (P = 0.015). The LARGE protocol was more efficient for females, whereas the MEDIUM protocol was more efficient for males. Pressure pain was reduced by all protocols (P < 0.001) with no differences between protocols and no gender effect. Conditioned pain modulation was more efficient than the compression-induced analgesia. For the LARGE protocol, precompression CPM efficiency positively correlated with compression-induced analgesia. Large body area compression exerts an area-dependent analgesic effect on experimental pain stimuli. The observed correlation with pain inhibition in response to robust non-noxious sensory stimulation may suggest that compression therapy shares similar mechanisms with inhibitory pain modulation assessed through CPM. PMID:27152691

  5. Fast estimation of Colles' fracture load of the distal section of the radius by homogenized finite element analysis based on HR-pQCT.

    PubMed

    Hosseini, Hadi S; Dünki, Andreas; Fabech, Jonas; Stauber, Martin; Vilayphiou, Nicolas; Pahr, Dieter; Pretterklieber, Michael; Wandel, Jasmin; Rietbergen, Bert van; Zysset, Philippe K

    2017-04-01

    Fractures of the distal section of the radius (Colles' fractures) occur earlier in life than other osteoporotic fractures. Therefore, they can be interpreted as a warning signal for later, more deleterious fractures of vertebral bodies or the femoral neck. In the past decade, the advent of HR-pQCT allowed a detailed architectural analysis of the distal radius and an automated but time-consuming estimation of its strength with linear micro-finite element (μFE) analysis. Recently, a second generation of HR-pQCT scanner (XtremeCT II, SCANCO Medical, Switzerland) with a resolution beyond 61 μm became available for even more refined biomechanical investigations in vivo. This raises the question how biomechanical outcome variables compare between the original (LR) and the new (HR) scanner resolution. Accordingly, the aim of this work was to validate experimentally a patient-specific homogenized finite element (hFE) analysis of the distal section of the human radius for the fast prediction of Colles' fracture load based on the last generation HR-pQCT. Fourteen pairs of fresh frozen forearms (mean age = 77.5±9) were scanned intact using the high (61 μm) and the low (82 μm) resolution protocols that correspond to the new and original HR-pQCT systems. From each forearm, the 20mm most distal section of the radius were dissected out, scanned with μCT at 16.4 μm and tested experimentally under compression up to failure for assessment of stiffness and ultimate load. Linear and nonlinear hFE models together with linear micro finite element (μFE) models were then generated based on the μCT and HR-pQCT reconstructions to predict the aforementioned mechanical properties of 24 sections. Precision errors of the short term reproducibility of the FE analyses were measured based on the repeated scans of 12 sections. The calculated failure loads correlated strongly with those measured in the experiments: accounting for donor as a random factor, the nonlinear hFE provided a marginal coefficient of determination (R m 2 ) of 0.957 for the high resolution (HR) and 0.948 for the low resolution (LR) protocols, the linear hFE with R m 2 of 0.957 for the HR and 0.947 for the LR protocols. Linear μFE predictions of the ultimate load were similar with an R m 2 of 0.950 for the HR and 0.954 for the LR protocols, respectively. Nonlinear hFE strength computation led to precision errors of 2.2 and 2.3% which were higher than the ones calculated based on the linear hFE (1.6 and 1.9%) and linear μFE (1.2 and 1.6%) for the HR and LR protocols respectively. Computation of the fracture load with nonlinear hFE demanded in average 6h of CPU time which was 3 times faster than with linear μFE, while computation with linear hFE took only a few minutes. This study delivers an extensive experimental and numerical validation for the application of an accurate and fast hFE diagnostic tool to help in identifying individuals who may be at risk of an osteoporotic wrist fracture and to follow up pharmacological and other treatments in such patients. Copyright © 2017 Elsevier Inc. All rights reserved.

  6. Refining animal models in fracture research: seeking consensus in optimising both animal welfare and scientific validity for appropriate biomedical use.

    PubMed

    Auer, Jorg A; Goodship, Allen; Arnoczky, Steven; Pearce, Simon; Price, Jill; Claes, Lutz; von Rechenberg, Brigitte; Hofmann-Amtenbrinck, Margarethe; Schneider, Erich; Müller-Terpitz, R; Thiele, F; Rippe, Klaus-Peter; Grainger, David W

    2007-08-01

    In an attempt to establish some consensus on the proper use and design of experimental animal models in musculoskeletal research, AOVET (the veterinary specialty group of the AO Foundation) in concert with the AO Research Institute (ARI), and the European Academy for the Study of Scientific and Technological Advance, convened a group of musculoskeletal researchers, veterinarians, legal experts, and ethicists to discuss, in a frank and open forum, the use of animals in musculoskeletal research. The group narrowed the field to fracture research. The consensus opinion resulting from this workshop can be summarized as follows: Anaesthesia and pain management protocols for research animals should follow standard protocols applied in clinical work for the species involved. This will improve morbidity and mortality outcomes. A database should be established to facilitate selection of anaesthesia and pain management protocols for specific experimental surgical procedures and adopted as an International Standard (IS) according to animal species selected. A list of 10 golden rules and requirements for conduction of animal experiments in musculoskeletal research was drawn up comprising 1) Intelligent study designs to receive appropriate answers; 2) Minimal complication rates (5 to max. 10%); 3) Defined end-points for both welfare and scientific outputs analogous to quality assessment (QA) audit of protocols in GLP studies; 4) Sufficient details for materials and methods applied; 5) Potentially confounding variables (genetic background, seasonal, hormonal, size, histological, and biomechanical differences); 6) Post-operative management with emphasis on analgesia and follow-up examinations; 7) Study protocols to satisfy criteria established for a "justified animal study"; 8) Surgical expertise to conduct surgery on animals; 9) Pilot studies as a critical part of model validation and powering of the definitive study design; 10) Criteria for funding agencies to include requirements related to animal experiments as part of the overall scientific proposal review protocols. Such agencies are also encouraged to seriously consider and adopt the recommendations described here when awarding funds for specific projects. Specific new requirements and mandates related both to improving the welfare and scientific rigour of animal-based research models are urgently needed as part of international harmonization of standards.

  7. A combined experimental and theoretical spectroscopic protocol for determination of the structure of heterogeneous catalysts: developing the information content of the resonance Raman spectra of M1 MoVOx † †Electronic supplementary information (ESI) available. See DOI: 10.1039/c7sc01771e Click here for additional data file.

    PubMed Central

    Kubas, Adam; Noak, Johannes

    2017-01-01

    Absorption and multiwavelength resonance Raman spectroscopy are widely used to investigate the electronic structure of transition metal centers in coordination compounds and extended solid systems. In combination with computational methodologies that have predictive accuracy, they define powerful protocols to study the spectroscopic response of catalytic materials. In this work, we study the absorption and resonance Raman spectra of the M1 MoVOx catalyst. The spectra were calculated by time-dependent density functional theory (TD-DFT) in conjunction with the independent mode displaced harmonic oscillator model (IMDHO), which allows for detailed bandshape predictions. For this purpose cluster models with up to 9 Mo and V metallic centers are considered to represent the bulk structure of MoVOx. Capping hydrogens were used to achieve valence saturation at the edges of the cluster models. The construction of model structures was based on a thorough bonding analysis which involved conventional DFT and local coupled cluster (DLPNO-CCSD(T)) methods. Furthermore the relationship of cluster topology to the computed spectral features is discussed in detail. It is shown that due to the local nature of the involved electronic transitions, band assignment protocols developed for molecular systems can be applied to describe the calculated spectral features of the cluster models as well. The present study serves as a reference for future applications of combined experimental and computational protocols in the field of solid-state heterogeneous catalysis. PMID:28989667

  8. Addressing recent docking challenges: A hybrid strategy to integrate template-based and free protein-protein docking.

    PubMed

    Yan, Yumeng; Wen, Zeyu; Wang, Xinxiang; Huang, Sheng-You

    2017-03-01

    Protein-protein docking is an important computational tool for predicting protein-protein interactions. With the rapid development of proteomics projects, more and more experimental binding information ranging from mutagenesis data to three-dimensional structures of protein complexes are becoming available. Therefore, how to appropriately incorporate the biological information into traditional ab initio docking has been an important issue and challenge in the field of protein-protein docking. To address these challenges, we have developed a Hybrid DOCKing protocol of template-based and template-free approaches, referred to as HDOCK. The basic procedure of HDOCK is to model the structures of individual components based on the template complex by a template-based method if a template is available; otherwise, the component structures will be modeled based on monomer proteins by regular homology modeling. Then, the complex structure of the component models is predicted by traditional protein-protein docking. With the HDOCK protocol, we have participated in the CPARI experiment for rounds 28-35. Out of the 25 CASP-CAPRI targets for oligomer modeling, our HDOCK protocol predicted correct models for 16 targets, ranking one of the top algorithms in this challenge. Our docking method also made correct predictions on other CAPRI challenges such as protein-peptide binding for 6 out of 8 targets and water predictions for 2 out of 2 targets. The advantage of our hybrid docking approach over pure template-based docking was further confirmed by a comparative evaluation on 20 CASP-CAPRI targets. Proteins 2017; 85:497-512. © 2016 Wiley Periodicals, Inc. © 2016 Wiley Periodicals, Inc.

  9. Interreality for the management and training of psychological stress: study protocol for a randomized controlled trial

    PubMed Central

    2013-01-01

    Background Psychological stress occurs when an individual perceives that environmental demands tax or exceed his or her adaptive capacity. Its association with severe health and emotional diseases, points out the necessity to find new efficient strategies to treat it. Moreover, psychological stress is a very personal problem and requires training focused on the specific needs of individuals. To overcome the above limitations, the INTERSTRESS project suggests the adoption of a new paradigm for e-health - Interreality - that integrates contextualized assessment and treatment within a hybrid environment, bridging the physical and the virtual worlds. According to this premise, the aim of this study is to investigate the advantages of using advanced technologies, in combination with cognitive behavioral therapy (CBT), based on a protocol for reducing psychological stress. Methods/Design The study is designed as a randomized controlled trial. It includes three groups of approximately 50 subjects each who suffer from psychological stress: (1) the experimental group, (2) the control group, (3) the waiting list group. Participants included in the experimental group will receive a treatment based on cognitive behavioral techniques combined with virtual reality, biofeedback and mobile phone, while the control group will receive traditional stress management CBT-based training, without the use of new technologies. The wait-list group will be reassessed and compared with the two other groups five weeks after the initial evaluation. After the reassessment, the wait-list patients will randomly receive one of the two other treatments. Psychometric and physiological outcomes will serve as quantitative dependent variables, while subjective reports of participants will be used as the qualitative dependent variable. Discussion What we would like to show with the present trial is that bridging virtual experiences, used to learn coping skills and emotional regulation, with real experiences using advanced technologies (virtual reality, advanced sensors and smartphones) is a feasible way to address actual limitations of existing protocols for psychological stress. Trial registration http://clinicaltrials.gov/ct2/show/NCT01683617 PMID:23806013

  10. Expansion of the Center for Network Innovation and Experimentation (CENETIX) Network to a Worldwide Presence

    DTIC Science & Technology

    2006-09-01

    data transform set contains : the security protocol (AH and/or ESP, connection mode (tunnel or transport), encryption information (DES, 3DES, AES...Management Information Base, version 2) objects are variables that contain data about the system. They are defined as part of the Simple Network...Avon Park was configured for access on the concentrator. c. Security Association (SA) • A security association contains all of the information

  11. Biotemplated Synthesis of PZT Nanowires

    DTIC Science & Technology

    2013-11-25

    this same experimental protocol would be successful with other biotemplates. M13 bacteriophage was chosen as a second template because (1) it possesses...and (3) it can be customized to bind compounds of interest with tailorable specificities based on the phage display process.14 M13 is a virus that is...coefficients (d33 < 8 pm/V). 50 As negatively charged carboxyl groups can bind cations,51 M13 phages were genetically engineered to display glutamate

  12. Spin-labelled diketopiperazines and peptide-peptoid chimera by Ugi-multi-component-reactions.

    PubMed

    Sultani, Haider N; Haeri, Haleh H; Hinderberger, Dariush; Westermann, Bernhard

    2016-12-28

    For the first time, spin-labelled coumpounds have been obtained by isonitrile-based multi component reactions (IMCRs). The typical IMCR Ugi-protocols offer a simple experimental setup allowing structural variety by which labelled diketopiperazines (DKPs) and peptide-peptoid chimera have been synthesized. The reaction keeps the paramagnetic spin label intact and offers a simple and versatile route to a large variety of new and chemically diverse spin labels.

  13. Nonlinear least-squares data fitting in Excel spreadsheets.

    PubMed

    Kemmer, Gerdi; Keller, Sandro

    2010-02-01

    We describe an intuitive and rapid procedure for analyzing experimental data by nonlinear least-squares fitting (NLSF) in the most widely used spreadsheet program. Experimental data in x/y form and data calculated from a regression equation are inputted and plotted in a Microsoft Excel worksheet, and the sum of squared residuals is computed and minimized using the Solver add-in to obtain the set of parameter values that best describes the experimental data. The confidence of best-fit values is then visualized and assessed in a generally applicable and easily comprehensible way. Every user familiar with the most basic functions of Excel will be able to implement this protocol, without previous experience in data fitting or programming and without additional costs for specialist software. The application of this tool is exemplified using the well-known Michaelis-Menten equation characterizing simple enzyme kinetics. Only slight modifications are required to adapt the protocol to virtually any other kind of dataset or regression equation. The entire protocol takes approximately 1 h.

  14. Spina Bifida

    MedlinePlus

    ... of myelomeningocele through a National Institutes of Health experimental protocol (Management of Myelomeningocele Study, or MOMS). Fetal ... additional loss from occurring. The surgery is considered experimental and there are risks to the fetus as ...

  15. The Spanish Version of the Unified Protocol for Transdiagnostic Treatment of Emotional Disorders in Adolescents (UP-A) Adapted as a School-Based Anxiety and Depression Prevention Program: Study Protocol for a Cluster Randomized Controlled Trial

    PubMed Central

    García-Escalera, Julia; Valiente, Rosa M; Ehrenreich-May, Jill; Kennedy, Sarah M; Sandín, Bonifacio

    2017-01-01

    Background Anxiety and depression are common, impairing conditions that evidence high comorbidity rates in adolescence. The Unified Protocol for Transdiagnostic Treatment of Emotional Disorders in Adolescents (UP-A) is one of the few existing resources aimed at applying transdiagnostic treatment principles to target core dysfunctions associated with both anxiety and depression within a single protocol. To our knowledge, this is the first study examining the efficacy of the UP-A adapted as a universal preventive intervention program. Objective The primary aim of this study is to examine whether the Spanish version of the UP-A is more effective than a waitlist (WL) control group in reducing and preventing symptoms of anxiety and depression when employed as a universal, classroom-based preventive intervention. The secondary aim is to investigate changes in a broad range of secondary outcome measures, including negative and positive affect, anxiety sensitivity, emotional avoidance, top problems ratings, school grades, depression and anxiety-related interference, self-esteem, life satisfaction, quality of life, conduct problems, hyperactivity/inattention symptoms, peer problems, prosocial behavior, school adjustment, and discipline problems. Other aims are to assess a range of possible predictors of intervention effects and to examine the feasibility and the acceptability of implementing UP-A in a prevention group format and in a school setting. Methods A cluster, randomized, WL, controlled trial design with classroom as the unit of randomization was used in this study. Five classes including a total of 152 adolescents were randomized to the experimental or WL control groups. Participants in the experimental group received 9 55-minute sessions delivered by advanced doctoral and masters students in clinical psychology. The WL control group will receive the intervention once the 3-month follow-up assessment is completed. Results We have recruited participants to the cluster randomized controlled trial (RCT) and have conducted the intervention with the experimental group. We expect the WL control group to complete the intervention in July 2017. Data analysis will take place during the second semester of 2017. Conclusions We expect the experimental group to outperform the WL control group at post-intervention and 3-month follow-up. We also expect the WL control group to show improvements in primary and secondary outcome measures after receiving the intervention. Results will have implications for researchers, families, and education providers. Trial Registration Clinicaltrials.gov NCT03123991; https://clinicaltrials.gov/ct2/show/NCT03123991 (Archived by WebCite at http://www.webcitation.org/6qp7GIzcR) PMID:28827212

  16. Effectiveness of Mindfulness-Based Group Therapy Compared to the Usual Opioid Dependence Treatment.

    PubMed

    Imani, Saeed; Atef Vahid, Mohammad Kazem; Gharraee, Banafsheh; Noroozi, Alireza; Habibi, Mojtaba; Bowen, Sarah

    2015-06-01

    This study investigated the effectiveness of mindfulness-based group therapy (MBGT) compared to the usual opioid dependence treatment (TAU).Thirty outpatients meeting the DSM-IV-TR criteria for opioid dependence from Iranian National Center for Addiction Studies (INCAS) were randomly assigned into experimental (Mindfulness-Based Group Therapy) and control groups (the Usual Treatment).The experimental group undertook eight weeks of intervention, but the control group received the usual treatment according to the INCAS program. The Five Factor Mindfulness Questionnaire (FFMQ) and the Addiction Sevier Index (ASI) were administered at pre-treatment and post-treatment assessment periods. Thirteen patients from the experimental group and 15 from the control group completed post-test assessments. The results of MANCOVA revealed an increase in mean scores in observing, describing, acting with awareness, non-judging, non-reacting, and decrease in mean scores of alcohol and opium in MBGT patient group. The effectiveness of MBGT, compared to the usual treatment, was discussed in this paper as a selective protocol in the health care setting for substance use disorders.

  17. Effectiveness of Mindfulness-Based Group Therapy Compared to the Usual Opioid Dependence Treatment

    PubMed Central

    Imani, Saeed; Atef Vahid, Mohammad Kazem; Gharraee, Banafsheh; Noroozi, Alireza; Habibi, Mojtaba; Bowen, Sarah

    2015-01-01

    Objective: This study investigated the effectiveness of mindfulness-based group therapy (MBGT) compared to the usual opioid dependence treatment (TAU).Thirty outpatients meeting the DSM-IV-TR criteria for opioid dependence from Iranian National Center for Addiction Studies (INCAS) were randomly assigned into experimental (Mindfulness-Based Group Therapy) and control groups (the Usual Treatment).The experimental group undertook eight weeks of intervention, but the control group received the usual treatment according to the INCAS program. Methods: The Five Factor Mindfulness Questionnaire (FFMQ) and the Addiction Sevier Index (ASI) were administered at pre-treatment and post-treatment assessment periods. Thirteen patients from the experimental group and 15 from the control group completed post-test assessments. Results: The results of MANCOVA revealed an increase in mean scores in observing, describing, acting with awareness, non-judging, non-reacting, and decrease in mean scores of alcohol and opium in MBGT patient group. Conclusion: The effectiveness of MBGT, compared to the usual treatment, was discussed in this paper as a selective protocol in the health care setting for substance use disorders. PMID:26877751

  18. Error characterization and quantum control benchmarking in liquid state NMR using quantum information processing techniques

    NASA Astrophysics Data System (ADS)

    Laforest, Martin

    Quantum information processing has been the subject of countless discoveries since the early 1990's. It is believed to be the way of the future for computation: using quantum systems permits one to perform computation exponentially faster than on a regular classical computer. Unfortunately, quantum systems that not isolated do not behave well. They tend to lose their quantum nature due to the presence of the environment. If key information is known about the noise present in the system, methods such as quantum error correction have been developed in order to reduce the errors introduced by the environment during a given quantum computation. In order to harness the quantum world and implement the theoretical ideas of quantum information processing and quantum error correction, it is imperative to understand and quantify the noise present in the quantum processor and benchmark the quality of the control over the qubits. Usual techniques to estimate the noise or the control are based on quantum process tomography (QPT), which, unfortunately, demands an exponential amount of resources. This thesis presents work towards the characterization of noisy processes in an efficient manner. The protocols are developed from a purely abstract setting with no system-dependent variables. To circumvent the exponential nature of quantum process tomography, three different efficient protocols are proposed and experimentally verified. The first protocol uses the idea of quantum error correction to extract relevant parameters about a given noise model, namely the correlation between the dephasing of two qubits. Following that is a protocol using randomization and symmetrization to extract the probability that a given number of qubits are simultaneously corrupted in a quantum memory, regardless of the specifics of the error and which qubits are affected. Finally, a last protocol, still using randomization ideas, is developed to estimate the average fidelity per computational gates for single and multi qubit systems. Even though liquid state NMR is argued to be unsuitable for scalable quantum information processing, it remains the best test-bed system to experimentally implement, verify and develop protocols aimed at increasing the control over general quantum information processors. For this reason, all the protocols described in this thesis have been implemented in liquid state NMR, which then led to further development of control and analysis techniques.

  19. Modeling of Receptor Tyrosine Kinase Signaling: Computational and Experimental Protocols.

    PubMed

    Fey, Dirk; Aksamitiene, Edita; Kiyatkin, Anatoly; Kholodenko, Boris N

    2017-01-01

    The advent of systems biology has convincingly demonstrated that the integration of experiments and dynamic modelling is a powerful approach to understand the cellular network biology. Here we present experimental and computational protocols that are necessary for applying this integrative approach to the quantitative studies of receptor tyrosine kinase (RTK) signaling networks. Signaling by RTKs controls multiple cellular processes, including the regulation of cell survival, motility, proliferation, differentiation, glucose metabolism, and apoptosis. We describe methods of model building and training on experimentally obtained quantitative datasets, as well as experimental methods of obtaining quantitative dose-response and temporal dependencies of protein phosphorylation and activities. The presented methods make possible (1) both the fine-grained modeling of complex signaling dynamics and identification of salient, course-grained network structures (such as feedback loops) that bring about intricate dynamics, and (2) experimental validation of dynamic models.

  20. Combining first-principles and data modeling for the accurate prediction of the refractive index of organic polymers

    NASA Astrophysics Data System (ADS)

    Afzal, Mohammad Atif Faiz; Cheng, Chong; Hachmann, Johannes

    2018-06-01

    Organic materials with a high index of refraction (RI) are attracting considerable interest due to their potential application in optic and optoelectronic devices. However, most of these applications require an RI value of 1.7 or larger, while typical carbon-based polymers only exhibit values in the range of 1.3-1.5. This paper introduces an efficient computational protocol for the accurate prediction of RI values in polymers to facilitate in silico studies that can guide the discovery and design of next-generation high-RI materials. Our protocol is based on the Lorentz-Lorenz equation and is parametrized by the polarizability and number density values of a given candidate compound. In the proposed scheme, we compute the former using first-principles electronic structure theory and the latter using an approximation based on van der Waals volumes. The critical parameter in the number density approximation is the packing fraction of the bulk polymer, for which we have devised a machine learning model. We demonstrate the performance of the proposed RI protocol by testing its predictions against the experimentally known RI values of 112 optical polymers. Our approach to combine first-principles and data modeling emerges as both a successful and a highly economical path to determining the RI values for a wide range of organic polymers.

  1. Robust mechanical property measurements of fibrous parylene-C thin-film substrate via moiré contouring technology.

    PubMed

    Sciammarella, F M; Sciammarella, C A; Lamberti, L; Styrcula, M; Wei, L; Lakhtakia, A

    2013-04-01

    Parylene-C is a bio-inert, bio-compatible and relatively inexpensive material with many bio-medical applications from coatings for implantable devices to bio-scaffolds. The main objective of this research was to demonstrate a novel approach to accurately measure the mechanical properties of free-standing fibrous thin-film substrates (TFS) of parylene-C. For that purpose, a two-stage experimental protocol based on the use of moiré contouring technology was developed. In this protocol, local measurements employing an advanced moiré setup that uses non-conventional illumination (i.e. evanescent field) are first performed to gather high-resolution information on a small region of the specimen; then, global measurements based on shadow moiré are performed to monitor the overall behavior of the membrane. The protocol was first calibrated for an aluminum foil and then partially applied to the fibrous parylene-C TFS. Material properties extracted from experiments are f0ully consistent with the data reported in literature and the results of a hybrid identification procedure based on the combination of finite element analysis and nonlinear optimization. The results will help lay the foundation for developing a comprehensive understanding of the influence that morphology and stresses play in the ability to enhance and sustain cell growth and tissue development, for biomedical applications. Copyright © 2012 Elsevier Ltd. All rights reserved.

  2. 40 CFR 792.120 - Protocol.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... the test system. (8) A description of the experimental design, including methods for the control of... at which the study is being conducted. (4) The proposed experimental start and termination dates. (5...

  3. 40 CFR 792.120 - Protocol.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... the test system. (8) A description of the experimental design, including methods for the control of... at which the study is being conducted. (4) The proposed experimental start and termination dates. (5...

  4. 40 CFR 792.120 - Protocol.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... the test system. (8) A description of the experimental design, including methods for the control of... at which the study is being conducted. (4) The proposed experimental start and termination dates. (5...

  5. 40 CFR 792.120 - Protocol.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... the test system. (8) A description of the experimental design, including methods for the control of... at which the study is being conducted. (4) The proposed experimental start and termination dates. (5...

  6. Design of a stateless low-latency router architecture for green software-defined networking

    NASA Astrophysics Data System (ADS)

    Saldaña Cercós, Silvia; Ramos, Ramon M.; Ewald Eller, Ana C.; Martinello, Magnos; Ribeiro, Moisés. R. N.; Manolova Fagertun, Anna; Tafur Monroy, Idelfonso

    2015-01-01

    Expanding software defined networking (SDN) to transport networks requires new strategies to deal with the large number of flows that future core networks will have to face. New south-bound protocols within SDN have been proposed to benefit from having control plane detached from the data plane offering a cost- and energy-efficient forwarding engine. This paper presents an overview of a new approach named KeyFlow to simultaneously reduce latency, jitter, and power consumption in core network nodes. Results on an emulation platform indicate that round trip time (RTT) can be reduced above 50% compared to the reference protocol OpenFlow, specially when flow tables are densely populated. Jitter reduction has been demonstrated experimentally on a NetFPGA-based platform, and 57.3% power consumption reduction has been achieved.

  7. Regenerative endodontics.

    PubMed

    Simon, S; Smith, A J

    2014-03-01

    Significant advances in our understanding of the biological processes involved in tooth development and repair at the cellular and molecular levels have underpinned the newly emerging area of regenerative endodontics. Development of treatment protocols based on exploiting the natural wound healing properties of the dental pulp and applying tissue engineering principles has allowed reporting of case series showing preservation of tissue vitality and apexogenesis. To review current case series reporting regenerative endodontics. Current treatment approaches tend to stimulate more reparative than regenerative responses in respect of the new tissue generated, which often does not closely resemble the physiological structure of dentine-pulp. However, despite these biological limitations, such techniques appear to offer significant promise for improved treatment outcomes. Improved biological outcomes will likely emerge from the many experimental studies being reported and will further contribute to improvements in clinical treatment protocols.

  8. Exponential gain of randomness certified by quantum contextuality

    NASA Astrophysics Data System (ADS)

    Um, Mark; Zhang, Junhua; Wang, Ye; Wang, Pengfei; Kim, Kihwan

    2017-04-01

    We demonstrate the protocol of exponential gain of randomness certified by quantum contextuality in a trapped ion system. The genuine randomness can be produced by quantum principle and certified by quantum inequalities. Recently, randomness expansion protocols based on inequality of Bell-text and Kochen-Specker (KS) theorem, have been demonstrated. These schemes have been theoretically innovated to exponentially expand the randomness and amplify the randomness from weak initial random seed. Here, we report the experimental evidence of such exponential expansion of randomness. In the experiment, we use three states of a 138Ba + ion between a ground state and two quadrupole states. In the 138Ba + ion system, we do not have detection loophole and we apply a methods to rule out certain hidden variable models that obey a kind of extended noncontextuality.

  9. Gaussian error correction of quantum states in a correlated noisy channel.

    PubMed

    Lassen, Mikael; Berni, Adriano; Madsen, Lars S; Filip, Radim; Andersen, Ulrik L

    2013-11-01

    Noise is the main obstacle for the realization of fault-tolerant quantum information processing and secure communication over long distances. In this work, we propose a communication protocol relying on simple linear optics that optimally protects quantum states from non-Markovian or correlated noise. We implement the protocol experimentally and demonstrate the near-ideal protection of coherent and entangled states in an extremely noisy channel. Since all real-life channels are exhibiting pronounced non-Markovian behavior, the proposed protocol will have immediate implications in improving the performance of various quantum information protocols.

  10. Design and Implementation of a Secure Modbus Protocol

    NASA Astrophysics Data System (ADS)

    Fovino, Igor Nai; Carcano, Andrea; Masera, Marcelo; Trombetta, Alberto

    The interconnectivity of modern and legacy supervisory control and data acquisition (SCADA) systems with corporate networks and the Internet has significantly increased the threats to critical infrastructure assets. Meanwhile, traditional IT security solutions such as firewalls, intrusion detection systems and antivirus software are relatively ineffective against attacks that specifically target vulnerabilities in SCADA protocols. This paper describes a secure version of the Modbus SCADA protocol that incorporates integrity, authentication, non-repudiation and anti-replay mechanisms. Experimental results using a power plant testbed indicate that the augmented protocol provides good security functionality without significant overhead.

  11. A microleakage study of gutta-percha/AH Plus and Resilon/Real self-etch systems after different irrigation protocols.

    PubMed

    Prado, Maíra; Simão, Renata Antoun; Gomes, Brenda Paula Figueiredo de Almeida

    2014-06-01

    The development and maintenance of the sealing of the root canal system is the key to the success of root canal treatment. The resin-based adhesive material has the potential to reduce the microleakage of the root canal because of its adhesive properties and penetration into dentinal walls. Moreover, the irrigation protocols may have an influence on the adhesiveness of resin-based sealers to root dentin. The objective of the present study was to evaluate the effect of different irrigant protocols on coronal bacterial microleakage of gutta-percha/AH Plus and Resilon/Real Seal Self-etch systems. One hundred ninety pre-molars were used. The teeth were divided into 18 experimental groups according to the irrigation protocols and filling materials used. The protocols used were: distilled water; sodium hypochlorite (NaOCl)+eDTA; NaOCl+H3PO4; NaOCl+eDTA+chlorhexidine (CHX); NaOCl+H3PO4+CHX; CHX+eDTA; CHX+ H3PO4; CHX+eDTA+CHX and CHX+H3PO4+CHX. Gutta-percha/AH Plus or Resilon/Real Seal Se were used as root-filling materials. The coronal microleakage was evaluated for 90 days against Enterococcus faecalis. Data were statistically analyzed using Kaplan-Meier survival test, Kruskal-Wallis and Mann-Whitney tests. No significant difference was verified in the groups using chlorhexidine or sodium hypochlorite during the chemo-mechanical preparation followed by eDTA or phosphoric acid for smear layer removal. The same results were found for filling materials. However, the statistical analyses revealed that a final flush with 2% chlorhexidine reduced significantly the coronal microleakage. A final flush with 2% chlorhexidine after smear layer removal reduces coronal microleakage of teeth filled with gutta-percha/AH Plus or Resilon/Real Seal SE.

  12. PANATIKI: A Network Access Control Implementation Based on PANA for IoT Devices

    PubMed Central

    Sanchez, Pedro Moreno; Lopez, Rafa Marin; Gomez Skarmeta, Antonio F.

    2013-01-01

    Internet of Things (IoT) networks are the pillar of recent novel scenarios, such as smart cities or e-healthcare applications. Among other challenges, these networks cover the deployment and interaction of small devices with constrained capabilities and Internet protocol (IP)-based networking connectivity. These constrained devices usually require connection to the Internet to exchange information (e.g., management or sensing data) or access network services. However, only authenticated and authorized devices can, in general, establish this connection. The so-called authentication, authorization and accounting (AAA) services are in charge of performing these tasks on the Internet. Thus, it is necessary to deploy protocols that allow constrained devices to verify their credentials against AAA infrastructures. The Protocol for Carrying Authentication for Network Access (PANA) has been standardized by the Internet engineering task force (IETF) to carry the Extensible Authentication Protocol (EAP), which provides flexible authentication upon the presence of AAA. To the best of our knowledge, this paper is the first deep study of the feasibility of EAP/PANA for network access control in constrained devices. We provide light-weight versions and implementations of these protocols to fit them into constrained devices. These versions have been designed to reduce the impact in standard specifications. The goal of this work is two-fold: (1) to demonstrate the feasibility of EAP/PANA in IoT devices; (2) to provide the scientific community with the first light-weight interoperable implementation of EAP/PANA for constrained devices in the Contiki operating system (Contiki OS), called PANATIKI. The paper also shows a testbed, simulations and experimental results obtained from real and simulated constrained devices. PMID:24189332

  13. PANATIKI: a network access control implementation based on PANA for IoT devices.

    PubMed

    Moreno Sanchez, Pedro; Marin Lopez, Rafa; Gomez Skarmeta, Antonio F

    2013-11-01

    Internet of Things (IoT) networks are the pillar of recent novel scenarios, such as smart cities or e-healthcare applications. Among other challenges, these networks cover the deployment and interaction of small devices with constrained capabilities and Internet protocol (IP)-based networking connectivity. These constrained devices usually require connection to the Internet to exchange information (e.g., management or sensing data) or access network services. However, only authenticated and authorized devices can, in general, establish this connection. The so-called authentication, authorization and accounting (AAA) services are in charge of performing these tasks on the Internet. Thus, it is necessary to deploy protocols that allow constrained devices to verify their credentials against AAA infrastructures. The Protocol for Carrying Authentication for Network Access (PANA) has been standardized by the Internet engineering task force (IETF) to carry the Extensible Authentication Protocol (EAP), which provides flexible authentication upon the presence of AAA. To the best of our knowledge, this paper is the first deep study of the feasibility of EAP/PANA for network access control in constrained devices. We provide light-weight versions and implementations of these protocols to fit them into constrained devices. These versions have been designed to reduce the impact in standard specifications. The goal of this work is two-fold: (1) to demonstrate the feasibility of EAP/PANA in IoT devices; (2) to provide the scientific community with the first light-weight interoperable implementation of EAP/PANA for constrained devices in the Contiki operating system (Contiki OS), called PANATIKI. The paper also shows a testbed, simulations and experimental results obtained from real and simulated constrained devices.

  14. An Enhanced Biometric Based Authentication with Key-Agreement Protocol for Multi-Server Architecture Based on Elliptic Curve Cryptography.

    PubMed

    Reddy, Alavalapati Goutham; Das, Ashok Kumar; Odelu, Vanga; Yoo, Kee-Young

    2016-01-01

    Biometric based authentication protocols for multi-server architectures have gained momentum in recent times due to advancements in wireless technologies and associated constraints. Lu et al. recently proposed a robust biometric based authentication with key agreement protocol for a multi-server environment using smart cards. They claimed that their protocol is efficient and resistant to prominent security attacks. The careful investigation of this paper proves that Lu et al.'s protocol does not provide user anonymity, perfect forward secrecy and is susceptible to server and user impersonation attacks, man-in-middle attacks and clock synchronization problems. In addition, this paper proposes an enhanced biometric based authentication with key-agreement protocol for multi-server architecture based on elliptic curve cryptography using smartcards. We proved that the proposed protocol achieves mutual authentication using Burrows-Abadi-Needham (BAN) logic. The formal security of the proposed protocol is verified using the AVISPA (Automated Validation of Internet Security Protocols and Applications) tool to show that our protocol can withstand active and passive attacks. The formal and informal security analyses and performance analysis demonstrates that the proposed protocol is robust and efficient compared to Lu et al.'s protocol and existing similar protocols.

  15. (abstract) Experimental Results From Internetworking Data Applications Over Various Wireless Networks Using a Single Flexible Error Control Protocol

    NASA Technical Reports Server (NTRS)

    Kanai, T.; Kramer, M.; McAuley, A. J.; Nowack, S.; Pinck, D. S.; Ramirez, G.; Stewart, I.; Tohme, H.; Tong, L.

    1995-01-01

    This paper describes results from several wireless field trials in New Jersey, California, and Colorado, conducted jointly by researchers at Bellcore, JPL, and US West over the course of 1993 and 1994. During these trials, applications communicated over multiple wireless networks including satellite, low power PCS, high power cellular, packet data, and the wireline Public Switched Telecommunications Network (PSTN). Key goals included 1) designing data applications and an API suited to mobile users, 2) investigating internetworking issues, 3) characterizing wireless networks under various field conditions, and 4) comparing the performance of different protocol mechanisms over the diverse networks and applications. We describe experimental results for different protocol mechanisms and parameters, such as acknowledgment schemes and packet sizes. We show the need for powerful error control mechanisms such as selective acknowledgements and combining data from multiple transmissions. We highlight the possibility of a common protocol for all wireless networks, from micro-cellular PCS to satellite networks.

  16. Changes in morphology of long bone marrow tissue of rats submitted to cryotherapy with liquid nitrogen.

    PubMed

    Costa, Fábio Wildson Gurgel; Pessoa, Rosana Maria Andrade; Nogueira, Carlos Bruno Pinheiro; Pereira, Karuza Maria Alves; Brito, Gerly Anne de Castro; Soares, Eduardo Costa Studart

    2012-02-01

    To study the main effects of local use of liquid nitrogen on bone marrow tissue in rats. The femoral diaphyses of 42 Wistar rats were exposed to three local and sequential applications of liquid nitrogen for one or two minutes, intercalated with periods of five minutes of passive thawing. The animals were sacrificed after one, two, four and 12 weeks and the specimens obtained were analyzed histomorphologically. In the second experimental week of one-minute protocol, histological degree of inflammation obtained a mean score of one (mild), ranging from 0 (absent or scarce) and two (moderate) (Kruskal-Wallis test p=0.01). In the second experimental week of two-minute protocol, degree of inflammation to the medullar tissue obtained an average score of two (Kruskal-Wallis test p=0.01). The degree of inflammation of the bone marrow tissue was higher in protocol of three applications of two minutes compared to protocol of three applications of one minute.

  17. Comparison of protocols for measuring and calculating postmortem submersion intervals for human analogs in fresh water.

    PubMed

    Humphreys, Michael K; Panacek, Edward; Green, William; Albers, Elizabeth

    2013-03-01

    Protocols for determining postmortem submersion interval (PMSI) have long been problematic for forensic investigators due to the wide variety of factors affecting the rate of decomposition of submerged carrion. Likewise, it has been equally problematic for researchers to develop standardized experimental protocols to monitor underwater decomposition without artificially affecting the decomposition rate. This study compares two experimental protocols: (i) underwater in situ evaluation with photographic documentation utilizing the Heaton et al. total aquatic decomposition (TAD) score and (ii) weighing the carrion before and after submersion. Complete forensic necropsies were performed as a control. Perinatal piglets were used as human analogs. The results of this study indicate that in order to objectively measure decomposition over time, the human analog should be examined at depth using the TAD scoring system rather than utilizing a carrion weight evaluation. The acquired TAD score can be used to calculate an approximate PMSI. © 2012 American Academy of Forensic Sciences.

  18. Translational microsurgery. A new platform for transplantation research.

    PubMed

    Kobayashi, Eiji; Haga, Junko

    2016-03-01

    Clinical microsurgery has been introduced in many fields, while experimental microsurgery has the cross-disciplinary features of the sciences and techniques for growth of medicine, pharmacology, veterinary, engineering etc. Training protocol, proposing a new name as Translational Microsurgery, was introduced. Reconstructive skills of hepatic artery in pediatric living donor liver transplantation were summarized. Ex vivo training protocol using artificial blood vessel for surgeons was proposed. Clinical microsurgery requires anastomosis with delicate arteries and limited field of view. Our training protocol revealed that the relation between the score and speed was seen, while not all the surgeons with enough experience got high score. This training led to muster clinical skills and to apply excellent experimental works. Our microsurgical training protocol has been planned from the points of clinical setting. Training for vascular anastomosis led to rodent transplantation models. These models were used for immunology and immunosuppressant research. Microsurgical techniques led to master catheter technique and to inject various drugs or gene vectors.

  19. Experimental GMPLS-Based Provisioning for Future All-Optical DPRing-Based MAN

    NASA Astrophysics Data System (ADS)

    Mu�oz, Ra�l; V�ctor Mart�nez Rivera, Ricardo; Sorribes, Jordi; Junyent Giralt, Gabriel

    2005-10-01

    Given the abundance and strategic importance of ring fiber plants in metropolitan area networks (MANs), and the accelerating growth of Internet traffic, it is crucial to extend the existing Internet protocol (IP)-based generalized multiprotocol label switching (GMPLS) framework to provision dynamic wavelength division multiplexing (WDM) optical rings. Nevertheless, the emerging GMPLS-based lightpath provisioning does not cover the intricacies of optical rings. No GMPLS standard exists for optical add-drop multiplexer (OADM) rings, relying instead upon proprietary static solution. The objective of this paper is to propose and evaluate novel GMPLS-based lightpath signaling and wavelength reservation schemes specifically designed for dedicated protection ring (DPRing)-based MANs. Performance evaluation has been carried out in a GMPLS-based testbed named ADRENALINE.

  20. Evaluating optimal therapy robustness by virtual expansion of a sample population, with a case study in cancer immunotherapy

    PubMed Central

    Barish, Syndi; Ochs, Michael F.; Sontag, Eduardo D.; Gevertz, Jana L.

    2017-01-01

    Cancer is a highly heterogeneous disease, exhibiting spatial and temporal variations that pose challenges for designing robust therapies. Here, we propose the VEPART (Virtual Expansion of Populations for Analyzing Robustness of Therapies) technique as a platform that integrates experimental data, mathematical modeling, and statistical analyses for identifying robust optimal treatment protocols. VEPART begins with time course experimental data for a sample population, and a mathematical model fit to aggregate data from that sample population. Using nonparametric statistics, the sample population is amplified and used to create a large number of virtual populations. At the final step of VEPART, robustness is assessed by identifying and analyzing the optimal therapy (perhaps restricted to a set of clinically realizable protocols) across each virtual population. As proof of concept, we have applied the VEPART method to study the robustness of treatment response in a mouse model of melanoma subject to treatment with immunostimulatory oncolytic viruses and dendritic cell vaccines. Our analysis (i) showed that every scheduling variant of the experimentally used treatment protocol is fragile (nonrobust) and (ii) discovered an alternative region of dosing space (lower oncolytic virus dose, higher dendritic cell dose) for which a robust optimal protocol exists. PMID:28716945

  1. Automatized set-up procedure for transcranial magnetic stimulation protocols.

    PubMed

    Harquel, S; Diard, J; Raffin, E; Passera, B; Dall'Igna, G; Marendaz, C; David, O; Chauvin, A

    2017-06-01

    Transcranial Magnetic Stimulation (TMS) established itself as a powerful technique for probing and treating the human brain. Major technological evolutions, such as neuronavigation and robotized systems, have continuously increased the spatial reliability and reproducibility of TMS, by minimizing the influence of human and experimental factors. However, there is still a lack of efficient set-up procedure, which prevents the automation of TMS protocols. For example, the set-up procedure for defining the stimulation intensity specific to each subject is classically done manually by experienced practitioners, by assessing the motor cortical excitability level over the motor hotspot (HS) of a targeted muscle. This is time-consuming and introduces experimental variability. Therefore, we developed a probabilistic Bayesian model (AutoHS) that automatically identifies the HS position. Using virtual and real experiments, we compared the efficacy of the manual and automated procedures. AutoHS appeared to be more reproducible, faster, and at least as reliable as classical manual procedures. By combining AutoHS with robotized TMS and automated motor threshold estimation methods, our approach constitutes the first fully automated set-up procedure for TMS protocols. The use of this procedure decreases inter-experimenter variability while facilitating the handling of TMS protocols used for research and clinical routine. Copyright © 2017 Elsevier Inc. All rights reserved.

  2. Protocol for fermionic positive-operator-valued measures

    NASA Astrophysics Data System (ADS)

    Arvidsson-Shukur, D. R. M.; Lepage, H. V.; Owen, E. T.; Ferrus, T.; Barnes, C. H. W.

    2017-11-01

    In this paper we present a protocol for the implementation of a positive-operator-valued measure (POVM) on massive fermionic qubits. We present methods for implementing nondispersive qubit transport, spin rotations, and spin polarizing beam-splitter operations. Our scheme attains linear opticslike control of the spatial extent of the qubits by considering ground-state electrons trapped in the minima of surface acoustic waves in semiconductor heterostructures. Furthermore, we numerically simulate a high-fidelity POVM that carries out Procrustean entanglement distillation in the framework of our scheme, using experimentally realistic potentials. Our protocol can be applied not only to pure ensembles with particle pairs of known identical entanglement, but also to realistic ensembles of particle pairs with a distribution of entanglement entropies. This paper provides an experimentally realizable design for future quantum technologies.

  3. Experimental verification of multipartite entanglement in quantum networks

    PubMed Central

    McCutcheon, W.; Pappa, A.; Bell, B. A.; McMillan, A.; Chailloux, A.; Lawson, T.; Mafu, M.; Markham, D.; Diamanti, E.; Kerenidis, I.; Rarity, J. G.; Tame, M. S.

    2016-01-01

    Multipartite entangled states are a fundamental resource for a wide range of quantum information processing tasks. In particular, in quantum networks, it is essential for the parties involved to be able to verify if entanglement is present before they carry out a given distributed task. Here we design and experimentally demonstrate a protocol that allows any party in a network to check if a source is distributing a genuinely multipartite entangled state, even in the presence of untrusted parties. The protocol remains secure against dishonest behaviour of the source and other parties, including the use of system imperfections to their advantage. We demonstrate the verification protocol in a three- and four-party setting using polarization-entangled photons, highlighting its potential for realistic photonic quantum communication and networking applications. PMID:27827361

  4. A Re-Examination of Hebbian-Covariance Rules and Spike Timing-Dependent Plasticity in Cat Visual Cortex in vivo

    PubMed Central

    Frégnac, Yves; Pananceau, Marc; René, Alice; Huguet, Nazyed; Marre, Olivier; Levy, Manuel; Shulz, Daniel E.

    2010-01-01

    Spike timing-dependent plasticity (STDP) is considered as an ubiquitous rule for associative plasticity in cortical networks in vitro. However, limited supporting evidence for its functional role has been provided in vivo. In particular, there are very few studies demonstrating the co-occurrence of synaptic efficiency changes and alteration of sensory responses in adult cortex during Hebbian or STDP protocols. We addressed this issue by reviewing and comparing the functional effects of two types of cellular conditioning in cat visual cortex. The first one, referred to as the “covariance” protocol, obeys a generalized Hebbian framework, by imposing, for different stimuli, supervised positive and negative changes in covariance between postsynaptic and presynaptic activity rates. The second protocol, based on intracellular recordings, replicated in vivo variants of the theta-burst paradigm (TBS), proven successful in inducing long-term potentiation in vitro. Since it was shown to impose a precise correlation delay between the electrically activated thalamic input and the TBS-induced postsynaptic spike, this protocol can be seen as a probe of causal (“pre-before-post”) STDP. By choosing a thalamic region where the visual field representation was in retinotopic overlap with the intracellularly recorded cortical receptive field as the afferent site for supervised electrical stimulation, this protocol allowed to look for possible correlates between STDP and functional reorganization of the conditioned cortical receptive field. The rate-based “covariance protocol” induced significant and large amplitude changes in receptive field properties, in both kitten and adult V1 cortex. The TBS STDP-like protocol produced in the adult significant changes in the synaptic gain of the electrically activated thalamic pathway, but the statistical significance of the functional correlates was detectable mostly at the population level. Comparison of our observations with the literature leads us to re-examine the experimental status of spike timing-dependent potentiation in adult cortex. We propose the existence of a correlation-based threshold in vivo, limiting the expression of STDP-induced changes outside the critical period, and which accounts for the stability of synaptic weights during sensory cortical processing in the absence of attention or reward-gated supervision. PMID:21423533

  5. Methodology capture: discriminating between the "best" and the rest of community practice

    PubMed Central

    Eales, James M; Pinney, John W; Stevens, Robert D; Robertson, David L

    2008-01-01

    Background The methodologies we use both enable and help define our research. However, as experimental complexity has increased the choice of appropriate methodologies has become an increasingly difficult task. This makes it difficult to keep track of available bioinformatics software, let alone the most suitable protocols in a specific research area. To remedy this we present an approach for capturing methodology from literature in order to identify and, thus, define best practice within a field. Results Our approach is to implement data extraction techniques on the full-text of scientific articles to obtain the set of experimental protocols used by an entire scientific discipline, molecular phylogenetics. Our methodology for identifying methodologies could in principle be applied to any scientific discipline, whether or not computer-based. We find a number of issues related to the nature of best practice, as opposed to community practice. We find that there is much heterogeneity in the use of molecular phylogenetic methods and software, some of which is related to poor specification of protocols. We also find that phylogenetic practice exhibits field-specific tendencies that have increased through time, despite the generic nature of the available software. We used the practice of highly published and widely collaborative researchers ("expert" researchers) to analyse the influence of authority on community practice. We find expert authors exhibit patterns of practice common to their field and therefore act as useful field-specific practice indicators. Conclusion We have identified a structured community of phylogenetic researchers performing analyses that are customary in their own local community and significantly different from those in other areas. Best practice information can help to bridge such subtle differences by increasing communication of protocols to a wider audience. We propose that the practice of expert authors from the field of evolutionary biology is the closest to contemporary best practice in phylogenetic experimental design. Capturing best practice is, however, a complex task and should also acknowledge the differences between fields such as the specific context of the analysis. PMID:18761740

  6. Construction, alignment, and implementation of an acousto-optical deflector-based system for patterned uncaging with ultraviolet light.

    PubMed

    Civillico, Eugene F; Shoham, Shy; O'Connor, Daniel H; Sarkisov, Dmitry V; Wang, Samuel S-H

    2012-08-01

    The method of patterned photoactivation is a natural fit for the study of neuronal dendritic integration. Photoactivatable molecules that influence a wide range of extracellular and intracellular neurophysiological functions are available. The choice of photosensitive molecules depends on the research question and will influence the design of the experimental apparatus. An acousto-optical deflector (AOD)-based system can be used for rapid ultraviolet (UV) photolysis in arbitrary spatial and temporal patterns. Photolysis-activated "caged" diffusible molecules or newer light-sensitive membrane proteins can be used in this system. This protocol describes the addition of a UV beam for uncaging to a homebuilt two-photon microscope. The goal is to get UV light from the light source (laser) to the approximate center of the objective's back aperture, passing through a pair of perpendicularly oriented AODs along the way. The protocol also describes the fine alignment of the UV beam and the implementation of AOD-based beam steering. Performing the final alignment with the beam passing through the AODs will ensure that the system is optimized for the idiosyncrasies of the crystals.

  7. Compositional Verification of a Communication Protocol for a Remotely Operated Vehicle

    NASA Technical Reports Server (NTRS)

    Goodloe, Alwyn E.; Munoz, Cesar A.

    2009-01-01

    This paper presents the specification and verification in the Prototype Verification System (PVS) of a protocol intended to facilitate communication in an experimental remotely operated vehicle used by NASA researchers. The protocol is defined as a stack-layered com- position of simpler protocols. It can be seen as the vertical composition of protocol layers, where each layer performs input and output message processing, and the horizontal composition of different processes concurrently inhabiting the same layer, where each process satisfies a distinct requirement. It is formally proven that the protocol components satisfy certain delivery guarantees. Compositional techniques are used to prove these guarantees also hold in the composed system. Although the protocol itself is not novel, the methodology employed in its verification extends existing techniques by automating the tedious and usually cumbersome part of the proof, thereby making the iterative design process of protocols feasible.

  8. Is there pre-attentive memory-based comparison of pitch?

    PubMed

    Jacobsen, T; Schröger, E

    2001-07-01

    The brain's responsiveness to changes in sound frequency has been demonstrated by an overwhelming number of studies. Change detection occurs unintentionally and automatically. It is generally assumed that this brain response, the so-called mismatch negativity (MMN) of the event-related brain potential or evoked magnetic field, is based on the outcome of a memory-comparison mechanism rather than being due to a differential state of refractoriness of tonotopically organized cortical neurons. To the authors' knowledge, however, there is no entirely compelling evidence for this belief. An experimental protocol controlling for refractoriness effects was developed and a true memory-comparison-based brain response to pitch change was demonstrated.

  9. Experimental evaluation of multiprocessor cache-based error recovery

    NASA Technical Reports Server (NTRS)

    Janssens, Bob; Fuchs, W. K.

    1991-01-01

    Several variations of cache-based checkpointing for rollback error recovery in shared-memory multiprocessors have been recently developed. By modifying the cache replacement policy, these techniques use the inherent redundancy in the memory hierarchy to periodically checkpoint the computation state. Three schemes, different in the manner in which they avoid rollback propagation, are evaluated. By simulation with address traces from parallel applications running on an Encore Multimax shared-memory multiprocessor, the performance effect of integrating the recovery schemes in the cache coherence protocol are evaluated. The results indicate that the cache-based schemes can provide checkpointing capability with low performance overhead but uncontrollable high variability in the checkpoint interval.

  10. Weight Loss and the Prevention of Weight Regain: Evaluation of a Treatment Model of Exercise Self-Regulation Generalizing to Controlled Eating.

    PubMed

    Annesi, James J; Johnson, Ping H; Tennant, Gisèle A; Porter, Kandice J; Mcewen, Kristin L

    2016-01-01

    For decades, behavioral weight-loss treatments have been unsuccessful beyond the short term. Development and testing of innovative, theoretically based methods that depart from current failed practices is a priority for behavioral medicine. To evaluate a new, theory-based protocol in which exercise support methods are employed to facilitate improvements in psychosocial predictors of controlled eating and sustained weight loss. Women with obesity were randomized into either a comparison treatment that incorporated a print manual plus telephone follow-ups (n = 55) or an experimental treatment of The Coach Approach exercise-support protocol followed after 2 months by group nutrition sessions focused on generalizing self-regulatory skills from an exercise support to a controlled eating context (n = 55). Repeated-measures analysis of variance contrasted group changes in weight, physical activity, fruit and vegetable intake, mood, and exercise- and eating-related self-regulation and self-efficacy over 24 months. Regression analyses determined salient interrelations of change scores over both the weight-loss phase (baseline-month 6) and weight-loss maintenance phase (month 6-month 24). Improvements in all psychological measures, physical activity, and fruit and vegetable intake were significantly greater in the experimental group where a mean weight loss of 5.7 kg (6.1% of initial body weight) occurred at month 6, and was largely maintained at a loss of 5.1 kg (5.4%) through the full 24 months of the study. After establishing temporal intervals for changes in self-regulation, self-efficacy, and mood that best predicted improvements in physical activity and eating, a consolidated multiple mediation model suggested that change in self-regulation best predicted weight loss, whereas change in self-efficacy best predicted maintenance of lost weight. Because for most participants loss of weight remained greater than that required for health benefits, and costs for treatment administration were comparatively low, the experimental protocol was considered successful. After sufficient replication, physician referral and applications within health promotion and wellness settings should be considered.

  11. Weight Loss and the Prevention of Weight Regain: Evaluation of a Treatment Model of Exercise Self-Regulation Generalizing to Controlled Eating

    PubMed Central

    Annesi, James J; Johnson, Ping H; Tennant, Gisèle A; Porter, Kandice J; McEwen, Kristin L

    2016-01-01

    Context: For decades, behavioral weight-loss treatments have been unsuccessful beyond the short term. Development and testing of innovative, theoretically based methods that depart from current failed practices is a priority for behavioral medicine. Objective: To evaluate a new, theory-based protocol in which exercise support methods are employed to facilitate improvements in psychosocial predictors of controlled eating and sustained weight loss. Methods: Women with obesity were randomized into either a comparison treatment that incorporated a print manual plus telephone follow-ups (n = 55) or an experimental treatment of The Coach Approach exercise-support protocol followed after 2 months by group nutrition sessions focused on generalizing self-regulatory skills from an exercise support to a controlled eating context (n = 55). Repeated-measures analysis of variance contrasted group changes in weight, physical activity, fruit and vegetable intake, mood, and exercise- and eating-related self-regulation and self-efficacy over 24 months. Regression analyses determined salient interrelations of change scores over both the weight-loss phase (baseline-month 6) and weight-loss maintenance phase (month 6-month 24). Results: Improvements in all psychological measures, physical activity, and fruit and vegetable intake were significantly greater in the experimental group where a mean weight loss of 5.7 kg (6.1% of initial body weight) occurred at month 6, and was largely maintained at a loss of 5.1 kg (5.4%) through the full 24 months of the study. After establishing temporal intervals for changes in self-regulation, self-efficacy, and mood that best predicted improvements in physical activity and eating, a consolidated multiple mediation model suggested that change in self-regulation best predicted weight loss, whereas change in self-efficacy best predicted maintenance of lost weight. Conclusions: Because for most participants loss of weight remained greater than that required for health benefits, and costs for treatment administration were comparatively low, the experimental protocol was considered successful. After sufficient replication, physician referral and applications within health promotion and wellness settings should be considered. PMID:26901268

  12. UMDR: Multi-Path Routing Protocol for Underwater Ad Hoc Networks with Directional Antenna

    NASA Astrophysics Data System (ADS)

    Yang, Jianmin; Liu, Songzuo; Liu, Qipei; Qiao, Gang

    2018-01-01

    This paper presents a new routing scheme for underwater ad hoc networks based on directional antennas. Ad hoc networks with directional antennas have become a hot research topic because of space reuse may increase networks capacity. At present, researchers have applied traditional self-organizing routing protocols (such as DSR, AODV) [1] [2] on this type of networks, and the routing scheme is based on the shortest path metric. However, such routing schemes often suffer from long transmission delays and frequent link fragmentation along the intermediate nodes of the selected route. This is caused by a unique feature of directional transmission, often called as “deafness”. In this paper, we take a different approach to explore the advantages of space reuse through multipath routing. This paper introduces the validity of the conventional routing scheme in underwater ad hoc networks with directional antennas, and presents a special design of multipath routing algorithm for directional transmission. The experimental results show a significant performance improvement in throughput and latency.

  13. OpenSource lab-on-a-chip physiometer for accelerated zebrafish embryo biotests.

    PubMed

    Akagi, Jin; Hall, Chris J; Crosier, Kathryn E; Cooper, Jonathan M; Crosier, Philip S; Wlodkowic, Donald

    2014-01-02

    Zebrafish (Danio rerio) embryo assays have recently come into the spotlight as convenient experimental models in both biomedicine and ecotoxicology. As a small aquatic model organism, zebrafish embryo assays allow for rapid physiological, embryo-, and genotoxic tests of drugs and environmental toxins that can be simply dissolved in water. This protocol describes prototyping and application of an innovative, miniaturized, and polymeric chip-based device capable of immobilizing a large number of living fish embryos for real-time and/or time-lapse microscopic examination. The device provides a physical address designation to each embryo during analysis, continuous perfusion of medium, and post-analysis specimen recovery. Miniaturized embryo array is a new concept of immobilization and real-time drug perfusion of multiple individual and developing zebrafish embryos inside the mesofluidic device. The OpenSource device presented in this protocol is particularly suitable to perform accelerated fish embryo biotests in ecotoxicology and phenotype-based pharmaceutical screening. Copyright © 2014 John Wiley & Sons, Inc.

  14. Evaluation of a protocol-based intervention to promote timely switching from intravenous to oral paracetamol for post-operative pain management: an interrupted time series analysis.

    PubMed

    Sabry, Nirmeen; Dawoud, Dalia; Alansary, Adel; Hounsome, Natalia; Baines, Darrin

    2015-12-01

    Timely switching from intravenous to oral therapy ensures optimized treatment and efficient use of health care resources. Intravenous (IV) paracetamol is widely used for post-operative pain management but not always switched to the oral form in a timely manner, leading to unnecessary increase in expenditure. This study aims to evaluate the impact of a multifaceted intervention to promote timely switching from the IV to oral form in the post-operative setting. An evidence-based prescribing protocol was designed and implemented by the clinical pharmacy team in a single district general hospital in Egypt. The protocol specified the criteria for appropriate prescribing of IV paracetamol. Doctors were provided with information and educational sessions prior to implementation. A prospective, quasi-experimental study was undertaken to evaluate its impact on IV paracetamol utilization and costs. Data on monthly utilization and costs were recorded for 12 months before and after implementation (January 2012 to December 2013). Data were analysed using interrupted time series analysis. Prior to implementation, in 2012, total spending on IV paracetamol was 674 154.00 Egyptian Pounds (L.E.) ($23,668.00). There was a non-significant (P > 0.05) downward trend in utilization (-32 ampoules per month) and costs [reduction of 632 L.E. ($222) per month]. Following implementation, immediate decrease in utilization and costs (P < 0.05) and a trend change over the follow-up period were observed. Average monthly reduction was 26% (95% CI: 24% to 28%, P < 0.001). A multifaceted, protocol-based intervention to ensure timely switching from IV-to-oral paracetamol achieved significant reduction in utilization and cost of IV paracetamol in the first 5 months of its implementation. © 2015 John Wiley & Sons, Ltd.

  15. Why standard brain-computer interface (BCI) training protocols should be changed: an experimental study.

    PubMed

    Jeunet, Camille; Jahanpour, Emilie; Lotte, Fabien

    2016-06-01

    While promising, electroencephaloraphy based brain-computer interfaces (BCIs) are barely used due to their lack of reliability: 15% to 30% of users are unable to control a BCI. Standard training protocols may be partly responsible as they do not satisfy recommendations from psychology. Our main objective was to determine in practice to what extent standard training protocols impact users' motor imagery based BCI (MI-BCI) control performance. We performed two experiments. The first consisted in evaluating the efficiency of a standard BCI training protocol for the acquisition of non-BCI related skills in a BCI-free context, which enabled us to rule out the possible impact of BCIs on the training outcome. Thus, participants (N = 54) were asked to perform simple motor tasks. The second experiment was aimed at measuring the correlations between motor tasks and MI-BCI performance. The ten best and ten worst performers of the first study were recruited for an MI-BCI experiment during which they had to learn to perform two MI tasks. We also assessed users' spatial ability and pre-training μ rhythm amplitude, as both have been related to MI-BCI performance in the literature. Around 17% of the participants were unable to learn to perform the motor tasks, which is close to the BCI illiteracy rate. This suggests that standard training protocols are suboptimal for skill teaching. No correlation was found between motor tasks and MI-BCI performance. However, spatial ability played an important role in MI-BCI performance. In addition, once the spatial ability covariable had been controlled for, using an ANCOVA, it appeared that participants who faced difficulty during the first experiment improved during the second while the others did not. These studies suggest that (1) standard MI-BCI training protocols are suboptimal for skill teaching, (2) spatial ability is confirmed as impacting on MI-BCI performance, and (3) when faced with difficult pre-training, subjects seemed to explore more strategies and therefore learn better.

  16. Effects of a peer support programme for youth social services employees experiencing potentially traumatic events: a protocol for a prospective cohort study.

    PubMed

    Guay, Stephane; Tremblay, Nicole; Goncalves, Jane; Bilodeau, Henriette; Geoffrion, Steve

    2017-06-24

    The use of peer support programmes to help workers experiencing potentially traumatic events (PTE) has increased in high-risk organisations in the last decades. However, the scientific evidence of its effectiveness is still very limited. This paper aims to describe the protocol of a prospective cohort study that assesses the efficacy of a peer support programme among youth social services employees exposed to a PTE at work on psychological well-being, work functioning and needs of support. This is a mixed-methods prospective study that will examine workers' evolution four times over a 12-month period in Canada. This study involves: (1) quantitative data obtained through self-administrated questionnaires among 222 workers, and (2) qualitative in-depth interviews with a subsample of 45 workers. This study will compare findings from a cohort who received the support of a peer following a PTE (peer support-experimental protocol) as part of the experimental protocol of the Montreal Youth Social Services-University Institute (MYSS-UI), the second group of workers did not ask for the peer support (no peer support-experimental protocol) but was part of MYSS-UI, and the third group received standard organisational support from the Monteregie Youth Social Services (MYSS) (standard organisational protocol). The protocol and informed consent form complied with the ethics guidelines of the MYSS-UI. The Research Ethics Board of MYSS-UI and MYSS reviewed and accepted the protocol as required. The results of the study will be published in peer-reviewed journals, presented at research and general public conferences, disseminated via a public report for the institute that funded the project and for all workers. Results of this study will influence decision making regarding intervention policies following PTE and peer support interventions may be expanded throughout the youth social services in Canada and worldwide. © Article author(s) (or their employer(s) unless otherwise stated in the text of the article) 2017. All rights reserved. No commercial use is permitted unless otherwise expressly granted.

  17. Non-Invasive Transcranial Brain Therapy Guided by CT Scans: an In Vivo Monkey Study

    NASA Astrophysics Data System (ADS)

    Marquet, F.; Pernot, M.; Aubry, J.-F.; Montaldo, G.; Tanter, M.; Boch, A.-L.; Kujas, M.; Seilhean, D.; Fink, M.

    2007-05-01

    Brain therapy using focused ultrasound remains very limited due to the strong aberrations induced by the skull. A minimally invasive technique using time-reversal was validated recently in-vivo on 20 sheeps. But such a technique requires a hydrophone at the focal point for the first step of the time-reversal procedure. A completely noninvasive therapy requires a reliable model of the acoustic properties of the skull in order to simulate this first step. 3-D simulations based on high-resolution CT images of a skull have been successfully performed with a finite differences code developed in our Laboratory. Thanks to the skull porosity, directly extracted from the CT images, we reconstructed acoustic speed, density and absorption maps and performed the computation. Computed wavefronts are in good agreement with experimental wavefronts acquired through the same part of the skull and this technique was validated in-vitro in the laboratory. A stereotactic frame has been designed and built in order to perform non invasive transcranial focusing in vivo. Here we describe all the steps of our new protocol, from the CT-scans to the therapy treatment and the first in vivo results on a monkey will be presented. This protocol is based on protocols already existing in radiotherapy.

  18. Integrated design, execution, and analysis of arrayed and pooled CRISPR genome-editing experiments.

    PubMed

    Canver, Matthew C; Haeussler, Maximilian; Bauer, Daniel E; Orkin, Stuart H; Sanjana, Neville E; Shalem, Ophir; Yuan, Guo-Cheng; Zhang, Feng; Concordet, Jean-Paul; Pinello, Luca

    2018-05-01

    CRISPR (clustered regularly interspaced short palindromic repeats) genome-editing experiments offer enormous potential for the evaluation of genomic loci using arrayed single guide RNAs (sgRNAs) or pooled sgRNA libraries. Numerous computational tools are available to help design sgRNAs with optimal on-target efficiency and minimal off-target potential. In addition, computational tools have been developed to analyze deep-sequencing data resulting from genome-editing experiments. However, these tools are typically developed in isolation and oftentimes are not readily translatable into laboratory-based experiments. Here, we present a protocol that describes in detail both the computational and benchtop implementation of an arrayed and/or pooled CRISPR genome-editing experiment. This protocol provides instructions for sgRNA design with CRISPOR (computational tool for the design, evaluation, and cloning of sgRNA sequences), experimental implementation, and analysis of the resulting high-throughput sequencing data with CRISPResso (computational tool for analysis of genome-editing outcomes from deep-sequencing data). This protocol allows for design and execution of arrayed and pooled CRISPR experiments in 4-5 weeks by non-experts, as well as computational data analysis that can be performed in 1-2 d by both computational and noncomputational biologists alike using web-based and/or command-line versions.

  19. Buprenorphine During Pregnancy Reduces Neonate Distress

    MedlinePlus

    ... supported clinical trial, the Maternal Opioid Treatment: Human Experimental Research (MOTHER) study, has found buprenorphine to be ... to the two medications. They surmise that the experimental treatment protocols may have moved patients from morphine ...

  20. Real-time Experiment Interface for Biological Control Applications

    PubMed Central

    Lin, Risa J.; Bettencourt, Jonathan; White, John A.; Christini, David J.; Butera, Robert J.

    2013-01-01

    The Real-time Experiment Interface (RTXI) is a fast and versatile real-time biological experimentation system based on Real-Time Linux. RTXI is open source and free, can be used with an extensive range of experimentation hardware, and can be run on Linux or Windows computers (when using the Live CD). RTXI is currently used extensively for two experiment types: dynamic patch clamp and closed-loop stimulation pattern control in neural and cardiac single cell electrophysiology. RTXI includes standard plug-ins for implementing commonly used electrophysiology protocols with synchronized stimulation, event detection, and online analysis. These and other user-contributed plug-ins can be found on the website (http://www.rtxi.org). PMID:21096883

  1. The Instrumental Model

    ERIC Educational Resources Information Center

    Yeates, Devin Rodney

    2011-01-01

    The goal of this dissertation is to enable better predictive models by engaging raw experimental data through the Instrumental Model. The Instrumental Model captures the protocols and procedures of experimental data analysis. The approach is formalized by encoding the Instrumental Model in an XML record. Decoupling the raw experimental data from…

  2. DOE Office of Scientific and Technical Information (OSTI.GOV)

    Williams, Brian P.; Sadlier, Ronald J.; Humble, Travis S.

    Adopting quantum communication to modern networking requires transmitting quantum information through a fiber-based infrastructure. In this paper, we report the first demonstration of superdense coding over optical fiber links, taking advantage of a complete Bell-state measurement enabled by time-polarization hyperentanglement, linear optics, and common single-photon detectors. Finally, we demonstrate the highest single-qubit channel capacity to date utilizing linear optics, 1.665 ± 0.018, and we provide a full experimental implementation of a hybrid, quantum-classical communication protocol for image transfer.

  3. Wireless Testbed Bonsai

    DTIC Science & Technology

    2006-02-01

    wireless sensor device network, and a about 200 Stargate nodes higher-tier multi-hop peer- to-peer 802.11b wireless network. Leading up to the full ExScal...deployment, we conducted spatial scaling tests on our higher-tier protocols on a 7 × 7 grid of Stargates nodes 45m and with 90m separations respectively...onW and its scaled version W̃ . III. EXPERIMENTAL SETUP Description of Kansei testbed. A stargate is a single board linux-based computer [7]. It uses a

  4. Scalable Multicast Protocols for Overlapped Groups in Broker-Based Sensor Networks

    NASA Astrophysics Data System (ADS)

    Kim, Chayoung; Ahn, Jinho

    In sensor networks, there are lots of overlapped multicast groups because of many subscribers, associated with their potentially varying specific interests, querying every event to sensors/publishers. And gossip based communication protocols are promising as one of potential solutions providing scalability in P(Publish)/ S(Subscribe) paradigm in sensor networks. Moreover, despite the importance of both guaranteeing message delivery order and supporting overlapped multicast groups in sensor or P2P networks, there exist little research works on development of gossip-based protocols to satisfy all these requirements. In this paper, we present two versions of causally ordered delivery guaranteeing protocols for overlapped multicast groups. The one is based on sensor-broker as delegates and the other is based on local views and delegates representing subscriber subgroups. In the sensor-broker based protocol, sensor-broker might lead to make overlapped multicast networks organized by subscriber's interests. The message delivery order has been guaranteed consistently and all multicast messages are delivered to overlapped subscribers using gossip based protocols by sensor-broker. Therefore, these features of the sensor-broker based protocol might be significantly scalable rather than those of the protocols by hierarchical membership list of dedicated groups like traditional committee protocols. And the subscriber-delegate based protocol is much stronger rather than fully decentralized protocols guaranteeing causally ordered delivery based on only local views because the message delivery order has been guaranteed consistently by all corresponding members of the groups including delegates. Therefore, this feature of the subscriber-delegate protocol is a hybrid approach improving the inherent scalability of multicast nature by gossip-based technique in all communications.

  5. Large-Scale Low-Cost NGS Library Preparation Using a Robust Tn5 Purification and Tagmentation Protocol

    PubMed Central

    Hennig, Bianca P.; Velten, Lars; Racke, Ines; Tu, Chelsea Szu; Thoms, Matthias; Rybin, Vladimir; Besir, Hüseyin; Remans, Kim; Steinmetz, Lars M.

    2017-01-01

    Efficient preparation of high-quality sequencing libraries that well represent the biological sample is a key step for using next-generation sequencing in research. Tn5 enables fast, robust, and highly efficient processing of limited input material while scaling to the parallel processing of hundreds of samples. Here, we present a robust Tn5 transposase purification strategy based on an N-terminal His6-Sumo3 tag. We demonstrate that libraries prepared with our in-house Tn5 are of the same quality as those processed with a commercially available kit (Nextera XT), while they dramatically reduce the cost of large-scale experiments. We introduce improved purification strategies for two versions of the Tn5 enzyme. The first version carries the previously reported point mutations E54K and L372P, and stably produces libraries of constant fragment size distribution, even if the Tn5-to-input molecule ratio varies. The second Tn5 construct carries an additional point mutation (R27S) in the DNA-binding domain. This construct allows for adjustment of the fragment size distribution based on enzyme concentration during tagmentation, a feature that opens new opportunities for use of Tn5 in customized experimental designs. We demonstrate the versatility of our Tn5 enzymes in different experimental settings, including a novel single-cell polyadenylation site mapping protocol as well as ultralow input DNA sequencing. PMID:29118030

  6. An Enhanced Biometric Based Authentication with Key-Agreement Protocol for Multi-Server Architecture Based on Elliptic Curve Cryptography

    PubMed Central

    Reddy, Alavalapati Goutham; Das, Ashok Kumar; Odelu, Vanga; Yoo, Kee-Young

    2016-01-01

    Biometric based authentication protocols for multi-server architectures have gained momentum in recent times due to advancements in wireless technologies and associated constraints. Lu et al. recently proposed a robust biometric based authentication with key agreement protocol for a multi-server environment using smart cards. They claimed that their protocol is efficient and resistant to prominent security attacks. The careful investigation of this paper proves that Lu et al.’s protocol does not provide user anonymity, perfect forward secrecy and is susceptible to server and user impersonation attacks, man-in-middle attacks and clock synchronization problems. In addition, this paper proposes an enhanced biometric based authentication with key-agreement protocol for multi-server architecture based on elliptic curve cryptography using smartcards. We proved that the proposed protocol achieves mutual authentication using Burrows-Abadi-Needham (BAN) logic. The formal security of the proposed protocol is verified using the AVISPA (Automated Validation of Internet Security Protocols and Applications) tool to show that our protocol can withstand active and passive attacks. The formal and informal security analyses and performance analysis demonstrates that the proposed protocol is robust and efficient compared to Lu et al.’s protocol and existing similar protocols. PMID:27163786

  7. The Family Startup Program: study protocol for a randomized controlled trial of a universal group-based parenting support program.

    PubMed

    Trillingsgaard, Tea; Maimburg, Rikke Damkjær; Simonsen, Marianne

    2015-04-21

    Inadequate parenting is an important public health problem with possible severe and long-term consequences related to child development. We have solid theoretical and political arguments in favor of efforts enhancing the quality of the early family environment in the population at large. However, little is known about effect of universal approaches to parenting support during the transition to parenthood. This protocol describes an experimental evaluation of group based parenting support, the Family Startup Program (FSP), currently implemented large scale in Denmark. Participants will be approximately 2500 pregnant women and partners. Inclusion criteria are parental age above 18 and the mother expecting first child. Families are recruited when attending routine pregnancy scans provided as a part of the publicly available prenatal care program at Aarhus University Hospital, Skejby. Families are randomized within four geographically defined strata to one of two conditions a) participation in FSP or b) Treatment As Usual (TAU). FSP aims to prepare new families for their roles as parents and enhance parental access to informal sources of support, i.e. social network and community resources. The program consists of twelve group sessions, with nine families in each group, continuing from pregnancy until the child is 15 months old. TAU is the publicly available pre- and postnatal care available to families in both conditions. Analyses will employ survey data, administrative data from health visitors, and administrative register based data from Statistics Denmark. All data sources will be linked via the unique Danish Civil Registration Register (CPR) identifier. Data will be obtained at four time points, during pregnancy, when the child is nine months, 18 months and seven years. The primary study outcome is measured by the Parenting Sense of Competence scale (PSOC) J Clin Child Psychol 18:167-75, 1989. Other outcomes include parenting and couple relationship quality, utility of primary sector service and child physical health, socio-emotional and cognitive development. The protocol describes an ambitious experimental evaluation of a universal group-based parenting support program; an evaluation that has not yet been made either in Denmark or internationally. ClinicalTrials.gov ID: NCT02294968. Registered November 14 2014.

  8. Evaluation of DNA extraction protocols for Brucella abortus pcr detection in aborted fetuses or calves born from cows experimentally infected with strain 2308

    PubMed Central

    Matrone, M.; Keid, L.B.; Rocha, V.C.M.; Vejarano, M.P.; Ikuta, C.Y.; Rodriguez, C.A.R.; Ferreira, F.; Dias, R.A.; Ferreira Neto, J.S

    2009-01-01

    The objective of the present study was to improve the detection of B. abortus by PCR in organs of aborted fetuses from infected cows, an important mechanism to find infected herds on the eradication phase of the program. So, different DNA extraction protocols were compared, focusing the PCR detection of B. abortus in clinical samples collected from aborted fetuses or calves born from cows challenged with the 2308 B. abortus strain. Therefore, two gold standard groups were built based on classical bacteriology, formed from: 32 lungs (17 positives), 26 spleens (11 positives), 23 livers (8 positives) and 22 bronchial lymph nodes (7 positives). All samples were submitted to three DNA extraction protocols, followed by the same amplification process with the primers B4 and B5. From the accumulated results for organ, the proportion of positives for the lungs was higher than the livers (p=0.04) or bronchial lymph nodes (p=0.004) and equal to the spleens (p=0.18). From the accumulated results for DNA extraction protocol, the proportion of positives for the Boom protocol was bigger than the PK (p< 0.0001) and GT (p=0.0004). There was no difference between the PK and GT protocols (p=0.5). Some positive samples from the classical bacteriology were negative to the PCR and vice-versa. Therefore, the best strategy for B. abortus detection in the organs of aborted fetuses or calves born from infected cows is the use, in parallel, of isolation by classical bacteriology and the PCR, with the DNA extraction performed by the Boom protocol. PMID:24031391

  9. Standardization of a Videofluoroscopic Swallow Study Protocol to Investigate Dysphagia in Dogs.

    PubMed

    Harris, R A; Grobman, M E; Allen, M J; Schachtel, J; Rawson, N E; Bennett, B; Ledyayev, J; Hopewell, B; Coates, J R; Reinero, C R; Lever, T E

    2017-03-01

    Videofluoroscopic swallow study (VFSS) is the gold standard for diagnosis of dysphagia in veterinary medicine but lacks standardized protocols that emulate physiologic feeding practices. Age impacts swallow function in humans but has not been evaluated by VFSS in dogs. To develop a protocol with custom kennels designed to allow free-feeding of 3 optimized formulations of contrast media and diets that address limitations of current VFSS protocols. We hypothesized that dogs evaluated by a free-feeding VFSS protocol would show differences in objective swallow metrics based on age. Healthy juvenile, adult, and geriatric dogs (n = 24). Prospective, experimental study. Custom kennels were developed to maintain natural feeding behaviors during VFSS. Three food consistencies (thin liquid, pureed food, and dry kibble) were formulated with either iohexol or barium to maximize palatability and voluntary prehension. Dogs were evaluated by 16 swallow metrics and compared across age groups. Development of a standardized VFSS protocol resulted in successful collection of swallow data in healthy dogs. No significant differences in swallow metrics were observed among age groups. Substantial variability was observed in healthy dogs when evaluated under these physiologic conditions. Features typically attributed to pathologic states, such as gastric reflux, were seen in healthy dogs. Development of a VFSS protocol that reflects natural feeding practices may allow emulation of physiology resulting in clinical signs of dysphagia. Age did not result in significant changes in swallow metrics, but additional studies are needed, particularly in light of substantial normal variation. Copyright © 2017 The Authors. Journal of Veterinary Internal Medicine published by Wiley Periodicals, Inc. on behalf of the American College of Veterinary Internal Medicine.

  10. A review of blood sample handling and pre-processing for metabolomics studies.

    PubMed

    Hernandes, Vinicius Veri; Barbas, Coral; Dudzik, Danuta

    2017-09-01

    Metabolomics has been found to be applicable to a wide range of clinical studies, bringing a new era for improving clinical diagnostics, early disease detection, therapy prediction and treatment efficiency monitoring. A major challenge in metabolomics, particularly untargeted studies, is the extremely diverse and complex nature of biological specimens. Despite great advances in the field there still exist fundamental needs for considering pre-analytical variability that can introduce bias to the subsequent analytical process and decrease the reliability of the results and moreover confound final research outcomes. Many researchers are mainly focused on the instrumental aspects of the biomarker discovery process, and sample related variables sometimes seem to be overlooked. To bridge the gap, critical information and standardized protocols regarding experimental design and sample handling and pre-processing are highly desired. Characterization of a range variation among sample collection methods is necessary to prevent results misinterpretation and to ensure that observed differences are not due to an experimental bias caused by inconsistencies in sample processing. Herein, a systematic discussion of pre-analytical variables affecting metabolomics studies based on blood derived samples is performed. Furthermore, we provide a set of recommendations concerning experimental design, collection, pre-processing procedures and storage conditions as a practical review that can guide and serve for the standardization of protocols and reduction of undesirable variation. © 2017 WILEY-VCH Verlag GmbH & Co. KGaA, Weinheim.

  11. A randomized trial of protocol-based care for early septic shock.

    PubMed

    Yealy, Donald M; Kellum, John A; Huang, David T; Barnato, Amber E; Weissfeld, Lisa A; Pike, Francis; Terndrup, Thomas; Wang, Henry E; Hou, Peter C; LoVecchio, Frank; Filbin, Michael R; Shapiro, Nathan I; Angus, Derek C

    2014-05-01

    In a single-center study published more than a decade ago involving patients presenting to the emergency department with severe sepsis and septic shock, mortality was markedly lower among those who were treated according to a 6-hour protocol of early goal-directed therapy (EGDT), in which intravenous fluids, vasopressors, inotropes, and blood transfusions were adjusted to reach central hemodynamic targets, than among those receiving usual care. We conducted a trial to determine whether these findings were generalizable and whether all aspects of the protocol were necessary. In 31 emergency departments in the United States, we randomly assigned patients with septic shock to one of three groups for 6 hours of resuscitation: protocol-based EGDT; protocol-based standard therapy that did not require the placement of a central venous catheter, administration of inotropes, or blood transfusions; or usual care. The primary end point was 60-day in-hospital mortality. We tested sequentially whether protocol-based care (EGDT and standard-therapy groups combined) was superior to usual care and whether protocol-based EGDT was superior to protocol-based standard therapy. Secondary outcomes included longer-term mortality and the need for organ support. We enrolled 1341 patients, of whom 439 were randomly assigned to protocol-based EGDT, 446 to protocol-based standard therapy, and 456 to usual care. Resuscitation strategies differed significantly with respect to the monitoring of central venous pressure and oxygen and the use of intravenous fluids, vasopressors, inotropes, and blood transfusions. By 60 days, there were 92 deaths in the protocol-based EGDT group (21.0%), 81 in the protocol-based standard-therapy group (18.2%), and 86 in the usual-care group (18.9%) (relative risk with protocol-based therapy vs. usual care, 1.04; 95% confidence interval [CI], 0.82 to 1.31; P=0.83; relative risk with protocol-based EGDT vs. protocol-based standard therapy, 1.15; 95% CI, 0.88 to 1.51; P=0.31). There were no significant differences in 90-day mortality, 1-year mortality, or the need for organ support. In a multicenter trial conducted in the tertiary care setting, protocol-based resuscitation of patients in whom septic shock was diagnosed in the emergency department did not improve outcomes. (Funded by the National Institute of General Medical Sciences; ProCESS ClinicalTrials.gov number, NCT00510835.).

  12. Design and fabrication of N-alkyl-polyethylenimine-stabilized iron oxide nanoclusters for gene delivery.

    PubMed

    Liu, Gang; Wang, Zhiyong; Lee, Seulki; Ai, Hua; Chen, Xiaoyuan

    2012-01-01

    With the rapid development of nanotechnology, inorganic magnetic nanoparticles, especially iron oxide nanoparticles (IOs), have emerged as great vehicles for biomedical diagnostic and therapeutic applications. In order to rationally design IO-based gene delivery nanovectors, surface modification is essential and determines the loading and release of the gene of interest. Here we highlight the basic concepts and applications of nonviral gene delivery vehicles based on low molecular weight N-alkyl polyethylenimine-stabilized IOs. The experimental protocols related to these topics are described in this chapter. Copyright © 2012 Elsevier Inc. All rights reserved.

  13. Stalking Antibiotic-Resistant Bacteria in Common Vegetables

    ERIC Educational Resources Information Center

    Brock, David; Boeke, Caroline; Josowitz, Rebecca; Loya, Katherine

    2004-01-01

    The study developed a simple experimental protocol for studying antibiotic resistant bacteria that will allow students to determine the proportion of such bacteria found on common fruit and vegetable crops. This protocol can open up the world of environmental science and show how human behavior can dramatically alter ecosystems.

  14. Performance Analysis of the HTTP Protocol on Geostationary Satellite Links

    NASA Technical Reports Server (NTRS)

    Krus, Hans; Allman, Mark; Griner, Jim; Tran, Diepchi

    1998-01-01

    Various issues associated with HTTP protocol on geostationary satellite links are presented in viewgraph form. Specific topics include: 1) Network reference points; 2) The HTTP 1.0 and 1.1 mechanisms; 3) Experimental setup; 4) TCP and HTTP configuration; 5) Modelling slow start and 6) Results and future work.

  15. Toward a single nursery protocol for oak seedlings

    Treesearch

    Paul P. Kormanik; Shi-Jean S. Sung; T.L. Kormanik

    1994-01-01

    After a soil fertility baseline had been determined for the Georgia Forestry Commission's (GFC) Morgan Nursery, and single nursery protocol consistently produced high quality oak seedlings. The fertility baseline developed at the Institute of Tree Root Biology's Whitehall Experimental Nursery and adjusted for three GFC nurseries has a background target level...

  16. Situated Naive Physics: Task Constraints Decide What Children Know about Density

    ERIC Educational Resources Information Center

    Kloos, Heidi; Fisher, Anna; Van Orden, Guy C.

    2010-01-01

    Children's understanding of density is riddled with misconceptions--or so it seems. Yet even preschoolers at times appear to understand density. This article seeks to reconcile these conflicting outcomes by investigating the nature of constraints available in different experimental protocols. Protocols that report misconceptions about density used…

  17. Zone-Based Routing Protocol for Wireless Sensor Networks

    PubMed Central

    Venkateswarlu Kumaramangalam, Muni; Adiyapatham, Kandasamy; Kandasamy, Chandrasekaran

    2014-01-01

    Extensive research happening across the globe witnessed the importance of Wireless Sensor Network in the present day application world. In the recent past, various routing algorithms have been proposed to elevate WSN network lifetime. Clustering mechanism is highly successful in conserving energy resources for network activities and has become promising field for researches. However, the problem of unbalanced energy consumption is still open because the cluster head activities are tightly coupled with role and location of a particular node in the network. Several unequal clustering algorithms are proposed to solve this wireless sensor network multihop hot spot problem. Current unequal clustering mechanisms consider only intra- and intercluster communication cost. Proper organization of wireless sensor network into clusters enables efficient utilization of limited resources and enhances lifetime of deployed sensor nodes. This paper considers a novel network organization scheme, energy-efficient edge-based network partitioning scheme, to organize sensor nodes into clusters of equal size. Also, it proposes a cluster-based routing algorithm, called zone-based routing protocol (ZBRP), for elevating sensor network lifetime. Experimental results show that ZBRP out-performs interims of network lifetime and energy conservation with its uniform energy consumption among the cluster heads. PMID:27437455

  18. Zone-Based Routing Protocol for Wireless Sensor Networks.

    PubMed

    Venkateswarlu Kumaramangalam, Muni; Adiyapatham, Kandasamy; Kandasamy, Chandrasekaran

    2014-01-01

    Extensive research happening across the globe witnessed the importance of Wireless Sensor Network in the present day application world. In the recent past, various routing algorithms have been proposed to elevate WSN network lifetime. Clustering mechanism is highly successful in conserving energy resources for network activities and has become promising field for researches. However, the problem of unbalanced energy consumption is still open because the cluster head activities are tightly coupled with role and location of a particular node in the network. Several unequal clustering algorithms are proposed to solve this wireless sensor network multihop hot spot problem. Current unequal clustering mechanisms consider only intra- and intercluster communication cost. Proper organization of wireless sensor network into clusters enables efficient utilization of limited resources and enhances lifetime of deployed sensor nodes. This paper considers a novel network organization scheme, energy-efficient edge-based network partitioning scheme, to organize sensor nodes into clusters of equal size. Also, it proposes a cluster-based routing algorithm, called zone-based routing protocol (ZBRP), for elevating sensor network lifetime. Experimental results show that ZBRP out-performs interims of network lifetime and energy conservation with its uniform energy consumption among the cluster heads.

  19. Identification of novel drug scaffolds for inhibition of SARS-CoV 3-Chymotrypsin-like protease using virtual and high-throughput screenings.

    PubMed

    Lee, Hyun; Mittal, Anuradha; Patel, Kavankumar; Gatuz, Joseph L; Truong, Lena; Torres, Jaime; Mulhearn, Debbie C; Johnson, Michael E

    2014-01-01

    We have used a combination of virtual screening (VS) and high-throughput screening (HTS) techniques to identify novel, non-peptidic small molecule inhibitors against human SARS-CoV 3CLpro. A structure-based VS approach integrating docking and pharmacophore based methods was employed to computationally screen 621,000 compounds from the ZINC library. The screening protocol was validated using known 3CLpro inhibitors and was optimized for speed, improved selectivity, and for accommodating receptor flexibility. Subsequently, a fluorescence-based enzymatic HTS assay was developed and optimized to experimentally screen approximately 41,000 compounds from four structurally diverse libraries chosen mainly based on the VS results. False positives from initial HTS hits were eliminated by a secondary orthogonal binding analysis using surface plasmon resonance (SPR). The campaign identified a reversible small molecule inhibitor exhibiting mixed-type inhibition with a K(i) value of 11.1 μM. Together, these results validate our protocols as suitable approaches to screen virtual and chemical libraries, and the newly identified compound reported in our study represents a promising structural scaffold to pursue for further SARS-CoV 3CLpro inhibitor development. Copyright © 2013. Published by Elsevier Ltd.

  20. Superfluid qubit systems with ring shaped optical lattices

    PubMed Central

    Amico, Luigi; Aghamalyan, Davit; Auksztol, Filip; Crepaz, Herbert; Dumke, Rainer; Kwek, Leong Chuan

    2014-01-01

    We study an experimentally feasible qubit system employing neutral atomic currents. Our system is based on bosonic cold atoms trapped in ring-shaped optical lattice potentials. The lattice makes the system strictly one dimensional and it provides the infrastructure to realize a tunable ring-ring interaction. Our implementation combines the low decoherence rates of neutral cold atoms systems, overcoming single site addressing, with the robustness of topologically protected solid state Josephson flux qubits. Characteristic fluctuations in the magnetic fields affecting Josephson junction based flux qubits are expected to be minimized employing neutral atoms as flux carriers. By breaking the Galilean invariance we demonstrate how atomic currents through the lattice provide an implementation of a qubit. This is realized either by artificially creating a phase slip in a single ring, or by tunnel coupling of two homogeneous ring lattices. The single qubit infrastructure is experimentally investigated with tailored optical potentials. Indeed, we have experimentally realized scaled ring-lattice potentials that could host, in principle, n ~ 10 of such ring-qubits, arranged in a stack configuration, along the laser beam propagation axis. An experimentally viable scheme of the two-ring-qubit is discussed, as well. Based on our analysis, we provide protocols to initialize, address, and read-out the qubit. PMID:24599096

  1. Experimental demonstration of the anti-maser

    NASA Astrophysics Data System (ADS)

    Mazzocco, Anthony; Aviles, Michael; Andrews, Jim; Dawson, Nathan; Crescimanno, Michael

    2012-10-01

    We denote by ``anti-maser'' a coherent perfect absorption (CPA) process in the radio frequency domain. We demonstrate several experimental realizations of the anti-maser suitable for an advanced undergraduate laboratory. Students designed, assembled and tested these devices, as well as the inexpensive laboratory setup and experimental protocol for displaying various CPA phenomenon.

  2. 75 FR 23775 - Agency Information Collection Activities; Proposed Collection; Comment Request; Experimental...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-05-04

    ... for research entitled ``Experimental Study of Patient Information Prototypes.'' This study is designed..., the working group refined several prototypes and designed a study to investigate the usefulness of... Design and Protocol The study is experimental and will have two independent variables in a 3 x 2 design...

  3. Model Based Optimal Control, Estimation, and Validation of Lithium-Ion Batteries

    NASA Astrophysics Data System (ADS)

    Perez, Hector Eduardo

    This dissertation focuses on developing and experimentally validating model based control techniques to enhance the operation of lithium ion batteries, safely. An overview of the contributions to address the challenges that arise are provided below. Chapter 1: This chapter provides an introduction to battery fundamentals, models, and control and estimation techniques. Additionally, it provides motivation for the contributions of this dissertation. Chapter 2: This chapter examines reference governor (RG) methods for satisfying state constraints in Li-ion batteries. Mathematically, these constraints are formulated from a first principles electrochemical model. Consequently, the constraints explicitly model specific degradation mechanisms, such as lithium plating, lithium depletion, and overheating. This contrasts with the present paradigm of limiting measured voltage, current, and/or temperature. The critical challenges, however, are that (i) the electrochemical states evolve according to a system of nonlinear partial differential equations, and (ii) the states are not physically measurable. Assuming available state and parameter estimates, this chapter develops RGs for electrochemical battery models. The results demonstrate how electrochemical model state information can be utilized to ensure safe operation, while simultaneously enhancing energy capacity, power, and charge speeds in Li-ion batteries. Chapter 3: Complex multi-partial differential equation (PDE) electrochemical battery models are characterized by parameters that are often difficult to measure or identify. This parametric uncertainty influences the state estimates of electrochemical model-based observers for applications such as state-of-charge (SOC) estimation. This chapter develops two sensitivity-based interval observers that map bounded parameter uncertainty to state estimation intervals, within the context of electrochemical PDE models and SOC estimation. Theoretically, this chapter extends the notion of interval observers to PDE models using a sensitivity-based approach. Practically, this chapter quantifies the sensitivity of battery state estimates to parameter variations, enabling robust battery management schemes. The effectiveness of the proposed sensitivity-based interval observers is verified via a numerical study for the range of uncertain parameters. Chapter 4: This chapter seeks to derive insight on battery charging control using electrochemistry models. Directly using full order complex multi-partial differential equation (PDE) electrochemical battery models is difficult and sometimes impossible to implement. This chapter develops an approach for obtaining optimal charge control schemes, while ensuring safety through constraint satisfaction. An optimal charge control problem is mathematically formulated via a coupled reduced order electrochemical-thermal model which conserves key electrochemical and thermal state information. The Legendre-Gauss-Radau (LGR) pseudo-spectral method with adaptive multi-mesh-interval collocation is employed to solve the resulting nonlinear multi-state optimal control problem. Minimum time charge protocols are analyzed in detail subject to solid and electrolyte phase concentration constraints, as well as temperature constraints. The optimization scheme is examined using different input current bounds, and an insight on battery design for fast charging is provided. Experimental results are provided to compare the tradeoffs between an electrochemical-thermal model based optimal charge protocol and a traditional charge protocol. Chapter 5: Fast and safe charging protocols are crucial for enhancing the practicality of batteries, especially for mobile applications such as smartphones and electric vehicles. This chapter proposes an innovative approach to devising optimally health-conscious fast-safe charge protocols. A multi-objective optimal control problem is mathematically formulated via a coupled electro-thermal-aging battery model, where electrical and aging sub-models depend upon the core temperature captured by a two-state thermal sub-model. The Legendre-Gauss-Radau (LGR) pseudo-spectral method with adaptive multi-mesh-interval collocation is employed to solve the resulting highly nonlinear six-state optimal control problem. Charge time and health degradation are therefore optimally traded off, subject to both electrical and thermal constraints. Minimum-time, minimum-aging, and balanced charge scenarios are examined in detail. Sensitivities to the upper voltage bound, ambient temperature, and cooling convection resistance are investigated as well. Experimental results are provided to compare the tradeoffs between a balanced and traditional charge protocol. Chapter 6: This chapter provides concluding remarks on the findings of this dissertation and a discussion of future work.

  4. Security of Y-00 and Similar Quantum Cryptographic Protocols

    DTIC Science & Technology

    2004-11-16

    security of Y-00 type protocols is clarified. Key words: Quantum cryptography PACS: 03.67.Dd Anew approach to quantum cryptog- raphy called KCQ, ( keyed ...classical- noise key generation [2] or the well known BB84 quantum protocol [3]. A special case called αη (or Y-00 in Japan) has been experimentally in... quantum noise for typical op- erating parameters. It weakens both the data and key security , possibly information-theoretically and cer- tainly

  5. La-CTP: Loop-Aware Routing for Energy-Harvesting Wireless Sensor Networks.

    PubMed

    Sun, Guodong; Shang, Xinna; Zuo, Yan

    2018-02-02

    In emerging energy-harvesting wireless sensor networks (EH-WSN), the sensor nodes can harvest environmental energy to drive their operation, releasing the user's burden in terms of frequent battery replacement, and even enabling perpetual sensing systems. In EH-WSN applications, usually, the node in energy-harvesting or recharging state has to stop working until it completes the energy replenishment. However, such temporary departures of recharging nodes severely impact the packet routing, and one immediate result is the routing loop problem. Controlling loops in connectivity-intermittent EH-WSN in an efficient way is a big challenge in practice, and so far, users still lack of effective and practicable routing protocols with loop handling. Based on the Collection Tree Protocol (CTP) widely used in traditional wireless sensor networks, this paper proposes a loop-aware routing protocol for real-world EH-WSNs, called La-CTP, which involves a new parent updating metric and a proactive, adaptive beaconing scheme to effectively suppress the occurrence of loops and unlock unavoidable loops, respectively. We constructed a 100-node testbed to evaluate La-CTP, and the experimental results showed its efficacy and efficiency.

  6. Innovative Approaches for Immune Tolerance to Factor VIII in the Treatment of Hemophilia A

    PubMed Central

    Sherman, Alexandra; Biswas, Moanaro; Herzog, Roland W.

    2017-01-01

    Hemophilia A (coagulation factor VIII deficiency) is a debilitating genetic disorder that is primarily treated with intravenous replacement therapy. Despite a variety of factor VIII protein formulations available, the risk of developing anti-dug antibodies (“inhibitors”) remains. Overall, 20–30% of patients with severe disease develop inhibitors. Current clinical immune tolerance induction protocols to eliminate inhibitors are not effective in all patients, and there are no prophylactic protocols to prevent the immune response. New experimental therapies, such as gene and cell therapies, show promising results in pre-clinical studies in animal models of hemophilia. Examples include hepatic gene transfer with viral vectors, genetically engineered regulatory T cells (Treg), in vivo Treg induction using immune modulatory drugs, and maternal antigen transfer. Furthermore, an oral tolerance protocol is being developed based on transgenic lettuce plants, which suppressed inhibitor formation in hemophilic mice and dogs. Hopefully, some of these innovative approaches will reduce the risk of and/or more effectively eliminate inhibitor formation in future treatment of hemophilia A. PMID:29225598

  7. Secure Communications

    NASA Astrophysics Data System (ADS)

    Bellac, Michel Le

    2014-11-01

    The first practical application of quantum physics examined in this book is quantum cryptography. Quantum cryptography is a relatively recent invention (it dates back from the mid 1980s) but I chose it because it allows me to illustrate the fundamental principles with a minimum number of intermediate steps. I shall begin with a short summary of classical cryptography, reviewing briefly the two systems which are currently used today: the secret key system and the public key system. Quantum cryptography is not a new method for dissimulating the meaning of a message, but it allows one to be certain that no spy has accessed it. There exist many quantum cryptography protocols and various experimental devices have been proposed for implementing them. The simplest device is based on polarization, a concept which will be introduced first in the case of of light polarization, and then in that of photon polarization. The use of photon polarization gives the simplest implementation of the protocol proposed in 1984 by Bennett and Brassard, which is known by the acronym formed with their initials, the BB84 protocol.

  8. Addendum to the AAPM's TG-51 protocol for clinical reference dosimetry of high-energy photon beams

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    McEwen, Malcolm, E-mail: malcolm.mcewen@nrc-cnrc.gc.ca; DeWerd, Larry; Ibbott, Geoffrey

    2014-04-15

    An addendum to the AAPM's TG-51 protocol for the determination of absorbed dose to water in megavoltage photon beams is presented. This addendum continues the procedure laid out in TG-51 but new k{sub Q} data for photon beams, based on Monte Carlo simulations, are presented and recommendations are given to improve the accuracy and consistency of the protocol's implementation. The components of the uncertainty budget in determining absorbed dose to water at the reference point are introduced and the magnitude of each component discussed. Finally, the consistency of experimental determination of N{sub D,w} coefficients is discussed. It is expected thatmore » the implementation of this addendum will be straightforward, assuming that the user is already familiar with TG-51. The changes introduced by this report are generally minor, although new recommendations could result in procedural changes for individual users. It is expected that the effort on the medical physicist's part to implement this addendum will not be significant and could be done as part of the annual linac calibration.« less

  9. Secure polarization-independent subcarrier quantum key distribution in optical fiber channel using BB84 protocol with a strong reference.

    PubMed

    Gleim, A V; Egorov, V I; Nazarov, Yu V; Smirnov, S V; Chistyakov, V V; Bannik, O I; Anisimov, A A; Kynev, S M; Ivanova, A E; Collins, R J; Kozlov, S A; Buller, G S

    2016-02-08

    A quantum key distribution system based on the subcarrier wave modulation method has been demonstrated which employs the BB84 protocol with a strong reference to generate secure bits at a rate of 16.5 kbit/s with an error of 0.5% over an optical channel of 10 dB loss, and 18 bits/s with an error of 0.75% over 25 dB of channel loss. To the best of our knowledge, these results represent the highest channel loss reported for secure quantum key distribution using the subcarrier wave approach. A passive unidirectional scheme has been used to compensate for the polarization dependence of the phase modulators in the receiver module, which resulted in a high visibility of 98.8%. The system is thus fully insensitive to polarization fluctuations and robust to environmental changes, making the approach promising for use in optical telecommunication networks. Further improvements in secure key rate and transmission distance can be achieved by implementing the decoy states protocol or by optimizing the mean photon number used in line with experimental parameters.

  10. Small-molecule ligand docking into comparative models with Rosetta

    PubMed Central

    Combs, Steven A; DeLuca, Samuel L; DeLuca, Stephanie H; Lemmon, Gordon H; Nannemann, David P; Nguyen, Elizabeth D; Willis, Jordan R; Sheehan, Jonathan H; Meiler, Jens

    2017-01-01

    Structure-based drug design is frequently used to accelerate the development of small-molecule therapeutics. Although substantial progress has been made in X-ray crystallography and nuclear magnetic resonance (NMR) spectroscopy, the availability of high-resolution structures is limited owing to the frequent inability to crystallize or obtain sufficient NMR restraints for large or flexible proteins. Computational methods can be used to both predict unknown protein structures and model ligand interactions when experimental data are unavailable. This paper describes a comprehensive and detailed protocol using the Rosetta modeling suite to dock small-molecule ligands into comparative models. In the protocol presented here, we review the comparative modeling process, including sequence alignment, threading and loop building. Next, we cover docking a small-molecule ligand into the protein comparative model. In addition, we discuss criteria that can improve ligand docking into comparative models. Finally, and importantly, we present a strategy for assessing model quality. The entire protocol is presented on a single example selected solely for didactic purposes. The results are therefore not representative and do not replace benchmarks published elsewhere. We also provide an additional tutorial so that the user can gain hands-on experience in using Rosetta. The protocol should take 5–7 h, with additional time allocated for computer generation of models. PMID:23744289

  11. Developing Ubiquitous Sensor Network Platform Using Internet of Things: Application in Precision Agriculture.

    PubMed

    Ferrández-Pastor, Francisco Javier; García-Chamizo, Juan Manuel; Nieto-Hidalgo, Mario; Mora-Pascual, Jerónimo; Mora-Martínez, José

    2016-07-22

    The application of Information Technologies into Precision Agriculture methods has clear benefits. Precision Agriculture optimises production efficiency, increases quality, minimises environmental impact and reduces the use of resources (energy, water); however, there are different barriers that have delayed its wide development. Some of these main barriers are expensive equipment, the difficulty to operate and maintain and the standard for sensor networks are still under development. Nowadays, new technological development in embedded devices (hardware and communication protocols), the evolution of Internet technologies (Internet of Things) and ubiquitous computing (Ubiquitous Sensor Networks) allow developing less expensive systems, easier to control, install and maintain, using standard protocols with low-power consumption. This work develops and test a low-cost sensor/actuator network platform, based in Internet of Things, integrating machine-to-machine and human-machine-interface protocols. Edge computing uses this multi-protocol approach to develop control processes on Precision Agriculture scenarios. A greenhouse with hydroponic crop production was developed and tested using Ubiquitous Sensor Network monitoring and edge control on Internet of Things paradigm. The experimental results showed that the Internet technologies and Smart Object Communication Patterns can be combined to encourage development of Precision Agriculture. They demonstrated added benefits (cost, energy, smart developing, acceptance by agricultural specialists) when a project is launched.

  12. Predicting Silk Fiber Mechanical Properties through Multiscale Simulation and Protein Design.

    PubMed

    Rim, Nae-Gyune; Roberts, Erin G; Ebrahimi, Davoud; Dinjaski, Nina; Jacobsen, Matthew M; Martín-Moldes, Zaira; Buehler, Markus J; Kaplan, David L; Wong, Joyce Y

    2017-08-14

    Silk is a promising material for biomedical applications, and much research is focused on how application-specific, mechanical properties of silk can be designed synthetically through proper amino acid sequences and processing parameters. This protocol describes an iterative process between research disciplines that combines simulation, genetic synthesis, and fiber analysis to better design silk fibers with specific mechanical properties. Computational methods are used to assess the protein polymer structure as it forms an interconnected fiber network through shearing and how this process affects fiber mechanical properties. Model outcomes are validated experimentally with the genetic design of protein polymers that match the simulation structures, fiber fabrication from these polymers, and mechanical testing of these fibers. Through iterative feedback between computation, genetic synthesis, and fiber mechanical testing, this protocol will enable a priori prediction capability of recombinant material mechanical properties via insights from the resulting molecular architecture of the fiber network based entirely on the initial protein monomer composition. This style of protocol may be applied to other fields where a research team seeks to design a biomaterial with biomedical application-specific properties. This protocol highlights when and how the three research groups (simulation, synthesis, and engineering) should be interacting to arrive at the most effective method for predictive design of their material.

  13. Experimental parameter identification of a multi-scale musculoskeletal model controlled by electrical stimulation: application to patients with spinal cord injury.

    PubMed

    Benoussaad, Mourad; Poignet, Philippe; Hayashibe, Mitsuhiro; Azevedo-Coste, Christine; Fattal, Charles; Guiraud, David

    2013-06-01

    We investigated the parameter identification of a multi-scale physiological model of skeletal muscle, based on Huxley's formulation. We focused particularly on the knee joint controlled by quadriceps muscles under electrical stimulation (ES) in subjects with a complete spinal cord injury. A noninvasive and in vivo identification protocol was thus applied through surface stimulation in nine subjects and through neural stimulation in one ES-implanted subject. The identification protocol included initial identification steps, which are adaptations of existing identification techniques to estimate most of the parameters of our model. Then we applied an original and safer identification protocol in dynamic conditions, which required resolution of a nonlinear programming (NLP) problem to identify the serial element stiffness of quadriceps. Each identification step and cross validation of the estimated model in dynamic condition were evaluated through a quadratic error criterion. The results highlighted good accuracy, the efficiency of the identification protocol and the ability of the estimated model to predict the subject-specific behavior of the musculoskeletal system. From the comparison of parameter values between subjects, we discussed and explored the inter-subject variability of parameters in order to select parameters that have to be identified in each patient.

  14. Developing Ubiquitous Sensor Network Platform Using Internet of Things: Application in Precision Agriculture

    PubMed Central

    Ferrández-Pastor, Francisco Javier; García-Chamizo, Juan Manuel; Nieto-Hidalgo, Mario; Mora-Pascual, Jerónimo; Mora-Martínez, José

    2016-01-01

    The application of Information Technologies into Precision Agriculture methods has clear benefits. Precision Agriculture optimises production efficiency, increases quality, minimises environmental impact and reduces the use of resources (energy, water); however, there are different barriers that have delayed its wide development. Some of these main barriers are expensive equipment, the difficulty to operate and maintain and the standard for sensor networks are still under development. Nowadays, new technological development in embedded devices (hardware and communication protocols), the evolution of Internet technologies (Internet of Things) and ubiquitous computing (Ubiquitous Sensor Networks) allow developing less expensive systems, easier to control, install and maintain, using standard protocols with low-power consumption. This work develops and test a low-cost sensor/actuator network platform, based in Internet of Things, integrating machine-to-machine and human-machine-interface protocols. Edge computing uses this multi-protocol approach to develop control processes on Precision Agriculture scenarios. A greenhouse with hydroponic crop production was developed and tested using Ubiquitous Sensor Network monitoring and edge control on Internet of Things paradigm. The experimental results showed that the Internet technologies and Smart Object Communication Patterns can be combined to encourage development of Precision Agriculture. They demonstrated added benefits (cost, energy, smart developing, acceptance by agricultural specialists) when a project is launched. PMID:27455265

  15. A neurocognitive approach for recovering upper extremity movement following subacute stroke: a randomized controlled pilot study.

    PubMed

    Sallés, Laia; Martín-Casas, Patricia; Gironès, Xavier; Durà, María José; Lafuente, José Vicente; Perfetti, Carlo

    2017-04-01

    [Purpose] This study aims to describe a protocol based on neurocognitive therapeutic exercises and determine its feasibility and usefulness for upper extremity functionality when compared with a conventional protocol. [Subjects and Methods] Eight subacute stroke patients were randomly assigned to a conventional (control group) or neurocognitive (experimental group) treatment protocol. Both lasted 30 minutes, 3 times a week for 10 weeks and assessments were blinded. Outcome measures included: Motor Evaluation Scale for Upper Extremity in Stroke Patients, Motricity Index, Revised Nottingham Sensory Assessment and Kinesthetic and Visual Imagery Questionnaire. Descriptive measures and nonparametric statistical tests were used for analysis. [Results] The results indicate a more favorable clinical progression in the neurocognitive group regarding upper extremity functional capacity with achievement of the minimal detectable change. The functionality results are related with improvements on muscle strength and sensory discrimination (tactile and kinesthetic). [Conclusion] Despite not showing significant group differences between pre and post-treatment, the neurocognitive approach could be a safe and useful strategy for recovering upper extremity movement following stroke, especially regarding affected hands, with better and longer lasting results. Although this work shows this protocol's feasibility with the panel of scales proposed, larger studies are required to demonstrate its effectiveness.

  16. [Benefits of Decumanum Phlebodium intake on the muscle damage in the response to intense physical exercise in sedentary subjects].

    PubMed

    Vargas Corzo, M C; Aguilar Cordero, M J; de Teresa Galván, C; Segura Millán, D; Miranda Leon, M T; Castillo Rueda, G; Guisado Barrilao, R

    2014-06-01

    Intense physical exercise provoke muscle damage, that in sedentary people can increase cardiovascular risk. Phlebodium decumanum (PD) has shown to have immunomodulator effects in models of moderate intense physical activities in well conditioned groups. To evaluate the PD effects during eccentric exercise, as a model of muscle inflammation protocol, on a sedentary population with cardiovascular risk. This is an experimental, double-blind, multigroup randomized study. Experimental Group 1 (n = 17)received PD, 9 doses of 400 mg (total amount 3.6 g) every 8 hours during 3 days, and Control Group 2 (n = 16)received a placebo. All the subjects performed two treadmill ergoespirometry tests: first, a modified Bruce protocol to discard ischemic responses during exercise and to evaluate VO2max before the experimental phase;and second, with an eccentric protocol (14% descending ramp test) during 10 minutes in stable state at 70-80%VO2max, as experimental inflammatory protocol.We compared intra and inter groups to evaluate differences in the pre and post-test differences results on blood muscle damage variables. The study shown statistically significant differences in all pre-post intra-groups results in muscle damage variables (CK, LDH and Myoglobin, but not in Cardiac Troponin), and in functional lower-limb test (SJand CMJ). The comparison of inter-group results shown less muscle damage and less functional lower-limb deterioration in Group 1 compared with Control group, with statistical significance in both cases. Differences in handgrip dynamometry were no statistically significant. The eccentric exercise protocol in that study has proven to be a good model to induce muscle and functional damage in sedentary people. Short PD treatment has shown to reduce muscle and functional acute damages compared with placebo control group in this specific population. Copyright AULA MEDICA EDICIONES 2014. Published by AULA MEDICA. All rights reserved.

  17. Summary of: Regenerative endodontics.

    PubMed

    Clark, Stephen J

    2014-03-01

    Significant advances in our understanding of the biological processes involved in tooth development and repair at the cellular and molecular levels have underpinned the newly emerging area of regenerative endodontics. Development of treatment protocols based on exploiting the natural wound healing properties of the dental pulp and applying tissue engineering principles has allowed reporting of case series showing preservation of tissue vitality and apexogenesis. To review current case series reporting regenerative endodontics. Current treatment approaches tend to stimulate more reparative than regenerative responses in respect of the new tissue generated, which often does not closely resemble the physiological structure of dentine-pulp. However, despite these biological limitations, such techniques appear to offer significant promise for improved treatment outcomes. Improved biological outcomes will likely emerge from the many experimental studies being reported and will further contribute to improvements in clinical treatment protocols.

  18. Experimentally feasible security check for n-qubit quantum secret sharing

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Schauer, Stefan; Huber, Marcus; Hiesmayr, Beatrix C.

    In this article we present a general security strategy for quantum secret sharing (QSS) protocols based on the scheme presented by Hillery, Buzek, and Berthiaume (HBB) [Phys. Rev. A 59, 1829 (1999)]. We focus on a generalization of the HBB protocol to n communication parties thus including n-partite Greenberger-Horne-Zeilinger states. We show that the multipartite version of the HBB scheme is insecure in certain settings and impractical when going to large n. To provide security for such QSS schemes in general we use the framework presented by some of the authors [M. Huber, F. Mintert, A. Gabriel, B. C. Hiesmayr,more » Phys. Rev. Lett. 104, 210501 (2010)] to detect certain genuine n-partite entanglement between the communication parties. In particular, we present a simple inequality which tests the security.« less

  19. Melanins and melanogenesis: methods, standards, protocols.

    PubMed

    d'Ischia, Marco; Wakamatsu, Kazumasa; Napolitano, Alessandra; Briganti, Stefania; Garcia-Borron, José-Carlos; Kovacs, Daniela; Meredith, Paul; Pezzella, Alessandro; Picardo, Mauro; Sarna, Tadeusz; Simon, John D; Ito, Shosuke

    2013-09-01

    Despite considerable advances in the past decade, melanin research still suffers from the lack of universally accepted and shared nomenclature, methodologies, and structural models. This paper stems from the joint efforts of chemists, biochemists, physicists, biologists, and physicians with recognized and consolidated expertise in the field of melanins and melanogenesis, who critically reviewed and experimentally revisited methods, standards, and protocols to provide for the first time a consensus set of recommended procedures to be adopted and shared by researchers involved in pigment cell research. The aim of the paper was to define an unprecedented frame of reference built on cutting-edge knowledge and state-of-the-art methodology, to enable reliable comparison of results among laboratories and new progress in the field based on standardized methods and shared information. © 2013 John Wiley & Sons A/S. Published by John Wiley & Sons Ltd.

  20. Automated recycling of chemistry for virtual screening and library design.

    PubMed

    Vainio, Mikko J; Kogej, Thierry; Raubacher, Florian

    2012-07-23

    An early stage drug discovery project needs to identify a number of chemically diverse and attractive compounds. These hit compounds are typically found through high-throughput screening campaigns. The diversity of the chemical libraries used in screening is therefore important. In this study, we describe a virtual high-throughput screening system called Virtual Library. The system automatically "recycles" validated synthetic protocols and available starting materials to generate a large number of virtual compound libraries, and allows for fast searches in the generated libraries using a 2D fingerprint based screening method. Virtual Library links the returned virtual hit compounds back to experimental protocols to quickly assess the synthetic accessibility of the hits. The system can be used as an idea generator for library design to enrich the screening collection and to explore the structure-activity landscape around a specific active compound.

  1. Development of an optimized protocol for the detection of classical swine fever virus in formalin-fixed, paraffin-embedded tissues by seminested reverse transcription-polymerase chain reaction and comparison with in situ hybridization.

    PubMed

    Ha, S-K; Choi, C; Chae, C

    2004-10-01

    An optimized protocol was developed for the detection of classical swine fever virus (CSFV) in formalin-fixed, paraffin-embedded tissues obtained from experimentally and naturally infected pigs by seminested reverse transcription-polymerase chain reaction (RT-PCR). The results for seminested RT-PCR were compared with those determined by in situ hybridization. The results obtained show that the use of deparaffinization with xylene, digestion with proteinase K, extraction with Trizol LS, followed by seminested RT-PCR is a reliable detection method. An increase in sensitivity was observed as amplicon size decreased. The highest sensitivity for RT-PCR on formalin-fixed, paraffin-embedded tissues RNA was obtained with amplicon sizes less than approximately 200 base pairs. An hybridization signal for CSFV was detected in lymph nodes from 12 experimentally and 12 naturally infected pigs. The sensitivity of seminested RT-PCR compared with in situ hybridization was 100% for CSFV. When only formalin-fixed tissues are available, seminested RT-PCR and in situ hybridization would be useful diagnostic methods for the detection of CSFV nucleic acid.

  2. A linear concatenation strategy to construct 5'-enriched amplified cDNA libraries using multiple displacement amplification.

    PubMed

    Gadkar, Vijay J; Filion, Martin

    2013-06-01

    In various experimental systems, limiting available amounts of RNA may prevent a researcher from performing large-scale analyses of gene transcripts. One way to circumvent this is to 'pre-amplify' the starting RNA/cDNA, so that sufficient amounts are available for any downstream analysis. In the present study, we report the development of a novel protocol for constructing amplified cDNA libraries using the Phi29 DNA polymerase based multiple displacement amplification (MDA) system. Using as little as 200 ng of total RNA, we developed a linear concatenation strategy to make the single-stranded cDNA template amenable for MDA. The concatenation, made possible by the template switching property of the reverse transcriptase enzyme, resulted in the amplified cDNA library with intact 5' ends. MDA generated micrograms of template, allowing large-scale polymerase chain reaction analyses or other large-scale downstream applications. As the amplified cDNA library contains intact 5' ends, it is also compatible with 5' RACE analyses of specific gene transcripts. Empirical validation of this protocol is demonstrated on a highly characterized (tomato) and an uncharacterized (corn gromwell) experimental system.

  3. Estimation of Nanodiamond Surface Charge Density from Zeta Potential and Molecular Dynamics Simulations.

    PubMed

    Ge, Zhenpeng; Wang, Yi

    2017-04-20

    Molecular dynamics simulations of nanoparticles (NPs) are increasingly used to study their interactions with various biological macromolecules. Such simulations generally require detailed knowledge of the surface composition of the NP under investigation. Even for some well-characterized nanoparticles, however, this knowledge is not always available. An example is nanodiamond, a nanoscale diamond particle with surface dominated by oxygen-containing functional groups. In this work, we explore using the harmonic restraint method developed by Venable et al., to estimate the surface charge density (σ) of nanodiamonds. Based on the Gouy-Chapman theory, we convert the experimentally determined zeta potential of a nanodiamond to an effective charge density (σ eff ), and then use the latter to estimate σ via molecular dynamics simulations. Through scanning a series of nanodiamond models, we show that the above method provides a straightforward protocol to determine the surface charge density of relatively large (> ∼100 nm) NPs. Overall, our results suggest that despite certain limitation, the above protocol can be readily employed to guide the model construction for MD simulations, which is particularly useful when only limited experimental information on the NP surface composition is available to a modeler.

  4. Rational design of small-molecule stabilizers of spermine synthase dimer by virtual screening and free energy-based approach.

    PubMed

    Zhang, Zhe; Martiny, Virginie; Lagorce, David; Ikeguchi, Yoshihiko; Alexov, Emil; Miteva, Maria A

    2014-01-01

    Snyder-Robinson Syndrome (SRS) is a rare mental retardation disorder which is caused by the malfunctioning of an enzyme, the spermine synthase (SMS), which functions as a homo-dimer. The malfunctioning of SMS in SRS patients is associated with several identified missense mutations that occur away from the active site. This investigation deals with a particular SRS-causing mutation, the G56S mutation, which was shown computationally and experimentally to destabilize the SMS homo-dimer and thus to abolish SMS enzymatic activity. As a proof-of-concept, we explore the possibility to restore the enzymatic activity of the malfunctioning SMS mutant G56S by stabilizing the dimer through small molecule binding at the mutant homo-dimer interface. For this purpose, we designed an in silico protocol that couples virtual screening and a free binding energy-based approach to identify potential small-molecule binders on the destabilized G56S dimer, with the goal to stabilize it and thus to increase SMS G56S mutant activity. The protocol resulted in extensive list of plausible stabilizers, among which we selected and tested 51 compounds experimentally for their capability to increase SMS G56S mutant enzymatic activity. In silico analysis of the experimentally identified stabilizers suggested five distinctive chemical scaffolds. This investigation suggests that druggable pockets exist in the vicinity of the mutation sites at protein-protein interfaces which can be used to alter the disease-causing effects by small molecule binding. The identified chemical scaffolds are drug-like and can serve as original starting points for development of lead molecules to further rescue the disease-causing effects of the Snyder-Robinson syndrome for which no efficient treatment exists up to now.

  5. Families of quantum fingerprinting protocols

    NASA Astrophysics Data System (ADS)

    Lovitz, Benjamin; Lütkenhaus, Norbert

    2018-03-01

    We introduce several families of quantum fingerprinting protocols to evaluate the equality function on two n -bit strings in the simultaneous message passing model. The original quantum fingerprinting protocol uses a tensor product of a small number of O (logn ) -qubit high-dimensional signals [H. Buhrman et al., Phys. Rev. Lett. 87, 167902 (2001), 10.1103/PhysRevLett.87.167902], whereas a recently proposed optical protocol uses a tensor product of O (n ) single-qubit signals, while maintaining the O (logn ) information leakage of the original protocol [J. M. Arazola and N. Lütkenhaus, Phys. Rev. A 89, 062305 (2014), 10.1103/PhysRevA.89.062305]. We find a family of protocols which interpolate between the original and optical protocols while maintaining the O (logn ) information leakage, thus demonstrating a tradeoff between the number of signals sent and the dimension of each signal. There has been interest in experimental realization of the recently proposed optical protocol using coherent states [F. Xu et al., Nat. Commun. 6, 8735 (2015), 10.1038/ncomms9735; J.-Y. Guan et al., Phys. Rev. Lett. 116, 240502 (2016), 10.1103/PhysRevLett.116.240502], but as the required number of laser pulses grows linearly with the input size n , eventual challenges for the long-time stability of experimental setups arise. We find a coherent state protocol which reduces the number of signals by a factor 1/2 while also reducing the information leakage. Our reduction makes use of a simple modulation scheme in optical phase space, and we find that more complex modulation schemes are not advantageous. Using a similar technique, we improve a recently proposed coherent state protocol for evaluating the Euclidean distance between two real unit vectors [N. Kumar et al., Phys. Rev. A 95, 032337 (2017), 10.1103/PhysRevA.95.032337] by reducing the number of signals by a factor 1/2 and also reducing the information leakage.

  6. Determining contrast medium dose and rate on basis of lean body weight: does this strategy improve patient-to-patient uniformity of hepatic enhancement during multi-detector row CT?

    PubMed

    Ho, Lisa M; Nelson, Rendon C; Delong, David M

    2007-05-01

    To prospectively evaluate the use of lean body weight (LBW) as the main determinant of the volume and rate of contrast material administration during multi-detector row computed tomography of the liver. This HIPAA-compliant study had institutional review board approval. All patients gave written informed consent. Four protocols were compared. Standard protocol involved 125 mL of iopamidol injected at 4 mL/sec. Total body weight (TBW) protocol involved 0.7 g iodine per kilogram of TBW. Calculated LBW and measured LBW protocols involved 0.86 g of iodine per kilogram and 0.92 g of iodine per kilogram calculated or measured LBW for men and women, respectively. Injection rate used for the three experimental protocols was determined proportionally on the basis of the calculated volume of contrast material. Postcontrast attenuation measurements during portal venous phase were obtained in liver, portal vein, and aorta for each group and were summed for each patient. Patient-to-patient enhancement variability in same group was measured with Levene test. Two-tailed t test was used to compare the three experimental protocols with the standard protocol. Data analysis was performed in 101 patients (25 or 26 patients per group), including 56 men and 45 women (mean age, 53 years). Average summed attenuation values for standard, TBW, calculated LBW, and measured LBW protocols were 419 HU +/- 50 (standard deviation), 443 HU +/- 51, 433 HU +/- 50, and 426 HU +/- 33, respectively (P = not significant for all). Levene test results for summed attenuation data for standard, TBW, calculated LBW, and measured LBW protocols were 40 +/- 29, 38 +/- 33 (P = .83), 35 +/- 35 (P = .56), and 26 +/- 19 (P = .05), respectively. By excluding highly variable but poorly perfused adipose tissue from calculation of contrast medium dose, the measured LBW protocol may lessen patient-to-patient enhancement variability while maintaining satisfactory hepatic and vascular enhancement.

  7. MANEMO Routing in Practice: Protocol Selection, Expected Performance, and Experimental Evaluation

    NASA Astrophysics Data System (ADS)

    Tazaki, Hajime; van Meter, Rodney; Wakikawa, Ryuji; Wongsaardsakul, Thirapon; Kanchanasut, Kanchana; Dias de Amorim, Marcelo; Murai, Jun

    Motivated by the deployment of post-disaster MANEMO (MANET for NEMO) composed of mobile routers and stations, we evaluate two candidate routing protocols through network simulation, theoretical performance analysis, and field experiments. The first protocol is the widely adopted Optimized Link State Routing protocol (OLSR) and the second is the combination of the Tree Discovery Protocol (TDP) with Network In Node Advertisement (NINA). To the best of our knowledge, this is the first time that these two protocols are compared in both theoretical and practical terms. We focus on the control overhead generated when mobile routers perform a handover. Our results confirm the correctness and operational robustness of both protocols. More interestingly, although in the general case OLSR leads to better results, TDP/NINA outperforms OLSR both in the case of sparse networks and in highly mobile networks, which correspond to the operation point of a large set of post-disaster scenarios.

  8. Effect of different analyte diffusion/adsorption protocols on SERS signals

    NASA Astrophysics Data System (ADS)

    Li, Ruoping; Petschek, Rolfe G.; Han, Junhe; Huang, Mingju

    2018-07-01

    The effect of different analyte diffusion/adsorption protocols was studied which is often overlooked in surface-enhanced Raman scattering (SERS) technique. Three protocols: highly concentrated dilution (HCD) protocol, half-half dilution (HHD) protocol and layered adsorption (LA) protocol were studied and the SERS substrates were monolayer films of 80 nm Ag nanoparticles (NPs) which were modified by polyvinylpyrrolidone. The diffusion/adsorption mechanisms were modelled using the diffusion equation and the electromagnetic field distribution of two adjacent Ag NPs was simulated by the finite-different time-domain method. All experimental data and theoretical analysis suggest that different diffusion/adsorption behaviour of analytes will cause different SERS signal enhancements. HHD protocol could produce the most uniform and reproducible samples, and the corresponding signal intensity of the analyte is the strongest. This study will help to understand and promote the use of SERS technique in quantitative analysis.

  9. Boron neutron capture therapy for oral precancer: proof of principle in an experimental animal model

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    A. Monti Hughes; ECC Pozzi; S. Thorp

    Field-cancerized tissue can give rise to second primary tumours, causing therapeutic failure. Boron neutron capture therapy (BNCT) is based on biological targeting and would serve to treat undetectable foci of malignant transformation. The aim of this study was to optimize BNCT for the integral treatment for oral cancer, with particular emphasis on the inhibitory effect on tumour development originating in precancerous conditions, and radiotoxicity of different BNCT protocols in a hamster cheek pouch oral precancer model.

  10. Bidirectional private key exchange using delay-coupled semiconductor lasers.

    PubMed

    Porte, Xavier; Soriano, Miguel C; Brunner, Daniel; Fischer, Ingo

    2016-06-15

    We experimentally demonstrate a key exchange cryptosystem based on the phenomenon of identical chaos synchronization. In our protocol, the private key is symmetrically generated by the two communicating partners. It is built up from the synchronized bits occurring between two current-modulated bidirectionally coupled semiconductor lasers with additional self-feedback. We analyze the security of the exchanged key and discuss the amplification of its privacy. We demonstrate private key generation rates up to 11  Mbit/s over a public channel.

  11. Superdense Coding over Optical Fiber Links with Complete Bell-State Measurements

    NASA Astrophysics Data System (ADS)

    Williams, Brian P.; Sadlier, Ronald J.; Humble, Travis S.

    2017-02-01

    Adopting quantum communication to modern networking requires transmitting quantum information through a fiber-based infrastructure. We report the first demonstration of superdense coding over optical fiber links, taking advantage of a complete Bell-state measurement enabled by time-polarization hyperentanglement, linear optics, and common single-photon detectors. We demonstrate the highest single-qubit channel capacity to date utilizing linear optics, 1.665 ±0.018 , and we provide a full experimental implementation of a hybrid, quantum-classical communication protocol for image transfer.

  12. Experimental system for computer network via satellite /CS/. III - Network control processor

    NASA Astrophysics Data System (ADS)

    Kakinuma, Y.; Ito, A.; Takahashi, H.; Uchida, K.; Matsumoto, K.; Mitsudome, H.

    1982-03-01

    A network control processor (NCP) has the functions of generating traffics, the control of links and the control of transmitting bursts. The NCP executes protocols, monitors of experiments, gathering and compiling data of measurements, of which programs are loaded on a minicomputer (MELCOM 70/40) with 512KB of memories. The NCP acts as traffic generators, instead of a host computer, in the experiment. For this purpose, 15 fake stations are realized by the software in each user station. This paper describes the configuration of the NCP and the implementation of the protocols for the experimental system.

  13. Acid-base properties of the alumina surface: influence of the titration procedures on the microcalorimetric results.

    PubMed

    Morel, Jean-Pierre; Marmier, Nicolas; Hurel, Charlotte; Morel-Desrosiers, Nicole

    2009-10-01

    The enthalpy changes associated with the protonation and deprotonation of an alumina surface have been determined on the basis of microcalorimetry experiments and acid-base potentiometric titrations at 25 degrees C. It has been shown that the results may vary significantly according to the experimental procedure. In order to do so, the potentiometric and microcalorimetric titrations have been carried out first from an acidic pH to basic pH and second from a pH near the pH(zpc) of alumina to acidic or basic pH. It has been demonstrated that the pK(a) values deduced from the potentiometric titrations are the same whatever the experimental protocol whereas the only way to obtain meaningful enthalpies of proton exchange is to carry out microcalorimetric titrations by starting around the point of zero charge.

  14. Molecular dynamics simulations and docking enable to explore the biophysical factors controlling the yields of engineered nanobodies.

    PubMed

    Soler, Miguel A; de Marco, Ario; Fortuna, Sara

    2016-10-10

    Nanobodies (VHHs) have proved to be valuable substitutes of conventional antibodies for molecular recognition. Their small size represents a precious advantage for rational mutagenesis based on modelling. Here we address the problem of predicting how Camelidae nanobody sequences can tolerate mutations by developing a simulation protocol based on all-atom molecular dynamics and whole-molecule docking. The method was tested on two sets of nanobodies characterized experimentally for their biophysical features. One set contained point mutations introduced to humanize a wild type sequence, in the second the CDRs were swapped between single-domain frameworks with Camelidae and human hallmarks. The method resulted in accurate scoring approaches to predict experimental yields and enabled to identify the structural modifications induced by mutations. This work is a promising tool for the in silico development of single-domain antibodies and opens the opportunity to customize single functional domains of larger macromolecules.

  15. Molecular dynamics simulations and docking enable to explore the biophysical factors controlling the yields of engineered nanobodies

    NASA Astrophysics Data System (ADS)

    Soler, Miguel A.; De Marco, Ario; Fortuna, Sara

    2016-10-01

    Nanobodies (VHHs) have proved to be valuable substitutes of conventional antibodies for molecular recognition. Their small size represents a precious advantage for rational mutagenesis based on modelling. Here we address the problem of predicting how Camelidae nanobody sequences can tolerate mutations by developing a simulation protocol based on all-atom molecular dynamics and whole-molecule docking. The method was tested on two sets of nanobodies characterized experimentally for their biophysical features. One set contained point mutations introduced to humanize a wild type sequence, in the second the CDRs were swapped between single-domain frameworks with Camelidae and human hallmarks. The method resulted in accurate scoring approaches to predict experimental yields and enabled to identify the structural modifications induced by mutations. This work is a promising tool for the in silico development of single-domain antibodies and opens the opportunity to customize single functional domains of larger macromolecules.

  16. Experimental demonstration of graph-state quantum secret sharing.

    PubMed

    Bell, B A; Markham, D; Herrera-Martí, D A; Marin, A; Wadsworth, W J; Rarity, J G; Tame, M S

    2014-11-21

    Quantum communication and computing offer many new opportunities for information processing in a connected world. Networks using quantum resources with tailor-made entanglement structures have been proposed for a variety of tasks, including distributing, sharing and processing information. Recently, a class of states known as graph states has emerged, providing versatile quantum resources for such networking tasks. Here we report an experimental demonstration of graph state-based quantum secret sharing--an important primitive for a quantum network with applications ranging from secure money transfer to multiparty quantum computation. We use an all-optical setup, encoding quantum information into photons representing a five-qubit graph state. We find that one can reliably encode, distribute and share quantum information amongst four parties, with various access structures based on the complex connectivity of the graph. Our results show that graph states are a promising approach for realising sophisticated multi-layered communication protocols in quantum networks.

  17. In silico design of smart binders to anthrax PA

    NASA Astrophysics Data System (ADS)

    Sellers, Michael; Hurley, Margaret M.

    2012-06-01

    The development of smart peptide binders requires an understanding of the fundamental mechanisms of recognition which has remained an elusive grail of the research community for decades. Recent advances in automated discovery and synthetic library science provide a wealth of information to probe fundamental details of binding and facilitate the development of improved models for a priori prediction of affinity and specificity. Here we present the modeling portion of an iterative experimental/computational study to produce high affinity peptide binders to the Protective Antigen (PA) of Bacillus anthracis. The result is a general usage, HPC-oriented, python-based toolkit based upon powerful third-party freeware, which is designed to provide a better understanding of peptide-protein interactions and ultimately predict and measure new smart peptide binder candidates. We present an improved simulation protocol with flexible peptide docking to the Anthrax Protective Antigen, reported within the context of experimental data presented in a companion work.

  18. Standardizing the experimental conditions for using urine in NMR-based metabolomic studies with a particular focus on diagnostic studies: a review.

    PubMed

    Emwas, Abdul-Hamid; Luchinat, Claudio; Turano, Paola; Tenori, Leonardo; Roy, Raja; Salek, Reza M; Ryan, Danielle; Merzaban, Jasmeen S; Kaddurah-Daouk, Rima; Zeri, Ana Carolina; Nagana Gowda, G A; Raftery, Daniel; Wang, Yulan; Brennan, Lorraine; Wishart, David S

    The metabolic composition of human biofluids can provide important diagnostic and prognostic information. Among the biofluids most commonly analyzed in metabolomic studies, urine appears to be particularly useful. It is abundant, readily available, easily stored and can be collected by simple, noninvasive techniques. Moreover, given its chemical complexity, urine is particularly rich in potential disease biomarkers. This makes it an ideal biofluid for detecting or monitoring disease processes. Among the metabolomic tools available for urine analysis, NMR spectroscopy has proven to be particularly well-suited, because the technique is highly reproducible and requires minimal sample handling. As it permits the identification and quantification of a wide range of compounds, independent of their chemical properties, NMR spectroscopy has been frequently used to detect or discover disease fingerprints and biomarkers in urine. Although protocols for NMR data acquisition and processing have been standardized, no consensus on protocols for urine sample selection, collection, storage and preparation in NMR-based metabolomic studies have been developed. This lack of consensus may be leading to spurious biomarkers being reported and may account for a general lack of reproducibility between laboratories. Here, we review a large number of published studies on NMR-based urine metabolic profiling with the aim of identifying key variables that may affect the results of metabolomics studies. From this survey, we identify a number of issues that require either standardization or careful accounting in experimental design and provide some recommendations for urine collection, sample preparation and data acquisition.

  19. GUIDANCE FOR RESEARCH HOUSE STUDIES OF THE FLORIDA RADON RESEARCH PROGRAM, VOLUME 2: MODEL-BACKED EXPERIMENTAL PROTOCOL FOR DETERMINING RADON

    EPA Science Inventory

    The report provides guidance and a readily available reference to groups involved with the Florida Radon Research Program's (FRRP's) research house studies. It includes: 1): Lists of Parameters for continuous and periodic high and low resolution measurements; (2) Protocols for c...

  20. Rethinking the NTCIP Design and Protocols - Analyzing the Issues

    DOT National Transportation Integrated Search

    1998-03-03

    This working paper discusses the issues involved in changing the current draft NTCIP standard from an X.25-based protocol stack to an Internet-based protocol stack. It contains a methodology which could be used to change NTCIP's base protocols. This ...

  1. Screening for Learning and Memory Mutations: A New Approach.

    PubMed

    Gallistel, C R; King, A P; Daniel, A M; Freestone, D; Papachristos, E B; Balci, F; Kheifets, A; Zhang, J; Su, X; Schiff, G; Kourtev, H

    2010-01-30

    We describe a fully automated, live-in 24/7 test environment, with experimental protocols that measure the accuracy and precision with which mice match the ratio of their expected visit durations to the ratio of the incomes obtained from two hoppers, the progress of instrumental and classical conditioning (trials-to-acquisition), the accuracy and precision of interval timing, the effect of relative probability on the choice of a timed departure target, and the accuracy and precision of memory for the times of day at which food is available. The system is compact; it obviates the handling of the mice during testing; it requires negligible amounts of experimenter/technician time; and it delivers clear and extensive results from 3 protocols within a total of 7-9 days after the mice are placed in the test environment. Only a single 24-hour period is required for the completion of first protocol (the matching protocol), which is strong test of temporal and spatial estimation and memory mechanisms. Thus, the system permits the extensive screening of many mice in a short period of time and in limited space. The software is publicly available.

  2. Protocol independent transmission method in software defined optical network

    NASA Astrophysics Data System (ADS)

    Liu, Yuze; Li, Hui; Hou, Yanfang; Qiu, Yajun; Ji, Yuefeng

    2016-10-01

    With the development of big data and cloud computing technology, the traditional software-defined network is facing new challenges (e.i., ubiquitous accessibility, higher bandwidth, more flexible management and greater security). Using a proprietary protocol or encoding format is a way to improve information security. However, the flow, which carried by proprietary protocol or code, cannot go through the traditional IP network. In addition, ultra- high-definition video transmission service once again become a hot spot. Traditionally, in the IP network, the Serial Digital Interface (SDI) signal must be compressed. This approach offers additional advantages but also bring some disadvantages such as signal degradation and high latency. To some extent, HD-SDI can also be regard as a proprietary protocol, which need transparent transmission such as optical channel. However, traditional optical networks cannot support flexible traffics . In response to aforementioned challenges for future network, one immediate solution would be to use NFV technology to abstract the network infrastructure and provide an all-optical switching topology graph for the SDN control plane. This paper proposes a new service-based software defined optical network architecture, including an infrastructure layer, a virtualization layer, a service abstract layer and an application layer. We then dwell on the corresponding service providing method in order to implement the protocol-independent transport. Finally, we experimentally evaluate that proposed service providing method can be applied to transmit the HD-SDI signal in the software-defined optical network.

  3. Development and Application of a Structural Health Monitoring System Based on Wireless Smart Aggregates

    PubMed Central

    Ma, Haoyan; Li, Peng; Song, Gangbing; Wu, Jianxin

    2017-01-01

    Structural health monitoring (SHM) systems can improve the safety and reliability of structures, reduce maintenance costs, and extend service life. Research on concrete SHMs using piezoelectric-based smart aggregates have reached great achievements. However, the newly developed techniques have not been widely applied in practical engineering, largely due to the wiring problems associated with large-scale structural health monitoring. The cumbersome wiring requires much material and labor work, and more importantly, the associated maintenance work is also very heavy. Targeting a practical large scale concrete crack detection (CCD) application, a smart aggregates-based wireless sensor network system is proposed for the CCD application. The developed CCD system uses Zigbee 802.15.4 protocols, and is able to perform dynamic stress monitoring, structural impact capturing, and internal crack detection. The system has been experimentally validated, and the experimental results demonstrated the effectiveness of the proposed system. This work provides important support for practical CCD applications using wireless smart aggregates. PMID:28714927

  4. Development and Application of a Structural Health Monitoring System Based on Wireless Smart Aggregates.

    PubMed

    Yan, Shi; Ma, Haoyan; Li, Peng; Song, Gangbing; Wu, Jianxin

    2017-07-17

    Structural health monitoring (SHM) systems can improve the safety and reliability of structures, reduce maintenance costs, and extend service life. Research on concrete SHMs using piezoelectric-based smart aggregates have reached great achievements. However, the newly developed techniques have not been widely applied in practical engineering, largely due to the wiring problems associated with large-scale structural health monitoring. The cumbersome wiring requires much material and labor work, and more importantly, the associated maintenance work is also very heavy. Targeting a practical large scale concrete crack detection (CCD) application, a smart aggregates-based wireless sensor network system is proposed for the CCD application. The developed CCD system uses Zigbee 802.15.4 protocols, and is able to perform dynamic stress monitoring, structural impact capturing, and internal crack detection. The system has been experimentally validated, and the experimental results demonstrated the effectiveness of the proposed system. This work provides important support for practical CCD applications using wireless smart aggregates.

  5. Creative musical expression as a catalyst for quality-of-life improvement in inner-city adolescents placed in a court-referred residential treatment program.

    PubMed

    Bittman, Barry; Dickson, Larry; Coddington, Kim

    2009-01-01

    Obstacles to effectively rehabilitate inner-city adolescents in staff-secure residential treatment centers should not be underestimated. Effective evidence-based protocols are lacking to help juveniles who are often angry, detached, frustrated, and in direct conflict with their peers. Facing a myriad of issues ranging from youth delinquency offenses to trauma, abuse, drug/alcohol use, peer pressure/gang-related activities, lack of structure in home environments, mental health diagnoses, and cognitive functioning difficulties, these adolescents present extraordinary challenges to an over-stressed juvenile justice system. A randomized controlled crossover study is utilized to comprehensively evaluate the effectiveness of a novel creative musical expression protocol as a catalyst for nonverbal and verbal disclosure leading to improvements in quality of life for inner-city youth in a court-referred residential treatment program. A total of 52 (30 females and 22 males) African-American, Asian, Caucasian, and Puerto Rican subjects ranging in age from 12 to 18 (mean age 14.5) completed the study. Dependent variable measures included the Child and Adolescent Functional Assessment Scale (CAFAS), the Adolescent Psychopathology Scale (APS), the Adolescent Anger Rating Scale (AARS), the Reynolds Adolescent Depression Scale, 2nd edition (RADS 2), and the Adolescent Visual-Analog Recreational Music Making Assessment (A-VARMMA). Statistically significant (experimental vs control) improvements in multiple parameters include school/work role performance, total depression, anhedonia/negative affect, negative self-evaluation, and instrumental anger. In addition, extended impact (experimental vs control) is characterized by statistically significant improvements 6 weeks after completion of the protocol, for school/work role performance, behavior toward others, anhedonia/negative affect, total anger, instrumental anger, anger, and interpersonal problems. The primary limitations of this study include an extended follow-up period of only 6 weeks post completion of the protocol, and the inability to blind the counselors performing standardized assessments. This study is the first of its kind to test a replicable creative musical expression protocol as a catalyst for nonverbal and verbal disclosure leading to improved quality of life for inner-city youth in a court-referred residential treatment program. With substantial potential for widespread dissemination, this innovative protocol for adolescents can be readily utilized by behavioral health professionals without prior musical experience.

  6. Refining animal models in fracture research: seeking consensus in optimising both animal welfare and scientific validity for appropriate biomedical use

    PubMed Central

    Auer, Jorg A; Goodship, Allen; Arnoczky, Steven; Pearce, Simon; Price, Jill; Claes, Lutz; von Rechenberg, Brigitte; Hofmann-Amtenbrinck, Margarethe; Schneider, Erich; Müller-Terpitz, R; Thiele, F; Rippe, Klaus-Peter; Grainger, David W

    2007-01-01

    Background In an attempt to establish some consensus on the proper use and design of experimental animal models in musculoskeletal research, AOVET (the veterinary specialty group of the AO Foundation) in concert with the AO Research Institute (ARI), and the European Academy for the Study of Scientific and Technological Advance, convened a group of musculoskeletal researchers, veterinarians, legal experts, and ethicists to discuss, in a frank and open forum, the use of animals in musculoskeletal research. Methods The group narrowed the field to fracture research. The consensus opinion resulting from this workshop can be summarized as follows: Results & Conclusion Anaesthesia and pain management protocols for research animals should follow standard protocols applied in clinical work for the species involved. This will improve morbidity and mortality outcomes. A database should be established to facilitate selection of anaesthesia and pain management protocols for specific experimental surgical procedures and adopted as an International Standard (IS) according to animal species selected. A list of 10 golden rules and requirements for conduction of animal experiments in musculoskeletal research was drawn up comprising 1) Intelligent study designs to receive appropriate answers; 2) Minimal complication rates (5 to max. 10%); 3) Defined end-points for both welfare and scientific outputs analogous to quality assessment (QA) audit of protocols in GLP studies; 4) Sufficient details for materials and methods applied; 5) Potentially confounding variables (genetic background, seasonal, hormonal, size, histological, and biomechanical differences); 6) Post-operative management with emphasis on analgesia and follow-up examinations; 7) Study protocols to satisfy criteria established for a "justified animal study"; 8) Surgical expertise to conduct surgery on animals; 9) Pilot studies as a critical part of model validation and powering of the definitive study design; 10) Criteria for funding agencies to include requirements related to animal experiments as part of the overall scientific proposal review protocols. Such agencies are also encouraged to seriously consider and adopt the recommendations described here when awarding funds for specific projects. Specific new requirements and mandates related both to improving the welfare and scientific rigour of animal-based research models are urgently needed as part of international harmonization of standards. PMID:17678534

  7. Fasting: a major limitation for resistance exercise training effects in rodents

    PubMed Central

    das Neves, W.; de Oliveira, L.F.; da Silva, R.P.; Alves, C.R.R.; Lancha, A.H.

    2017-01-01

    Protocols that mimic resistance exercise training (RET) in rodents present several limitations, one of them being the electrical stimulus, which is beyond the physiological context observed in humans. Recently, our group developed a conditioning system device that does not use electric shock to stimulate rats, but includes fasting periods before each RET session. The current study was designed to test whether cumulative fasting periods have some influence on skeletal muscle mass and function. Three sets of male Wistar rats were used in the current study. The first set of rats was submitted to a RET protocol without food restriction. However, rats were not able to perform exercise properly. The second and third sets were then randomly assigned into three experimental groups: 1) untrained control rats, 2) untrained rats submitted to fasting periods, and 3) rats submitted to RET including fasting periods before each RET session. While the second set of rats performed a short RET protocol (i.e., an adaptation protocol for 3 weeks), the third set of rats performed a longer RET protocol including overload (i.e., 8 weeks). After the short-term protocol, cumulative fasting periods promoted loss of weight (P<0.001). After the longer RET protocol, no difference was observed for body mass, extensor digitorum longus (EDL) morphology or skeletal muscle function (P>0.05 for all). Despite no effects on EDL mass, soleus muscle displayed significant atrophy in the fasting experimental groups (P<0.01). Altogether, these data indicate that fasting is a major limitation for RET in rats. PMID:29185588

  8. Fasting: a major limitation for resistance exercise training effects in rodents.

    PubMed

    das Neves, W; de Oliveira, L F; da Silva, R P; Alves, C R R; Lancha, A H

    2017-11-17

    Protocols that mimic resistance exercise training (RET) in rodents present several limitations, one of them being the electrical stimulus, which is beyond the physiological context observed in humans. Recently, our group developed a conditioning system device that does not use electric shock to stimulate rats, but includes fasting periods before each RET session. The current study was designed to test whether cumulative fasting periods have some influence on skeletal muscle mass and function. Three sets of male Wistar rats were used in the current study. The first set of rats was submitted to a RET protocol without food restriction. However, rats were not able to perform exercise properly. The second and third sets were then randomly assigned into three experimental groups: 1) untrained control rats, 2) untrained rats submitted to fasting periods, and 3) rats submitted to RET including fasting periods before each RET session. While the second set of rats performed a short RET protocol (i.e., an adaptation protocol for 3 weeks), the third set of rats performed a longer RET protocol including overload (i.e., 8 weeks). After the short-term protocol, cumulative fasting periods promoted loss of weight (P<0.001). After the longer RET protocol, no difference was observed for body mass, extensor digitorum longus (EDL) morphology or skeletal muscle function (P>0.05 for all). Despite no effects on EDL mass, soleus muscle displayed significant atrophy in the fasting experimental groups (P<0.01). Altogether, these data indicate that fasting is a major limitation for RET in rats.

  9. Measurement-device-independent quantum key distribution for Scarani-Acin-Ribordy-Gisin 04 protocol

    PubMed Central

    Mizutani, Akihiro; Tamaki, Kiyoshi; Ikuta, Rikizo; Yamamoto, Takashi; Imoto, Nobuyuki

    2014-01-01

    The measurement-device-independent quantum key distribution (MDI QKD) was proposed to make BB84 completely free from any side-channel in detectors. Like in prepare & measure QKD, the use of other protocols in MDI setting would be advantageous in some practical situations. In this paper, we consider SARG04 protocol in MDI setting. The prepare & measure SARG04 is proven to be able to generate a key up to two-photon emission events. In MDI setting we show that the key generation is possible from the event with single or two-photon emission by a party and single-photon emission by the other party, but the two-photon emission event by both parties cannot contribute to the key generation. On the contrary to prepare & measure SARG04 protocol where the experimental setup is exactly the same as BB84, the measurement setup for SARG04 in MDI setting cannot be the same as that for BB84 since the measurement setup for BB84 in MDI setting induces too many bit errors. To overcome this problem, we propose two alternative experimental setups, and we simulate the resulting key rate. Our study highlights the requirements that MDI QKD poses on us regarding with the implementation of a variety of QKD protocols. PMID:24913431

  10. Integrated Structural Biology for α-Helical Membrane Protein Structure Determination.

    PubMed

    Xia, Yan; Fischer, Axel W; Teixeira, Pedro; Weiner, Brian; Meiler, Jens

    2018-04-03

    While great progress has been made, only 10% of the nearly 1,000 integral, α-helical, multi-span membrane protein families are represented by at least one experimentally determined structure in the PDB. Previously, we developed the algorithm BCL::MP-Fold, which samples the large conformational space of membrane proteins de novo by assembling predicted secondary structure elements guided by knowledge-based potentials. Here, we present a case study of rhodopsin fold determination by integrating sparse and/or low-resolution restraints from multiple experimental techniques including electron microscopy, electron paramagnetic resonance spectroscopy, and nuclear magnetic resonance spectroscopy. Simultaneous incorporation of orthogonal experimental restraints not only significantly improved the sampling accuracy but also allowed identification of the correct fold, which is demonstrated by a protein size-normalized transmembrane root-mean-square deviation as low as 1.2 Å. The protocol developed in this case study can be used for the determination of unknown membrane protein folds when limited experimental restraints are available. Copyright © 2018 Elsevier Ltd. All rights reserved.

  11. Quantum processing by remote quantum control

    NASA Astrophysics Data System (ADS)

    Qiang, Xiaogang; Zhou, Xiaoqi; Aungskunsiri, Kanin; Cable, Hugo; O'Brien, Jeremy L.

    2017-12-01

    Client-server models enable computations to be hosted remotely on quantum servers. We present a novel protocol for realizing this task, with practical advantages when using technology feasible in the near term. Client tasks are realized as linear combinations of operations implemented by the server, where the linear coefficients are hidden from the server. We report on an experimental demonstration of our protocol using linear optics, which realizes linear combination of two single-qubit operations by a remote single-qubit control. In addition, we explain when our protocol can remain efficient for larger computations, as well as some ways in which privacy can be maintained using our protocol.

  12. A virtual experimenter to increase standardization for the investigation of placebo effects.

    PubMed

    Horing, Bjoern; Newsome, Nathan D; Enck, Paul; Babu, Sabarish V; Muth, Eric R

    2016-07-18

    Placebo effects are mediated by expectancy, which is highly influenced by psychosocial factors of a treatment context. These factors are difficult to standardize. Furthermore, dedicated placebo research often necessitates single-blind deceptive designs where biases are easily introduced. We propose a study protocol employing a virtual experimenter - a computer program designed to deliver treatment and instructions - for the purpose of standardization and reduction of biases when investigating placebo effects. To evaluate the virtual experimenter's efficacy in inducing placebo effects via expectancy manipulation, we suggest a partially blinded, deceptive design with a baseline/retest pain protocol (hand immersions in hot water bath). Between immersions, participants will receive an (actually inert) medication. Instructions pertaining to the medication will be delivered by one of three metaphors: The virtual experimenter, a human experimenter, and an audio/text presentation (predictor "Metaphor"). The second predictor includes falsely informing participants that the medication is an effective pain killer, or correctly informing them that it is, in fact, inert (predictor "Instruction"). Analysis will be performed with hierarchical linear modelling, with a sample size of N = 50. Results from two pilot studies are presented that indicate the viability of the pain protocol (N = 33), and of the virtual experimenter software and placebo manipulation (N = 48). It will be challenging to establish full comparability between all metaphors used for instruction delivery, and to account for participant differences in acceptance of their virtual interaction partner. Once established, the presence of placebo effects would suggest that the virtual experimenter exhibits sufficient cues to be perceived as a social agent. He could consequently provide a convenient platform to investigate effects of experimenter behavior, or other experimenter characteristics, e.g., sex, age, race/ethnicity or professional status. More general applications are possible, for example in psychological research such as bias research, or virtual reality research. Potential applications also exist for standardizing clinical research by documenting and communicating instructions used in clinical trials.

  13. Experimental investigation of factors affecting the absolute recovery coefficients in iodine-124 PET lesion imaging

    NASA Astrophysics Data System (ADS)

    Jentzen, Walter

    2010-04-01

    The use of recovery coefficients (RCs) in 124I PET lesion imaging is a simple method to correct the imaged activity concentration (AC) primarily for the partial-volume effect and, to a minor extent, for the prompt gamma coincidence effect. The aim of this phantom study was to experimentally investigate a number of various factors affecting the 124I RCs. Three RC-based correction approaches were considered. These approaches differ with respect to the volume of interest (VOI) drawn, which determines the imaged AC and the RCs: a single voxel VOI containing the maximum value (maximum RC), a spherical VOI with a diameter of the scanner resolution (resolution RC) and a VOI equaling the physical object volume (isovolume RC). Measurements were performed using mainly a stand-alone PET scanner (EXACT HR+) and a latest-generation PET/CT scanner (BIOGRAPH mCT). The RCs were determined using a cylindrical phantom containing spheres or rotational ellipsoids and were derived from images acquired with a reference acquisition protocol. For each type of RC, the influence of the following factors on the RC was assessed: object shape, background activity spill in and iterative image reconstruction parameters. To evaluate the robustness of the RC-based correction approaches, the percentage deviation between RC-corrected and true ACs was determined from images acquired with a clinical acquisition protocol of different AC regimes. The observed results of the shape and spill-in effects were compared with simulation data derived from a convolution-based model. The study demonstrated that the shape effect was negligible and, therefore, was in agreement with theoretical expectations. In contradiction to the simulation results, the observed spill-in effect was unexpectedly small. To avoid variations in the determination of RCs due to reconstruction parameter changes, image reconstruction with a pixel length of about one-third or less of the scanner resolution and an OSEM 1 × 32 algorithm or one with somewhat higher number of effective iterations are recommended. Using the clinical acquisition protocol, the phantom study indicated that the resolution- or isovolume-based recovery-correction approaches appeared to be more appropriate to recover the ACs from patient data; however, the application of the three RC-based correction approaches to small lesions containing low ACs was, in particular, associated with large underestimations. The phantom study had several limitations, which were discussed in detail.

  14. Protocol for project IMPACT (improving millions hearts for provider and community transformation): a quasi-experimental evaluation of an integrated electronic health record and community health worker intervention study to improve hypertension management among South Asian patients.

    PubMed

    Lopez, Priscilla M; Zanowiak, Jennifer; Goldfeld, Keith; Wyka, Katarzyna; Masoud, Ahmad; Beane, Susan; Kumar, Rashi; Laughlin, Phoebe; Trinh-Shevrin, Chau; Thorpe, Lorna; Islam, Nadia

    2017-12-06

    The Million Hearts® initiative aims to prevent heart disease and stroke in the United States by mobilizing public and private sectors around a core set of objectives, with particular attention on improving blood pressure control. South Asians in particular have disproportionately high rates of hypertension and face numerous cultural, linguistic, and social barriers to accessing healthcare. Interventions utilizing Health information technology (HIT) and community health worker (CHW)-led patient coaching have each been demonstrated to be effective at advancing Million Hearts® goals, yet few studies have investigated the potential impact of integrating these strategies into a clinical-community linkage initiative. Building upon this initiative, we present the protocol and preliminary results of a research study, Project IMPACT, designed to fill this gap in knowledge. Project IMPACT is a stepped wedge quasi-experimental study designed to test the feasibility, adoption, and impact of integrating CHW-led health coaching with electronic health record (EHR)-based interventions to improve hypertension control among South Asian patients in New York City primary care practices. EHR intervention components include the training and implementation of hypertension-specific registry reports, alerts, and order sets. Fidelity to the EHR intervention is assessed by collecting the type, frequency, and utilization of intervention components for each practice. CHW intervention components consist of health coaching sessions on hypertension and related risk factors for uncontrolled hypertensive patients. The outcome, hypertension control (<140 mmHg systolic blood pressure (BP) and <90 mmHg diastolic BP), is collected at the aggregate- and individual-level for all 16 clinical practices enrolled. Project IMPACT builds upon the evidence base of the effectiveness of CHW and Million Hearts® initiatives and proposes a unique integration of provider-based EHR and community-based CHW interventions. The project informs the effectiveness of these interventions in team-based care approaches, thereby, helping to develop relevant sustainability strategies for improving hypertension control among targeted racial/ethnic minority populations at small primary care practices. This study protocol has been approved and is made available on Clinicaltrials.gov by NCT03159533 as of May 17, 2017.

  15. Spin glass model for cell reprogramming

    NASA Astrophysics Data System (ADS)

    Pusuluri, Sai Teja; Castillo, Horacio E.

    2014-03-01

    Recent experiments show that differentiated cells can be reprogrammed to become pluripotent stem cells. The possible cell fates can be modeled as attractors in a dynamical system, the ``epigenetic landscape.'' Both cellular differentiation and reprogramming can be described in the landscape picture as motion from one attractor state to another attractor state. We use a simple model based on spin glass theory that can construct a simulated epigenetic landscape starting from the experimental genomic data. We modify the model to incorporate experimental reprogramming protocols. Our simulations successfully reproduce several reprogramming experiments. We probe the robustness of the results against random changes in the model, explore the importance of asymmetric interactions between transcription factors and study the importance of histone modification errors in reprogramming.

  16. Entanglement and Wigner Function Negativity of Multimode Non-Gaussian States

    NASA Astrophysics Data System (ADS)

    Walschaers, Mattia; Fabre, Claude; Parigi, Valentina; Treps, Nicolas

    2017-11-01

    Non-Gaussian operations are essential to exploit the quantum advantages in optical continuous variable quantum information protocols. We focus on mode-selective photon addition and subtraction as experimentally promising processes to create multimode non-Gaussian states. Our approach is based on correlation functions, as is common in quantum statistical mechanics and condensed matter physics, mixed with quantum optics tools. We formulate an analytical expression of the Wigner function after the subtraction or addition of a single photon, for arbitrarily many modes. It is used to demonstrate entanglement properties specific to non-Gaussian states and also leads to a practical and elegant condition for Wigner function negativity. Finally, we analyze the potential of photon addition and subtraction for an experimentally generated multimode Gaussian state.

  17. Entanglement and Wigner Function Negativity of Multimode Non-Gaussian States.

    PubMed

    Walschaers, Mattia; Fabre, Claude; Parigi, Valentina; Treps, Nicolas

    2017-11-03

    Non-Gaussian operations are essential to exploit the quantum advantages in optical continuous variable quantum information protocols. We focus on mode-selective photon addition and subtraction as experimentally promising processes to create multimode non-Gaussian states. Our approach is based on correlation functions, as is common in quantum statistical mechanics and condensed matter physics, mixed with quantum optics tools. We formulate an analytical expression of the Wigner function after the subtraction or addition of a single photon, for arbitrarily many modes. It is used to demonstrate entanglement properties specific to non-Gaussian states and also leads to a practical and elegant condition for Wigner function negativity. Finally, we analyze the potential of photon addition and subtraction for an experimentally generated multimode Gaussian state.

  18. REPHLEX II: An information management system for the ARS Water Data Base

    NASA Astrophysics Data System (ADS)

    Thurman, Jane L.

    1993-08-01

    The REPHLEX II computer system is an on-line information management system which allows scientists, engineers, and other researchers to retrieve data from the ARS Water Data Base using asynchronous communications. The system features two phone lines handling baud rates from 300 to 2400, customized menus to facilitate browsing, help screens, direct access to information and data files, electronic mail processing, file transfers using the XMODEM protocol, and log-in procedures which capture information on new users, process passwords, and log activity for a permanent audit trail. The primary data base on the REPHLEX II system is the ARS Water Data Base which consists of rainfall and runoff data from experimental agricultural watersheds located in the United States.

  19. Changes in co-contraction during stair descent after manual therapy protocol in knee osteoarthritis: A pilot, single-blind, randomized study.

    PubMed

    Cruz-Montecinos, Carlos; Flores-Cartes, Rodrigo; Montt-Rodriguez, Agustín; Pozo, Esteban; Besoaín-Saldaña, Alvaro; Horment-Lara, Giselle

    2016-10-01

    Manual therapy has shown clinical results in patients with knee osteoarthritis. However, the biomechanical aspects during functional tasks have not been explored in depth. Through surface electromyography, the medial and lateral co-contractions of the knee were measured while descending stairs, prior and posterior to applying a manual therapy protocol in the knee, with emphasis on techniques of joint mobilization and soft-tissue management. Sixteen females with slight or moderate knee osteoarthritis were recruited (eight experimental, eight control). It was observed that the lateral co-contraction index of the experimental group, posterior to intervention, increased by 11.7% (p = 0.014). The application of a manual therapy protocol with emphasis on techniques of joint mobilization and soft-tissue management modified lateral co-contraction, which would have a protective effect on the joint. Copyright © 2016 Elsevier Ltd. All rights reserved.

  20. Experimental measurement-device-independent verification of quantum steering

    NASA Astrophysics Data System (ADS)

    Kocsis, Sacha; Hall, Michael J. W.; Bennet, Adam J.; Saunders, Dylan J.; Pryde, Geoff J.

    2015-01-01

    Bell non-locality between distant quantum systems—that is, joint correlations which violate a Bell inequality—can be verified without trusting the measurement devices used, nor those performing the measurements. This leads to unconditionally secure protocols for quantum information tasks such as cryptographic key distribution. However, complete verification of Bell non-locality requires high detection efficiencies, and is not robust to typical transmission losses over long distances. In contrast, quantum or Einstein-Podolsky-Rosen steering, a weaker form of quantum correlation, can be verified for arbitrarily low detection efficiencies and high losses. The cost is that current steering-verification protocols require complete trust in one of the measurement devices and its operator, allowing only one-sided secure key distribution. Here we present measurement-device-independent steering protocols that remove this need for trust, even when Bell non-locality is not present. We experimentally demonstrate this principle for singlet states and states that do not violate a Bell inequality.

  1. Experimental measurement-device-independent verification of quantum steering.

    PubMed

    Kocsis, Sacha; Hall, Michael J W; Bennet, Adam J; Saunders, Dylan J; Pryde, Geoff J

    2015-01-07

    Bell non-locality between distant quantum systems--that is, joint correlations which violate a Bell inequality--can be verified without trusting the measurement devices used, nor those performing the measurements. This leads to unconditionally secure protocols for quantum information tasks such as cryptographic key distribution. However, complete verification of Bell non-locality requires high detection efficiencies, and is not robust to typical transmission losses over long distances. In contrast, quantum or Einstein-Podolsky-Rosen steering, a weaker form of quantum correlation, can be verified for arbitrarily low detection efficiencies and high losses. The cost is that current steering-verification protocols require complete trust in one of the measurement devices and its operator, allowing only one-sided secure key distribution. Here we present measurement-device-independent steering protocols that remove this need for trust, even when Bell non-locality is not present. We experimentally demonstrate this principle for singlet states and states that do not violate a Bell inequality.

  2. Design and interpretation of cell trajectory assays

    PubMed Central

    Bowden, Lucie G.; Simpson, Matthew J.; Baker, Ruth E.

    2013-01-01

    Cell trajectory data are often reported in the experimental cell biology literature to distinguish between different types of cell migration. Unfortunately, there is no accepted protocol for designing or interpreting such experiments and this makes it difficult to quantitatively compare different published datasets and to understand how changes in experimental design influence our ability to interpret different experiments. Here, we use an individual-based mathematical model to simulate the key features of a cell trajectory experiment. This shows that our ability to correctly interpret trajectory data is extremely sensitive to the geometry and timing of the experiment, the degree of motility bias and the number of experimental replicates. We show that cell trajectory experiments produce data that are most reliable when the experiment is performed in a quasi-one-dimensional geometry with a large number of identically prepared experiments conducted over a relatively short time-interval rather than a few trajectories recorded over particularly long time-intervals. PMID:23985736

  3. Morphological Study of Langmuir Polymer Films by means of Atomic Force Microscopy and MD Simulations

    NASA Astrophysics Data System (ADS)

    Reiter, Renate; Knecht, Volker; Chandran, Sivasurender; Reiter, Günter

    In general it is difficult to reproduce well defined morphologies of Langmuir polymer films (LPFs) because they have a high propensity to form non-equilibrium states. We present a systematic study based on different compression protocols designed to allow for relaxations of LPFs under well defined conditions. The homo peptide poly-?-benzyl-L-glutamate (PBLG) was chosen for this study because it is a well investigated system that represents the relaxational behaviour of rod-like molecules which is expected to show less complexity than coiled polymer molecules. Our results demonstrate that experimentally manipulating the course of relaxations in LPFs has tremendous impact on the ordering of the molecules. Coarse grain molecular dynamics simulations were performed under comparable conditions. The results match the experimental observations reasonably well and allow to zoom into molecular details which are not resolved experimentally.

  4. Physics-based enzyme design: predicting binding affinity and catalytic activity.

    PubMed

    Sirin, Sarah; Pearlman, David A; Sherman, Woody

    2014-12-01

    Computational enzyme design is an emerging field that has yielded promising success stories, but where numerous challenges remain. Accurate methods to rapidly evaluate possible enzyme design variants could provide significant value when combined with experimental efforts by reducing the number of variants needed to be synthesized and speeding the time to reach the desired endpoint of the design. To that end, extending our computational methods to model the fundamental physical-chemical principles that regulate activity in a protocol that is automated and accessible to a broad population of enzyme design researchers is essential. Here, we apply a physics-based implicit solvent MM-GBSA scoring approach to enzyme design and benchmark the computational predictions against experimentally determined activities. Specifically, we evaluate the ability of MM-GBSA to predict changes in affinity for a steroid binder protein, catalytic turnover for a Kemp eliminase, and catalytic activity for α-Gliadin peptidase variants. Using the enzyme design framework developed here, we accurately rank the most experimentally active enzyme variants, suggesting that this approach could provide enrichment of active variants in real-world enzyme design applications. © 2014 Wiley Periodicals, Inc.

  5. OMIP contribution to CMIP6: experimental and diagnostic protocol for the physical component of the Ocean Model Intercomparison Project

    NASA Astrophysics Data System (ADS)

    Griffies, Stephen M.; Danabasoglu, Gokhan; Durack, Paul J.; Adcroft, Alistair J.; Balaji, V.; Böning, Claus W.; Chassignet, Eric P.; Curchitser, Enrique; Deshayes, Julie; Drange, Helge; Fox-Kemper, Baylor; Gleckler, Peter J.; Gregory, Jonathan M.; Haak, Helmuth; Hallberg, Robert W.; Heimbach, Patrick; Hewitt, Helene T.; Holland, David M.; Ilyina, Tatiana; Jungclaus, Johann H.; Komuro, Yoshiki; Krasting, John P.; Large, William G.; Marsland, Simon J.; Masina, Simona; McDougall, Trevor J.; Nurser, A. J. George; Orr, James C.; Pirani, Anna; Qiao, Fangli; Stouffer, Ronald J.; Taylor, Karl E.; Treguier, Anne Marie; Tsujino, Hiroyuki; Uotila, Petteri; Valdivieso, Maria; Wang, Qiang; Winton, Michael; Yeager, Stephen G.

    2016-09-01

    The Ocean Model Intercomparison Project (OMIP) is an endorsed project in the Coupled Model Intercomparison Project Phase 6 (CMIP6). OMIP addresses CMIP6 science questions, investigating the origins and consequences of systematic model biases. It does so by providing a framework for evaluating (including assessment of systematic biases), understanding, and improving ocean, sea-ice, tracer, and biogeochemical components of climate and earth system models contributing to CMIP6. Among the WCRP Grand Challenges in climate science (GCs), OMIP primarily contributes to the regional sea level change and near-term (climate/decadal) prediction GCs.OMIP provides (a) an experimental protocol for global ocean/sea-ice models run with a prescribed atmospheric forcing; and (b) a protocol for ocean diagnostics to be saved as part of CMIP6. We focus here on the physical component of OMIP, with a companion paper (Orr et al., 2016) detailing methods for the inert chemistry and interactive biogeochemistry. The physical portion of the OMIP experimental protocol follows the interannual Coordinated Ocean-ice Reference Experiments (CORE-II). Since 2009, CORE-I (Normal Year Forcing) and CORE-II (Interannual Forcing) have become the standard methods to evaluate global ocean/sea-ice simulations and to examine mechanisms for forced ocean climate variability. The OMIP diagnostic protocol is relevant for any ocean model component of CMIP6, including the DECK (Diagnostic, Evaluation and Characterization of Klima experiments), historical simulations, FAFMIP (Flux Anomaly Forced MIP), C4MIP (Coupled Carbon Cycle Climate MIP), DAMIP (Detection and Attribution MIP), DCPP (Decadal Climate Prediction Project), ScenarioMIP, HighResMIP (High Resolution MIP), as well as the ocean/sea-ice OMIP simulations.

  6. Cognitive behavioral therapy program for cannabis use cessation in first-episode psychosis patients: study protocol for a randomized controlled trial.

    PubMed

    González-Ortega, Itxaso; Echeburúa, Enrique; García-Alocén, Adriana; Vega, Patricia; González-Pinto, Ana

    2016-07-29

    The high rate of cannabis use among patients with first-episode psychosis (FEP), as well as the associated negative impact on illness course and treatment outcomes, underlines the need for effective interventions in these populations. However, to date, there have been few clinical treatment trials (of pharmacological or psychological interventions) that have specifically focused on addressing comorbid cannabis use among these patients. The aim of this paper is to describe the design of a study protocol for a randomized controlled trial in which the objective is to assess the efficacy of a specific cognitive behavioral therapy program for cannabis cessation in patients with FEP compared to standard treatment (psychoeducation). This is a single-blind randomized study with 1 year of follow-up. Patients are to be randomly assigned to one of two treatments: (1) specific cognitive behavioral therapy for cannabis cessation composed of 1-hour sessions once a week for 16 weeks, in addition to pharmacological treatment scheduled by the psychiatrist, or (2) a control group (psychoeducation + pharmacological treatment) following the same format as the experimental group. Participants in both groups will be evaluated at baseline (pre-treatment), at 16 weeks (post-treatment), and at 3 and 6 months and 1 year of follow-up. The primary outcome will be that patients in the experimental group will have greater cannabis cessation than patients in the control group at post-treatment. The secondary outcome will be that the experimental group will have better clinical and functional outcomes than the control group. This study provides the description of a clinical trial design based on specific cognitive behavioral therapy for cannabis cessation in FEP patients, aiming to improve clinical and functional outcome, as well as tackling the addictive disorder. NCT02319746 ClinicalTrials.gov Identifier. ClinicalTrials.gov Protocol and Results Registration System (PRS) Receipt Release Date: 15 December 2014.

  7. An experimental analysis on OSPF-TE convergence time

    NASA Astrophysics Data System (ADS)

    Huang, S.; Kitayama, K.; Cugini, F.; Paolucci, F.; Giorgetti, A.; Valcarenghi, L.; Castoldi, P.

    2008-11-01

    Open shortest path first (OSPF) protocol is commonly used as an interior gateway protocol (IGP) in MPLS and generalized MPLS (GMPLS) networks to determine the topology over which label-switched paths (LSPs) can be established. Traffic-engineering extensions (network states such as link bandwidth information, available wavelengths, signal quality, etc) have been recently enabled in OSPF (henceforth, called OSPF-TE) to support shortest path first (SPF) tree calculation upon different purposes, thus possibly achieving optimal path computation and helping improve resource utilization efficiency. Adding these features into routing phase can exploit the OSPF robustness, and no additional network component is required to manage the traffic-engineering information. However, this traffic-engineering enhancement also complicates OSPF behavior. Since network states change frequently upon the dynamic trafficengineered LSP setup and release, the network is easily driven from a stable state to unstable operating regimes. In this paper, we focus on studying the OSPF-TE stability in terms of convergence time. Convergence time is referred to the time spent by the network to go back to steady states upon any network state change. An external observation method (based on black-box method) is employed to estimate the convergence time. Several experimental test-beds are developed to emulate dynamic LSP setup/release, re-routing upon single-link failure. The experimental results show that with OSPF-TE the network requires more time to converge compared to the conventional OSPF protocol without TE extension. Especially, in case of wavelength-routed optical network (WRON), introducing per wavelength availability and wavelength continuity constraint to OSPF-TE suffers severe convergence time and a large number of advertised link state advertisements (LSAs). Our study implies that long convergence time and large number of LSAs flooded in the network might cause scalability problems in OSPF-TE and impose limitations on OSPF-TE applications. New solutions to mitigate the s convergence time and to reduce the amount of state information are desired in the future.

  8. Cortisol Release in Response to UVB Exposure in Xiphophorus Fish

    PubMed Central

    Contreras, Adam J.; Boswell, Mikki; Downs, Kevin P.; Pasquali, Amanda; Walter, Ronald B.

    2014-01-01

    Xiphophorus fishes are comprised of 26 known species. Interspecies hybridization between select species has been utilized to produce experimental models to study melanoma development. Xiphophorus melanoma induction protocols utilize ultraviolet light (UVB) to induce DNA damage and associated downstream tumorigenesis. However, the impact of induced stress caused by the UVB treatment of the experimental animals undergoing tumor induction protocols has not been assessed. Stress is an adaptive physiological response to excessive or unpredictable environmental stimuli. The stress response in fishes may be measured by assay of cortisol released into the water. Here, we present results from investigations of stress response during experimental treatment and UVB exposure in X. maculatus Jp 163 B, X. couchianus, and F1 interspecies hybrids produced from the mating X. maculatus Jp 163 B x X. couchianus. Overall, cortisol release rates for males and females after UVB exposure showed no statistical differences. At lower UVB doses (8 and 16 kJ/m2), X. couchianus exhibited 2 fold higher levels of DNA damage then either X. maculatus or the F1 hybrid. However, based on cortisol release rates, none of the fish types tested induced a primary stress response at the UVB lower doses (8 and 16 kJ/m2). In contrast, at a very high UVB dose (32 kJ/m2) both X. maculatus and the F1 hybrid showed a 5 fold increase in cortisol release rate. To determine the effect of pigmentation on UVB induced stress, wild type and albino X. hellerii were exposed to UVB (32 kJ/m2). Albino X. hellerii exhibited 3.7 fold increase in cortisol release while wild type X. hellerii did not exhibit a significant cortisol response to UVB. Overall, the data suggest the rather low UVB doses often employed in tumour induction protocols do not induce a primary stress response in Xiphophorus fishes. PMID:24625568

  9. Study protocol of a cluster randomized controlled trial evaluating the efficacy of a comprehensive pressure ulcer prevention programme for private for-profit nursing homes.

    PubMed

    Kwong, Enid Wai-yung; Lee, Paul Hong; Yeung, Kwan-mo

    2016-01-18

    Because the demand for government-subsidized nursing homes in Hong Kong outstrips the supply, the number of for-profit private nursing homes has been increasing rapidly. However, the standard of care in such homes is always criticized. Pressure ulcers are a major long-term care issue that is closely associated with the quality of care delivered in nursing home settings. The aim of this study is to evaluate the effectiveness of a pressure ulcer prevention programme for residents in private for-profit nursing homes. This is a two-arm cluster randomized controlled trial with an estimated sample size of 1088 residents and 74 care staff from eight for-profit private nursing homes. Eligible nursing homes will be those classified as category A2 homes in the Enhanced Bought Place Scheme (EBPS), having a capacity of around 130-150 beds, and no structured PU prevention protocol and/or programmes in place. Care staff will be health workers, personal care workers, and nurses who are front-line staff providing direct care to residents. Eight nursing homes will be randomly assigned to either an experimental or control group. The experimental group will be provided with an intensive training programme and will be involved in the implementation of a 16-week pressure ulcer prevention protocol, while the control group will deliver the usual pressure ulcer prevention care. The study outcomes are the pressure ulcer prevention knowledge and skills of the care staff and the prevalence and incidence of pressure ulcers. Data on the knowledge and skills of care staff, and prevalence of pressure ulcer will be collected at the base line, and then at the 8(th) week and at completion of the implementation of the protocol. The assessment of the incidence of pressures will start from before the commencement of the intensive training course to the end of the implementation of the protocol. In view of the negative impact of pressure ulcers, it is important to have an effective and evidence-based pressure ulcer prevention programme to improve preventive care in private for-profit nursing homes. The programme will potentially improve the knowledge and skills of care staff on the prevention of pressure ulcers and also lead to a reduction in the development of pressure ulcers in nursing homes. The Current Controlled Trial is NCT02270385, 18 October 2014.

  10. SPP: A data base processor data communications protocol

    NASA Technical Reports Server (NTRS)

    Fishwick, P. A.

    1983-01-01

    The design and implementation of a data communications protocol for the Intel Data Base Processor (DBP) is defined. The protocol is termed SPP (Service Port Protocol) since it enables data transfer between the host computer and the DBP service port. The protocol implementation is extensible in that it is explicitly layered and the protocol functionality is hierarchically organized. Extensive trace and performance capabilities have been supplied with the protocol software to permit optional efficient monitoring of the data transfer between the host and the Intel data base processor. Machine independence was considered to be an important attribute during the design and implementation of SPP. The protocol source is fully commented and is included in Appendix A of this report.

  11. Effectiveness of inquiry-based learning in an undergraduate exercise physiology course.

    PubMed

    Nybo, Lars; May, Michael

    2015-06-01

    The present study was conducted to investigate the effects of changing a laboratory physiology course for undergraduate students from a traditional step-by-step guided structure to an inquiry-based approach. With this aim in mind, quantitative and qualitative evaluations of learning outcomes (individual subject-specific tests and group interviews) were performed for a laboratory course in cardiorespiratory exercise physiology that was conducted in one year with a traditional step-by-step guided manual (traditional course) and the next year completed with an inquiry-based structure (I-based course). The I-based course was a guided inquiry course where students had to design the experimental protocol and conduct their own study on the basis of certain predefined criteria (i.e., they should evaluate respiratory responses to submaximal and maximal exercise and provide indirect and direct measures of aerobic exercise capacity). The results indicated that the overall time spent on the experimental course as well as self-evaluated learning outcomes were similar across groups. However, students in the I-based course used more time in preparation (102 ± 5 min) than students in the traditional course (42 ± 3 min, P < 0.05), and 65 ± 5% students in the I-based course searched for additional literature before experimentation compared with only 2 ± 1% students in the traditional course. Furthermore, students in the I-based course achieved a higher (P < 0.05) average score on the quantitative test (45 ± 3%) compared with students in the traditional course (31 ± 4%). Although students were unfamiliar with cardiorespiratory exercise physiology and the experimental methods before the course, it appears that an inquiry-based approach rather than one that provides students with step-by-step instructions may benefit learning outcomes in a laboratory physiology course. Copyright © 2015 The American Physiological Society.

  12. Evidence-based recommendations for bowel cleansing before colonoscopy in children: a report from a national working group.

    PubMed

    Turner, D; Levine, A; Weiss, B; Hirsh, A; Shamir, R; Shaoul, R; Berkowitz, D; Bujanover, Y; Cohen, S; Eshach-Adiv, O; Jamal, Gera; Kori, M; Lerner, A; On, A; Rachman, L; Rosenbach, Y; Shamaly, H; Shteyer, E; Silbermintz, A; Yerushalmi, B

    2010-12-01

    There are no current recommendations for bowel cleansing before colonoscopy in children. The Israeli Society of Pediatric Gastroenterology and Nutrition (ISPGAN) established an iterative working group to formulate evidence-based guidelines for bowel cleansing in children prior to colonoscopy. Data were collected by systematic review of the literature and via a national-based survey of all endoscopy units in Israel. Based on the strength of evidence, the Committee reached consensus on six recommended protocols in children. Guidelines were finalized after an open audit of ISPGAN members. Data on 900 colonoscopies per year were accrued, which represents all annual pediatric colonoscopies performed in Israel. Based on the literature review, the national survey, and the open audit, several age-stratified pediatric cleansing protocols were proposed: two PEG-ELS protocols (polyethylene-glycol with electrolyte solution); Picolax-based protocol (sodium picosulphate with magnesium citrate); sodium phosphate protocol (only in children over the age of 12 years who are at low risk for renal damage); stimulant laxative-based protocol (e. g. bisacodyl); and a PEG 3350-based protocol. A population-based analysis estimated that the acute toxicity rate of oral sodium phosphate is at most 3/7320 colonoscopies (0.041 %). Recommendations on diet and enema use are provided in relation to each proposed protocol. There is no ideal bowel cleansing regimen and, thus, various protocols are in use. We propose several evidence-based protocols to optimize bowel cleansing in children prior to colonoscopy and minimize adverse events. © Georg Thieme Verlag KG Stuttgart · New York.

  13. Efficiency and security problems of anonymous key agreement protocol based on chaotic maps

    NASA Astrophysics Data System (ADS)

    Yoon, Eun-Jun

    2012-07-01

    In 2011, Niu-Wang proposed an anonymous key agreement protocol based on chaotic maps in [Niu Y, Wang X. An anonymous key agreement protocol based on chaotic maps. Commun Nonlinear Sci Simulat 2011;16(4):1986-92]. Niu-Wang's protocol not only achieves session key agreement between a server and a user, but also allows the user to anonymously interact with the server. Nevertheless, this paper points out that Niu-Wang's protocol has the following efficiency and security problems: (1) The protocol has computational efficiency problem when a trusted third party decrypts the user sending message. (2) The protocol is vulnerable to Denial of Service (DoS) attack based on illegal message modification by an attacker.

  14. Measurement device-independent quantum dialogue

    NASA Astrophysics Data System (ADS)

    Maitra, Arpita

    2017-12-01

    Very recently, the experimental demonstration of quantum secure direct communication (QSDC) with state-of-the-art atomic quantum memory has been reported (Zhang et al. in Phys Rev Lett 118:220501, 2017). Quantum dialogue (QD) falls under QSDC where the secrete messages are communicated simultaneously between two legitimate parties. The successful experimental demonstration of QSDC opens up the possibilities for practical implementation of QD protocols. Thus, it is necessary to analyze the practical security issues of QD protocols for future implementation. Since the very first proposal for QD by Nguyen (Phys Lett A 328:6-10, 2004), a large number of variants and extensions have been presented till date. However, all of those leak half of the secret bits to the adversary through classical communications of the measurement results. In this direction, motivated by the idea of Lo et al. (Phys Rev Lett 108:130503, 2012), we propose a measurement device-independent quantum dialogue scheme which is resistant to such information leakage as well as side-channel attacks. In the proposed protocol, Alice and Bob, two legitimate parties, are allowed to prepare the states only. The states are measured by an untrusted third party who may himself behave as an adversary. We show that our protocol is secure under this adversarial model. The current protocol does not require any quantum memory, and thus, it is inherently robust against memory attacks. Such robustness might not be guaranteed in the QSDC protocol with quantum memory (Zhang et al. 2017).

  15. Lung-Protective Ventilation Initiated in the Emergency Department (LOV-ED): A Quasi-Experimental, Before-After Trial.

    PubMed

    Fuller, Brian M; Ferguson, Ian T; Mohr, Nicholas M; Drewry, Anne M; Palmer, Christopher; Wessman, Brian T; Ablordeppey, Enyo; Keeperman, Jacob; Stephens, Robert J; Briscoe, Cristopher C; Kolomiets, Angelina A; Hotchkiss, Richard S; Kollef, Marin H

    2017-09-01

    We evaluated the efficacy of an emergency department (ED)-based lung-protective mechanical ventilation protocol for the prevention of pulmonary complications. This was a quasi-experimental, before-after study that consisted of a preintervention period, a run-in period of approximately 6 months, and a prospective intervention period. The intervention was a multifaceted ED-based mechanical ventilator protocol targeting lung-protective tidal volume, appropriate setting of positive end-expiratory pressure, rapid oxygen weaning, and head-of-bed elevation. A propensity score-matched analysis was used to evaluate the primary outcome, which was the composite incidence of acute respiratory distress syndrome and ventilator-associated conditions. A total of 1,192 patients in the preintervention group and 513 patients in the intervention group were included. Lung-protective ventilation increased by 48.4% in the intervention group. In the propensity score-matched analysis (n=490 in each group), the primary outcome occurred in 71 patients (14.5%) in the preintervention group compared with 36 patients (7.4%) in the intervention group (adjusted odds ratio 0.47; 95% confidence interval [CI] 0.31 to 0.71). There was an increase in ventilator-free days (mean difference 3.7; 95% CI 2.3 to 5.1), ICU-free days (mean difference 2.4; 95% CI 1.0 to 3.7), and hospital-free days (mean difference 2.4; 95% CI 1.2 to 3.6) associated with the intervention. The mortality rate was 34.1% in the preintervention group and 19.6% in the intervention group (adjusted odds ratio 0.47; 95% CI 0.35 to 0.63). Implementing a mechanical ventilator protocol in the ED is feasible and is associated with significant improvements in the delivery of safe mechanical ventilation and clinical outcome. Copyright © 2017 American College of Emergency Physicians. Published by Elsevier Inc. All rights reserved.

  16. Developing leadership capacity for guideline use: a pilot cluster randomized control trial.

    PubMed

    Gifford, Wendy A; Davies, Barbara L; Graham, Ian D; Tourangeau, Ann; Woodend, A Kirsten; Lefebre, Nancy

    2013-02-01

    The importance of leadership to influence nurses' use of clinical guidelines has been well documented. However, little is known about how to develop and evaluate leadership interventions for guideline use. The purpose of this study was to pilot a leadership intervention designed to influence nurses' use of guideline recommendations when caring for patients with diabetic foot ulcers in home care nursing. This paper reports on the feasibility of implementing the study protocol, the trial findings related to nursing process outcomes, and leadership behaviors. A mixed methods pilot study was conducted with a post-only cluster randomized controlled trial and descriptive qualitative interviews. Four units were randomized to control or experimental groups. Clinical and management leadership teams participated in a 12-week leadership intervention (workshop, teleconferences). Participants received summarized chart audit data, identified goals for change, and created a team leadership action. Criteria to assess feasibility of the protocol included: design, intervention, measures, and data collection procedures. For the trial, chart audits compared differences in nursing process outcomes. 8-item nursing assessments score. Secondary outcome: 5-item score of nursing care based on goals for change identified by intervention participants. Qualitative interviews described leadership behaviors that influenced guideline use. Conducting this pilot showed some aspects of the study protocol were feasible, while others require further development. Trial findings observed no significant difference in the primary outcome. A significant increase was observed in the 5-item score chosen by intervention participants (p = 0.02). In the experimental group more relations-oriented leadership behaviors, audit and feedback and reminders were described as leadership strategies. Findings suggest that a leadership intervention has the potential to influence nurses' use of guideline recommendations, but further work is required to refine the intervention and outcome measures. A taxonomy of leadership behaviors is proposed to inform future research. © 2012 The authors. World Views on Evidence-Based Nursing © Sigma Theta Tau International.

  17. Comment on "flexible protocol for quantum private query based on B92 protocol"

    NASA Astrophysics Data System (ADS)

    Chang, Yan; Zhang, Shi-Bin; Zhu, Jing-Min

    2017-03-01

    In a recent paper (Quantum Inf Process 13:805-813, 2014), a flexible quantum private query (QPQ) protocol based on B92 protocol is presented. Here we point out that the B92-based QPQ protocol is insecure in database security when the channel has loss, that is, the user (Alice) will know more records in Bob's database compared with she has bought.

  18. The Cultivation of Arabidopsis for Experimental Research Using Commercially Available Peat-Based and Peat-Free Growing Media

    PubMed Central

    Drake, Tiffany; Keating, Mia; Summers, Rebecca; Yochikawa, Aline; Pitman, Tom

    2016-01-01

    Experimental research involving Arabidopsis thaliana often involves the quantification of phenotypic traits during cultivation on compost or other growing media. Many commercially-available growing media contain peat, but peat extraction is not sustainable due to its very slow rate of formation. Moreover, peat extraction reduces peatland biodiversity and releases stored carbon and methane into the atmosphere. Here, we compared the experimental performance of Arabidopsis on peat-based and several types of commercially-available peat-free growing media (variously formed from coir, composted bark, wood-fibre, and domestic compost), to provide guidance for reducing peat use in plant sciences research with Arabidopsis. Arabidopsis biomass accumulation and seed yield were reduced by cultivation on several types of peat-free growing media. Arabidopsis performed extremely poorly on coir alone, presumably because this medium was completely nitrate-free. Some peat-free growing media were more susceptible to fungal contamination. We found that autoclaving of control (peat-based) growing media had no effect upon any physiological parameters that we examined, compared with non-autoclaved control growing media, under our experimental conditions. Overall, we conclude that Arabidopsis performs best when cultivated on peat-based growing media because seed yield was almost always reduced when peat-free media were used. This may be because standard laboratory protocols and growth conditions for Arabidopsis are optimized for peat-based media. However, during the vegetative growth phase several phenotypic traits were comparable between plants cultivated on peat-based and some peat-free media, suggesting that under certain circumstances peat-free media can be suitable for phenotypic analysis of Arabidopsis. PMID:27088495

  19. Coping-Infused Dialogue through Patient-Preferred Live Music: A Medical Music Therapy Protocol and Randomized Pilot Study for Hospitalized Organ Transplant Patients.

    PubMed

    Hogan, Tyler James; Silverman, Michael J

    2015-01-01

    Solid organ transplant patients often experience a variety of psychosocial stressors that can lead to distress and may hinder successful recovery. Using coping-infused dialogue (CID) through patient- preferred live music (PPLM) music therapy sessions may improve mood and decrease pain while also imparting psychoeducational knowledge concerning the identification of local and global problems and coping skills. The purpose of this pilot study was to develop a coping-based medical music therapy protocol that combines coping-infused dialogue (CID) with patient-preferred live music (PPLM) and measure the effects of the resulting CID-PPLM protocol on mood (positive and negative affect) and pain in hospitalized transplant patients. Our study used a pre-/posttest single-session wait-list control design. Participants (N=25) were randomly assigned to experimental (CID-PPLM) or control (usual care) conditions. Participants in the CID-PPLM condition received a single 30-minute session that integrated stressor identification and knowledge of coping skills (CID) with patient-preferred live music (PPLM). Results indicated no between-group differences at pretest and significant correlations between pre- and posttest measures. Concerning posttest ANCOVA analyses, there were significant between-group differences in positive affect, negative affect, and pain, with experimental participants having more favorable posttest scores than control participants. Effect sizes were in the medium-to-large range for positive affect (η2=.198), negative affect (η2=.422), and pain (η2=.303). CID through receptive PPLM may be an effective protocol for improving mood and decreasing pain in organ transplant recipients. MT interventions can be an important tool to develop rapport and enhance outcomes with patients. As greater engagement during interventions may have stronger treatment effects, we recommend future research examining patient engagement as a potential mediator of intervention effects, as well as the number of sessions required to maximize clinical outcomes. © the American Music Therapy Association 2015. All rights reserved. For permissions, please e-mail: journals.permissions@oup.com.

  20. Effect of an Incontinence Training Program on Nursing Home Staff's Knowledge, Attitudes, and Behavior.

    ERIC Educational Resources Information Center

    Campbell, Emily B; And Others

    1991-01-01

    Nursing staff (n=166) in four nursing homes participated in quasi-experimental study to measure knowledge and attitudes about urinary incontinence and compliance with toileting protocols. Intervention group (n=96) showed slight increase in knowledge; their attitudes remained positive over four testing times. Compliance with protocol was only 72…

  1. Recreational trampling experiments: Effects of trampler weight and shoe type

    Treesearch

    David N. Cole

    1995-01-01

    A standard protocol for conducting experimental trampling studies was developed by Cole and Bayfield (1993). Two variables that were not standardized in that protocol are the type of shoe worn by tramplers and the weight of tramplers. In a study conducted in four different vegetation types, tramplers wearing lug-soled boots caused significantly more immediate...

  2. An analytical approach to test and design upper limb prosthesis.

    PubMed

    Veer, Karan

    2015-01-01

    In this work the signal acquiring technique, the analysis models and the design protocols of the prosthesis are discussed. The different methods to estimate the motion intended by the amputee from surface electromyogram (SEMG) signals based on time and frequency domain parameters are presented. The experiment proposed that the used techniques can help significantly in discriminating the amputee's motions among four independent activities using dual channel set-up. Further, based on experimental results, the design and working of an artificial arm have been covered under two constituents--the electronics design and the mechanical assembly. Finally, the developed hand prosthesis allows the amputated persons to perform daily routine activities easily.

  3. Universal quantum computation with temporal-mode bilayer square lattices

    NASA Astrophysics Data System (ADS)

    Alexander, Rafael N.; Yokoyama, Shota; Furusawa, Akira; Menicucci, Nicolas C.

    2018-03-01

    We propose an experimental design for universal continuous-variable quantum computation that incorporates recent innovations in linear-optics-based continuous-variable cluster state generation and cubic-phase gate teleportation. The first ingredient is a protocol for generating the bilayer-square-lattice cluster state (a universal resource state) with temporal modes of light. With this state, measurement-based implementation of Gaussian unitary gates requires only homodyne detection. Second, we describe a measurement device that implements an adaptive cubic-phase gate, up to a random phase-space displacement. It requires a two-step sequence of homodyne measurements and consumes a (non-Gaussian) cubic-phase state.

  4. Using an Animal Group Vigilance Practical Session to Give Learners a "Heads-Up" to Problems in Experimental Design

    ERIC Educational Resources Information Center

    Rands, Sean A.

    2011-01-01

    The design of experimental ecological fieldwork is difficult to teach to classes, particularly when protocols for data collection are normally carefully controlled by the class organiser. Normally, reinforcement of the some problems of experimental design such as the avoidance of pseudoreplication and appropriate sampling techniques does not occur…

  5. A water pumping control system with a programmable logic controller (PLC) and industrial wireless modules for industrial plants--an experimental setup.

    PubMed

    Bayindir, Ramazan; Cetinceviz, Yucel

    2011-04-01

    This paper describes a water pumping control system that is designed for production plants and implemented in an experimental setup in a laboratory. These plants contain harsh environments in which chemicals, vibrations or moving parts exist that could potentially damage the cabling or wires that are part of the control system. Furthermore, the data has to be transferred over paths that are accessible to the public. The control systems that it uses are a programmable logic controller (PLC) and industrial wireless local area network (IWLAN) technologies. It is implemented by a PLC, an communication processor (CP), two IWLAN modules, and a distributed input/output (I/O) module, as well as the water pump and sensors. Our system communication is based on an Industrial Ethernet and uses the standard Transport Control Protocol/Internet Protocol for parameterisation, configuration and diagnostics. The main function of the PLC is to send a digital signal to the water pump to turn it on or off, based on the tank level, using a pressure transmitter and inputs from limit switches that indicate the level of the water in the tank. This paper aims to provide a convenient solution in process plants where cabling is not possible. It also has lower installation and maintenance cost, provides reliable operation, and robust and flexible construction, suitable for industrial applications. Copyright © 2010 ISA. Published by Elsevier Ltd. All rights reserved.

  6. DETERMINATION OF HEAT TRANSFER COEFFICIENTS FOR FRENCH PLASTIC SEMEN STRAW SUSPENDED IN STATIC NITROGEN VAPOR OVER LIQUID NITROGEN.

    PubMed

    Santo, M V; Sansinena, M; Chirife, J; Zaritzky, N

    2015-01-01

    The use of mathematical models describing heat transfer during the freezing process is useful for the improvement of cryopreservation protocols. A widespread practice for cryopreservation of spermatozoa of domestic animal species consists of suspending plastic straws in nitrogen vapor before plunging into liquid nitrogen. Knowledge of surface heat transfer coefficient (h) is mandatory for computational modelling; however, h values for nitrogen vapor are not available. In the present study, surface heat transfer coefficients for plastic French straws immersed in nitrogen vapor over liquid nitrogen was determined; vertical and horizontal positions were considered. Heat transfer coefficients were determined from the measurement of time-temperature curves and from numerical solution of heat transfer partial differential equation under transient conditions using finite elements. The h values experimentally obtained for horizontal and vertically placed straws were compared to those calculated using correlations based on the Nusselt number for natural convection. For horizontal straws the average obtained value was h=12.5 ± 1.2 W m(2) K and in the case of vertical straws h=16 ± 2.48 W m(2) K. The numerical simulation validated against experimental measurements, combined with accurate h values provides a reliable tool for the prediction of freezing curves of semen-filled straws immersed in nitrogen vapor. The present study contributes to the understanding of the cryopreservation techniques for sperm freezing based on engineering concepts, improving the cooling protocols and the manipulation of the straws.

  7. Using a Low Cost Flight Simulation Environment for Interdisciplinary Education

    NASA Technical Reports Server (NTRS)

    Khan, M. Javed; Rossi, Marcia; ALi, Syed F.

    2004-01-01

    A multi-disciplinary and inter-disciplinary education is increasingly being emphasized for engineering undergraduates. However, often the focus is on interaction between engineering disciplines. This paper discusses the experience at Tuskegee University in providing interdisciplinary research experiences for undergraduate students in both Aerospace Engineering and Psychology through the utilization of a low cost flight simulation environment. The environment, which is pc-based, runs a low-cost of-the-shelf software and is configured for multiple out-of-the-window views and a synthetic heads down display with joystick, rudder and throttle controls. While the environment is being utilized to investigate and evaluate various strategies for training novice pilots, students were involved to provide them with experience in conducting such interdisciplinary research. On the global inter-disciplinary level these experiences included developing experimental designs and research protocols, consideration of human participant ethical issues, and planning and executing the research studies. During the planning phase students were apprised of the limitations of the software in its basic form and the enhancements desired to investigate human factors issues. A number of enhancements to the flight environment were then undertaken, from creating Excel macros for determining the performance of the 'pilots', to interacting with the software to provide various audio/video cues based on the experimental protocol. These enhancements involved understanding the flight model and performance, stability & control issues. Throughout this process, discussions of data analysis included a focus from a human factors perspective as well as an engineering point of view.

  8. Recent advances in hopanoids analysis: Quantification protocols overview, main research targets and selected problems of complex data exploration.

    PubMed

    Zarzycki, Paweł K; Portka, Joanna K

    2015-09-01

    Pentacyclic triterpenoids, particularly hopanoids, are organism-specific compounds and are generally considered as useful biomarkers that allow fingerprinting and classification of biological, environmental and geological samples. Simultaneous quantification of various hopanoids together with battery of related non-polar and low-molecular mass compounds may provide principal information for geochemical and environmental research focusing on both modern and ancient investigations. Target compounds can be derived from microbial biomass, water columns, sediments, coals, crude fossils or rocks. This create number of analytical problems due to different composition of the analytical matrix and interfering compounds and therefore, proper optimization of quantification protocols for such biomarkers is still the challenge. In this work we summarizing typical analytical protocols that were recently applied for quantification of hopanoids like compounds from different samples. Main steps including components of interest extraction, pre-purification, fractionation, derivatization and quantification involving gas (1D and 2D) as well as liquid separation techniques (liquid-liquid extraction, solid-phase extraction, planar and low resolution column chromatography, high-performance liquid chromatography) are described and discussed from practical point of view, mainly based on the experimental papers that were published within last two years, where significant increase in hopanoids research was noticed. The second aim of this review is to describe the latest research trends concerning determination of hopanoids and related low-molecular mass lipids analyzed in various samples including sediments, rocks, coals, crude oils and plant fossils as well as stromatolites and microbial biomass cultivated under different conditions. It has been found that majority of the most recent papers are based on uni- or bivariate approach for complex data analysis. Data interpretation involves number of physicochemical parameters and hopanoids quantities or given biomarkers mass ratios derived from high-throughput separation and detection systems, typically GC-MS and HPLC-MS. Based on quantitative data reported in recently published experimental works it has been demonstrated that multivariate data analysis using e.g. principal components computations may significantly extend our knowledge concerning proper biomarkers selection and samples classification by means of hopanoids and related non-polar compounds. Copyright © 2015 Elsevier Ltd. All rights reserved.

  9. Imaging the beating heart in the mouse using intravital microscopy techniques

    PubMed Central

    Vinegoni, Claudio; Aguirre, Aaron D; Lee, Sungon; Weissleder, Ralph

    2017-01-01

    Real-time microscopic imaging of moving organs at single-cell resolution represents a major challenge in studying complex biology in living systems. Motion of the tissue from the cardiac and respiratory cycles severely limits intravital microscopy by compromising ultimate spatial and temporal imaging resolution. However, significant recent advances have enabled single-cell resolution imaging to be achieved in vivo. In this protocol, we describe experimental procedures for intravital microscopy based on a combination of thoracic surgery, tissue stabilizers and acquisition gating methods, which enable imaging at the single-cell level in the beating heart in the mouse. Setup of the model is typically completed in 1 h, which allows 2 h or more of continuous cardiac imaging. This protocol can be readily adapted for the imaging of other moving organs, and it will therefore broadly facilitate in vivo high-resolution microscopy studies. PMID:26492138

  10. Developments in fiber optics for distribution automation

    NASA Technical Reports Server (NTRS)

    Kirkham, H.; Friend, H.; Jackson, S.; Johnston, A.

    1991-01-01

    An optical fiber based communications system of unusual design is described. The system consists of a network of optical fibers overlaid on the distribution system. It is configured as a large number of interconnected rings, with some spurs. Protocols for access to and control of the network are described. Because of the way they function, the protocols are collectively called AbNET, in commemoration of the microbiologists' abbreviation Ab for antibody. Optical data links that could be optically powered are described. There are two versions, each of which has a good frequency response and minimal filtering requirements. In one, a conventional FM pulse train is used at the transmitter, and a novel form of phase-locked loop is used as demodulator. In the other, the FM transmitter is replaced with a pulse generator arranged so that the period between pulses represents the modulating signal. Transmitter and receiver designs, including temperature compensation methods, are presented. Experimental results are given.

  11. PRESAGE: PRivacy-preserving gEnetic testing via SoftwAre Guard Extension.

    PubMed

    Chen, Feng; Wang, Chenghong; Dai, Wenrui; Jiang, Xiaoqian; Mohammed, Noman; Al Aziz, Md Momin; Sadat, Md Nazmus; Sahinalp, Cenk; Lauter, Kristin; Wang, Shuang

    2017-07-26

    Advances in DNA sequencing technologies have prompted a wide range of genomic applications to improve healthcare and facilitate biomedical research. However, privacy and security concerns have emerged as a challenge for utilizing cloud computing to handle sensitive genomic data. We present one of the first implementations of Software Guard Extension (SGX) based securely outsourced genetic testing framework, which leverages multiple cryptographic protocols and minimal perfect hash scheme to enable efficient and secure data storage and computation outsourcing. We compared the performance of the proposed PRESAGE framework with the state-of-the-art homomorphic encryption scheme, as well as the plaintext implementation. The experimental results demonstrated significant performance over the homomorphic encryption methods and a small computational overhead in comparison to plaintext implementation. The proposed PRESAGE provides an alternative solution for secure and efficient genomic data outsourcing in an untrusted cloud by using a hybrid framework that combines secure hardware and multiple crypto protocols.

  12. A Novel Quantum Solution to Privacy-Preserving Nearest Neighbor Query in Location-Based Services

    NASA Astrophysics Data System (ADS)

    Luo, Zhen-yu; Shi, Run-hua; Xu, Min; Zhang, Shun

    2018-04-01

    We present a cheating-sensitive quantum protocol for Privacy-Preserving Nearest Neighbor Query based on Oblivious Quantum Key Distribution and Quantum Encryption. Compared with the classical related protocols, our proposed protocol has higher security, because the security of our protocol is based on basic physical principles of quantum mechanics, instead of difficulty assumptions. Especially, our protocol takes single photons as quantum resources and only needs to perform single-photon projective measurement. Therefore, it is feasible to implement this protocol with the present technologies.

  13. Simulation of transmission electron microscope images of biological specimens.

    PubMed

    Rullgård, H; Ofverstedt, L-G; Masich, S; Daneholt, B; Oktem, O

    2011-09-01

    We present a new approach to simulate electron cryo-microscope images of biological specimens. The framework for simulation consists of two parts; the first is a phantom generator that generates a model of a specimen suitable for simulation, the second is a transmission electron microscope simulator. The phantom generator calculates the scattering potential of an atomic structure in aqueous buffer and allows the user to define the distribution of molecules in the simulated image. The simulator includes a well defined electron-specimen interaction model based on the scalar Schrödinger equation, the contrast transfer function for optics, and a noise model that includes shot noise as well as detector noise including detector blurring. To enable optimal performance, the simulation framework also includes a calibration protocol for setting simulation parameters. To test the accuracy of the new framework for simulation, we compare simulated images to experimental images recorded of the Tobacco Mosaic Virus (TMV) in vitreous ice. The simulated and experimental images show good agreement with respect to contrast variations depending on dose and defocus. Furthermore, random fluctuations present in experimental and simulated images exhibit similar statistical properties. The simulator has been designed to provide a platform for development of new instrumentation and image processing procedures in single particle electron microscopy, two-dimensional crystallography and electron tomography with well documented protocols and an open source code into which new improvements and extensions are easily incorporated. © 2011 The Authors Journal of Microscopy © 2011 Royal Microscopical Society.

  14. Command-line cellular electrophysiology for conventional and real-time closed-loop experiments.

    PubMed

    Linaro, Daniele; Couto, João; Giugliano, Michele

    2014-06-15

    Current software tools for electrophysiological experiments are limited in flexibility and rarely offer adequate support for advanced techniques such as dynamic clamp and hybrid experiments, which are therefore limited to laboratories with a significant expertise in neuroinformatics. We have developed lcg, a software suite based on a command-line interface (CLI) that allows performing both standard and advanced electrophysiological experiments. Stimulation protocols for classical voltage and current clamp experiments are defined by a concise and flexible meta description that allows representing complex waveforms as a piece-wise parametric decomposition of elementary sub-waveforms, abstracting the stimulation hardware. To perform complex experiments lcg provides a set of elementary building blocks that can be interconnected to yield a large variety of experimental paradigms. We present various cellular electrophysiological experiments in which lcg has been employed, ranging from the automated application of current clamp protocols for characterizing basic electrophysiological properties of neurons, to dynamic clamp, response clamp, and hybrid experiments. We finally show how the scripting capabilities behind a CLI are suited for integrating experimental trials into complex workflows, where actual experiment, online data analysis and computational modeling seamlessly integrate. We compare lcg with two open source toolboxes, RTXI and RELACS. We believe that lcg will greatly contribute to the standardization and reproducibility of both simple and complex experiments. Additionally, on the long run the increased efficiency due to a CLI will prove a great benefit for the experimental community. Copyright © 2014 Elsevier B.V. All rights reserved.

  15. Near-optimal protocols in complex nonequilibrium transformations

    DOE PAGES

    Gingrich, Todd R.; Rotskoff, Grant M.; Crooks, Gavin E.; ...

    2016-08-29

    The development of sophisticated experimental means to control nanoscale systems has motivated efforts to design driving protocols that minimize the energy dissipated to the environment. Computational models are a crucial tool in this practical challenge. In this paper, we describe a general method for sampling an ensemble of finite-time, nonequilibrium protocols biased toward a low average dissipation. In addition, we show that this scheme can be carried out very efficiently in several limiting cases. As an application, we sample the ensemble of low-dissipation protocols that invert the magnetization of a 2D Ising model and explore how the diversity of themore » protocols varies in response to constraints on the average dissipation. In this example, we find that there is a large set of protocols with average dissipation close to the optimal value, which we argue is a general phenomenon.« less

  16. Numerical approach for unstructured quantum key distribution

    PubMed Central

    Coles, Patrick J.; Metodiev, Eric M.; Lütkenhaus, Norbert

    2016-01-01

    Quantum key distribution (QKD) allows for communication with security guaranteed by quantum theory. The main theoretical problem in QKD is to calculate the secret key rate for a given protocol. Analytical formulas are known for protocols with symmetries, since symmetry simplifies the analysis. However, experimental imperfections break symmetries, hence the effect of imperfections on key rates is difficult to estimate. Furthermore, it is an interesting question whether (intentionally) asymmetric protocols could outperform symmetric ones. Here we develop a robust numerical approach for calculating the key rate for arbitrary discrete-variable QKD protocols. Ultimately this will allow researchers to study ‘unstructured' protocols, that is, those that lack symmetry. Our approach relies on transforming the key rate calculation to the dual optimization problem, which markedly reduces the number of parameters and hence the calculation time. We illustrate our method by investigating some unstructured protocols for which the key rate was previously unknown. PMID:27198739

  17. A Smart Sensor for Defending against Clock Glitching Attacks on the I2C Protocol in Robotic Applications

    PubMed Central

    Jiménez-Naharro, Raúl; Gómez-Bravo, Fernando; Medina-García, Jonathan; Sánchez-Raya, Manuel; Gómez-Galán, Juan Antonio

    2017-01-01

    This paper presents a study about hardware attacking and clock signal vulnerability. It considers a particular type of attack on the clock signal in the I2C protocol, and proposes the design of a new sensor for detecting and defending against this type of perturbation. The analysis of the attack and the defense is validated by means of a configurable experimental platform that emulates a differential drive robot. A set of experimental results confirm the interest of the studied vulnerabilities and the efficiency of the proposed sensor in defending against this type of situation. PMID:28346337

  18. Adaptive hybrid optimal quantum control for imprecisely characterized systems.

    PubMed

    Egger, D J; Wilhelm, F K

    2014-06-20

    Optimal quantum control theory carries a huge promise for quantum technology. Its experimental application, however, is often hindered by imprecise knowledge of the input variables, the quantum system's parameters. We show how to overcome this by adaptive hybrid optimal control, using a protocol named Ad-HOC. This protocol combines open- and closed-loop optimal control by first performing a gradient search towards a near-optimal control pulse and then an experimental fidelity estimation with a gradient-free method. For typical settings in solid-state quantum information processing, adaptive hybrid optimal control enhances gate fidelities by an order of magnitude, making optimal control theory applicable and useful.

  19. Computer simulation of fibrillation threshold measurements and electrophysiologic testing procedures

    NASA Technical Reports Server (NTRS)

    Grumbach, M. P.; Saxberg, B. E.; Cohen, R. J.

    1987-01-01

    A finite element model of cardiac conduction was used to simulate two experimental protocols: 1) fibrillation threshold measurements and 2) clinical electrophysiologic (EP) testing procedures. The model consisted of a cylindrical lattice whose properties were determined by four parameters: element length, conduction velocity, mean refractory period, and standard deviation of refractory periods. Different stimulation patterns were applied to the lattice under a given set of lattice parameter values and the response of the model was observed through a simulated electrocardiogram. The studies confirm that the model can account for observations made in experimental fibrillation threshold measurements and in clinical EP testing protocols.

  20. Effects of scapulohumeral rehabilitation protocol on trunk control recovery in patients with subacute stroke: A pilot randomized controlled trial.

    PubMed

    Dell'Uomo, Daniela; Morone, Giovanni; Centrella, Antonio; Paolucci, Stefano; Caltagirone, Carlo; Grasso, Maria Grazia; Traballesi, Marco; Iosa, Marco

    2017-01-01

    Despite upper limb rehabilitation is widely investigated in patients with stroke, the effects of scapulohumeral rehabilitation on trunk stabillization are mainly unknown. To test the effects of scapulohumeral rehabilitation protocol on trunk control recovery in patients with subacute stroke. A pilot randomized controlled trial with two groups of 14 patients each one performing 20 minutes per day, 5 days a week, for 6 weeks in add on to standard therapy. Experimental group performed a specific scapulohumeral rehabilitation protocol aiming to improve trunk competencies whereas control group performed conventional arm rehabilitation. Clinical scale tests and accelerometric evaluations were performed pre- and post-treatment. Experimental groups showed better scores at discharge at Trunk impairment Scale (p < 0.001), Barthel Index (p = 0.024), Trunk Control Test (p = 0.002), Sitting Balance Scale (p = 0.002), but neither at Fugl-Meyer Scale (p = 0.194) nor Modified Ashworth Scale (p = 0.114). Accelerometric analysis showed higher stability of trunk for experimental group especially during static and dynamic items. The recovery of scapulohumeral functions also acts on trunk stabilization post-stroke.

Top